张静, 张光洲, 金学奇, 由甲川, 梁野. 电力监控系统基于ATT&CK框架的威胁路径构建方法研究[J]. 电力信息与通信技术, 2024, 22(12): 55-61. DOI: 10.16543/j.2095-641x.electric.power.ict.2024.12.08
引用本文: 张静, 张光洲, 金学奇, 由甲川, 梁野. 电力监控系统基于ATT&CK框架的威胁路径构建方法研究[J]. 电力信息与通信技术, 2024, 22(12): 55-61. DOI: 10.16543/j.2095-641x.electric.power.ict.2024.12.08
ZHANG Jing, ZHANG Guangzhou, JIN Xueqi, YOU Jiachuan, LIANG Ye. Research on Threat Path Construction Technology of Power Monitoring System Based on ATT&CK Framework[J]. Electric Power Information and Communication Technology, 2024, 22(12): 55-61. DOI: 10.16543/j.2095-641x.electric.power.ict.2024.12.08
Citation: ZHANG Jing, ZHANG Guangzhou, JIN Xueqi, YOU Jiachuan, LIANG Ye. Research on Threat Path Construction Technology of Power Monitoring System Based on ATT&CK Framework[J]. Electric Power Information and Communication Technology, 2024, 22(12): 55-61. DOI: 10.16543/j.2095-641x.electric.power.ict.2024.12.08

电力监控系统基于ATT&CK框架的威胁路径构建方法研究

Research on Threat Path Construction Technology of Power Monitoring System Based on ATT&CK Framework

  • 摘要: 为解决电力监控系统现有安全策略面对新型攻击防护能力不足的问题,文中提出一种基于对抗战术、技术和通用知识(adversarial tactics, techniques, and common knowledge,ATT&CK)框架的威胁路径构自动建方法。该方法首先基于设备间的连通状况构建网络无向图;然后依据资产分级信息构建威胁移动路径;最后依据资产分类信息、ATT&CK框架以及网络杀伤链,补全威胁移动路径信息,完成威胁路径构建。该方法不仅为电力系统安全策略的制定提供了理论依据和支持,还为检测到威胁时自适应调整网络安全策略提供了可能。

     

    Abstract: To solve the problem that the existing security strategy of power monitoring system is insufficient to defend against new attacks, this paper proposes an automatic threat path construction method based on ATT&CK framework. Firstly, the network undirected graph based on the connectivity between devices is constructed. Then, the threat movement path is constructed according to the asset classification information. Finally, according to the asset classification information, ATT&CK framework and network killing chain, the threat movement path information and the threat path construction are completed. This method not only provides a theoretical basis and support for the formulation of power system security policy, but also provides the possibility to adaptively adjust network security policy when threats are detected.

     

/

返回文章
返回