计算机科学 ›› 2023, Vol. 50 ›› Issue (9): 68-74.doi: 10.11896/jsjkx.230500233
王敬, 张淼, 刘杨, 李昊霖, 李昊天, 王佰玲, 魏玉良
WANG Jing, ZHANG Miao, LIU Yang, LI Haoling, LI Haotian, WANG Bailing, WEI Yuliang
摘要: 随着工业控制系统不断走向现代化和智能化,工业控制系统的安全问题日益凸显。然而,传统的工业控制系统往往仅关注信息安全或生产安全,不能同时兼顾两方面的安全问题。知识图谱作为一种结构化的数据表现形式,能够存储领域知识并建模知识之间的因果关系。现有研究大多使用知识图谱解决网络安全问题,鲜有研究将知识图谱用于解决工业控制系统的信息与生产安全问题。文中提出了一种面向流程工业控制系统的双安融合知识图谱构建方法,通过基于BERT的命名实体模型和图对齐等技术,有效地从工控领域网络安全数据库和实际化工生产相关文档中提取了实体和关系,并构建了流程工业双安融合知识图谱。该知识图谱融合了化工生产流程特征和网络攻击行为特征,能通过两种特征知识间的耦合关系为工控系统提供综合的网络安全和生产安全保障。
中图分类号:
[1]CONTI M,DONADEL D,TURRIN F.A survey on industrialcontrol system testbeds and datasets for security research[J].IEEE Communications Surveys & Tutorials,2021,23(4):2248-2294. [2]DING D,HAN Q L,XIANG Y,et al.A survey on security control and attack detection for industrial cyber-physical systems[J].Neurocomputing,2018,275:1674-1683. [3]WOLF M,SERPANOS D.Safety and security in cyber-physical systems and internet-of-things systems[C]//Proceedings of the IEEE.2017:9-20. [4]MAO S,ZHAO Y M,CHEN J H,et al.Development of process safety knowledge graph:a case study on delayed coking process[J].Computers & Chemical Engineering,2020,143:107094. [5]CHEN Z Y,LIU Y,VALERA-MEDINA A,et al.Multi-sourced modelling for strip breakage using knowledge graph embeddings[J].Procedia CIRP,2021,104:1884-1889. [6]LIANG H,PENG X J,ZHAO N,et al.An approach of top-down electric generation knowledge graph construction[J].IOP Conference Series:Earth and Environmental Science,2021,661(1):012021. [7]WANG Z,ZHANG B,GAO D.A novel knowledge graph deve-lopment for industry design:A case study on indirect coal liquefaction process[J].Computers in Industry,2022,139:103647. [8]EIBECK A,LIM M Q,KRAFT M.J-Park Simulator:anontology-based platform for cross-domain scenarios in process industry[J].Computers & Chemical Engineering,2019,131:106586. [9]JIA Y,QI Y,SHANG H,et al.A practical approach to constructing a knowledge graph for cybersecurity[J].Engineering,2018,4(1):53-60. [10]LI K,ZHOU H,TU Z,et al.CSKB:A Cyber Security Know-ledge Base Based on Knowledge Graph[C]//International Conference on Security and Privacy in Digital Economy.Singapore:Springer, 2020:100-113. [11]RYEN V,SOYLU A,ROMAN D.Building semantic knowledge graphs from(semi-) structured data:a review[J].Future Internet,2022,14(5):129. [12]HOGAN A,BLOMQVIST E,COCHEZ M,et al.Knowledgegraphs[J].ACM Computing Surveys(CSUR),2021,54(4):1-37. [13]JI S,PAN S,CAMBRIA E,MARTTINEN P,et al.A survey on knowledge graphs:Representation,acquisition,and applications[J].IEEE Transactions on Neural Networks and Learning Systems,2021,33(2):494-514. [14]EILICKE C,CHEKOL M W,RUFFINELLI D,et al.Anytimebot tom-up rule learning for knowledge graph completion[C]//Proceedings of the 28th International Joint Conference on Artificial Intelligence.2019:3137-3143. [15]PIPLAI A,MITTAL S,JOSHI A,et al.Creating cybersecurity knowledge graphs from malware after action reports[J].IEEE Access,2020,8:211691-211703. [16]AL-MOSLMI T,OCAÑA M G,OPDAHL A L,et al.Named entity extraction for knowledge graphs:A literature overview[J].IEEE Access,2020,8:32862-32881. [17]DEVLIN J,CHANG M W,LEE K,et al.Bert:Pre-training of deep bidirectional transformers for language understanding[J].arXiv:1810.04805,2018. [18]VASWANI A,SHAZEER N,PARMAR N,et al.Attention isall you need[C]//Proceedings of the 31st International Confe-rence on Neural Information Processing Systems.2017:6000-6010. [19]HUANG Z,XU W,YU K.Bidirectional LSTM-CRF models for sequence tagging[J].arXiv:1508.01991,2015. [20]SOUZA F,NOGUEIRA R,LOTUFO R.Portuguese named entity recognition using BERT-CRF[J].arXiv:1909.10649,2019. [21]MILAJERDI S M,ESHETE B,GJOMEMO R,et al.Poirot:Aligning attack behavior with kernel audit records for cyber threat hunting[C]//Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security.2019:1795-1812. [22]NADEEM A,VERWER S,MOSKAL S,et al.Alert-driven attack graph generation using s-pdfa[J].IEEE Transactions on Dependable and Secure Computing,2021,19(2):731-746. |
|