首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于层次分析的信息物理网络多维攻击损毁评估
引用本文:洪晟,岳天羽,李新建.基于层次分析的信息物理网络多维攻击损毁评估[J].北京航空航天大学学报,2022,48(9):1827-1835.
作者姓名:洪晟  岳天羽  李新建
作者单位:1.北京航空航天大学 网络空间安全学院, 北京 100083
基金项目:国家重点研发计划2019YFB1706001工信部高质量发展专项TC210804R-2
摘    要:由于信息物理网络交叉互联、多重连接的特点,易成为网络攻击的对象目标。通过对信息物理网络的网络体系架构和网络应用特点进行相关研究,提出了一种信息物理网络多维攻击损毁评估模型。将信息物理网络分为物理层、规则层、服务层3个维度,基于每个维度分别给出网络攻击损毁评估属性计算方法。通过对网络状态监测,可以得到拓扑稳定性、连通可用性、失效可控性,传输稳定性、丢包可用性、误码可控性,响应稳定性、业务可用性、风险可控性3个维度的攻击损毁评估属性。采用层次分析法得到信息物理网络3个不同维度及网络整体的攻击损毁评估结果,为信息物理网络的安全防护提供支撑与依据。模拟信息物理网络遭受分布式拒绝服务攻击,并采用所提方法进行攻击损毁评估,验证了所提模型的实用性和有效性。 

关 键 词:信息物理网络    网络攻击    多维攻击损毁评估    攻击损毁评估属性    层次分析法
收稿时间:2022-03-10

Multidimensional attack damage assessment of cyber-physical systems based on hierarchical analysis
Institution:1.School of Cyber Science and Technology, Beihang University, Beijing 100083, China2.China Tobacco Hubei Industrial LLC, Wuhan 430040, China
Abstract:With characteristics, such as cross interconnection and multiple connections, cyber-physical systems is susceptible to network attack. Through relevant research on its network architecture and on the characteristics of its network application, a model for multidimensional attack damage assessment is established. Firstly, the cyber-physical systems was divided in three dimensions: the physical layer, the rule layer and the service layer. For each layer, an attribute-based method for assessing the network attack damage was given. Then, through monitoring the network status, the attributes for attack damage assessment were obtained, which include topological stability, connectivity availability, failure controllability, transmission stability, packet loss availability, bit error controllability, response stability, service availability and risk controllability. Finally, the analytic hierarchy process was used to gain the evaluation results of the attack damage in each of the three different layers and the whole network, thus providing support and basis for the security protection of the network. Simulation of the DDoS attack on the cyber-physical systems, along with the application of the proposed method to evaluate the attack damage, verifies the practicability and effectiveness of the model. 
Keywords:
点击此处可从《北京航空航天大学学报》浏览原始摘要信息
点击此处可从《北京航空航天大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号