Research on Typical Model of Network Invasion and Attack in Power Industrial Control System
Title | Research on Typical Model of Network Invasion and Attack in Power Industrial Control System |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Li, Mingxuan, Yang, Zhushi, He, Ling, Teng, Yangxin |
Conference Name | 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) |
Keywords | attack behavior analysis, attack model, behavior characteristics analysis, Business, composability, computer network security, control engineering computing, control systems, control theory, industrial control, industrial control network space security, industrial control system, network intrusion, network invasion, Networked Control Systems Security, power industry control system intrusion, Power systems, Predictive Metrics, production engineering computing, Protocols, pubcrawl, Resiliency, Safety, security |
Abstract | Aiming at the operation characteristics of power industry control system, this paper deeply analyses the attack mechanism and characteristics of power industry control system intrusion. On the basis of classifying and sorting out the attack characteristics of power industrial control system, this paper also attaches importance to break the basic theory and consequential technologies of industrial control network space security, and constructs the network intrusion as well as attack model of power industrial control system to realize the precise characterization of attackers' attack behavior, which provides a theoretical model for the analysis and early warning of attack behavior analysis of power industrial control systems. |
DOI | 10.1109/IAEAC47372.2019.8997649 |
Citation Key | li_research_2019 |
- industrial control system
- Safety
- Resiliency
- pubcrawl
- Protocols
- production engineering computing
- Predictive Metrics
- power systems
- power industry control system intrusion
- Networked Control Systems Security
- network invasion
- network intrusion
- Control Theory
- industrial control network space security
- industrial control
- control systems
- control engineering computing
- computer network security
- composability
- Business
- behavior characteristics analysis
- attack model
- attack behavior analysis
- security