Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240700068-7.doi: 10.11896/jsjkx.240700068
• Information Security • Previous Articles Next Articles
LI Weifeng1, XIE Jiangping2
CLC Number:
[1]LI J N.Current Situation and Development Considerations of Industrial Information Security Protection[J].New Industrialization,2021,11(10):118-120,125. [2]ZHAO Y F,LI F Y,WEI K Y,et al.Research on the Security Monitoring of the Enterprise Side of the Industrial Internet[J].Internet of Things Technology,2021,11(8):18-21,25. [3]LI P C,WANG H.Structured Risk Analysis under the Development Trend of Informatization of Industrial Control Systems[J].Brand & Standardization,2023(4):184-186,189. [4]LIU W D,GUO Q J,CHAN Y D,et al.A Review of the Security Development of Industrial Control Systems[J].Information Studies,2021,47(1):1-9,24. [5]A Historical Review of Cyberattacks by U.S.Intelligence Agencies-Based on the Analysis of Information Disclosed by the Global Cybersecurity Community[J/OL].Industrial Information Security,2023(2):87-93. https://kns.cnki.net/kcms2/article/abstract?v=LY1OVaQjltxZ6SoQA0w0bo7-KLHGkqe5Cvp4YtF_NGhendCbu4px0aJ-2qbknicK7ri-VaW-MWgEpOfY59yAcrDtvxt3teE6Rd_yoO15EZQeG-stOxcQ0fx096qt1iYHjtYSGrxKUz4H1bUNqhUXLgdqYrjAWzRATflxZ7OdSRMzgztkXl1ENA==&uniplatform=NZKPT&language=CHS. [6]MILLER S,BRUBAKER N,KAPELLMANN Z D,et al.Custom Attack Tools,Detections,and ATT&CK Mapping[EB/OL].[2024-06-16].https://cloud.google.com/blog/topics/threat-intelligence/triton-actor-ttp-profile-custom-attack-tools-detections/. [7]DIETZM L,ENGLBRECHT,PERNUL G.Enhancing industrial control system forensics using replication-based digital twins[M].Springer Nature Switzerland AG,2021:21-38. [8]NEGRI E,FUMAGALLI L,MACCHI M,et al.A Review of the Roles of Digital Twin in CPS-Based Production Systems[M].Springer,Cham,2019:291-307. [9]TAO F,ZHANG H,LIU A,et al.Digital Twin in Industry:State-of-the-Art[J].IEEE Transactions on Industrial Informatics,2018,15(4):2405-2415. [10]DIETZ M,PERNUL G.Digital Twin:Empowering Enter- prises Towards a System-of-Systems Approach[J].Business & Information Systems Engineering,2020,62(2):179-184. [11]EKELHARTM E A A.Digital Twins for Cyber-Physical Sys-tems Security:State of the Art and Outlook[M].Springer International,2019:383-412. [12]BOSCHERT S,HEINRICH C,ROSENA R.Next GenerationDigital Twin[C]//Proceedings of the 12th International Symposium on Tools and Methods of Competitive Engineering.IFAC,2019. [13]KAUR M J,MISHRA V P,MAHESHWARI A P.The Convergence of Digital Twin,IoT,and Machine Learning:Transforming Data into Action[M].Springer,Cham,2020:3-17. [14]UHLEMANN T,LEHMANN C,STEINHILPER,et al.TheDigital Twin:Realizing the Cyber-Physical Production System for Industry 4.0[J].Procedia CIRP,2017(61):335-340. [15]ERUBIO J,ROMAN R,LOPEZ J.Analysis of CybersecurityThreats in Industry 4.0:The Case of Intrusion Detection[M].Springer International Publishing,Cham,2018:119-130. [16]EKELHART M E A A.Towards Security-Aware Virtual Environments for Digital Twins[C]//Proceedings of the 4th ACM Workshop on Cyber-Physical System Security(CPSS’18).CPSS,2018. [17]MARIETHERES D,GÜNTHER P.Unleashing the DigitalTwin’s Potential for ICS Security[J].IEEE Security Privacy,2020,18(4):20-27. [18]REN W,DI L Q,JIANG C Q,et al.Information Security Technology-Security Assurance Evaluation Framework for Information Systems-Part 1:Introduction and General Model:GB/T 20274.1-2023 [S].Beijing:[Publisher not specified],2023. [19]ABEBE T,LALITHA B.A SCADA testbed for investigatingcyber security vulnerabilities in critical infrastructures[J].Automatic Control and Computer Sciences,2016(50):54-62. [20]MURILLO A,COMBITA A,LUIS G,et al.A Virtual Environment for Industrial Control Systems:A Nonlinear Use-Case in Attack Detection,Identification,and Response[C]//Proceedings of the 4th Annual Industrial Control System Security Workshop(ICSS’18).ICSS,2018. [21]KANG E,ADEPU S,JACKSON D,et al.Model-Based Security Analysis of a Water Treatment System[C]//2016 IEEE/ACM 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems.IEEE,2016. [22]EKELHART M E A A.Towards Security-Aware Virtual Environments for Digital Twins[C]//Proceedings of the 4th ACM Workshop on Cyber-Physical System Security.CPSS,2018. [23]DANILCZYK W,SUN Y,HE H,et al.ANGEL:An Intelligent Digital Twin Framework for Microgrid Security[C]//2019 North American Power Symposium.NAPS,2019. [24]DIETZ M,VIELBERTH M,GÜNTHER P.Integrating Digital Twin Security Simulations in the Security Operations Center[C]//Proceedings of the 15th International Conference on Availability,Reliability and Security(ARES).2020. [25]ANGIN M A A P.A Digital Twins Approach to Smart Grid Security Testing and Standardization[C]//2020 IEEE InternationalWorkshop on Metrology for Industry 4.0 IoT.IEEE,2020. |
[1] | TANG Xin, SUN Yufei, WANG Yujue, SHI Min, ZHU Dengming. Three Layer Knowledge Graph Architecture for Industrial Digital Twins [J]. Computer Science, 2024, 51(6A): 230400153-6. |
[2] | WANG Wentong, ZHANG Zhijun, ZHANG Mingyang. Review of Key Technologies,Research Progress and Applications of Metaverse [J]. Computer Science, 2024, 51(12): 2-11. |
[3] | SUN Yunhe, WANG Yu, ZHAO Liang, YANG Dongsheng, GUAN Yunchong. Review of Digital Twin Based Satellite Network Mobile Edge Computing [J]. Computer Science, 2024, 51(12): 12-19. |
[4] | WANG Kewen, ZHANG Weiting, LIAO Peixi. Deterministic Transmission Scheduling Mechanism for Mixed Traffic Flows Towards Digital Twin Networks [J]. Computer Science, 2024, 51(12): 37-45. |
[5] | MA Zigang, MA Rongkuan, LI Beibei, XIE Yaobin, WEI Qiang, PENG Minwei. SSPN-RA:Security Integration Risk Assessment Method for ICS Based on SS-petri Net [J]. Computer Science, 2024, 51(10): 380-390. |
[6] | WANG Jing, ZHANG Miao, LIU Yang, LI Haoling, LI Haotian, WANG Bailing, WEI Yuliang. Study on Dual-security Knowledge Graph for Process Industrial Control [J]. Computer Science, 2023, 50(9): 68-74. |
[7] | ZHAO Mingmin, YANG Qiuhui, HONG Mei, CAI Chuang. Smart Contract Fuzzing Based on Deep Learning and Information Feedback [J]. Computer Science, 2023, 50(9): 117-122. |
[8] | YANG Yahui, MA Rongkuan, GENG Yangyang, WEI Qiang, JIA Yan. Black-box Fuzzing Method Based on Reverse-engineering for Proprietary Industrial Control Protocol [J]. Computer Science, 2023, 50(4): 323-332. |
[9] | LI Xiaohuan, CHEN Bitao, KANG Jiawen, YE Jin. Coalition Game-assisted Joint Resource Optimization for Digital Twin-assisted Edge Intelligence [J]. Computer Science, 2023, 50(2): 42-49. |
[10] | SHANG Yuye, YUAN Jiabin. Task Offloading Method Based on Cloud-Edge-End Cooperation in Deep Space Environment [J]. Computer Science, 2023, 50(2): 80-88. |
[11] | GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di. Blockchain-based Role-Delegation Access Control for Industrial Control System [J]. Computer Science, 2021, 48(9): 306-316. |
[12] | SUO Yan-feng, WANG Shao-jie, QIN Yu, LI Qiu-xiang, FENG Da-jun and LI Jing-chun. Summary of Security Technology and Application in Industrial Control System [J]. Computer Science, 2018, 45(4): 25-33. |
[13] | CHEN Ping, LIANG Qi-ming and SUN Wei. System Capability-oriented Approach for Formalized Software Requirements Analysing and Testing [J]. Computer Science, 2017, 44(Z6): 534-538. |
[14] | TU Ling, MA Yue, CHENG Cheng and ZHOU Yan-hui. Hybrid Protocol Deformation Based Web Security Fuzzy Testing and Utility Evaluation Approach [J]. Computer Science, 2017, 44(5): 141-145. |
[15] | CHEN Zhuang,HUANG Yong and ZOU Hang. Anomaly Detection of Industrial Control System Based on Outlier Mining [J]. Computer Science, 2014, 41(5): 178-181. |
|