








摘 要: 針對現(xiàn)有多執(zhí)行體裁決算法和調(diào)度算法主要將執(zhí)行體受攻擊的次數(shù)作為可信度的參考依據(jù),難以區(qū)分每次攻擊行為的惡意程度,也難以應(yīng)對執(zhí)行體輸出為數(shù)值且允許存在誤差的應(yīng)用場景的問題,以電力系統(tǒng)狀態(tài)估計異常檢測作為應(yīng)用場景,提出根據(jù)歸一化的執(zhí)行體輸出差異距離調(diào)整其可信度的裁決算法,以及基于運行時長、可信度和切換開銷等構(gòu)造收益函數(shù)的調(diào)度算法。仿真實驗結(jié)果表明,相比同等權(quán)重的裁決算法和隨機切換的調(diào)度算法,所提算法在系統(tǒng)執(zhí)行開銷基本相同的情況下,可以將系統(tǒng)平均失效率降低43.8%,能夠有效地提升工業(yè)網(wǎng)絡(luò)防護設(shè)備的防御能力。
關(guān)鍵詞: 內(nèi)生安全; 裁決算法; 調(diào)度算法; 工業(yè)控制系統(tǒng); 異常檢測
中圖分類號: TP393"" 文獻標(biāo)志碼: A
文章編號: 1001-3695(2022)05-025-1437-07
doi:10.19734/j.issn.1001-3695.2021.10.0462
Multi executor decision algorithm and scheduling algorithm based on differential distance feedback
Yu Fei, Liu Ke, Geng Yangyang, Wei Qiang
(Information Engineering University, Zhengzhou 450001, China)
Abstract: With the anomaly detection of power system state estimation as the application scenario,this paper proposed a decision algorithm that adjusted executor’s credibility according to the normalized output differential distance,and proposed a scheduling algorithm that constructed a revenue function based on runtime,credibility,and switching overhead,to solve the problem that the existing multi executor decision algorithms and scheduling algorithms can not distinguish the malicious degree of each attack and deal with the application scenarios where the output was numerical while allowed errors since they mainly took the attack number as the reference basis for the executor credibility.The simulation results show that compared with the decision algorithm with the same weight and the scheduling algorithm with random switching,the proposed algorithm can reduce the average failure rate of the system by 43.8%,and effectively improve the defense capability of industrial network protection equipment.
Key words: endogenous security; decision algorithm; scheduling algorithm; industrial control system; anomaly detection
0 引言
在數(shù)字化、網(wǎng)絡(luò)化、智能化的發(fā)展趨勢下,工業(yè)控制系統(tǒng)普遍采用的防火墻、入侵檢測系統(tǒng)等邊界防護設(shè)備,其自身安全問題也逐漸暴露出來,吸引了越來越多的關(guān)注。
2016年,方程式組織(Equation Group)的網(wǎng)絡(luò)攻擊程序工具集被曝包含針對知名網(wǎng)絡(luò)設(shè)備制造商(例如Cisco、Fortinet和天融信等)的路由器、防火墻和VPN(virtual private network)等邊界防護產(chǎn)品的網(wǎng)絡(luò)武器[1]。工業(yè)安全公司CyberX的專家發(fā)現(xiàn)施耐德ConneXium工業(yè)級防火墻漏洞,攻擊者可以遠程執(zhí)行任意代碼[2]。2019年,美國西部某電力公司的邊界防火墻存在的安全漏洞導(dǎo)致控制中心與多個發(fā)電廠之間的通信發(fā)生中斷[3]。2021年,美國Colonial Pipeline公司VPN系統(tǒng)遭黑客攻擊,被迫全面暫停運營[4]。……