Method for quantitative evaluation on information safety vulnerability of SCADA system

A system information and quantitative assessment technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of not considering the impact of SCADA system vulnerability, not considering defense measures, etc.

Active Publication Date: 2017-12-19
SOUTHWEST JIAOTONG UNIV
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] First, the basic form of the attack tree is currently used, without considering the defense measures, so there is a problem that the impact of the defense measures on the vulnerability of the SCADA system is not considered; second, the above-mentioned prior art calculates the relevant indicators of the attack tree leaf nodes , the weight distribution of multiple indicators is set based on experience, and no more objective mathematical method is used to calculate and determine the weight value of indicators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for quantitative evaluation on information safety vulnerability of SCADA system
  • Method for quantitative evaluation on information safety vulnerability of SCADA system
  • Method for quantitative evaluation on information safety vulnerability of SCADA system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0058] In this example, an example of an attack defense tree of a SCADA system is constructed, and the method of the present invention is applied to evaluate the vulnerability of its leaf nodes, attack sequences and the overall system.

[0059] According to the definition and composition structure of SCADA system, its information security threats may come from three places, that is, from the master station, slave station and communication network. Through analysis, construct such as figure 2 An example of an attack defense tree is shown. The meanings of its root node, intermediate node, leaf node and defense node are shown in Table 1:

[0060] Table 1 Meaning of each node in the attack defense tree

[0061]

[0062] In practical applications, evaluators can establish corresponding scoring standards according to the actual situation, and then give the corresponding attribute score of each leaf node according to this standard. In this example, the scoring standard shown in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for quantitative evaluation on the information safety vulnerability of an SCADA system, provides a method for evaluating the information safety vulnerability of the SCADA system based on analytic hierarchy process empowerment and an attack defense tree model and aims to utilize an analytic hierarchy process to scientifically endow weight values for calculation indexes of leaf nodes, then calculate leaf nodes and attack sequences of attack defense trees, the overall vulnerability of the system and the vulnerability sensitivity of the leaf nodes and thus determine key leaf nodes affecting the information safety vulnerability of the SCADA system. A quantified reference basis specific to adoption of defensive measures for weak links of the SCADA system is provided for technicians.

Description

technical field [0001] The invention relates to a method for quantitatively evaluating the vulnerability of SCADA system information security. Background technique [0002] SCADA (Supervisory Control and Data Acquisition) system is a remote supervisory control and data acquisition system that comprehensively applies computer technology, control technology, communication and network technology. It is widely used in electric power, petroleum and petrochemical, rail transit, mining operations and other fields. It is an important part of the country's key infrastructure and is related to the country's strategic security. [0003] The modern industrial SCADA system has the characteristics of network and intelligence, but these characteristics introduce the inherent vulnerability and attack threat of the network into the SCADA system. In June 2012, the State Council's "Several Opinions on Promoting the Development of Informatization and Effectively Guaranteeing Information Securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
Inventor 黄慧萍唐猛梁红琴
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products