Disclosure of Invention
Aiming at the problems, the invention provides a risk quantitative analysis method of an industrial control system based on a threat map, which specifically comprises the following steps:
s1), performing behavior analysis on the attack faced by the industrial process in the industrial control system, and determining 3 types of elements for establishing a threat map according to the actual environment of the industrial control system: the method comprises the steps that a threat source, an object to be protected and an intermediate node are arranged, wherein the object to be protected is an information asset which needs to be protected by the industrial control system, a line, reaching the position of the object to be protected through the intermediate node, of the threat source is a threat path generating a threat, and a threat map based on a cognitive map form is established according to the 3 types of elements;
s2) according to the threat map obtained in the step S1), constructing an information asset risk value formula of the industrial control system:
this formula is used to quantify the risk faced by the industrial control system, where viRepresents the value, Σ, of an information asset invnThe total value of the information assets in the industrial control system; dkjiThe vulnerability of an intermediate node k in a threat path for a threat source j to intrude into an information asset i, where k is the number of the intermediate node,dkjiThe value interval of (1) is (0); m is the total number of intermediate nodes in the threat path of the threat source j invading the information asset i; i, j, m and n are positive integers;
s3) carrying out risk assessment on the industrial control system according to the risk value calculated by the information asset risk value formula of the industrial control system in the step S2): comparing the calculated risk value with a preset risk threshold, and if the calculated risk value is lower than the preset risk threshold, indicating that the threat faced by the industrial control system is within an acceptable range; if the calculated risk value is higher than the preset risk threshold, it indicates that the industrial control system faces the attacked risk, and at this time, the vulnerability of the intermediate node in the threat path needs to be reduced by adding or replacing a protection measure of the intermediate node in the threat path, so as to reduce the risk value to be below the preset risk threshold.
According to the industrial control system risk quantitative analysis method based on the threat map, the threat map in the form of the cognitive map is established according to the behavior analysis of the industrial process in the industrial control system, the threat map describes the potential threat and source of the information assets in the industrial control system based on the form of the cognitive map, and the behavior analysis in the industrial process can be effectively supported. On the basis of the threat map, a formula for quantizing the information asset risk value of the industrial control system is further provided, the formula calculates the risk degree of the information asset in the industrial control system according to the value of the information asset and the vulnerability degree of the intermediate node of the threat path, the risk degree is used for evaluating the risk of the industrial control system, whether the threat faced by the industrial control system is within an acceptable range is judged by comparing the information asset risk value calculated by the formula with a preset risk threshold value, if the threat is not within the acceptable range, the protective measures of the node in the threat path are added or replaced according to the actual condition, and the risk of the industrial control system is reduced to the acceptable level. The industrial control system risk quantitative analysis method based on the threat map provided by the invention is based on the behavior in the industrial flow, the essential cause and the internal interaction relation of the safety problem of the industrial control system are explored, the possible risks and sources of the industrial control system in the industrial flow are intuitively reflected in the form of the threat map, the information asset value and the influence strength of the vulnerability of industrial control equipment on the safety of the industrial control system are objectively analyzed by means of quantitative analysis, and the errors and defects in subjective judgment are avoided, so that the risk degree of the industrial control system is more accurately evaluated.
Detailed Description
The invention aims to analyze potential risks and the influence thereof in the information environment of the industrial control system by establishing a threat map, wherein risk analysis is an important link for guaranteeing information safety, and in order to make the purposes, technical schemes and advantages of the invention clearer and clearer, the technical schemes of the invention are further described in detail below with reference to the attached drawings and specific implementation modes.
The invention provides an industrial control system risk quantitative analysis method based on a threat map, which is characterized in that the threat map in a cognitive map form is established according to behavior analysis of an industrial process in an industrial control system, a structural schematic diagram of the threat map is shown in fig. 1, and the threat map can describe where a potential threat may come from in the process of processing the industrial control system, and which loopholes of the industrial control system are utilized and which valuable information assets in the industrial control system are damaged. The threat map is used for constructing a threat path which threatens information assets of an industrial control system, and 3 types of elements are required to be firstly determined to establish the threat map, wherein the elements are respectively a threat source, an object to be protected and an intermediate node (referred to as an intermediate node for short) of the threat path.
In the threat map, threat sources are divided into 4 levels of a1, b1, c1 and d1 according to the possibility of generating threats, and the threat levels are ranked as a1< b1< c1< d 1:
a1. external attacker: potential attackers in the external network environment are less threatening due to their unknown nature.
b1. The remote user: and the internal users who access remotely are not in direct contact with the internal network of the industrial control system, so the threat is moderate.
c1. Local area network internal users: and the threat of the users in the local area network of the industrial control system is high.
d1. The industrial control system authorizes the user: the industrial control system authorizes the user, can directly access and use the industrial control system equipment, and directly threatens the industrial control system due to possible abuses, misoperation and other behaviors, so that the threat is high.
The object to be protected of the threat map is an information asset needing to be protected, the information asset is divided into 4 types according to the type, data, instruction information, configuration information and software information are operated, and the position of the threat map is required to be determined when the threat map is constructed. In the industrial process, the position of the object to be protected and the related information assets include, but are not limited to, the following:
a2. a data server: operational data from the sensors.
b2. Programmable Logic Controller (PLC): and realizing software information of the PLC algorithm.
c2. OLE (OLE) for Process Control server for Process Control: OPC server instruction information.
d2. Data Acquisition And Supervisory Control (SCADA) server: SCADA operating data and SCADA system instruction information.
e2. Operator Personal Computer (PC): software information for implementing a Human Machine Interface (HMI).
f2. Person Computer (PC) for security management: personal PC configuration information.
The threat source carries out invasion on the object to be protected through the intermediate node, and the invasion modes mainly include the following three modes:
(1) and directly accessing through the equipment interface to carry out physical intrusion.
(2) And local system intrusion is carried out through local network access.
(3) And performing remote intrusion through remote network access.
The network facilities involved in the intrusion process are intermediate nodes of the threat path, and the intermediate nodes are divided into two types, namely network basic equipment and a server, and specifically comprise the following steps:
a3. network infrastructure equipment: routers, switches, firewalls, Virtual Private Networks (VPNs), Intrusion Detection Systems (IDSs), master data logging Systems, workstations, and the like.
b3. A server: a sparse zone (DMZ) server, a database server, etc.
On the basis of the threat map, the invention provides a quantifiable industrial control system risk analysis method, and the information asset risk value of the industrial control system can be obtained by calculation through a formula (1):
wherein v isiRepresents the value, Σ, of an information asset invnThe total value of the information assets in the industrial control system; dkjiThe vulnerability (i.e. the probability of success of intrusion of the threat source) of an intermediate node k in the threat path for the intrusion of the information asset i by the threat source j, wherein k is the number of the intermediate node, d is the number of the intermediate nodekjiThe value interval of (1) is (0); and m is the total number of intermediate nodes in the threat path of the threat source j invading the information asset i.
The risk value calculated by the formula (1) is used for carrying out risk assessment on the industrial control system, and is compared with a preset risk threshold value, if the risk value is lower than the preset risk threshold value, the threat faced by the industrial control system is in an acceptable range; if the risk value is higher than the preset risk threshold, the industrial control system is indicated to be attacked, and the vulnerability degree of the intermediate nodes in the threat path can be reduced by adding or replacing protective measures of the intermediate nodes in the threat path so as to reduce the risk value to be lower than the preset risk threshold.
Before risk analysis is performed on a specific implementation, 3 types of elements, a threat source, an object to be protected and an intermediate node of a threat map need to be determined according to the environment of an actual industrial control system, as shown in fig. 1, a route from the threat source to the position of the object to be protected through the intermediate node is a critical route for generating a threat, namely a threat route.
S1) setting a threat source j in the industrial control system. According to the threat source grade, e.g. setting 3 types of threat sources, remote users (threat medium) j1J (high threat) of local area network internal user2J, authorizing users (with high threat) by industrial control system3。
S2) determining the object to be protected, i.e. the information asset i which needs to be protected. Setting the operation data i in the data server as the information assets to be protected according to the type and the position of the information assets1Operation data i in SCADA server2Command information i in SCADA Server3Command information i in OPC Server4Configuration information i in the personal computer of the security administration5Software information i for realizing PLC algorithm in PLC6HMI software information i in the operator PC7The value of each information asset is set according to the importance level of the information asset. If set to i1Value v of1=15,i2Value v of2=20,i3Value v of3=35,i4Value v of4=40,i5Value v of5=15,i6Value v of6=10,i7Value v of7A larger value indicates a greater value of the information asset than 5.
S3) determining intermediate nodes of the threat path through industrial process behaviors of the industrial control system. The threat source threatens the industrial control system through 3 modes of physical invasion, local system invasion and remote invasion, and after the access to the local area network of the industrial control system is obtained, the threat source tries to intercept related identity authentication information and obtains a related secret key of a network host from a data stream. However, due to different access rights of users, the acquired identity information may have access limitation, in which case the threat source will try to collect the obsolete information from the database server and try to acquire the identity information with higher access rights. In addition, the threatThe source may also inject malicious code to acquire and remove data, enable unauthorized access to information assets, and even modify the database and its configuration information, creating false users with access rights. Inter-host workflow attacks may cause changes in the flow of information, and threat sources may modify transmitted data or inject malicious code to affect the authentication of users in the database to obtain higher levels of access. The intermediate nodes involved in the intrusion process comprise network basic equipment and a server, wherein the network basic equipment comprises an enterprise firewall k
1Enterprise local area network (IDS) k
2Engineering workstation k
4Industrial Control System (ICS) firewall k
5Industrial controlled local area network (IDS) k
6Main data recording system k
7Control room workstation k
8(ii) a The server comprises a database server k
3. Setting the vulnerability degree d of the intermediate node vulnerability according to the vulnerability of the intermediate node
kIf set to k
1Degree of vulnerability d
1=0.1,k
2Degree of vulnerability d
2=0.2,k
3Degree of vulnerability d
3=0.2,k
4Degree of vulnerability d
4=0.1,k
5Degree of vulnerability d
5=0.2,k
6Degree of vulnerability d
6=0.2,k
7Degree of vulnerability d
7=0.3,k
8Degree of vulnerability d
80.1. Then, according to fig. 1, the vulnerability d of the intermediate node k (where k is 1,2, …,8) in the threat path of the threat path and the threat source j (where j is 1,2,3) invading the information asset i (where i is 1,2, …,7) is determined
kjiA value of (1), wherein
In the above equation, i is 2,3, …, 7. The greater the vulnerability value, the higher the probability that the intermediate node will be successfully invaded by the threat source.
The output result of the method is divided into two parts, namely a threat map which is used for carrying out behavior analysis on the attack faced in an industrial control system and determining a threat path of a threat source invading an object to be protected; the risk value is used for evaluating the risk of the industrial control system, and is compared with a preset risk threshold value, if the value is lower than the preset risk threshold value, the threat faced by the industrial control system is in an acceptable range; if the risk value is higher than the preset risk threshold, the risk that the industrial control system is attacked is indicated, and the vulnerability degree of the intermediate node can be reduced by adding or replacing protective measures of the intermediate node so as to reduce the risk value to be lower than the preset risk threshold.
Generating a threat map of the industrial control system information asset according to the threat source, the position of the object to be protected and the intermediate node set in the previous 3 steps, wherein lines of different types represent threat paths of different threat sources j invading the object i to be protected, and the numerical value of each section of the threat path connected with the intermediate node is the probability of the threat source successfully invading the intermediate node, namely the vulnerability d of the intermediate nodekjiThe numerical value of each section connecting the position of the object to be protected is pi which is the probability that the threat source successfully invades the object to be protectedm(dkji) And m is the total number of the intermediate nodes in the threat path. According to the initially set threat source j, the object i to be protected and the value v thereofiIntermediate node k of threat path and its vulnerability dkjiCalculating the risk value R of the industrial control system by using the formula 1ICS. The risk value indicates the risk degree of the industrial control system, and the obtained risk value RICSThe larger the risk degree of the industrial control system is, the larger the threat to the information assets is. R is obtained according to the set numerical valueICS0.089351, performing risk assessment on the industrial control system by comparing with a preset risk threshold value, wherein the preset risk threshold value is the highest acceptable risk value and is determined according to the actual situation, and if the risk threshold value is set to be Rt=0.1,RICS<RtThe industrial control system faces the threats within the acceptable range.
According to the industrial control system risk quantitative analysis method based on the threat map, the threat map in the form of the cognitive map is established according to the behavior analysis of the industrial process in the industrial control system, the threat map describes the potential threat and source of the information assets in the industrial control system based on the form of the cognitive map, and the behavior analysis in the industrial process can be effectively supported. The method comprises the steps of establishing a threat map, determining 3 types of elements which are respectively a threat source, a position of an object to be protected and a middle node of a threat path, further providing a formula for quantizing an information asset risk value of the industrial control system on the basis of the threat map, calculating the risk degree of the information asset in the industrial control system according to the value of the information asset and the fragility degree of the middle node of the threat path by the formula for risk assessment of the industrial control system, comparing the information asset risk value calculated by the formula with a preset risk threshold value, judging whether the threat faced by the industrial control system is in an acceptable range, if not, increasing or replacing protective measures of the nodes in the threat path according to actual conditions, and reducing the risk of the industrial control system to the acceptable level. The industrial control system risk quantitative analysis method based on the threat map provided by the invention is based on the behavior in the industrial flow, the essential cause and the internal interaction relation of the safety problem of the industrial control system are explored, the possible risks and sources of the industrial control system in the industrial flow are intuitively reflected in the form of the threat map, the information asset value and the influence strength of the vulnerability of industrial control equipment on the safety of the industrial control system are objectively analyzed by means of quantitative analysis, and the errors and defects in subjective judgment are avoided, so that the risk degree of the industrial control system is more accurately evaluated.
Although illustrative embodiments of the present invention have been described above to facilitate the understanding of the present invention by those skilled in the art, it should be understood that the present invention is not limited in scope to the specific embodiments. Such variations are obvious and all the inventions utilizing the concepts of the present invention are intended to be protected.