[1] 彭勇,江常青,谢丰,等.工业控制系统信息安全研究进展[J].清华大学学报(自然科学版),2012,52(10):1396-1408. PENG Y,JIANG C Q,XIE F,et al.Research progress on information security of industrial control systems[J].Journal of Tsinghua University(Natural Science Edition),2012,52(10):1396-1408.(in Chinese) [2] 张环宇,陈凯.基于零动态的工控系统攻击检测识别安全模型[J].计算机工程,2017,43(10):98-103. ZHANG H Y,CHEN K.Industrial control system security model of attack detection and identification based on zero dynamics[J].Computer Engineering,2017,43(10):98-103.(in Chinese) [3] 杨国泰.工业控制系统安全网络防护分析[J].电子世界,2019(16):70-71. YANG G T.Analysis of security network protection of industrial control system[J].Electronic World,2019(16):70-71.(in Chinese) [4] 蒲石,陈周国,祝世雄.震网病毒分析与防范[J].信息网络安全,2012(2):40-43. PU S,CHEN Z G,ZHU S X.Analysis and prevention of Stuxnet virus[J].Information Network Security,2012(2):40-43.(in Chinese) [5] 邹颀伟.基于Fuzzing测试的工控网络协议漏洞挖掘技术研究[D].西安:西安电子科技大学,2018. ZOU Q W.Research on mining technology of industrial control network protocol vulnerabilities based on Fuzzing test[D].Xi'an:Xidian University,2018.(in Chinese) [6] 阮伟,黄光平,陈亮,等.工业控制系统私有协议深度解析方法[J].电子技术与软件工程,2019(22):3-4. RUAN W,HUANG G P,CHEN L,et al.In-depth analysis method of industrial control system private protocol[J].Electronic Technology and Software Engineering,2019(22):3-4.(in Chinese) [7] 马小荣,贺琴,马晟.西门子工业控制的PLC应用及关键技术分析[J].中国新通信,2019,21(19):119. MA X R,HE Q,MA S.PLC application and key technology analysis of Siemens industrial control[J].China New Communications,2019,21(19):119.(in Chinese) [8] 常焘.关于西门子PLC控制系统工作原理及常见故障应用分析[J].山东工业技术,2018(20):155. CHANG T.About the working principle of Siemens PLC control system and application analysis of common faults[J].Shandong Industrial Technology,2018(20):155.(in Chinese) [9] 赵国华.西门子PLC在工厂应用中的问题及对策探讨[J].橡塑技术与装备,2016,42(10):97-98. ZHAO G H.Discussion on the problems and countermeasures of Siemens PLC in factory application[J].Rubber and Plastics Technology and Equipment,2016,42(10):97-98.(in Chinese) [10] 李文轩.工控系统网络协议安全测试方法研究综述[J].单片机与嵌入式系统应用,2019,19(9):18-21. LI W X.Summary of research on security test methods of industrial control system network protocol[J].Single Chip Microcomputer and Embedded System Applications,2019,19(9):18-21.(in Chinese) [11] 贾涛.西门子S7-200以太网通讯协议研究[J].电子技术与软件工程,2014(24):30-32. JIA T.Research on Siemens S7-200 Ethernet communication protocol[J].Electronic Technology and Software Engineering,2014(24):30-32.(in Chinese) [12] LI M X,HE L,TENG Y X,et al.Research on network protocol vulnerability discovery based on fuzz testing[C]//Proceedings of 2017 IEEE Information Technology,Networking,Electronic and Automation Control Conference.Washington D.C.,USA:IEEE Press,2017:1354-1358. [13] MA R,WANG D G,HU C Z,et al.Test data generation for stateful network protocol fuzzing using a rule-based state machine[J].Tsinghua Science and Technology,2016,21(3):352-360. [14] KIM S J,SHON T.Field classification-based novel fuzzing case generation for ICS protocols[J].Journal of Supercomputing,2018,74(9):4434-4450. [15] ZHOU B H,LI Q,SUN B W,et al.An improved fuzzy test of industrial control system[C]//Proceedings of the 10th International Conference on Computer and Automation Engineering.New York,USA:ACM Press,2018:233-237. [16] MOUSAVI S M,TAVANA M,ALIKAR N,et al.A tuned hybrid intelligent fruit fly optimization algorithm for fuzzy rule generation and classification[J].Neural Computing and Applications,2019,31(3):1-4. [17] 张成彬,赵慧,曹宗钰.基于深度学习的车身网络KWP2000协议漏洞挖掘[J].山东大学学报(工学版),2019,49(2):17-22. ZHANG C B,ZHAO H,CAO Z Y.The vulnerability mining method for KWP2000 protocol based on deep learning and fuzzing[J].Journal of Shandong University(Engineering Science),2019,49(2):17-22.(in Chinese) [18] LI Z H,ZHAO H,SHI J Q,et al.An intelligent fuzzing data generation method based on deep adversarial learning[J].IEEE Access,2019,7:49327-49340. [19] 吕佩吾,葛雅川,李楠,等.基于卷积神经网络的工控协议Modbus TCP异常检测[J].信息安全研究,2019,5(7):635-638. LÜ P W,GE Y C,LI N,et al.Anomaly detection of industrial control protocol Modbus TCP based on convolutional neural network[J].Information Security Research,2019,5(7):635-638. [20] DONG G F,SUN P,SHI W B,et al.A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems[J].Applied Soft Computing,2018,70:896-902. [21] 申莹珠.基于模型学习的安全协议脆弱性分析关键技术研究[D].郑州:战略支援部队信息工程大学,2018. SHEN Y Z.Research on key technologies for vulnerability analysis of security protocols based on model learning[D].Zhengzhou:Strategic Support Force Information Engineering University,2018.(in Chinese) [22] 钱忠,李培峰,周国栋,等.基于双向LSTM网络的不确定和否定作用范围识别[J].软件学报,2018,29(8):2427-2447. QIAN Z,LI P F,ZHOU G D,et al.Recognition of uncertain and negative scope based on two-way LSTM network[J].Journal of Software,2018,29(8):2427-2447.(in Chinese) [23] GAO J L,ZHANG H P,LU P,et al.An effective LSTM recurrent network to detect arrhythmia on imbalanced ECG dataset[J].Journal of Healthcare Engineering,2019,2019:1-10. [24] MA R,REN S M,MA K,et al.Semi-valid fuzz testing case generation for stateful network protocol[J].Tsinghua Science and Technology,2017,22(5):458-468. [25] 梁卓杰.测试用例自动生成算法设计及自动化测试平台构建[D].北京:北京交通大学,2019. LIANG Z J.Design of automatic test case generation algorithm and construction of automatic test platform[D].Beijing:Beijing Jiaotong University,2019.(in Chinese) |