Method for Quantitatively Assessing Information Security Vulnerability of Scada System

A system information and quantitative evaluation technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of not considering the defense measures and the impact of the vulnerability of the SCADA system

Active Publication Date: 2019-10-18
SOUTHWEST JIAOTONG UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] First, the basic form of the attack tree is currently used, without considering the defense measures, so there is a problem that the impact of the defense measures on the vulnerability of the SCADA system is not considered; second, the above-mentioned prior art calculates the relevant indicators of the attack tree leaf nodes , the weight distribution of multiple indicators is set based on experience, and no more objective mathematical method is used to calculate and determine the weight value of indicators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for Quantitatively Assessing Information Security Vulnerability of Scada System
  • Method for Quantitatively Assessing Information Security Vulnerability of Scada System
  • Method for Quantitatively Assessing Information Security Vulnerability of Scada System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0058] In this example, an example of an attack defense tree of a SCADA system is constructed, and the method of the present invention is applied to evaluate the vulnerability of its leaf nodes, attack sequences and the overall system.

[0059] According to the definition and composition structure of SCADA system, its information security threats may come from three places, that is, from the master station, slave station and communication network. Through analysis, construct such as figure 2 An example of an attack defense tree is shown. The meanings of its root node, intermediate node, leaf node and defense node are shown in Table 1:

[0060] Table 1 Meaning of each node in the attack defense tree

[0061]

[0062] In practical applications, evaluators can establish corresponding scoring standards according to the actual situation, and then give the corresponding attribute score of each leaf node according to this standard. In this example, the scoring standard shown in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for quantitatively evaluating the vulnerability of SCADA system information security. The invention proposes a SCADA system information security vulnerability assessment method based on the analytic hierarchy process empowerment and attack defense tree model. The purpose is to use the AHP to scientifically assign weight values ​​to each calculation index of the leaf node, and then calculate the vulnerability of the leaf node of the attack defense tree, the attack sequence and the system as a whole, as well as the vulnerability sensitivity of the leaf node, and then determine the impact on the SCADA system. The key leaf nodes of information security vulnerabilities provide a quantitative reference for technicians to take defensive measures against the weak links of the SCADA system.

Description

technical field [0001] The invention relates to a method for quantitatively evaluating the vulnerability of SCADA system information security. Background technique [0002] SCADA (Supervisory Control and Data Acquisition) system is a remote supervisory control and data acquisition system that comprehensively applies computer technology, control technology, communication and network technology. It is widely used in electric power, petroleum and petrochemical, rail transit, mining operations and other fields. It is an important part of the country's key infrastructure and is related to the country's strategic security. [0003] The modern industrial SCADA system has the characteristics of network and intelligence, but these characteristics introduce the inherent vulnerability and attack threat of the network into the SCADA system. In June 2012, the State Council's "Several Opinions on Promoting the Development of Informatization and Effectively Guaranteeing Information Securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
Inventor 黄慧萍唐猛梁红琴
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products