列控系統(tǒng)信息安全風險主動防御研究
[Abstract]:With the increasing risk of information security in rail transit train operation control system, considering the particularity and complexity of the system, the information security solution of general industrial control system can not be applied to train control system well. At present, the research on information security defense technology of train control system at home and abroad is few and deep, and the characteristics of data driving of train control system are not fully considered. Defense does not combine industry features such as Safety redundancy and Fault-Security. Therefore, under the background of information and network of train control system, it is of great significance to study the active defense technology of information security combined with the characteristics of the system. Based on the above considerations, this paper mainly studies information security modeling and defense policy selection of train control systems. The attack game tree (Attack Countermeasure tree is introduced into the attack and defense modeling of train control system, and the definition of ACT model is revised to better describe the characteristics of the system. On this basis, the information security defense target of train control system is proposed, and the method of selecting optimal active defense strategy is given. The main contents of this paper are as follows: (1) the current situation of information security in industrial control and train control systems is studied. Taking the communication based train control (Communication-based Train) system based on WLAN (Wireless Local Area Networks as the research object, the information security related contents of train control system, including information security requirements, system network vulnerability, attack surface, are analyzed emphatically. Typical attack and defense technology, especially active defense technology. (2) Information security active defense modeling method based on attack game tree is studied. Firstly, the typical security modeling methods such as attack tree, defense tree, attack defense tree and Bayesian defense graph are analyzed, and their limitations are pointed out. Then the attack game tree and its probability calculation, qualitative analysis and quantitative analysis are introduced as information security analysis tools, and the ACT model is modified to make it more suitable for the information security modeling of train control system. The modeling steps are given. (3) an optimal policy selection method for information security of train control systems is proposed. Firstly, by analyzing the characteristics and requirements of train control system, the optimal defense target and its formal expression of train control system are put forward, and then based on the attack process of general industrial control system, the attack classification to train control system is given. Then the numerical model of quantitative analysis of attack and defense is determined. Finally, the algorithm of solving the optimal defense strategy based on qualitative and quantitative analysis is given. (4) the application of active defense model and optimal defense strategy selection method. By analyzing the minimum information flow definition system of CBTC system based on WLAN as the analysis object, the ACT model is established, and the optimal strategy considering security and efficiency in the train control system is solved by quantifying the model, and the defense effect is verified. The analysis results show that the active defense model of train control system based on attack game tree presented in this paper can well reflect the interaction of train control system attack, detection and mitigation events. The proposed defense target and optimal strategy selection method can efficiently find out the optimal strategy which accords with the system security and efficiency goals, and can realize the multi-objective optimization. The experimental results show that the proposed method is scientific and efficient.
【學位授予單位】:北京交通大學
【學位級別】:碩士
【學位授予年份】:2017
【分類號】:U284.48;TP309
【相似文獻】
相關期刊論文 前10條
1 程劍鋒;王東;賀廣宇;;基于仿真平臺的列控系統(tǒng)自動測試研究[J];中國鐵路;2012年02期
2 楊韜;;列控系統(tǒng)數(shù)據(jù)校核技術研究[J];鐵路通信信號工程技術;2013年S1期
3 王嵩;孫其泰;;適用于我國Ⅲ、Ⅳ級鐵路的列控系統(tǒng)[J];鐵道通信信號;2013年12期
4 鄒振民,杉江廣幸 ,久保田清登 ,原田英;日本東海道新干線采用的新型列控系統(tǒng)[J];鐵道通信信號;2003年01期
5 傅世善;;閉塞與列控概論 第二講 列控系統(tǒng)的速度控制模式[J];鐵路通信信號工程技術;2004年06期
6 傅世善;;閉塞與列控概論 第四講 典型的列控系統(tǒng)[J];鐵路通信信號工程技術;2005年02期
7 王長林,肖鵬,康太平;列控系統(tǒng)安全防護技術模型及研究[J];交通運輸工程與信息學報;2005年01期
8 鄒少文;客運專線列控系統(tǒng)模式探討[J];鐵道工程學報;2005年01期
9 魯志彤;;歐洲列控系統(tǒng)與中國列控系統(tǒng)的比較[J];天津科技;2009年02期
10 杜平;;城際鐵路列控系統(tǒng)方案探討[J];鐵路通信信號工程技術;2010年02期
相關會議論文 前4條
1 管建華;王海忠;;高速客運專線列控系統(tǒng)方案的思考[A];鐵路客運專線建設技術交流會論文集[C];2005年
2 范麗君;;秦沈線TVM430系統(tǒng)點式功能的探討[A];鐵道科學技術新進展——鐵道科學研究院五十五周年論文集[C];2005年
3 呂書麗;;列控系統(tǒng)車載設備發(fā)展淺談[A];科技、工程與經(jīng)濟社會協(xié)調(diào)發(fā)展——中國科協(xié)第五屆青年學術年會論文集[C];2004年
4 呂書麗;;列控系統(tǒng)車載設備發(fā)展淺談[A];快速提升鐵路建設與裝備現(xiàn)代化技術促進鐵路跨越式發(fā)展——中國科協(xié)第五屆青年學術年會第九分會場論文集[C];2004年
相關重要報紙文章 前4條
1 本報特約記者 楊光和;C3之光照亮絢麗人生[N];人民鐵道;2010年
2 記者 張麗華 李娟;鐵道部徹查列控系統(tǒng) 直指“通號系”[N];第一財經(jīng)日報;2011年
3 本報記者 宋菁;廣深港高鐵全面檢測列控系統(tǒng)[N];21世紀經(jīng)濟報道;2011年
4 邵文杰;信號控制技術具有自主知識產(chǎn)權[N];光明日報;2007年
相關博士學位論文 前8條
1 謝雨飛;列控系統(tǒng)需求規(guī)范形式化建模與驗證方法研究[D];北京交通大學;2012年
2 呂繼東;列車運行控制系統(tǒng)分層形式化建模與驗證分析[D];北京交通大學;2011年
3 譚平;城際鐵路車載列控系統(tǒng)安全及智能控制關鍵技術研究[D];浙江大學;2014年
4 蔡伯根;低成本列控系統(tǒng)的列車組合定位理論與方法[D];北京交通大學;2010年
5 曹源;高速鐵路列車運行控制系統(tǒng)的形式化建模與驗證方法研究[D];北京交通大學;2011年
6 張亞東;高速鐵路列車運行控制系統(tǒng)安全風險辨識及分析研究[D];西南交通大學;2013年
7 邢小琴;高速鐵路GSM-R網(wǎng)絡檢測/監(jiān)測數(shù)據(jù)分析關鍵技術研究[D];中國鐵道科學研究院;2014年
8 劉金濤;基于STPA的需求階段的高速列車運行控制系統(tǒng)安全分析方法研究[D];北京交通大學;2015年
相關碩士學位論文 前10條
1 程瑞軍;列控系統(tǒng)混成行為的建模與驗證方法[D];北京交通大學;2014年
2 王建;基于隨機Petri網(wǎng)的高鐵列控系統(tǒng)C2/C3等級轉(zhuǎn)換過程建模及仿真[D];西南交通大學;2015年
3 劉潤;CPS系統(tǒng)動態(tài)行為在線建模與驗證研究[D];南京大學;2016年
4 王錫奎;面向領域特征的列控系統(tǒng)車載ATP軟件建模方法研究[D];北京交通大學;2016年
5 周慧英;基于STeC的列控系統(tǒng)的建模與驗證[D];貴州大學;2016年
6 徐蛟;面向列控安全性監(jiān)控的運行時驗證方法研究[D];國防科學技術大學;2014年
7 安越;基于UML和TA的RBC系統(tǒng)形式化建模與分析[D];蘭州交通大學;2016年
8 丁春平;基于域+Timed RAISE的列控系統(tǒng)等級轉(zhuǎn)換場景建模與驗證[D];蘭州交通大學;2016年
9 武亦儒;基于接口模型的失效傳播分析及其在列控系統(tǒng)中的應用[D];北京交通大學;2017年
10 滕昌敏;端到端通信在列控系統(tǒng)中應用的研究[D];北京交通大學;2017年
,本文編號:2160483
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2160483.html