• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    MSICST:Multiple-Scenario Industrial Control System Testbed for Security Research

    2019-08-13 05:55:02WeiXuYaodongTaoChunfangYangandHuiqinChen
    Computers Materials&Continua 2019年8期

    Wei Xu,Yaodong Tao,,Chunfang Yang and Huiqin Chen

    Abstract: A security testbed is an important aspect of Industrial Control System (ICS)security research.However,existing testbeds still have many problems in that they cannot fully simulate enterprise networks and ICS attacks.This paper presents a Multiple-Scenario Industrial Control System Testbed (MSICST),a hardware-in-the-loop ICS testbed for security research.The testbed contains four typical process scenarios:thermal power plant,rail transit,smart grid,and intelligent manufacturing.We use a combination of actual physical equipment and software simulations to build the process scenario sand table and use real hardware and software to build the control systems,demilitarized zone,and enterprise zone networks.According to the ICS cyber kill chain,the attacker is modeled,and two typical attack scenarios are constructed in the testbed.Through research into this security solution,whitelist-based host protection and a new Intrusion Detection System (IDS) are proposed and tested.

    Keywords: Industrial control system,security testbed,simulation,attack,network.

    1 Introduction

    Industrial Control Systems (ICSs) are employed in numerous critical infrastructure assets including power generation,transmission and distribution,transportation,oil and gas,and chemical production.Information and Communication Technologies (ICT) have been widely adopted in modern ICSs.Many ICSs and devices are connected to the Internet[Andreeva,Gordeychik,Gritsai et al.(2016)] and show an increasing trend year over year[Xu,Tao and Guan (2018)].Because ICSs are different from traditional IT systems[Stouffer,Falco and Scarfone (2011)],traditional security solutions cannot completely solve ICS security problems [Weiss (2008)].In addition,ICSs control the actual physical process.Thus,cyberattacks will cause serious consequences.For example,Stuxnet was injected into the Natanz nuclear facilities in Iran in 2010,destroyed more than 1,000 centrifuges [Albright,Brannan and Walrond (2010);Kushner (2013)].Hackers compromised information systems of three power distribution companies in Ukraine in December 2015,and about 230,000 people were left without electricity for 1 h to 6 h[Liang,Weller,Zhao et al.(2017)].The WannaCry ransomware that broke out in 2017 also infected control networks of some enterprises,causing serious losses [Lee (2018);Nick,Jenny and Stu (2017)].The cybersecurity of ICSs has received increased attention from industry and research communities.

    The primary objective of an ICS security testbed is to discover ICS vulnerabilities and to study and evaluate cybersecurity implementation.This has become a hot topic in ICS security research [McLaughlin,Konstantinou,Wang et al.(2016)].Researchers have built several ICS testbeds,which were used for ICS attack simulations,ICS vulnerability detection,education and training,research,and verification of security solutions [Holm,Karresand,Vidstrom et al.(2015)].However,few of these testbeds simulated a complete enterprise network or realistically simulated the complete ICS attack process.

    This paper introduces the Multiple-Scenario Industrial Control System testbed (MSICST)for security research.In Section 2,we introduce related works on ICS security testbeds.The architecture and construction process of the MSICST testbed,detailing the four process scenarios and other parts of the testbed,are introduced in Section 3.Security experiments conducted on the MSICST testbed,including vulnerability discovery,attack scenario simulations,and security solution research,are introduced in Section 4.Finally,a brief summary and future work plan are given.

    2 Related works

    Smart-grid SCADA (Supervisory Control and Data Acquisition) testbeds have always been a research hot spot [NIST (2014)].Different research institutions have developed many smart grid testbeds,among which the National SCADA Test Bed (NSTB) in the United States is the most representative.NSTB is a large-scale electric power grid testbed built by the Idaho National Labs with funding from the US Department of Energy.NSTB uses actual physical grid components and commercially available hardware and software to build a grid control system that includes 61 miles of 128-kV transmission lines and 13.8-kV distribution lines,7 substations,and more than 3,000 monitoring and control points.NSTB includes a variety of wireless and wired communication standards and protocols including TCP/IP,ATM,802.11,GSM,ICCP,Modbus,DNP3,and more.It can be used to control system cybersecurity assessments,standard developments,outreach and training,etc.[DoE (2018);Morris,Srivastava,Reaves et al.(2011)]

    The National Institute of Standards and Technology developed a cybersecurity testbed for industrial control systems.The testbed constructs three process scenarios:a chemical process manufacturing scenario based on the Tennessee Eastman model [Downs and Vogel(1993)],a robotic collaborative assembly scenario,and a wide-area-network SCADA scenario.Common ICS attacks such as Denial of Service (DoS),replay attack,and Man-In-The-Middle (MITM) attack are simulated on the testbed,and the performance of the control system after being attacked and deploying cybersecurity products is measured[Candell,Zimmerman and Stouffer (2015);Candell,Stouffer and Anand (2014)].

    Researchers at the Joint Research Centre of the European Commission built an experimental platform based on the control system of a typical turbo-gas power plant.The experimental platform has been used to study the effects of some ICT attacks against control systems,including SCADA system phishing,Domain Name System (DNS)poisoning,DoS worms,and Modbus/DNP3 worms.Countermeasures such as secure ICS protocols and an Intrusion Detection System (IDS) for control systems were proposed and tested [Fovino,Masera,Guidi et al.(2010)].

    Researchers at Mississippi State University built a testbed that includes real hardware and software as well as real-world physical processes for pedagogy and cybersecurity research.The testbed consists of seven actual physical processes and their control systems,including a water storage tank,raised water tower,factory conveyor belt,gas pipeline,industrial blower,steel rolling operation,and a smart grid transmission control system.The researchers used the testbed for Human Machine Interface (HMI)vulnerability discovery,developed a serial Modbus and DNP3 data logger,and developed and tested a statistical IDS [Morris,Srivastava,Reaves et al.(2011)].

    The Lancaster ICS testbed,based on a Hardware-In-the-Loop (HIL) concept,constructs a complete enterprise network that consists of six manufacturing zones,an ICS demilitarized zone,and an enterprise zone.The researchers conducted cybersecurity studies and experiments on this testbed [Green,Lee,Antrobus et al.(2017);Green,Paske,Hutchison et al.(2014)].

    The Singapore University of Technology and Design developed the Security Water Treatment testbed,which has a real water treatment capacity of 5 gallons per hour.Three attacker models with different permissions were constructed in the testbed.Attack experiments such as system reconnaissance and compromise through wireless networks were carried out,and the impacts of these attacks on the physical processes were studied[Mathur and Tippenhauer (2016)].

    Many testbeds model control systems and their associated networks using various simulation technologies rather than actual physical equipment.These are called softwareonly testbeds [Holm,Karresand,Vidstrom et al.(2015)].Graphical Realism Framework for Industrial Control Simulations is a free open-source and software-only ICS network testbed developed through simulation technology.It includes a virtual HMI in the control room,a virtual Programmable Logic Controller (PLC) controlling the plant,and a simulation of the physical process itself using the popular Unify 3D game engine[Formby,Rad and Beyah (2018)].

    3 Construction of MSICST testbed

    Fig.1 shows the logical network architecture of the testbed based on the Purdue Enterprise Reference Architecture,which includes an enterprise zone,Demilitarized Zone (DMZ),and control zone [Williams (1994);Bodungen,Singer,Shbeeb et al.(2016)].Four industrial process scenarios are constructed in the control zone,including a thermal power plant scenario,rail transit scenario,smart grid scenario,and smart manufacturing scenario.In each process scenario,the actual physical process is simulated by a sand table,the control system is constructed with commercially available hardware and software,and in some scenarios,a combination of software simulations and actual physical equipment is used to build a more real and comprehensive process behavior.We also built an attacker model and an observer and monitoring network in the testbed.The attacker model can be used for attack experiments.The observer and management network is used to manage the entire testbed and to record and analyze network traffic and to log data.

    Figure1:High-level network logical architecture diagram of MSICST testbed

    3.1 Four process scenarios of control zone

    3.1.1 Thermal power plant scenario

    The basic principle of a thermal power plant is to generate electricity from fossil fuels.Fossil fuel burns water in a boiler to generate steam,and the steam drives the steam turbine to rotate,the steam turbine drives the generator,and the generator generates electric energy by cutting the magnetic field lines.

    Figure2:Photo of sand table (left) and one HMI page screenshot (right,HMI of combustion system) of thermal power plant scenario

    We simulate the process of a thermal power plant through a sand table,which combines software simulations and actual physical equipment.As shown on the left of Fig.2,we made a sand table to simulate the physical process of a thermal power plant,including three systems:combustion system,steam-water system,and electrical system.There is also a simulation software running synchronously with the sand table.The software implements the user interface through Flash,processes the simulation of the thermal power plant through C#,and connects to the physical PLCs of the control system through external Input and Output (IO) interface hardware.The combustion system includes coal handling,coal grinding,combustion,air supply,air introduction,dust removal,desulphurization,and smoke exhaustion.The steam-water system includes a superheater,steam drum,high-pressure steam,steam turbine,cooling tower,deaeration,pressurization,and heating.The power system includes generators,transformers,high-voltage switches,and standby generators.

    Coal conveyor motors and conveyor belts,coal grinding motors,boiler fans,turbines and generator motors,and boiler internal temperature sensors are used the actual physical equipment.The air heater simulates the combustion process,and the boiler fan blows strips to simulate flame.Water,steam,smoke,and electric current are simulated by Light Emitting Diode (LED) lamp belts and smoke generators.

    The control system is basically consistent with the monitoring and management system of a real power plant,including a Data Acquisition System (DAS),Modulation Control System (MCS),Burner Management System (BMS),Sequential Control System (SCS),Electrical Control System (ECS),Turbine Bypass Control System (BPC),and Digital Electronic Hydraulic control system (DEH).

    Table1:Controller information in thermal power plant scenario

    As shown in Tab.1,DAS,MCS,and SCS adopt a set of control systems (Siemens-S7-1200),BMS adopts an independent set of control systems (Rockwell-Controllogix 1756),ECS uses an independent set of control systems (Schneider Quantum),and BPC and DEH adopt a set of control systems (GE VersaMax).There are 152 monitoring and control points in this scenario.

    Referring to the HMI of a real thermal power plant,we use KingView to implement the HMI of the thermal power plant scenario,which consists of five monitoring pages to monitor and control the operation of the plant from different angles.The right side of Fig.2 shows a page of the HMI of the thermal power plant scenario.

    Similar to WinCC,KingView is an integrated system that consists of standard industrial computer software and hardware platforms.It has the advantages of strong adaptability,good openness,easy expansion,economy,and a short development cycle.

    3.1.2 Rail transit scenario

    We made a rail transit simulation sand table,which was simplified and based on a subway line in a Chinese city.The sand table includes three stations,circular rail transit lines,and two trains.There are two operating stations and one maintenance station in the three stations.The operating stations have shielded doors,elevators,air conditioners,gates,firefighting capability,and other facilities.The two trains are equipped with variable frequency motors that can run and stop on the track under the control system,and can communicate with the control system through the power carrier.Signal equipment such as traffic lights is placed on the track.The sand table is basically the same as a real rail transit system,but the scale is reduced.The gates,shield doors,elevators,and so on can also be driven by the motors,and they are also equipped with manual control switches.The left side of Fig.3 is a photo of the rail transit sand table.

    Figure3:Photo of sand table (left) and HMI screen (right) of rail transit scenario

    The difference is that the train uses 24 V of low voltage instead of high voltage,18 Hall sensors on the track,and magnets installed on the train to locate the train instead of Global Positioning System (GPS).In addition,the air conditioner only uses the water flow to simulate the switch effect without real effect.

    In order to achieve automatic control of the trains and station operation,we use two PLCs for control.As shown in Tab.2,a Siemens S7-300 is used to control the relevant systems of the station,including the power supply system,elevator motor control,entrance and exit gate control,ventilation and air conditioning control,signal light control,arrival information display,and shielded door control.The PLC communicates with the field equipment through a Modbus RTU.A Siemens S7-200SMART is used to control the track positioning module,track signal,turnout motor,train speed,train positioning,train anti-collision,and communication between the trains and stations.The PLC and trains communicate through a power line carrier.There are 90 monitoring and control points in this scenario.

    As shown on the right of Fig.3,the HMI of an entire platform is implemented in KingView,which communicates with two PLCs using the S7 communication protocol.It can monitor the running status of the trains and stations in real time,and can manually and automatically control the stations and trains.

    3.1.3 Smart grid scenario

    The power grid is the infrastructure of power transmission,and it is an economical and fast way to transfer energy.Owing to the large number of sites,wide geographical distribution,and diverse communication methods,the control system of the smart grid is a typical SCADA system.The power grid is also a research hot spot for ICS security testbeds.The protocols,devices,and physical processes used by the power grid have great specialties,and the grid enterprises are relatively concentrated.In order to truly simulate the characteristics of the Chinese power grid,we developed a grid testbed scenario in cooperation with the research institute affiliated with the State Grid Corporation of China.

    Table3:Device information for smart grid scenario

    The power physical process is divided into power generation,power transmission,power substation,power distribution,power utilization,and power dispatch.The testbed scenario we implemented mainly concentrates on the power consumption part.A SCADA system constructed with smart meters,concentrators,and a main station device can display the power consumption of an area in a centralized manner through the Web,and can remotely read the meter and remotely switch off the power.

    We selected several devices that are widely used in China.We used two models of smart meter:Wisdom FKCA23-DF6203 and Sanxing DTZY188-G.The concentrator was a Hexing DJGZ23-HX3200.Tab.3 presents detailed device information.The main station device stores data and has a web server function,and the user can access the terminating device through the browser for remote operation.

    3.1.4 Intelligent manufacturing scenario

    Computer numerical control (CNC) is the basis of intelligent manufacturing.It consists of many components that can independently complete digital control.It generally contains a controller,memory,and HMI.The operating status can be viewed through the HMI screen,and the parameters can be adjusted via the HMI button.However,a traditional CNC system does not connect to an external network,and it needs to obtain the running record data through a USB flash disk,SD card,etc.The operators cannot adjust parameters remotely via the network.In order to improve the intelligence level of the manufacturing industry and realize the collaborative manufacturing of multiple machines,the Distributed Numerical Control (DNC) system was developed.The DNC system consists of a DNC server and several controlled CNCs.The DNC server can acquire the status of each CNC in real time through the network,and can remotely adjust the parameters of each CNC in real time to realize the collaborative manufacturing of multiple CNCs.

    We established an intelligent manufacturing test platform in cooperation with the research institutes of China Aerospace Science and Technology Corporation (CASC).The intelligent manufacturing testbed was built using real equipment,including two machine tools,two CNC controllers,and a DNC server.As shown in Tab.4,the CNC controllers are a Siemens 808d CNC controller and a FANUC 0i-TF CNC controller,which are widely used in the market.The FANUC CNC controller has a built-in communication module and uses the Focus communication protocol developed jointly by GE and FANUC corporation.The Siemens CNC controller does not have a built-in communication module.We added a Moxa expansion card to communicate with an external network through the Modbus protocol.The Siemens CNC controls a milling machine,and the FANUC CNC controls a lathe to simulate two typical process scenarios of the CNC.According to a suggestion from our partner,we adopted the Integ-DNC networking system of Integ-Foever as the DNC server.The testbed was deployed in our partner’s lab,and we can access this testbed scenario via VPN for security research.

    3.2 Demilitarized zone

    Although most industrial control systems adopt some measures to achieve isolation from external networks,they usually achieve weak separation through a DMZ,which also provides an attack path for cyberattacks [Fovino,Masera,Guidi et al.(2010)].We also used this method in the testbed to establish a DMZ in which data historians and the KingView server were deployed.The KingView server can collect and display the status of each process scenario in a unified way.The KingView server and data historian are deployed on the Windows Server 2008 operating system.The enterprise zone network can access the DMZ,and the DMZ can access the control zone network.However,the enterprise zone network cannot directly access the control zone network,and a weak separation is achieved in this way.This separation is implemented by specific rules of the iptalbes firewall.

    3.3 Enterprise zone

    In the enterprise zone,we simulate the deployment of office networks in normal enterprises,including Web servers,mail servers,and office workstations.Owing to cost considerations,we did not deploy information systems such as Enterprise Resource Planning or the Management Information System,which are commonly deployed by enterprises.

    As shown in Tab.5,the office workstation adopts a Commercial Off-The-shelf (COT)software and hardware configuration,uses the common Windows 7 operating system,runs common office software such as the Microsoft Office series software,and is connected to the Internet.

    3.4 Other parts of MSICST testbed

    3.4.1 Attacker model

    A cyberattack against an ICS is very different from the traditional IT network attack.According to the ICS cyber kill chain model [Assante and Lee (2015)],the attack process is divided into two stages.The first stage is the same as the IT cyber kill chain [Martin(2013)],and the second stage attacks the ICS in order to destroy the physical process.The existing ICS testbed mainly studies some attacks in the second stage and cannot simulate the complete ICS cyber kill chain.We want to simulate the complete ICS network kill chain process in the testbed,starting from attacking the enterprise zone network,and going step by step to achieve the purpose of destroying the physical process.We build an attacker model in which the attacker connects to the Internet,does not physically touch the enterprise network,and cannot access the enterprise network.If the attacker wants to attack the ICS system,he first must enter the enterprise zone network through penetration attacks.There is no additional authority after entering the enterprise zone network.It is necessary to further penetrate the DMZ to enter the control zone network step by step and ultimately achieve the purpose of destroying the physical process.This attack process not only conforms to the ICS cyber kill chain model but is also a common process of multiple ICS cybersecurity events,so it is more realistic.

    3.4.2 Observe and manage network

    We deploy a monitoring network in the testbed that mirrors the network traffic through the Switched Port Analyzer (SPAN) port of the switches and the routers,and stores the traffic data centrally.By monitoring and analyzing the traffic,we can get a deeper understanding of the characteristics and details of the attack,and develop IDS specially for ICS systems on this basis.In addition,the system logs of the operator stations,engineer stations,firewalls,and network devices can be uploaded to the monitoring server though syslog protocol,which provides a basis for subsequent association analyses.

    In the management network,a system backup server and software warehouse server are deployed.The virtual desktop server is realized by VMware Horizon View,and the virtual machine is connected remotely by a thin client,which can be quickly recovered after an attack and provide reconfigurable architectures.In addition,the combination of virtualization and a thin client improves the flexibility and replicability of the testbed.

    4 Experiment on MSICST testbed

    4.1 Vulnerability discovery

    First,we verified the known vulnerabilities of the software and hardware in the testbed.We took advantage of the S7 and Modbus protocol’s lack of encryption and identity authentication vulnerabilities to send commands directly to the PLC,which creates equipment downtime.Using the Ettercap tool to perform an MITM attack on the HMI and PLC,we can make the HMI display false PLC data.This method can also be used to perform Modbus command injection attacks.It also verifies the PLC device DoS attack through the ultra-long Ping package.

    In addition,we conducted system vulnerability discovery for a specific type of PLC device.The firmware of the PLC was downloaded by a tool provided by the manufacturer,and a reverse analysis of the firmware was carried out.We scanned the network ports and services of the device through Nmap and Simple Network Management Protocol (SNMP),and fuzzed the protocol and service of the device through Peach Fuzzer.We found that there are some vulnerabilities in the protocols,authentication,and services of the device.We informed the device manufacturer about the relevant information.These results are not discussed in this paper,as the ethical disclosure process is ongoing.

    4.2 Attack scenarios

    We built two attack scenarios through disclosed vulnerabilities and cyberattacks that occurred against ICSs.

    4.2.1 Attack scenario 1

    As shown in Fig.4 and Tab.6,the attacker sends a spear phishing email to the target,which contains an attachment in Microsoft PowerPoint file format.The attacker used Microsoft Office 2007 vulnerabilities (CVE-2014-4114) to include malicious software in this attached file.The employees infect the malicious software when opening the attachment file on office workstations of the enterprise zone,and the attacker gains the authority of the enterprise zone.Then,the attacker uses the CVE-2008-4250 vulnerability to attack the KingView server in the DMZ zone.This vulnerability allows for the remote execution of arbitrary code through a remote procedure call to gain the authority of the server,thus penetrating the DMZ network.Then,through this server,the same vulnerability penetrates the operation station of the control zone.Finally,the remote stop CPU (Central Processing Unit) command is sent to the Siemens PLC of the power plant through the operator station,which causes the DAS,MCS,and SCS systems to stop running,and the entire power plant stops working.Because the power is interrupted,the rail transit system stops running.In this attack scenario,all attacks after the user opens the email can be automatically completed by the malicious software.The entire process takes no more than 1 min.

    Figure4:Attack process diagram of two attack scenarios

    Table6:Vulnerabilities used in attack scenarios

    4.2.2 Attack scenario 2

    As shown in Fig.4 and Tab.5,the enterprise zone network is infected with WannaCry ransomware.The internal staff copies files from office workstations to the engineering station through a USB flash disk for upgrades and maintenance.The WannaCry ransomware spreads to the control zone through the USB flash disk and exploits vulnerabilities (CVE-2017-11780)to spread through port 445 in the control zone network.Thus,all engineering stations and operation stations stop running,and the files are encrypted.

    The attack process of scenario 1 is basically the same as the first phase of the Ukrainian blackout accident [Liang,Weller,Zhao et al.(2017)].After obtaining control of the HMI,BlackEnergy attacked the circuit breaker of the power grid,and the attack scenario simply sent a stop CPU command to the PLC.Then,the attack process was basically complete.Scenario 2 is the actual infection process of WannaCry in many industrial enterprises [Lee (2018);Nick,Jenny and Stu (2017)].In addition,Stuxnet enters the control network in a similar way [Kushner (2013)].

    4.3 Security solutions

    Security solutions are an important research topic for the ICS testbed.Some researchers have tried to improve the architecture and increase the security of the ICS protocol via methods such as the secure Modbus protocol [Nai Fovino,Carcano and Masera (2009)],Secure DNP3,and DNPSec [Majdalawieh,Parisi-Presicce and Wijesekera (2007)].These solutions can improve the security of newly deployed ICSs,but according to the characteristics of the ICSs,these systems may be in service for a long time [Stouffer,Falco and Scarfone (2011)].To increase the security of an ICS in use,security solutions may be added to the original system.This paper mainly considers this issue.

    If an HMI is implemented based on COT software and hardware,software updates cannot be performed in time.If traditional antivirus software is used in an ICS system,it will be difficult to update the virus database in time.We try to use whitelist-based host protection software,which records the programs that the workstation has already run and the signatures of the files of these programs to form a whitelist.When a subsequent program needs to run,the protection software checks whether the signature is already on the whitelist.If it is on the whitelist,it is allowed to run,and if it is not on the whitelist,it is not allowed to run.This protection program occupies fewer resources and does not conflict with the control software.Even without upgrading,it can prevent some unknown attacks.After testing,this method can effectively protect against the attack methods in our attack scenarios.

    There are fewer firewall products available for ICS networks that can identify the industrial control protocol,and the control network has higher requirements for network delays.Deploying a firewall may increase the delay and affect the control process,but deploying the IDS system and detecting the network through mirror traffic and discovering attacks is a better solution.Nai et al.[Fovino,Masera,Guidi et al.(2010)]proposed a behavior-based IDS system,and Formby et al.[Formby,Rad and Beyah(2018)] also implemented IDS through Snort.Wan et al.[Wan,Yao,Jing et al.(2018)]proposed an event-based anomaly detection method to identify misbehaviors using nonpublic industrial communication protocols.Through the construction process of attack scenarios,we find that the ICS attack process requires a combination of common IT vulnerabilities with ICS-specific vulnerabilities.In order to better prevent such attacks,we propose a new IDS solution that combines traditional IT system IDS and behaviorbased ICS-specific IDS.Traditional IT network IDS can effectively identify malicious behaviors such as ARP spoofing,DNS spoofing,traditional worms,viruses,and Trojans.Behavior-based IDS can detect attacks on control systems in time.At present,the function of our behavior-based IDS is relatively simple.It can only detect unauthorized parameter modifications,the remote turning-on or turning-off of devices,and firmware downloads and uploads.In addition,it can only alarm and cannot effectively block attacks,but it can find existing ICS attacks very effectively.

    5 Conclusion

    This paper presented the MSICST testbed,a multiple-scenario hardware-in-the-loop ICS testbed for security research,which contains a complete enterprise network such as an enterprise zone network,DMZ,and control zone network.The control zone network contains four typical process scenarios:thermal power plant,rail transit,smart grid,and intelligent manufacturing.In order to conduct security research,the testbed also includes an attacker model,observer,and management network.Using the testbed,we conducted vulnerability discovery on the control device and found some vulnerabilities.We constructed two attack scenarios to simulate real ICS cyberattack events.We studied the security solutions and a whitelist-based host protection technology.From this,a new IDS solution was proposed.The IDS solution combines traditional IT system IDS and behavior-based ICS-specific IDS.

    In the future,we will expand to more process scenarios,and we will deploy more devices and protocols such as robotic control systems and other processes of the power grid.Additionally,we will introduce the steganography technology [Zhang,Qin,Zhang et al.(2018)] to conceal attacks,and add steganalysis [Yang,Luo,Lu et al.(2018);Ma,Luo,Li et al.(2018)] and machine learning [Xiang,Zhao,Li et al.(2018)] technology in order to evaluate the security.

    97人妻天天添夜夜摸| 热re99久久精品国产66热6| 老司机午夜福利在线观看视频| 天堂√8在线中文| 丝袜美腿诱惑在线| 一进一出好大好爽视频| 男人舔女人的私密视频| 久久香蕉激情| 久热这里只有精品99| 亚洲专区中文字幕在线| 悠悠久久av| 亚洲午夜精品一区,二区,三区| 久久精品亚洲精品国产色婷小说| 脱女人内裤的视频| 最新美女视频免费是黄的| 成人18禁高潮啪啪吃奶动态图| 一级毛片女人18水好多| 欧美另类亚洲清纯唯美| 又黄又粗又硬又大视频| 人人妻,人人澡人人爽秒播| 亚洲久久久国产精品| 精品免费久久久久久久清纯| 夜夜夜夜夜久久久久| 久久人妻av系列| 777久久人妻少妇嫩草av网站| 999精品在线视频| 久热这里只有精品99| 精品福利永久在线观看| 日韩欧美在线二视频| 免费日韩欧美在线观看| 亚洲自拍偷在线| 露出奶头的视频| 欧美日韩一级在线毛片| 人妻丰满熟妇av一区二区三区| 欧美成人午夜精品| 另类亚洲欧美激情| 最近最新免费中文字幕在线| 午夜久久久在线观看| 超碰成人久久| 亚洲第一av免费看| 男女之事视频高清在线观看| 亚洲第一欧美日韩一区二区三区| 欧美乱色亚洲激情| 亚洲自拍偷在线| 国产有黄有色有爽视频| e午夜精品久久久久久久| 看黄色毛片网站| 一进一出抽搐gif免费好疼 | 色精品久久人妻99蜜桃| 精品久久久久久成人av| 色婷婷久久久亚洲欧美| 国产又爽黄色视频| 亚洲精品中文字幕一二三四区| 国产亚洲欧美98| 成人精品一区二区免费| 日本免费一区二区三区高清不卡 | 男人操女人黄网站| 国产在线精品亚洲第一网站| 黄色成人免费大全| 少妇被粗大的猛进出69影院| 最近最新免费中文字幕在线| 国产人伦9x9x在线观看| 亚洲人成网站在线播放欧美日韩| 两个人免费观看高清视频| 最近最新免费中文字幕在线| 91大片在线观看| 又紧又爽又黄一区二区| 精品人妻在线不人妻| 免费搜索国产男女视频| 欧美中文综合在线视频| 亚洲av五月六月丁香网| 欧美黑人精品巨大| 久久人妻熟女aⅴ| 久久久国产成人精品二区 | 欧美成人性av电影在线观看| av网站在线播放免费| 两性午夜刺激爽爽歪歪视频在线观看 | 国产欧美日韩一区二区三| 国产精品 国内视频| 免费久久久久久久精品成人欧美视频| 亚洲专区国产一区二区| 久久精品国产亚洲av香蕉五月| 母亲3免费完整高清在线观看| 成人亚洲精品av一区二区 | 久99久视频精品免费| 99精品在免费线老司机午夜| 大型黄色视频在线免费观看| 嫩草影院精品99| 日本vs欧美在线观看视频| 99精品在免费线老司机午夜| 神马国产精品三级电影在线观看 | 亚洲专区国产一区二区| 午夜福利,免费看| 男人的好看免费观看在线视频 | 黄色 视频免费看| 超碰97精品在线观看| 亚洲中文字幕日韩| 色婷婷久久久亚洲欧美| 好看av亚洲va欧美ⅴa在| 久热爱精品视频在线9| 国产精品久久电影中文字幕| 黄色丝袜av网址大全| 久久这里只有精品19| 久久伊人香网站| 真人做人爱边吃奶动态| 老熟妇乱子伦视频在线观看| 热re99久久精品国产66热6| 在线视频色国产色| 国产成人系列免费观看| 两个人免费观看高清视频| 成人亚洲精品一区在线观看| 母亲3免费完整高清在线观看| 夜夜夜夜夜久久久久| 亚洲午夜理论影院| 欧美av亚洲av综合av国产av| 69av精品久久久久久| √禁漫天堂资源中文www| 少妇 在线观看| 亚洲成人国产一区在线观看| 波多野结衣一区麻豆| 窝窝影院91人妻| 国产无遮挡羞羞视频在线观看| 亚洲成人国产一区在线观看| 99精品久久久久人妻精品| 午夜日韩欧美国产| 天天躁狠狠躁夜夜躁狠狠躁| 天堂中文最新版在线下载| 人妻久久中文字幕网| 国产乱人伦免费视频| 国产精品免费一区二区三区在线| 久久久国产成人免费| 99精品在免费线老司机午夜| 村上凉子中文字幕在线| 人成视频在线观看免费观看| 久久国产精品人妻蜜桃| 一进一出抽搐gif免费好疼 | 国产精品乱码一区二三区的特点 | 啪啪无遮挡十八禁网站| 国产精品一区二区在线不卡| 久久婷婷成人综合色麻豆| 美女高潮到喷水免费观看| 最新在线观看一区二区三区| 老司机深夜福利视频在线观看| 国产又色又爽无遮挡免费看| 国产成人影院久久av| 黄色怎么调成土黄色| 亚洲精品在线观看二区| 满18在线观看网站| 成人18禁高潮啪啪吃奶动态图| ponron亚洲| 嫩草影院精品99| 成人亚洲精品av一区二区 | 免费在线观看亚洲国产| 757午夜福利合集在线观看| 一区二区日韩欧美中文字幕| 欧美乱妇无乱码| av天堂久久9| 12—13女人毛片做爰片一| 露出奶头的视频| 色综合欧美亚洲国产小说| 一二三四在线观看免费中文在| 人人妻人人爽人人添夜夜欢视频| 免费不卡黄色视频| 亚洲色图av天堂| 国产精品免费一区二区三区在线| 一级,二级,三级黄色视频| 91老司机精品| 好男人电影高清在线观看| 黑丝袜美女国产一区| 可以免费在线观看a视频的电影网站| 久热爱精品视频在线9| 国产黄a三级三级三级人| e午夜精品久久久久久久| 一边摸一边抽搐一进一出视频| 亚洲激情在线av| 欧美日韩福利视频一区二区| 成人永久免费在线观看视频| 国产精品久久久人人做人人爽| 别揉我奶头~嗯~啊~动态视频| netflix在线观看网站| 精品国产一区二区三区四区第35| 亚洲色图 男人天堂 中文字幕| 中文字幕高清在线视频| 一a级毛片在线观看| 波多野结衣一区麻豆| 午夜福利影视在线免费观看| 80岁老熟妇乱子伦牲交| 国产精品国产av在线观看| 日韩大码丰满熟妇| 免费一级毛片在线播放高清视频 | 免费观看人在逋| 精品久久久久久成人av| 18禁观看日本| 在线看a的网站| 搡老乐熟女国产| 一进一出抽搐gif免费好疼 | 成人av一区二区三区在线看| 免费女性裸体啪啪无遮挡网站| www.熟女人妻精品国产| 99久久久亚洲精品蜜臀av| 黄色视频,在线免费观看| 午夜久久久在线观看| 国产精品综合久久久久久久免费 | 大香蕉久久成人网| 亚洲av成人一区二区三| 宅男免费午夜| 久久久国产成人免费| 免费日韩欧美在线观看| 国产一区二区在线av高清观看| 性欧美人与动物交配| 久久精品91蜜桃| 日韩视频一区二区在线观看| 校园春色视频在线观看| 好男人电影高清在线观看| 夜夜爽天天搞| 麻豆一二三区av精品| 一区二区日韩欧美中文字幕| 国产成人av教育| 亚洲va日本ⅴa欧美va伊人久久| av视频免费观看在线观看| 99久久国产精品久久久| 777久久人妻少妇嫩草av网站| 琪琪午夜伦伦电影理论片6080| 国产成人啪精品午夜网站| 女人被躁到高潮嗷嗷叫费观| 日韩人妻精品一区2区三区| 啦啦啦在线免费观看视频4| 久久人人精品亚洲av| 国产成人影院久久av| 女人爽到高潮嗷嗷叫在线视频| 在线永久观看黄色视频| 女人精品久久久久毛片| 亚洲人成网站在线播放欧美日韩| 国产亚洲精品久久久久5区| 久久影院123| 免费看a级黄色片| 国产精品成人在线| 美女国产高潮福利片在线看| 亚洲精品粉嫩美女一区| 国产高清videossex| 日韩欧美国产一区二区入口| 国产精品 国内视频| 正在播放国产对白刺激| 黄色毛片三级朝国网站| 亚洲五月天丁香| 亚洲男人的天堂狠狠| 美女国产高潮福利片在线看| 午夜福利欧美成人| 久久久精品欧美日韩精品| 热99re8久久精品国产| 久久人妻av系列| 热re99久久精品国产66热6| 久久中文看片网| 麻豆国产av国片精品| 一级毛片女人18水好多| 欧美一区二区精品小视频在线| 久久久久久久午夜电影 | 在线十欧美十亚洲十日本专区| 精品一区二区三卡| 欧美在线一区亚洲| 嫩草影视91久久| 日韩欧美免费精品| 日韩大尺度精品在线看网址 | 51午夜福利影视在线观看| 中文字幕最新亚洲高清| 色婷婷久久久亚洲欧美| 欧美一级毛片孕妇| 黄色丝袜av网址大全| 亚洲专区国产一区二区| 国产主播在线观看一区二区| 人成视频在线观看免费观看| 级片在线观看| 欧美精品啪啪一区二区三区| 精品人妻在线不人妻| 一区二区三区精品91| 一个人免费在线观看的高清视频| av福利片在线| 精品久久久精品久久久| 日本欧美视频一区| 国产精品 国内视频| 国产精品一区二区免费欧美| 身体一侧抽搐| 国产午夜精品久久久久久| www.www免费av| 亚洲 欧美一区二区三区| 亚洲精品在线观看二区| 男女下面插进去视频免费观看| 日日摸夜夜添夜夜添小说| 精品人妻在线不人妻| 亚洲一区高清亚洲精品| 嫩草影视91久久| 中文欧美无线码| 亚洲一区中文字幕在线| 久久中文字幕人妻熟女| 99精品在免费线老司机午夜| 深夜精品福利| svipshipincom国产片| 日韩成人在线观看一区二区三区| 亚洲人成伊人成综合网2020| 丝袜在线中文字幕| 久久精品91无色码中文字幕| 精品国产国语对白av| 欧美日本中文国产一区发布| 丰满人妻熟妇乱又伦精品不卡| 亚洲成人免费av在线播放| 18禁黄网站禁片午夜丰满| 久久香蕉精品热| av网站免费在线观看视频| 欧美乱码精品一区二区三区| 美女高潮到喷水免费观看| 91老司机精品| 在线免费观看的www视频| 国产激情久久老熟女| 亚洲精品一区av在线观看| 男人操女人黄网站| 精品一区二区三区视频在线观看免费 | 亚洲aⅴ乱码一区二区在线播放 | 国产色视频综合| 一级黄色大片毛片| cao死你这个sao货| 757午夜福利合集在线观看| 极品教师在线免费播放| 亚洲av片天天在线观看| 天堂√8在线中文| xxx96com| 欧美黄色片欧美黄色片| 国产片内射在线| 搡老岳熟女国产| 操美女的视频在线观看| 18禁观看日本| 在线观看免费午夜福利视频| 亚洲三区欧美一区| 中亚洲国语对白在线视频| 欧美乱色亚洲激情| 俄罗斯特黄特色一大片| 亚洲中文日韩欧美视频| 成人亚洲精品一区在线观看| 精品高清国产在线一区| 久久精品人人爽人人爽视色| 国产激情欧美一区二区| www.999成人在线观看| 伦理电影免费视频| 在线观看免费视频网站a站| 欧美一级毛片孕妇| 国产xxxxx性猛交| e午夜精品久久久久久久| 99久久人妻综合| 在线观看免费日韩欧美大片| 又黄又粗又硬又大视频| 亚洲国产看品久久| 亚洲精品在线观看二区| 99riav亚洲国产免费| 色播在线永久视频| 日韩精品中文字幕看吧| 亚洲av日韩精品久久久久久密| 多毛熟女@视频| 欧美+亚洲+日韩+国产| 久久久久久久精品吃奶| 成人精品一区二区免费| 亚洲成人免费av在线播放| 午夜福利一区二区在线看| 人人妻人人澡人人看| 精品卡一卡二卡四卡免费| 亚洲男人天堂网一区| 中出人妻视频一区二区| 久久精品亚洲熟妇少妇任你| 人人妻人人爽人人添夜夜欢视频| 99久久国产精品久久久| 一二三四在线观看免费中文在| 国产高清激情床上av| 可以免费在线观看a视频的电影网站| 久久久久久久久中文| 丁香欧美五月| 亚洲av第一区精品v没综合| 欧美日韩亚洲国产一区二区在线观看| 法律面前人人平等表现在哪些方面| 亚洲欧美精品综合一区二区三区| 18禁美女被吸乳视频| 欧美日韩国产mv在线观看视频| 久久精品影院6| 亚洲情色 制服丝袜| 国产野战对白在线观看| 久久精品91无色码中文字幕| 午夜91福利影院| av欧美777| 桃色一区二区三区在线观看| 中文字幕av电影在线播放| 国产91精品成人一区二区三区| 99热国产这里只有精品6| 午夜两性在线视频| 亚洲一码二码三码区别大吗| 咕卡用的链子| 亚洲精品国产精品久久久不卡| 精品第一国产精品| 国产精品香港三级国产av潘金莲| 视频区图区小说| 看片在线看免费视频| 日本 av在线| 国产亚洲欧美98| 日韩精品青青久久久久久| 久久精品国产亚洲av高清一级| 精品国内亚洲2022精品成人| 无遮挡黄片免费观看| 人人妻人人澡人人看| 亚洲欧美精品综合一区二区三区| 久久亚洲真实| 亚洲一区二区三区不卡视频| 久久久久久大精品| 久久久精品大字幕| 国产高清视频在线播放一区| 男人和女人高潮做爰伦理| 亚洲国产高清在线一区二区三| 免费搜索国产男女视频| 国产亚洲精品综合一区在线观看| 欧美黑人欧美精品刺激| 久久国产精品人妻蜜桃| avwww免费| 日本黄色片子视频| 一进一出抽搐gif免费好疼| 黄色视频,在线免费观看| 真实男女啪啪啪动态图| 色噜噜av男人的天堂激情| 免费搜索国产男女视频| 国内精品一区二区在线观看| 欧美一区二区亚洲| 成人永久免费在线观看视频| 有码 亚洲区| 脱女人内裤的视频| 亚洲精品色激情综合| 国产精品久久电影中文字幕| 国产精品久久久久久亚洲av鲁大| 欧美日韩福利视频一区二区| 搡老熟女国产l中国老女人| 欧美性猛交黑人性爽| 波多野结衣巨乳人妻| 免费高清视频大片| 精品久久久久久成人av| 久久精品国产亚洲av涩爱 | 亚洲 国产 在线| 日本一二三区视频观看| 亚洲av五月六月丁香网| 亚洲黑人精品在线| 国产乱人伦免费视频| 搡老妇女老女人老熟妇| 18+在线观看网站| 国产三级黄色录像| 亚洲在线自拍视频| 久久这里只有精品中国| www.www免费av| 赤兔流量卡办理| 波多野结衣高清作品| 午夜精品一区二区三区免费看| 免费av毛片视频| 桃色一区二区三区在线观看| 久久热精品热| 一边摸一边抽搐一进一小说| 国产精品98久久久久久宅男小说| 最近中文字幕高清免费大全6 | 久久久久久久亚洲中文字幕 | 免费在线观看成人毛片| 国产乱人视频| a在线观看视频网站| 欧美最新免费一区二区三区 | 精品99又大又爽又粗少妇毛片 | 国产一区二区在线观看日韩| 成年免费大片在线观看| 嫩草影视91久久| 可以在线观看的亚洲视频| 三级国产精品欧美在线观看| 97热精品久久久久久| 又紧又爽又黄一区二区| 欧美黑人巨大hd| 日韩国内少妇激情av| av在线天堂中文字幕| 在线国产一区二区在线| 欧美性猛交╳xxx乱大交人| 欧美+日韩+精品| 亚洲av第一区精品v没综合| 一个人看视频在线观看www免费| 变态另类丝袜制服| 看免费av毛片| 长腿黑丝高跟| 欧美一级a爱片免费观看看| 美女高潮喷水抽搐中文字幕| 夜夜夜夜夜久久久久| 久久人人精品亚洲av| 久久久国产成人精品二区| 久久国产精品影院| 毛片一级片免费看久久久久 | 精品一区二区三区av网在线观看| 国产精品久久久久久精品电影| 亚洲国产精品久久男人天堂| 久久精品国产自在天天线| 色综合欧美亚洲国产小说| 亚洲成人中文字幕在线播放| 中出人妻视频一区二区| 少妇人妻一区二区三区视频| 免费看日本二区| 亚洲成人中文字幕在线播放| 极品教师在线视频| 色噜噜av男人的天堂激情| 一卡2卡三卡四卡精品乱码亚洲| 亚洲自拍偷在线| 久久99热6这里只有精品| 国产三级在线视频| 国产69精品久久久久777片| 99国产极品粉嫩在线观看| 亚洲成人久久爱视频| 好男人电影高清在线观看| 国产成人av教育| 人人妻,人人澡人人爽秒播| 亚洲成a人片在线一区二区| 日韩精品青青久久久久久| 免费在线观看亚洲国产| 久久国产乱子伦精品免费另类| 一级黄片播放器| 可以在线观看的亚洲视频| 亚洲电影在线观看av| 真人一进一出gif抽搐免费| 亚洲国产高清在线一区二区三| 嫁个100分男人电影在线观看| 日日摸夜夜添夜夜添av毛片 | 免费一级毛片在线播放高清视频| 亚洲av美国av| 美女被艹到高潮喷水动态| 亚洲熟妇熟女久久| 美女被艹到高潮喷水动态| 亚洲av电影在线进入| 18+在线观看网站| 搡老妇女老女人老熟妇| 国产探花极品一区二区| 亚洲黑人精品在线| 日本成人三级电影网站| 岛国在线免费视频观看| 网址你懂的国产日韩在线| 久久性视频一级片| 身体一侧抽搐| 一夜夜www| 成人欧美大片| 丰满乱子伦码专区| 亚洲无线观看免费| 亚洲aⅴ乱码一区二区在线播放| av福利片在线观看| 国产成人影院久久av| 国产高清视频在线播放一区| 亚洲最大成人中文| 搡老妇女老女人老熟妇| 少妇高潮的动态图| a在线观看视频网站| 亚洲成人久久性| 非洲黑人性xxxx精品又粗又长| 91av网一区二区| 又爽又黄a免费视频| 97超视频在线观看视频| 中文在线观看免费www的网站| www.999成人在线观看| 亚洲av成人精品一区久久| 天堂动漫精品| 欧美最黄视频在线播放免费| 噜噜噜噜噜久久久久久91| 日本熟妇午夜| 在线观看午夜福利视频| av在线蜜桃| 老司机午夜十八禁免费视频| 人人妻人人澡欧美一区二区| 亚洲欧美激情综合另类| 好男人电影高清在线观看| 欧美日韩福利视频一区二区| 欧美三级亚洲精品| 精品久久久久久久末码| 亚洲色图av天堂| 亚洲国产精品成人综合色| 特级一级黄色大片| 一个人免费在线观看电影| 国产伦一二天堂av在线观看| 国产黄色小视频在线观看| 国产伦在线观看视频一区| 欧美一区二区亚洲| 欧美乱色亚洲激情| 免费看美女性在线毛片视频| 脱女人内裤的视频| 免费电影在线观看免费观看| 国产成人啪精品午夜网站| 久久欧美精品欧美久久欧美| 国产精品嫩草影院av在线观看 | 99久久精品国产亚洲精品| 亚洲 国产 在线| 久久九九热精品免费| 亚洲中文字幕日韩| 中国美女看黄片| 伦理电影大哥的女人| 在线观看美女被高潮喷水网站 | 精品人妻1区二区| 亚洲人与动物交配视频| 日本五十路高清| 欧美高清性xxxxhd video| 亚洲av成人av| 两性午夜刺激爽爽歪歪视频在线观看| 俺也久久电影网| 亚洲真实伦在线观看| 又爽又黄a免费视频| 综合色av麻豆| 欧美乱色亚洲激情| 最近中文字幕高清免费大全6 | 一进一出抽搐动态| av天堂在线播放| 热99re8久久精品国产| 亚洲美女黄片视频| 人妻久久中文字幕网| 国产精品久久久久久精品电影| 99热这里只有是精品50| 欧美午夜高清在线| 99热这里只有是精品50| 成人特级av手机在线观看| 欧美乱色亚洲激情|