[1] |
国家工业信息安全产业发展联盟.工业信息安全态势白皮书(2017年)[EB/OL].[2018-03-10].https://max.book 118.com/html/2018/1007/5043141300001320.shtm.
|
[2] |
ZHU B,JOSEPH A,SASTRY S.A taxonomy of cyber attacks on SCADA systems[C]//Proceedings of 2011 International Conference on Internet of Things and 4th International Conference on Cyber,Physical and Social Computing.Washington D.C.,USA:IEEE Press,2012:380-388.
|
[3] |
BODUNGEN C E,SINGER B L,SHBEEB A,等.黑客大曝光:工业控制系统安全[M].戴超,张鹿,译.北京:机械工业出版社,2017.
|
[4] |
陶耀东,李宁,曾广圣.工业控制系统安全综述[J].计算机工程与应用,2016,52(13):8-18.
|
[5] |
彭勇,江常青,谢丰,等.工业控制系统信息安全研究进展[J].清华大学学报(自然科学版),2012,52(10):1396-1408.
|
[6] |
王炎,刘嘉勇,刘亮,等.漏洞利用工具研发框架研究[J].计算机工程,2018,44(3):127-131.
|
[7] |
严俊龙.基于Metasploit框架自动化渗透测试研究[J].信息网络安全,2013(2):53-56.
|
[8] |
姚宇,祝烈煌,武传坤.工业控制网络安全技术与实践[M].北京:机械工业出版社,2017.
|
[9] |
屈婉莹,魏为民,朱苏榕.工业控制系统通信协议安全研究[C]//全国智能电网用户端能源管理学术年会.上海:出版者不详,2015:220-224.
|
[10] |
冯涛,鲁晔,方君丽.工业以太网协议脆弱性与安全防护技术综述[J].通信学报,2017,38(增刊):185-196.
|
[11] |
SHAHZAD A,LEE M,LEE Y K,et al.Realtime MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information[J].Symmetry,2015,7(3):1176-1210.
|
[12] |
HUITSING P,CHANDIA R,PAPA M,et al.Attack taxonomies for the Modbus protocols[J].International Journal of Critical Infrastructure Protection,2008,1(1):37-44.
|
[13] |
VAIDYA B,MAKRAKIS D,MOUFTAH H T.Authentication and authorization mechanisms for substation automation in smart grid network[J].IEEE Network,2013,27(1):5-11.
|
[14] |
PREMNATH A P,JO J Y,KIM Y.Application of NTRU cryptographic algorithm for SCADA security[C]//Proceedings of International Conference on Information Technology:New Generations.Washington D.C.,USA:IEEE Press,2014:341-346.
|
[15] |
张环宇,陈凯.基于零动态的工控系统攻击检测识别安全模型[J].计算机工程,2017,43(10):98-103.
|
[16] |
FORMBY D,SRINIVASAN P,LEONARD A,et al.Who's in control of your control system? device fingerprinting for cyber-physical systems[C]//Proceedings of Network and Distributed System Security Symposium.San Diego,USA:IEICE,2016:1-15.
|
[17] |
李伟.基于Modbus协议的工控节点设计与实现[J].计算机工程,2010,36(16):226-228.
|
[18] |
司马莉萍,贺贵明,陈明榜.基于Modbus/TCP协议的工业控制通信[J].计算机应用,2005,25(z1):29-31.
|
[19] |
BOSSERT G,HIET G.Towards automated protocol reverse engineering using semantic information[C]//Proceedings of ACM Symposium on Information,Computer and Communications Security.New York,USA:ACM Press,2014:51-62.
|
[20] |
DUCHÊNE J,GUERNIC C L,ALATA E,et al.State of the art of network protocol reverse engineering tools[J].Journal of Computer Virology and Hacking Techniques,2017(2):1-16.
|
[21] |
ANTROBUS R,FREY S,GREEN B,et al.SimaticScan:towards a specialised vulnerability scanner for industrial control systems[C]//Proceedings of the 4th International Symposium on ICS and SCADA Cyber Security Research.Belfast,UK:[s.n.],2016:1-8.
|
[22] |
VOYIATZIS A G,KATSIGIANNIS K,KOUBIAS S.A Modbus/TCP fuzzer for testing Internet worked industrial systems[C]//Proceedings of IEEE Conference on Emerging Technologies and Factory Automation.Washington D.C.,USA:IEEE Press,2015:1-6.
|
[23] |
张亚丰,洪征,吴礼发,等.基于范式语法的工控协议Fuzzing测试技术[J].计算机应用研究,2016,33(8):2433-2439.
|
[24] |
VARGAS C,LANGFINGER M,VOGEL-HEUSER B.A tiered security analysis of industrial control system devices[C]//Proceedings of IEEE International Conference on Industrial Informatics.Washington D.C.,USA:IEEE Press,2017:399-404.
|
[25] |
詹静,杨静.基于远程证明的可信Modbus/TCP协议研究[J].四川大学学报(工程科学版),2017,49(1):197-205.
|