计算机科学 ›› 2025, Vol. 52 ›› Issue (6A): 240700068-7.doi: 10.11896/jsjkx.240700068
李维峰1, 谢江平2
LI Weifeng1, XIE Jiangping2
摘要: 文中探讨了基于数字孪生的系统安全测试方法,旨在通过数字孪生在系统生命周期早期进行安全设计,规避工业控制系统的潜在威胁。所提方法包括初步准备、四阶段渗透测试及报告生成,确保在系统构建前发现并验证漏洞。利用数字孪生模拟系统动态变化,提供数据保真度进行深入安全分析。通过模拟传感器与开关环境来验证所提方法有效性,识别并评估Modbus TCP/IP协议漏洞,提出改进建议。该研究为工业控制系统安全测试提供了新视角,展示了数字孪生在安全设计中的潜力,为未来系统安全分析与测试奠定了基础。
中图分类号:
[1]LI J N.Current Situation and Development Considerations of Industrial Information Security Protection[J].New Industrialization,2021,11(10):118-120,125. [2]ZHAO Y F,LI F Y,WEI K Y,et al.Research on the Security Monitoring of the Enterprise Side of the Industrial Internet[J].Internet of Things Technology,2021,11(8):18-21,25. [3]LI P C,WANG H.Structured Risk Analysis under the Development Trend of Informatization of Industrial Control Systems[J].Brand & Standardization,2023(4):184-186,189. [4]LIU W D,GUO Q J,CHAN Y D,et al.A Review of the Security Development of Industrial Control Systems[J].Information Studies,2021,47(1):1-9,24. [5]A Historical Review of Cyberattacks by U.S.Intelligence Agencies-Based on the Analysis of Information Disclosed by the Global Cybersecurity Community[J/OL].Industrial Information Security,2023(2):87-93. https://kns.cnki.net/kcms2/article/abstract?v=LY1OVaQjltxZ6SoQA0w0bo7-KLHGkqe5Cvp4YtF_NGhendCbu4px0aJ-2qbknicK7ri-VaW-MWgEpOfY59yAcrDtvxt3teE6Rd_yoO15EZQeG-stOxcQ0fx096qt1iYHjtYSGrxKUz4H1bUNqhUXLgdqYrjAWzRATflxZ7OdSRMzgztkXl1ENA==&uniplatform=NZKPT&language=CHS. [6]MILLER S,BRUBAKER N,KAPELLMANN Z D,et al.Custom Attack Tools,Detections,and ATT&CK Mapping[EB/OL].[2024-06-16].https://cloud.google.com/blog/topics/threat-intelligence/triton-actor-ttp-profile-custom-attack-tools-detections/. [7]DIETZM L,ENGLBRECHT,PERNUL G.Enhancing industrial control system forensics using replication-based digital twins[M].Springer Nature Switzerland AG,2021:21-38. [8]NEGRI E,FUMAGALLI L,MACCHI M,et al.A Review of the Roles of Digital Twin in CPS-Based Production Systems[M].Springer,Cham,2019:291-307. [9]TAO F,ZHANG H,LIU A,et al.Digital Twin in Industry:State-of-the-Art[J].IEEE Transactions on Industrial Informatics,2018,15(4):2405-2415. [10]DIETZ M,PERNUL G.Digital Twin:Empowering Enter- prises Towards a System-of-Systems Approach[J].Business & Information Systems Engineering,2020,62(2):179-184. [11]EKELHARTM E A A.Digital Twins for Cyber-Physical Sys-tems Security:State of the Art and Outlook[M].Springer International,2019:383-412. [12]BOSCHERT S,HEINRICH C,ROSENA R.Next GenerationDigital Twin[C]//Proceedings of the 12th International Symposium on Tools and Methods of Competitive Engineering.IFAC,2019. [13]KAUR M J,MISHRA V P,MAHESHWARI A P.The Convergence of Digital Twin,IoT,and Machine Learning:Transforming Data into Action[M].Springer,Cham,2020:3-17. [14]UHLEMANN T,LEHMANN C,STEINHILPER,et al.TheDigital Twin:Realizing the Cyber-Physical Production System for Industry 4.0[J].Procedia CIRP,2017(61):335-340. [15]ERUBIO J,ROMAN R,LOPEZ J.Analysis of CybersecurityThreats in Industry 4.0:The Case of Intrusion Detection[M].Springer International Publishing,Cham,2018:119-130. [16]EKELHART M E A A.Towards Security-Aware Virtual Environments for Digital Twins[C]//Proceedings of the 4th ACM Workshop on Cyber-Physical System Security(CPSS’18).CPSS,2018. [17]MARIETHERES D,GÜNTHER P.Unleashing the DigitalTwin’s Potential for ICS Security[J].IEEE Security Privacy,2020,18(4):20-27. [18]REN W,DI L Q,JIANG C Q,et al.Information Security Technology-Security Assurance Evaluation Framework for Information Systems-Part 1:Introduction and General Model:GB/T 20274.1-2023 [S].Beijing:[Publisher not specified],2023. [19]ABEBE T,LALITHA B.A SCADA testbed for investigatingcyber security vulnerabilities in critical infrastructures[J].Automatic Control and Computer Sciences,2016(50):54-62. [20]MURILLO A,COMBITA A,LUIS G,et al.A Virtual Environment for Industrial Control Systems:A Nonlinear Use-Case in Attack Detection,Identification,and Response[C]//Proceedings of the 4th Annual Industrial Control System Security Workshop(ICSS’18).ICSS,2018. [21]KANG E,ADEPU S,JACKSON D,et al.Model-Based Security Analysis of a Water Treatment System[C]//2016 IEEE/ACM 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems.IEEE,2016. [22]EKELHART M E A A.Towards Security-Aware Virtual Environments for Digital Twins[C]//Proceedings of the 4th ACM Workshop on Cyber-Physical System Security.CPSS,2018. [23]DANILCZYK W,SUN Y,HE H,et al.ANGEL:An Intelligent Digital Twin Framework for Microgrid Security[C]//2019 North American Power Symposium.NAPS,2019. [24]DIETZ M,VIELBERTH M,GÜNTHER P.Integrating Digital Twin Security Simulations in the Security Operations Center[C]//Proceedings of the 15th International Conference on Availability,Reliability and Security(ARES).2020. [25]ANGIN M A A P.A Digital Twins Approach to Smart Grid Security Testing and Standardization[C]//2020 IEEE InternationalWorkshop on Metrology for Industry 4.0 IoT.IEEE,2020. |
|