[go: up one dir, main page]

CN105045251B - The demand analysis of industrial control system functional safety and information security and fusion method - Google Patents

The demand analysis of industrial control system functional safety and information security and fusion method Download PDF

Info

Publication number
CN105045251B
CN105045251B CN201510276161.8A CN201510276161A CN105045251B CN 105045251 B CN105045251 B CN 105045251B CN 201510276161 A CN201510276161 A CN 201510276161A CN 105045251 B CN105045251 B CN 105045251B
Authority
CN
China
Prior art keywords
security
requirements
assets
information security
functional safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510276161.8A
Other languages
Chinese (zh)
Other versions
CN105045251A (en
Inventor
周纯杰
黄双
秦元庆
张琦
李璇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201510276161.8A priority Critical patent/CN105045251B/en
Publication of CN105045251A publication Critical patent/CN105045251A/en
Application granted granted Critical
Publication of CN105045251B publication Critical patent/CN105045251B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0259Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the response to fault detection

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明公开了一种工业控制系统功能安全与信息安全的需求分析及融合方法,包括分析系统中的资产,明确其相关属性,形成系统资产清单;根据系统资产与危害事件之间的关联性确定危害事故发生的可能性;确定哪些危害事件需要进一步采取功能安全保障措施,进而确定对系统中功能安全需求集;分析资产的固有漏洞及其可能面临的信息安全威胁及对应的防护措施;判断需要加强保护的系统资产,进而确定资产的信息安全防护措施,所有资产需要的保护措施就形成了系统的信息安全需求集;将功能安全需求集与信息安全需求集进行冲突协调,得到系统整体的安全需求集;依据各安全措施的实施成本,结合系统的总体成本约束,对系统的整体安全需求集进行优化。

The invention discloses a demand analysis and fusion method for industrial control system functional safety and information security, including analyzing assets in the system, clarifying their related attributes, and forming a list of system assets; determining according to the correlation between system assets and hazardous events Possibility of hazardous accidents; determine which hazardous events require further functional safety assurance measures, and then determine the set of functional safety requirements in the system; analyze the inherent vulnerabilities of assets and the information security threats they may face and corresponding protective measures; judge the needs Strengthen the protection of system assets, and then determine the information security protection measures for assets. The protection measures required by all assets form the information security requirement set of the system; coordinate the conflict between the functional security requirement set and the information security requirement set, and obtain the overall security of the system Requirements set: According to the implementation cost of each security measure, combined with the overall cost constraints of the system, optimize the overall security requirements set of the system.

Description

工业控制系统功能安全与信息安全的需求分析及融合方法Requirement analysis and fusion method of industrial control system functional safety and information security

技术领域technical field

本发明涉及工业控制系统安全控制领域,更具体地,涉及一种针对工业控制系统的功能安全与信息安全的需求分析及融合方法。The invention relates to the field of safety control of industrial control systems, and more specifically, to a demand analysis and fusion method for functional safety and information safety of industrial control systems.

背景技术Background technique

工业控制系统属于生产运行系统,是国家关键基础设施和各类工业生产的大脑和中枢神经,保障其安全运行至关重要。工业控制系统安全防护需求分析是是保障系统安全运行的前提和基础。The industrial control system belongs to the production operation system. It is the brain and central nervous system of the country's key infrastructure and various industrial productions. It is very important to ensure its safe operation. The analysis of industrial control system security protection requirements is the premise and basis for ensuring the safe operation of the system.

在工业控制系统中,功能安全是安全控制的一个重要方面,在IEC61508标准中,功能安全主要是针对与E/E/PE相关的设备及控制系统,避免在系统故障或失效时,被控对象/过程或其他相关系统导致不可接受的风险,导致经济损失、人员伤亡或环境污染。信息通信技术在工业控制系统中的广泛应用极大的降低了系统的设计维护成本提高了系统的性能,但同时也将信息安全问题引入到了工业控制系统中,信息安全业已成为工业控制系统安全控制的另一个重要的方面。这两种安全并不是相互独立、毫无关系的,而是相互影响、密切联系的。从安全防护的视角来看,信息安全防护策略有可能会增大系统功能安全方面的风险,功能安全保障措施也有可能给系统引入新的信息安全漏洞;同时,在某些时刻二者也会体现出相互促进的一面。总体来说,功能安全保障与信息安全防护在总体目标上是一致的,都是为了保证系统安全稳定运行,但是其具体的侧重点又有不同。功能安全强调的是系统运行过程中不导致资产损失、人员伤亡或环境污染,考虑的是系统随机的故障与失效对外界产生的风险。信息安全强调的是恶意攻击不干扰系统的正常运行,考虑的是恶意的入侵攻击对系统内产生的风险。In industrial control systems, functional safety is an important aspect of safety control. In the IEC61508 standard, functional safety is mainly aimed at equipment and control systems related to E/E/PE, so as to prevent the controlled object from being damaged when the system fails or fails. / process or other related system that poses an unacceptable risk resulting in economic loss, personal injury or environmental pollution. The wide application of information and communication technology in industrial control systems has greatly reduced the design and maintenance costs of the system and improved the performance of the system, but at the same time it has also introduced information security issues into industrial control systems. Information security has become a security control system for industrial control systems. Another important aspect of . These two kinds of security are not independent and unrelated to each other, but are closely related to each other. From the perspective of security protection, information security protection strategies may increase the risk of system functional security, and functional security measures may also introduce new information security vulnerabilities into the system; to promote each other. Generally speaking, functional security assurance and information security protection have the same overall goal, both to ensure the safe and stable operation of the system, but their specific emphases are different. Functional safety emphasizes that the system does not cause asset loss, casualties or environmental pollution during the operation process, and considers the risks of random system failures and failures to the outside world. Information security emphasizes that malicious attacks do not interfere with the normal operation of the system, and considers the risks generated by malicious intrusion attacks on the system.

功能安全标准IEC61508中规定了工业控制系统功能安全防护步骤,现在已经制定的IEC62443部分标准也大致明晰了工业控制系统信息安全防护的流程。但是这些标准大多是从一个方面的安全出发进行考虑,且涉及的安全相关知识较为专业、门槛过高。而目前,关于综合工业控制系统功能安全与信息安全方面的研究,多是集中于区分二者的概念与关系,对于其综合安全需求分析与融合尚未提出有效的解决方案。The functional safety standard IEC61508 stipulates the functional safety protection steps of industrial control systems, and some standards of IEC62443 that have been formulated now roughly clarify the process of information security protection of industrial control systems. However, most of these standards are considered from one aspect of safety, and the safety-related knowledge involved is relatively professional and the threshold is too high. At present, the research on the functional safety and information security of the integrated industrial control system is mostly focused on distinguishing the concepts and relationships between the two, and no effective solution has been proposed for the analysis and integration of its comprehensive security requirements.

发明专利申请(CN201210186363.X)公开了一种“基于系统资产的软件安全需求分析方法”,在确定系统资产后,通过建成的系统资产库半自动地获得具有系统性、权威性的分析结果(包括资产所对应的威胁、攻击模式和用于缓和威胁的CC标准安全功能组件),最终根据结果完成安全概要规范。发明授权专利(CN201110208744.9),公开了一种“一种等级驱动的安全需求分析方法”,根据用户对系统提出的安全需求等级要求,对根据威胁选择的安全功能组件进行筛选,再由安全需求分析人员考虑具体技术和安全策略,将最终选定的安全功能组件描述成安全概要规范。这些专利都是属于IT领域,且仅考虑的是信息安全。Invention patent application (CN201210186363.X) discloses a "software security requirements analysis method based on system assets", after determining system assets, semi-automatically obtain systematic and authoritative analysis results (including Threats corresponding to assets, attack modes, and CC standard security function components for mitigating threats), and finally complete the security profile specification based on the results. The authorized invention patent (CN201110208744.9) discloses a "level-driven security requirement analysis method", which screens the security function components selected according to the threat according to the level of security requirements proposed by the user for the system, and then the security Requirement analysts consider specific technologies and security strategies, and describe the finally selected security function components as security profile specifications. These patents belong to the field of IT, and only consider information security.

功能安全与信息安全的这些异同点在分析系统安全需求时就使得存在一些相互冗余或矛盾的安全需求,需要进行融合以获得具有一致性的系统安全需求。目前,国内外尚未有一套工业控制系统的综合功能安全与信息安全的需求分析与融合方法。These similarities and differences between functional safety and information security lead to some redundant or contradictory safety requirements when analyzing system safety requirements, which need to be integrated to obtain consistent system safety requirements. At present, there is no set of requirements analysis and fusion methods for the comprehensive functional safety and information security of industrial control systems at home and abroad.

发明内容Contents of the invention

本发明的目的在于提供一种用于工业控制系统的功能安全和信息安全需求分析及融合的方法,该方法能够为工业控制系统安全控制及防护(综合功能安全和信息安全)提供一套快速、完整获取安全需求的流程,减小安全需求开发难度、降低安全需求开发成本,提高系统综合安全能力。The purpose of the present invention is to provide a method for analyzing and integrating functional safety and information security requirements of industrial control systems, which can provide a set of fast, Completely obtain the process of security requirements, reduce the difficulty of developing security requirements, reduce the cost of developing security requirements, and improve the comprehensive security capabilities of the system.

本发明提供了工业控制系统中功能安全与信息安全的需求分析及融合方法,包括下述步骤;The invention provides a demand analysis and fusion method of functional safety and information safety in an industrial control system, including the following steps;

步骤(1)分析系统中的资产,明确其相关属性,形成系统资产清单。其具体过程为:Step (1) Analyze the assets in the system, clarify their related attributes, and form a list of system assets. The specific process is:

(1.1)搜集、分析及整理系统的设计文档、说明文档以及用例图;(1.1) Collect, analyze and organize the design documents, description documents and use case diagrams of the system;

(1.2)分析系统中的功能、数据信息、软硬件资源以及系统运行涉及的人员,将系统的资产进行分类,分为信息资产、软件资产、物理资产、服务、人员以及无形资产,确定资产的属性,包括:资产名称、数量、位置、随机失效概率、资产失效后可能引发的危害事故、资产的重要性以及资产的固有漏洞。其中资产的重要性可以分为非常重要(VI)、重要(I)、一般(GI)、不重要(UI)、非常不重要(VUI)五个等级。最后形成系统的资产清单。(1.2) Analyze the functions, data information, software and hardware resources and personnel involved in the system operation in the system, classify the assets of the system into information assets, software assets, physical assets, services, personnel and intangible assets, and determine the assets Attributes, including: asset name, quantity, location, probability of random failure, possible hazards after asset failure, importance of asset, and inherent vulnerability of asset. The importance of assets can be divided into five levels: very important (VI), important (I), general (GI), unimportant (UI), and very unimportant (VUI). Finally, a system asset list is formed.

步骤(2)依据系统的资产清单,分析系统资产失效可能引发的危害事故,评估其后果,根据系统资产与危害事件之间的关联性确定危害事故发生的可能性,其具体过程为:Step (2) Based on the system asset list, analyze the hazardous accidents that may be caused by the failure of system assets, evaluate their consequences, and determine the possibility of hazardous accidents according to the correlation between system assets and hazardous events. The specific process is as follows:

(2.1)根据系统资产清单及各资产可能引发的危害事故,确定系统中可能发生的危害事故集合。(2.1) According to the list of system assets and the hazard accidents that may be caused by each asset, determine the collection of hazard accidents that may occur in the system.

(2.2)对危害事故集合中的每种危害事故根据专家评估结果采用模糊综合评估方法评估其发生后产生的后果。(2.2) Use the fuzzy comprehensive evaluation method to evaluate the consequences of each hazardous accident in the hazardous accident set according to the expert evaluation results.

(2.3)依据系统资产间的依赖关系,结合资产的失效概率,确定危害事故集合中的每种危害可能发生的概率。(2.3) According to the dependencies among system assets, combined with the failure probability of assets, determine the probability that each hazard in the hazard accident set may occur.

步骤(3)根据危害事故的分析结果,评估其功能安全方面的潜在风险,结合行业对系统的风险承受能力,确定哪些危害事件需要进一步采取功能安全保障措施,进而确定对系统中功能安全保护需求(即功能安全需求),其具体过程为:Step (3) Based on the analysis results of hazardous accidents, evaluate the potential risks in terms of functional safety, and combine the industry's risk tolerance for the system to determine which hazardous events require further functional safety protection measures, and then determine the protection requirements for functional safety in the system (that is, functional safety requirements), the specific process is:

(3.1)结合危害事故发生造成的后果和可能发生的概率,评估各类危险事件的功能安全风险;(3.1) Evaluate the functional safety risks of various hazardous events in combination with the consequences of hazardous accidents and the probability of occurrence;

(3.2)结合各类危险事件的应对措施,根据各类危险事件功能安全风险等级,判断是否需要施加对应的功能安全保障措施来降低或消除风险;(3.2) Combined with the response measures for various dangerous events, and according to the functional safety risk level of various dangerous events, judge whether it is necessary to apply corresponding functional safety measures to reduce or eliminate risks;

(3.3)将整个系统所需的功能安全保障综合起来,形成系统的功能安全需求集Rsafety(3.3) Combine the functional safety guarantees required by the entire system to form the functional safety requirement set R safety of the system.

步骤(4)根据系统的资产,分析资产的固有漏洞及其可能面临的信息安全威胁及对应的防护措施,具体过程为:Step (4) According to the assets of the system, analyze the inherent vulnerabilities of the assets and the information security threats they may face and the corresponding protective measures. The specific process is:

(4.1)针对资产清单中的各种资产,依据其固有的漏洞,分析可能面临的威胁列表、以及所有可用的保护措施。(4.1) For various assets in the asset inventory, analyze the list of possible threats and all available protection measures based on their inherent vulnerabilities.

(4.2)分析资产的固有漏洞和可能面临的信息安全威胁,依据行业的历史数据,利用专家评估的数据通过模糊评估方法判断各种漏洞可能被威胁所利用的概率。(4.2) Analyze the inherent vulnerabilities of assets and possible information security threats. Based on the historical data of the industry, use the data evaluated by experts to judge the probability that various vulnerabilities may be exploited by threats through fuzzy evaluation methods.

步骤(5),根据资产的重要性等级、其漏洞被利用的可能性,采用模糊评估的方法评估资产的信息安全风险等级,结合系统能够承受的信息安全风险等级,判断需要加强保护的系统资产,进而确定资产的信息安全防护措施,所有资产需要的保护措施就形成了系统的信息安全防护需求(即信息安全需求集),其具体过程为:In step (5), according to the importance level of the asset and the possibility of its vulnerability being exploited, the fuzzy evaluation method is used to evaluate the information security risk level of the asset, and combined with the information security risk level that the system can withstand, determine the system assets that need to be strengthened. , and then determine the information security protection measures of assets, and the protection measures required by all assets form the information security protection requirements of the system (that is, the information security requirements set). The specific process is as follows:

(5.1)将资产对应的漏洞列表中的每个漏洞可能被利用的概率进行模糊化得到对应的模糊向量。(5.1) Fuzzify the probability that each vulnerability in the vulnerability list corresponding to the asset may be exploited to obtain the corresponding fuzzy vector.

(5.2)根据系统的资产列表获得其在系统中的重要性程度(如表1所示,分为三个等级),并同样将其进行模糊化,得到对应的模糊向量。(5.2) Obtain the degree of importance in the system according to the asset list of the system (as shown in Table 1, divided into three levels), and also fuzzify it to obtain the corresponding fuzzy vector.

(5.3)将信息安全风险按照行业或系统要求划分等级,例如划分“高(HR)、中(MR)、低(LR)”三个等级。(5.3) Classify information security risks according to industry or system requirements, such as "high (HR), medium (MR) and low (LR)".

(5.4)设计系统的信息安全风险模糊评估的隶属度矩阵。然后,结合资产重要性的模糊向量和对应漏洞被利用可能性的模糊向量,计算出该漏洞的风险模糊向量。并通过模糊向量的反模糊化得到该漏洞的风险等级。(5.4) Design the membership degree matrix of the information security risk fuzzy assessment of the system. Then, the risk fuzzy vector of the vulnerability is calculated by combining the fuzzy vector of asset importance and the fuzzy vector of the corresponding vulnerability being exploited. And through the defuzzification of the fuzzy vector, the risk level of the vulnerability is obtained.

(5.5)根据系统中资产对信息安全风险的承受能力,判断该漏洞是否需要进行防护,若是则给出防护措施。(5.5) According to the ability of assets in the system to withstand information security risks, judge whether the vulnerability needs to be protected, and if so, give protective measures.

(5.6)依据上述(5.1)-(5.5)完成所有资产的所有漏洞的评估与防护。将整个系统的将系统的信息安全防护措施综合起来,形成系统的信息安全需求集Rsecurity(5.6) Complete the assessment and protection of all vulnerabilities of all assets according to the above (5.1)-(5.5). Combine the information security protection measures of the whole system to form the information security requirement set R security of the system.

步骤(6),将上述步骤(3)中得到的功能安全需求集Rsafety与步骤(5)中信息安全需求集Rsecurity进行冲突协调,通过定性的方法对两种安全需求进行融合得到系统整体的安全需求集Rsystem,其具体过程为:Step (6), coordinate the conflict between the functional safety requirement set R safety obtained in the above step (3) and the information security requirement set R security in step (5), and integrate the two security requirements through a qualitative method to obtain the overall system The security requirements set R system , the specific process is:

(6.1)分别将功能安全需求集和信息安全需求集,按照“预防类”、“检测类”、“响应类”进行分类。预防类需求是指在功能安全保障或信息安全防护中起预防作用的措施对应的需求;检测类需求是指在功能安全保障或信息安全防护中进行实时检测(故障检测及入侵检测)对应的需求;响应类需求是指在功能安全保障或信息安全防护中在检测到问题后(故障或入侵)系统有针对性的进行响应对应的需求。(6.1) Classify the functional safety requirement set and the information security requirement set according to "prevention", "detection" and "response". Prevention requirements refer to the requirements corresponding to preventive measures in functional safety assurance or information security protection; detection requirements refer to the requirements corresponding to real-time detection (fault detection and intrusion detection) in functional safety assurance or information security protection ; Response requirements refer to the corresponding requirements for the system to respond in a targeted manner after detecting problems (faults or intrusions) in functional safety assurance or information security protection.

(6.2)对于功能安全需求集和信息安全需求集中的预防类需求,没有交叉的,则直接添加进系统整体安全需求集Rsystem中;有交叉的,针对上层的预防类需求以信息安全需求为准,针对下层的预防类需求以功能安全需求为准,去掉冲突的需求,然后融入系统整体安全需求集Rsystem中。(6.2) If there is no intersection between the functional safety requirements set and the preventive requirements set in the information security requirements set, it will be directly added to the overall system security requirements set R system ; if there is an overlap, the prevention requirements for the upper layer will be based on the information security requirements For the prevention requirements of the lower layer, the functional safety requirements shall prevail, and the conflicting requirements shall be removed, and then integrated into the overall system security requirements set R system .

(6.3)对于功能安全需求集和信息安全需求集中没有交叉的检测类需求,直接添加入系统整体安全需求集Rsystem中;对于有交叉的检测类需求,按照求并集的方式进行融合(即尽量更全面的进行检测),然后添加进系统整体安全需求集Rsystem中。(6.3) For detection requirements that do not intersect with the functional safety requirements set and information security requirements set, they are directly added to the overall system security requirements set R system ; As far as possible more comprehensive detection), and then added to the system's overall security requirements set R system .

(6.4)对于功能安全需求集和信息安全需求集中响应类需求,需要进行更为精细的融合。首先分析功能安全需求集和信息安全需求集中的各种响应类需求,结合系统的实际情况,依次制定每个需求的冲突解决策略,例如,对于安全关键系统,可制定冲突解决策略为:“当需求集Rsafety-r和Rsecurity-r中的需求有冲突时,以Rsafety-r中的需求为准,删除Rsecurity-r中冲突的需求”;还可以以发生冲突的需求涉及的资产所面临的功能安全风险,与信息安全风险之间的大小来制定冲突解决策略;然后将功能安全需求集和信息安全需求集中的响应类需求逐一对比,没有冲突的直接添加入系统整体安全需求集Rsystem中;有冲突的,按照制定的冲突解决策略进行解决,然后融入到系统整体安全需求集Rsystem中。冲突解决策略的制订需要结合响应类需求的具体情况和系统的具体应用来确定。(6.4) For the functional safety requirements set and the centralized response requirements of information security requirements, a more refined integration is required. First, analyze the various response requirements in the functional safety requirement set and the information security requirement set, and formulate the conflict resolution strategy for each requirement in turn based on the actual situation of the system. For example, for a safety-critical system, the conflict resolution strategy can be formulated as: "When When there is a conflict between the requirements in the requirements set R safety-r and R security-r , the requirements in R safety-r shall prevail, and the conflicting requirements in R security-r shall be deleted; the assets involved in the conflicting requirements may also be used Formulate a conflict resolution strategy based on the size of the functional security risks faced and the information security risks; then compare the functional security requirements set and the response requirements in the information security requirements set one by one, and directly add those without conflicts to the overall system security requirements set In the R system ; if there is a conflict, resolve it according to the established conflict resolution strategy, and then integrate it into the overall system security requirement set R system . The formulation of the conflict resolution strategy needs to be determined in combination with the specific situation of the response class requirements and the specific application of the system.

步骤(7)依据各安全措施的实施成本,结合系统的总体成本约束,对系统的整体安全需求集进行优化,具体过程为:Step (7) According to the implementation cost of each security measure, combined with the overall cost constraints of the system, the overall security requirement set of the system is optimized. The specific process is as follows:

(7.1)分析系统整体安全需求集中每一则安全需求应对的风险,列举出能够减缓该风险的所有安全措施(即能够提供相同类型的安全防护的措施),构成一类安全措施集合。对于每一类安全措施集合,评估其实施成本。安全措施的实施成本是指系统为实施安全措施而需要付出的额外代价,这里通过计算量和通信量两个指标来衡量,计算量成本利用专家知识和大致估算相结合的方法获得,通信量成本指安全措施需要额外增加的通信字节数,可以根据具体的安全措施直接确定。(7.1) Analyze the risk of each security requirement in the overall security requirement set of the system, and list all security measures that can mitigate the risk (that is, measures that can provide the same type of security protection), forming a set of security measures. For each set of security measures, evaluate their implementation costs. The implementation cost of security measures refers to the additional cost that the system needs to pay for the implementation of security measures. Here, it is measured by two indicators of calculation volume and communication volume. The calculation volume cost is obtained by combining expert knowledge and rough estimation. The communication volume cost Refers to the additional number of communication bytes required by security measures, which can be directly determined according to specific security measures.

(7.2)根据系统的设计规范,获取系统的安全防护(包括功能安全和信息安全)总的成本约束,即系统为功能安全保障和信息安全防护所能够付出的最大,包括总的计算量成本和总的通信量成本。(7.2) According to the design specifications of the system, obtain the total cost constraints of system security protection (including functional safety and information security), that is, the maximum that the system can pay for functional safety protection and information security protection, including the total calculation cost and Total traffic cost.

(7.3)依据系统的总成本约束,结合各安全措施集合中各安全措施的实施成本,对系统的整体安全需求集Rsystem进行优化。(a)首先,将步骤(6)中获得的系统整体安全需求集,按照每则需求所应对的风险等级大小由低到高排序。(b)依据安全措施的实施成本,计算整个需求集的实施总成本,若没有超出系统安全防护总的成本约束,则完成优化过程;若超出系统安全防护总的成本约束,则继续。(c)首先判断Rsystem中的需求是否已处理完,若处理完,则说明在当前系统安全防护总的成本约束下,无法设计出满足系统或行业风险等级要求的系统安全需求,需要修改系统安全防护总的成本约束,然后再重新进行系统安全需求设计;若没有处理完,则顺序取出一则需求,在其对应的安全措施集合中,选取比当前需求中选定的安全措施成本更低的安全措施,作为该则需求修改后的结果,然后继续。(d)依据步骤(3)和(5)判断该则修改后的需求能否满足对应资产对风险的要求,若能满足则跳转到(b);若不能满足则跳转到(c)。(7.3) According to the total cost constraints of the system, combined with the implementation cost of each security measure in each security measure set, optimize the overall security requirement set R system of the system. (a) First, sort the overall system security requirements set obtained in step (6) from low to high according to the risk level that each requirement responds to. (b) According to the implementation cost of security measures, calculate the total implementation cost of the entire requirement set. If the total cost constraint of system security protection is not exceeded, the optimization process is completed; if the total cost constraint of system security protection is exceeded, continue. (c) First judge whether the requirements in the R system have been processed. If the processing is completed, it means that under the current system security protection total cost constraints, the system security requirements that meet the system or industry risk level requirements cannot be designed, and the system needs to be modified The total cost constraints of security protection, and then re-design the system security requirements; if it has not been processed, take out a requirement in sequence, and select the security measure that is lower in cost than the security measure selected in the current requirement in the corresponding set of security measures security measures, as a result of this requirement modification, and continue. (d) According to steps (3) and (5), judge whether the modified demand can meet the risk requirements of the corresponding asset, if it can be satisfied, then go to (b); if not, go to (c) .

与现有技术相比,本发明以保护工业控制系统的功能安全和信息安全为目的,克服了现有安全需求分析方法在用于工业控制系统时仅考虑一种安全问题的缺陷。该发明能够在对工业控制系统进行安全需求分析时,综合考虑功能安全与信息安全,并在需求层面进行两种安全的融合及协调优化,使安全需求在满足系统成本约束的前提下保证系统综合安全性。预期的有益效果包括:Compared with the prior art, the invention aims at protecting the functional safety and information safety of the industrial control system, and overcomes the defect that the existing safety requirement analysis method only considers one safety problem when used in the industrial control system. The invention can comprehensively consider functional safety and information security when analyzing the safety requirements of the industrial control system, and carry out the fusion and coordination optimization of the two kinds of security at the demand level, so that the safety requirements can ensure system integration under the premise of meeting the system cost constraints. safety. Expected beneficial effects include:

一、在需求层面,综合考虑工业控制系统的功能安全和信息安全,能够保证系统安全控制中两种安全的相互协调,避免系统整体安全需求中的冲突和冗余,为有效的提升系统的整体安全性打下了基础。1. At the demand level, comprehensively considering the functional safety and information security of the industrial control system can ensure the mutual coordination of the two types of security in the system security control, avoid conflicts and redundancy in the overall security requirements of the system, and effectively improve the overall security of the system. Security lays the groundwork.

二、按照对系统的动作和影响,将功能安全需求和信息安全需求进行分类,采用定量的方法对同一类型的安全需求进行融合,提高需求融合效率,同时也使得需求融合过程中尽可能的保证安全需求的全面性和准确性。2. According to the action and impact on the system, classify the functional safety requirements and information security requirements, and use quantitative methods to integrate the same type of security requirements to improve the efficiency of requirements fusion, and at the same time ensure that the requirements are integrated as much as possible Comprehensiveness and accuracy of security requirements.

三、考虑工业控制系统资源成本受限的特性,采用成本约束的方法对融合后的系统安全需求进行进一步的优化,确保在满足系统安全防护总成本的同时保证系统的整体安全。3. Considering the limited resource cost of the industrial control system, the cost-constrained method is used to further optimize the security requirements of the integrated system to ensure the overall security of the system while meeting the total cost of system security protection.

四、该发明综合利用专家数据采取模糊评估等多种实用的工程评估方法,使其能够运用于实际工业控制系统需求分析中,降低工业控制系统安全需求分析设计门槛,同时切实减小系统开发成本。4. The invention comprehensively utilizes expert data and adopts various practical engineering evaluation methods such as fuzzy evaluation, so that it can be applied to actual industrial control system demand analysis, lowering the threshold of industrial control system security demand analysis and design, and at the same time effectively reducing system development costs .

附图说明Description of drawings

图1是工业控制系统功能安全与信息安全的需求分析及融合流程;Figure 1 shows the requirements analysis and integration process of industrial control system functional safety and information security;

图2(a)是多个资产同时失效引发危害事故的关系示意图;Figure 2(a) is a schematic diagram of the relationship between multiple assets failing simultaneously and causing hazardous accidents;

图2(b)是独立的多个资产失效引发危害事故的关系示意图;Figure 2(b) is a schematic diagram of the relationship between multiple independent asset failures causing hazardous accidents;

图2(c)是两种关系混合的多个资产失效引发危害事故的关系示意图;Figure 2(c) is a schematic diagram of the relationship between multiple asset failures and hazardous accidents caused by the mixture of the two relationships;

图3是功能安全需求集与信息安全需求集融合流程;Figure 3 is the fusion process of functional safety requirements set and information security requirements set;

图4是预防类安全需求集的融合过程;Figure 4 is the fusion process of the preventive safety requirements set;

图5是检测类安全需求集的融合过程;Figure 5 is the fusion process of the detection class security requirement set;

图6基于成本的系统整体安全需求集的优化过程。Figure 6. Cost-based optimization process of the system's overall security requirements set.

具体实施方式detailed description

为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。此外,下面所描述的本发明各个实施方式中所涉及到的技术特征只要彼此之间未构成冲突就可以相互组合。In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

参见图1所示,图1中的优化后的系统整体安全需求集就是本发明申请中最终需要获得到结果。Referring to FIG. 1 , the optimized overall system security requirement set in FIG. 1 is the final result to be obtained in the application of the present invention.

本发明的一种用于工业控制系统功能安全与信息安全的需求分析及融合方法。该方法能够为工业控制系统安全控制及防护(综合功能安全和信息安全)提供一套快速、完整获取安全需求的流程,减小安全需求开发难度、降低安全需求开发成本,提高系统综合安全能力。首先分析系统的资产,然后分别获取系统的功能安全需求集和信息安全需求集,最后融合得到系统整体的安全需求集,具体包括以下步骤:The invention relates to a demand analysis and fusion method for functional safety and information safety of an industrial control system. This method can provide a set of rapid and complete process for obtaining security requirements for industrial control system security control and protection (integrated functional security and information security), reduce the difficulty of security requirement development, reduce the cost of security requirement development, and improve the comprehensive security capability of the system. First, analyze the assets of the system, then obtain the functional safety requirements set and information security requirements set of the system respectively, and finally integrate the overall security requirements set of the system, including the following steps:

步骤一:分析系统中的资产,明确其相关属性,形成系统资产清单。Step 1: Analyze the assets in the system, clarify their related attributes, and form a list of system assets.

(1)首先搜集、分析及整理系统的设计文档、说明文档以及用例图,并获得与系统相关人员进行沟通、调研的结果。(1) First collect, analyze and organize the design documents, description documents and use case diagrams of the system, and obtain the results of communication and research with relevant system personnel.

(2)然后结合系统的设计文档,对系统中的资产进行分类:资产包括具体的资产和抽象的资产,工业控制系统中的资产一般可以分为:信息资产、软件资产、物理资产、服务、人员以及无形资产六大类。(a)信息资产包括数据库和数据文件、合同协议、系统文件、研究信息、用户手册、操作或者支持规程、基本维持运行的安排、审核踪迹、归档信息等。(b)软件资产包括应用软件、系统软件、开发工具、实用程序等。(c)物理资产包括工业控制系统设备、电控设备、通信设备可移动媒体以及其他设备。(d)服务包括设计、安装、调试、运行、维护、计算和通信服务、公用服务设施等。(e)人员包括系统涉及的所有人员,主要考虑人员的资格、技能以及经验。(f)无形资产是指系统涉及的组织机构的声誉、形象等。最后,查明系统中各种资产的各种属性,包括资产名称、数量、位置、失效时可能引发的危险事件、资产固有的漏洞、失效概率以及资产在系统中的重要性以及,形成资产清单。如表1所示,给出实施例某工业控制系统部分资产清单。其中,各资产的失效概率以及重要性利用专家评分结果采取获取,初始可以设置为0,危害事故通过分析调研行业和系统的历史数据获得,这里仅给出危害事件的编号,具体危害事件需要结合实际系统给出。(2) Then combine the design documents of the system to classify the assets in the system: assets include specific assets and abstract assets. Assets in industrial control systems can generally be divided into: information assets, software assets, physical assets, services, Six categories of personnel and intangible assets. (a) Information assets include databases and data files, contractual agreements, system files, research information, user manuals, operating or support procedures, arrangements for basic maintenance operations, audit trails, and archived information. (b) Software assets include application software, system software, development tools, utility programs, etc. (c) Physical assets include industrial control system equipment, electronic control equipment, communication equipment, removable media, and other equipment. (d) Services include design, installation, commissioning, operation, maintenance, computing and communication services, public service facilities, etc. (e) Personnel include all personnel involved in the system, mainly considering the qualifications, skills and experience of personnel. (f) Intangible assets refer to the reputation and image of the organizations involved in the system. Finally, find out the various attributes of various assets in the system, including asset names, quantities, locations, dangerous events that may be caused when they fail, inherent vulnerabilities of assets, failure probability, and the importance of assets in the system, and form an asset list . As shown in Table 1, a partial asset list of an industrial control system in an embodiment is given. Among them, the failure probability and importance of each asset are obtained by using expert scoring results, which can be initially set to 0. Hazardous accidents are obtained by analyzing and investigating historical data of industries and systems. Here, only the numbers of hazardous events are given, and specific hazardous events need to be combined The actual system is given.

表1实施例某工业控制系统部分资产清单Table 1 Partial asset list of an industrial control system in the embodiment

步骤二:依据系统的资产清单,分析系统资产失效可能引发的危害事故,评估其后果,根据危害事故与资产之间的关联关系,确定危害事故发生的可能性Step 2: According to the asset list of the system, analyze the hazardous accidents that may be caused by the failure of system assets, evaluate their consequences, and determine the possibility of hazardous accidents according to the relationship between hazardous accidents and assets

(1)根据系统资产清单及各资产可能引发的危害事故,确定系统中可能发生的危害事故集合。(1) According to the list of system assets and the hazard accidents that may be caused by each asset, determine the set of hazard accidents that may occur in the system.

分析系统的资产清单,综合系统资产清单中涉及的危害事件,得到系统的危害事件集Accident={a1,...,ai,...,an},其中ai(i=1,2,...,n)为第i个危害事件,n为系统中危害事件的总个数。对于危害事件集中的危害事件ai,采用三元组表示,即ai=(Nai,Cai,Pai),其中Nai为危害事件ai的编号,Cai为危害事件ai发生后产生的后果,采用“非常严重(VS)、严重(S)、一般(G)、不严重(US)、极不严重(VUS)”五个等级表示,Pai为危害事件ai可能发生的概率,用百分比表示。Analyzing the system's asset list and the hazard events involved in the comprehensive system asset list, the system's hazard event set Accident={a 1 ,...,a i ,...,a n }, where a i (i=1 , 2,...,n) is the i-th hazard event, and n is the total number of hazard events in the system. For the hazard event a i in the hazard event set, it is represented by a triplet, that is, a i = (Na i , Ca i , Pa i ), where Na i is the number of the hazard event a i , and Ca i is the occurrence of the hazard event a i The subsequent consequences are represented by five grades of "Very Serious (VS), Serious (S), General (G), Not Serious (US), Very Not Serious (VUS)", Pa i is the possibility of hazardous event a i The probability of , expressed as a percentage.

(2)对危害事故集合中的每种危害事故根据专家评估结果采用模糊综合评估方法评估其发生后产生的后果。(2) Use the fuzzy comprehensive evaluation method to evaluate the consequences of each hazardous accident in the hazardous accident set according to the expert evaluation results.

首先构造判断矩阵J如下:First construct the judgment matrix J as follows:

其中jxy·jyx=1;x,y=1,2,...,n。jxy表示危险事件ax相对于ay产生的后果的重要程度,其评判标准如下表2所示。Where j xy ·j yx =1; x, y=1, 2, . . . , n. j xy indicates the importance of the consequences of a dangerous event a x relative to a y , and its evaluation criteria are shown in Table 2 below.

表2判断矩阵中元素的标度表Table 2 Scale table of elements in judgment matrix

完成判断矩阵J后,对其进行一致性验证,验证指标为After the judgment matrix J is completed, its consistency verification is carried out, and the verification index is

其中λ为判断矩阵J的最大特征根。一致性指标CI的含义为:Where λ is the largest characteristic root of the judgment matrix J. The meaning of the consistency index CI is:

●当CI=0时,表示有完全的一致性●When CI=0, it means there is complete consistency

●当CI接近于0时,表示有满意的一致性●When the CI is close to 0, it means that there is a satisfactory consistency

●当CI=1时,表示完全不具有一致性●When CI=1, it means there is no consistency at all

为使评估更为科学,可以采用多组评分结果进行评估,分别构造判断矩阵,求取对应一致性指标CI1,CI2,...,CIk,计算随机一致性指标RI如下In order to make the evaluation more scientific, multiple groups of scoring results can be used for evaluation, and judgment matrices are respectively constructed to obtain the corresponding consistency indexes CI 1 , CI 2 ,..., CI k , and the random consistency index RI is calculated as follows

然后计算一致性比率CR如下Then calculate the consistency ratio CR as follows

一般的,当一致性比率CR<0.1时,认为对应J的不一致性在容许的范围内,有满意的一致性,通过一致性检验。如果CR≥0.1时,认为对应J的不一致性不再允许范围内,需要重新选择矩阵的数值,直到通过一致性检验。Generally, when the consistency ratio CR<0.1, it is considered that the inconsistency corresponding to J is within the allowable range, there is satisfactory consistency, and the consistency test is passed. If CR≥0.1, it is considered that the inconsistency corresponding to J is no longer within the allowable range, and the value of the matrix needs to be reselected until the consistency test is passed.

通过一致性检验的判断矩阵J,计算其特征根,设最大特征根对于的特征向量为A=(ω1,ω2,...,ωn),在ω1,ω2,...,ωn最大、最小值的区间内,将n个值进行均匀的五等分模糊化,最终得到危害事故ai发生后产生的后果CaiCalculate the characteristic root of the judgment matrix J that passes the consistency test, and set the characteristic vector of the largest characteristic root as A=(ω 12 ,...,ω n ), at ω 12 ,... , within the range of the maximum and minimum values of ω n , the n values are uniformly fuzzified by quintiles, and finally the consequences Ca i of the hazardous accident a i are obtained.

(3)依据系统资产间的依赖关系,结合资产的失效概率,确定危害事故集合中的每种危害可能发生的概率。(3) According to the dependency relationship between system assets and the failure probability of assets, determine the probability of each hazard in the hazard accident set that may occur.

计算危害事件ai可能发生的概率,依据系统的资产清单,分析危害事故与资产之间的关系,这种关系包括:(a)几种资产同时失效引发某一危害事故,(b)几种资产中,只要有一种资产失效,则引发危险事件,(c)前两种情况的混合。如图2所示示例中,对情况(a)危害事件ai可能发生的概率为其中为图2(a)中第i个资产的失效概率;对于情况(b)危害事件ai可能发生的概率为对于情况(c)危害事件ai可能发生的概率为 Calculate the probability that the hazardous event a i may occur, and analyze the relationship between the hazardous event and the asset based on the system's asset list. This relationship includes: (a) several assets fail simultaneously to cause a certain hazardous Among the assets, as long as one asset fails, a dangerous event will be triggered, (c) a mixture of the first two situations. In the example shown in Figure 2, the probability that the hazard event a i may occur in case (a) is in is the failure probability of the i-th asset in Figure 2(a); for the situation (b) the probability that the hazardous event a i may occur is For situation (c) the probability that the hazardous event a i may occur is

步骤三:根据危害事故的分析结果,评估其功能安全方面的潜在风险,结合行业对系统的风险承受能力,确定哪些危害事件需要进一步采取功能安全保障措施,进而确定对系统中功能安全保护需求(即功能安全需求Rsafety)Step 3: Based on the analysis results of hazardous accidents, evaluate the potential risks in terms of functional safety, and combine the industry's risk tolerance for the system to determine which hazardous events require further functional safety protection measures, and then determine the protection requirements for functional safety in the system ( That is, functional safety requirements R safety )

(1)结合危害事故发生造成的后果和可能发生的概率,评估各类危险事件的功能安全风险。(1) Combined with the consequences of hazardous accidents and the probability of occurrence, evaluate the functional safety risks of various hazardous events.

将危害事件可能发生的概率进行等级化(一般采用三等级、五等级或七等级),这里以分为五等级为例(极有可能发生HL、较有可能发生VL、可能发生L、较不可能发生VUL、极不可能发生HUL),一般是在区间[0,1]内均匀划分。功能安全风险与危害事件可能发生的概率和其后果相关,将功能安全风险分等级,一般可分为三等级(可视行业要求进行修改)。The probability of the possible occurrence of hazardous events is graded (generally three, five or seven grades are used), and here we take five grades as an example (HL is very likely to occur, VL is more likely to occur, L is likely to occur, and less likely to occur VUL may occur, and HUL is extremely unlikely to occur), which are generally evenly divided in the interval [0, 1]. Functional safety risks are related to the probability of possible occurrence of hazardous events and their consequences. Functional safety risks are classified into three levels (modified according to industry requirements).

表3风险等级划分Table 3 Risk Classification

风险等级risk level 描述describe Hh 具有极高的风险very high risk Mm 具有中等的风险moderate risk LL 具有较低的风险has a lower risk

结合危害事件发生后可能,构建风险评估表如下表4所示,进而得到对应危害事件的功能安全风险等级。Combined with the possibility after the occurrence of the hazardous event, the risk assessment table is constructed as shown in Table 4 below, and then the functional safety risk level corresponding to the hazardous event is obtained.

表4风险等级评估表Table 4 Risk Level Assessment Form

(2)结合各类危险事件的应对措施,根据各类危险事件功能安全风险等级,判断是否需要施加对应的功能安全保障措施来降低或消除风险。(2) Combined with the response measures of various dangerous events, according to the functional safety risk level of various dangerous events, judge whether it is necessary to apply corresponding functional safety measures to reduce or eliminate the risk.

依据行业或系统对危险事件的风险承受能力(例如行业要求系统本能出现危害事件的高于L的情况),确定不满足要求的危害事件。分别针对不满足要求的危害事件,从功能安全组件库选取合适的安全组件,缓解功能安全风险。According to the industry or system's risk tolerance for hazardous events (for example, the industry requires the system to be higher than L for hazardous events), determine the hazardous events that do not meet the requirements. For the hazard events that do not meet the requirements, select appropriate safety components from the functional safety component library to mitigate functional safety risks.

(3)将整个系统所需的功能安全保障综合起来,形成系统的功能安全需求集Rsafety(3) Combine the functional safety guarantees required by the entire system to form the functional safety requirement set R safety of the system.

系统所有的功能安全组件构成了系统对功能安全的需求,即可获得系统的功能安全需求集RsafetyAll the functional safety components of the system constitute the functional safety requirements of the system, and the functional safety requirements set R safety of the system can be obtained.

步骤四:根据系统的资产,分析资产的固有漏洞及其可能面临的信息安全威胁及对应的防护措施。Step 4: According to the assets of the system, analyze the inherent vulnerabilities of the assets, the information security threats they may face, and the corresponding protective measures.

(1)针对资产清单中的各种资产,依据其固有的漏洞,分析可能面临的威胁列表、以及所有可用的保护措施。(1) For various assets in the asset inventory, analyze the list of possible threats and all available protection measures based on their inherent vulnerabilities.

首先,将系统中涉及到的漏洞收集形成漏洞集V={v1,v2,...,vi,...vp},其中vi为第i个漏洞,p为漏洞集中漏洞的个数。First, collect the vulnerabilities involved in the system to form a vulnerability set V={v 1 , v 2 ,...,v i ,...v p }, where v i is the i-th vulnerability, and p is the vulnerability in the vulnerability set the number of .

然后,针对漏洞集中的每个漏洞分析其保护措施,面临的威胁,将漏洞形式化的表示为如下所示:Then, for each vulnerability in the vulnerability set, its protection measures and threats are analyzed, and the vulnerability is formalized as follows:

vi=(protectlisti,pvi,[threati-1,pvi-1],[threati-2,pvi-2],...,[threati-j,pvi-j],...)v i = (protectlist i , pv i , [threat i-1 , pv i-1 ], [threat i-2 , pv i-2 ], ..., [threat ij , pv ij ], ...)

其中protectlisti为针对漏洞vi的防护措施列表,pvi为漏洞被利用的概率,[threati-j,pvi-j]分别为漏洞vi面临的第j个威胁以及漏洞vi被威胁threati-j利用的概率。其中防护措施列表和威胁通过分析调研获得。Among them, protectlist i is the list of protective measures against vulnerability v i , pv i is the probability of vulnerability being exploited, [threat ij , pv ij ] are respectively the jth threat faced by vulnerability v i and the number of vulnerabilities v i is exploited by threat ij probability. The list of protective measures and threats are obtained through analysis and research.

(2)分析资产的固有漏洞和可能面临的信息安全威胁,依据行业的历史数据,利用专家评估的数据通过模糊评估方法判断各种漏洞可能被威胁所利用的概率。(2) Analyze the inherent vulnerabilities of assets and possible information security threats. Based on the historical data of the industry, use the data evaluated by experts to judge the probability that various vulnerabilities may be exploited by threats through fuzzy evaluation methods.

首先分析资产的固有漏洞和可能面临的信息安全威胁,然后依据行业的历史数据,利用专家评估的数据通过模糊评估方法判断各种漏洞可能被威胁所利用的概率。针对一个漏洞存在多个威胁的情况,通过多个威胁于漏洞之间的关系获得漏洞被利用的概率pvi,其计算方式类同图2所示。First, analyze the inherent vulnerabilities of assets and possible information security threats, and then use the data evaluated by experts to judge the probability that various vulnerabilities may be exploited by threats based on the historical data of the industry and the fuzzy evaluation method. In the case of a vulnerability with multiple threats, the probability pv i of exploiting the vulnerability is obtained through the relationship between the multiple threats and the vulnerability, and its calculation method is similar to that shown in Figure 2.

步骤五:根据资产的重要性等级、其漏洞被利用的可能性,采用模糊评估的方法评估资产的信息安全风险等级,结合系统能够承受的信息安全风险等级,判断需要加强保护的系统资产,进而确定资产的信息安全防护措施,所有资产需要的保护措施形成了系统的信息安全防护需求(即信息安全需求集Rsecurity)Step 5: According to the importance level of the asset and the possibility of its vulnerability being exploited, use the fuzzy evaluation method to evaluate the information security risk level of the asset, and combine the information security risk level that the system can withstand to determine the system assets that need to be strengthened, and then Determine the information security protection measures for assets, and the protection measures required by all assets form the information security protection requirements of the system (that is, the information security requirement set R security )

(1)将资产对应的漏洞列表中的每个漏洞可能被利用的概率进行模糊化得到对应的模糊向量。(1) Fuzzify the probability that each vulnerability in the vulnerability list corresponding to the asset may be exploited to obtain the corresponding fuzzy vector.

将漏洞被利用的概率在区间[0,1]上均匀划分为五等级,分别为“非常高(VH)、高(H)、中等(M)、低(L)、非常低(VL)”,并且将pvi进行模糊化的到模糊向量 The probability of exploiting the vulnerability is evenly divided into five levels on the interval [0, 1], which are "very high (VH), high (H), medium (M), low (L), and very low (VL)" , and fuzzy the pv i to the fuzzy vector

(2)根据系统的资产列表获得其在系统中的重要性程度(如表1所示,分为三个等级),并同样将其进行模糊化,得到对应的模糊向量。(2) Obtain the degree of importance in the system according to the asset list of the system (as shown in Table 1, it is divided into three levels), and also fuzzify it to obtain the corresponding fuzzy vector.

针对资产ai,评定其重要性程度Iai,一般将其分为三个等级:重要资产(CA)、一般资产(MA)、非重要资产(NCA),并将其进行模糊化的到自残的重要性程度的模糊量 For assets a i , evaluate its importance level Ia i , generally divide them into three levels: important assets (CA), general assets (MA), non-important assets (NCA), and fuzzify them to self-harm The amount of fuzziness of the degree of importance

(3)将信息安全风险按照行业或系统要求划分等级,例如划分“高(HR)、中(MR)、低(LR)”三个等级。(3) Classify information security risks according to industry or system requirements, for example, divide into three grades of "high (HR), medium (MR) and low (LR)".

(4)设计系统的信息安全风险模糊评估的隶属度矩阵,其一般原则是资产越重要而且漏洞被利用的概率也越大,则风险等级越高;资产越不重要而且漏洞被利用的概率也越小,则风险等级越低。具体依据行业和系统的具体情况而定。然后,结合资产重要性的模糊向量和对应漏洞被利用可能性的模糊向量,计算出该漏洞的风险模糊向量。并通过模糊向量的反模糊化得到该漏洞的风险等级。(4) Design the membership degree matrix of the information security risk fuzzy assessment of the system. The general principle is that the more important the asset and the greater the probability of exploiting the vulnerability, the higher the risk level; the less important the asset and the greater the probability of exploiting the vulnerability. The smaller the value, the lower the risk level. It depends on the specific situation of the industry and system. Then, the risk fuzzy vector of the vulnerability is calculated by combining the fuzzy vector of asset importance and the fuzzy vector of the corresponding vulnerability being exploited. And through the defuzzification of the fuzzy vector, the risk level of the vulnerability is obtained.

首先,构造由资产重要性程度和漏洞被利用程度组成的信息安全风险模糊评估的隶属度矩阵,表5为一个信息安全风险模糊评估的隶属度矩阵实例。First, construct the asset importance degree and the extent to which vulnerabilities are exploited The membership degree matrix of fuzzy assessment of information security risk is formed. Table 5 is an example of membership degree matrix of fuzzy assessment of information security risk.

表5信息安全风险模糊评估的隶属度矩阵Table 5 Membership degree matrix of information security risk fuzzy assessment

然后,通过资产重要性程度和漏洞被利用程度以及信息安全风险模糊评估的隶属度矩阵求取资产ai的风险模糊向量按照隶属度最大原则进行反模糊化,得到资产ai的风险等级RiskiThen, by asset importance and the extent to which vulnerabilities are exploited and the membership degree matrix of information security risk fuzzy assessment to obtain the risk fuzzy vector of asset a i Defuzzification is carried out according to the principle of maximum membership degree, and the risk level Risk i of asset a i is obtained.

(5)根据系统中资产对信息安全风险的承受能力,判断该漏洞是否需要进行防护,若是给出防护措施。(5) According to the ability of assets in the system to withstand information security risks, determine whether the vulnerability needs to be protected, and if so, provide protective measures.

依据行业或系统对信息安全风险等级的要求,判断资产是否需要添加防护,对于需要添加防护的资产,从其对应漏洞的保护列表选取保护措施。According to the requirements of the industry or system for information security risk level, it is judged whether the assets need to be protected. For the assets that need to be protected, the protection measures are selected from the protection list corresponding to the vulnerabilities.

(6)形成系统的信息安全需求集。(6) Form the information security requirement set of the system.

依据上述(1)-(5)子步骤完成所有资产的所有漏洞的评估与防护。将整个系统的将系统的信息安全防护措施综合起来,形成系统的信息安全需求集RsecurityComplete the assessment and protection of all vulnerabilities of all assets according to the sub-steps (1)-(5) above. Combine the information security protection measures of the whole system to form the information security requirement set R security of the system.

步骤六:将上述步骤三中得到的功能安全需求集Rsafety与步骤五中信息安全需求集Rsecurity进行冲突协调,通过定性的方法对两种安全需求进行融合得到系统整体的安全需求集Rsystem,其流程如图3所示。Step 6: Coordinate the conflict between the functional safety requirement set R safety obtained in the above step 3 and the information security requirement set R security in step 5, and combine the two security requirements through a qualitative method to obtain the overall system security requirement set R system , and its process is shown in Figure 3.

(1)分别将功能安全需求集Rsafety和信息安全需求集Rsecuriy,都按照“预防类”、“检测类”、“响应类”进行分类。(1) The functional safety requirement set R safety and the information security requirement set R securiy are classified according to "prevention", "detection" and "response".

按照安全需求(包括功能安全需求和信息安全需求)对系统的影响将两个需求集Rsafety和Rsecurity都分为三类:预防类需求、检测类需求以及响应类需求,即得到功能安全预防类需求集Rsafety-p、功能安全检测类需求集Rsafety-d、功能安全响应类需求集Rsafety-r和信息安全预防类需求集Rsecurity-p、信息安全检测类需求集Rsecurity-d、信息安全响应类需求集Rsecurity-r。两个安全需求集中相同类型的需求有可能存在冗余信息和冲突,不同类型的需求是相互独立的。因此对两个安全需求集同类型的需求进行融合,According to the impact of security requirements (including functional safety requirements and information security requirements) on the system, the two requirement sets R safety and R security are divided into three categories: prevention requirements, detection requirements and response requirements, that is, functional safety prevention Class requirements set R safety-p , functional safety detection requirements set R safety-d , functional safety response requirements set R safety-r , information security prevention requirements set R security-p , information security detection requirements set R security- d . Information security response class requirements set R security-r . There may be redundant information and conflicts in the same type of requirements in the two security requirements sets, and different types of requirements are independent of each other. Therefore, the requirements of the same type in the two security requirements sets are fused,

(2)融合功能安全需求集和信息安全需求集中的预防类需求。(2) Integrate the functional safety requirements set and the preventive requirements of the information security requirements set.

对于预防类需求集Rsafety-p和Rsecurity-p,是预先设置防范措施用于保护系统的安全需求。工业控制系统中,信息安全一般是由信息层面逐渐向下引入到现场控制层面,功能安全一般是系统内部逐渐向底层扩散,进而影响物理系统,最后造成财产损失、人员伤亡或环境破坏。信息安全的预防类措施一般集中于较为上层的信息处理层,功能安全的预防类措施一般集中于较为下层的实时控制层以及物理系统,其冲突较少。功能安全预防类需求集Rsafety-p和信息安全预防类需求集Rsecurity-p的融合过程如图4所示,具体为:从Rsafety-p中的预防类需求集中取出一则需求,依次与Rsecurity-p中的每则需求进行比较:若都无冲突和冗余,则将该则需求添加到系统整体安全需求集Rsystem中;若有冲突则检查保护点的位置,若处于信息层面,则丢弃该则需求,若处于现场控制层面或物理系统,则该则需求添加到系统整体安全需求集Rsystem中,并将Rsecurity-p相应冲突的需求删除;若有冗余,也丢弃该则需求。依次步骤,直至Rsafety-p为空集,然后,将Rsecurity-p中剩余的需求添加到系统整体安全需求集Rsystem中。As for the preventive requirement sets R safety-p and R security-p , it is the safety requirement that preventive measures are set in advance to protect the system. In industrial control systems, information security is generally introduced downward from the information level to the on-site control level. Functional safety generally spreads from the inside of the system to the bottom layer, and then affects the physical system, resulting in property loss, casualties or environmental damage. The preventive measures of information security are generally concentrated in the upper information processing layer, and the preventive measures of functional safety are generally concentrated in the lower real-time control layer and physical system, with fewer conflicts. The fusion process of the functional safety prevention requirements set R safety-p and the information security prevention requirements set R security-p is shown in Figure 4, specifically: take a requirement from the prevention requirements set in R safety-p , and in turn Compare with each requirement in R security-p : if there is no conflict and redundancy, add this requirement to the overall system security requirement set R system ; if there is a conflict, check the position of the protection point, if it is in the information If it is at the field control level or the physical system, then this requirement is added to the overall system security requirement set R system , and the corresponding conflicting requirements of R security-p are deleted; if there is redundancy, also This requirement is discarded. Step by step until R safety-p is an empty set, and then add the remaining requirements in R security-p to the overall system security requirement set R system .

(3)融合功能安全需求集和信息安全需求集中的检测类需求。(3) Integrate the detection requirements of the functional safety requirements set and the information security requirements set.

对于检测类需求集Rsafety-d和Rsecurity-d,在工业控制系统中,一般对系统的影响主要体现在对系统资源的占用方面,此外,检测类需求一般不会有相互冲突的需求,更多的是检测项的冗余。因此Rsafety-d与Rsecurity-d的融合主要是消除冗余信息,其过程如图5所示,具体为:从Rsafety-d中取出一则需求依次与Rsecurity-d中的需求进行比较,若有没有冗余信息,则将该则需求添加到系统整体安全需求集Rsystem中;否则将这两则需求合并为一则需求,然后添加到系统整体安全需求集Rsystem中。直至Rsafety-d为空集,然后,将Rsecurity-d中剩余的需求添加到系统整体安全需求集Rsystem中。For the detection requirements sets R safety-d and R security-d , in industrial control systems, the general impact on the system is mainly reflected in the occupation of system resources. In addition, detection requirements generally do not have conflicting requirements. More is the redundancy of detection items. Therefore, the fusion of R safety-d and R security-d is mainly to eliminate redundant information. The process is shown in Figure 5, specifically: take a requirement from R safety-d and sequentially match it with the requirements in R security-d For comparison, if there is no redundant information, add this requirement to the overall system security requirement set R system ; otherwise, combine these two requirements into one requirement, and then add it to the system overall security requirement set R system . Until R safety-d is an empty set, then add the remaining requirements in R security-d to the overall system security requirement set R system .

(4)融合功能安全需求集和信息安全需求集中的响应类需求。(4) Integrate the functional safety requirements set and the response requirements of the information security requirements set.

对于响应类需求集Rsafety-r和Rsecurity-r,在工业控制系统中,一般会直接改变系统的行为以应对故障或攻击,两个需求集Rsafety-r和Rsecurity-r中的这类需求由于都是对系统采取动作,在融合过程中,主要是解决需求的冲突问题。同时,这类需求实现后产生动作对系统影响最大,有冲突的功能安全响应和信息安全响应不仅不能完成本身的安全保障任务,还可能会对系统造成严重的影响,因此需要设计更为精细的融合方案。首先,结合行业和系统的实际情况,制订融合的过程中冲突解决的基本策略,例如,对于安全关键系统,可制定冲突解决策略为:“当需求集Rsafety-r和Rsecurity-r中的需求有冲突时,以Rsafety-r中的需求为准,删除Rsecurity-r中冲突的需求。”还可以以发生冲突的需求涉及的资产所面临的功能安全风险,与信息安全风险之间的大小来制定冲突解决策略。然后,从Rsafety-r中取出需求依次与Rsecurity-r中的需求比较,若有冲突,采用预先制定的策略进行解决,然后将融合后的需求添加到系统整体安全需求集Rsystem中;若没有冲突则直接将该需求添加到系统整体安全需求集Rsystem中。直至Rsafety-r为空集,然后,将Rsecurity-r中剩余的需求添加到系统整体安全需求集Rsystem中。For the response-type requirement sets R safety-r and R security-r , in industrial control systems, the behavior of the system will generally be directly changed to deal with failures or attacks. The two requirement sets R safety-r and R security-r Since the class requirements all take actions on the system, in the fusion process, the main problem is to solve the conflict of requirements. At the same time, the actions generated after the realization of such requirements have the greatest impact on the system. Conflicting functional security responses and information security responses not only fail to complete their own security tasks, but may also have serious impacts on the system. Therefore, more sophisticated design is required. Fusion program. First, combine the actual situation of the industry and the system to formulate the basic strategy for conflict resolution in the fusion process. For example, for safety-critical systems, the conflict resolution strategy can be formulated as: "When the requirements set R safety-r and R security-r When there are conflicting requirements, the requirements in R safety-r shall prevail, and the conflicting requirements in R security-r shall be deleted." It is also possible to use the functional safety risk faced by the assets involved in the conflicting requirements and the information security risk to develop a conflict resolution strategy. Then, take out the requirements from R safety-r and compare them with the requirements in R security-r in turn. If there is any conflict, use the pre-established strategy to solve it, and then add the fused requirements to the overall system security requirements set R system ; If there is no conflict, directly add the requirement to the overall system security requirement set R system . Until R safety-r is an empty set, then add the remaining requirements in R security-r to the overall system security requirement set R system .

步骤七:依据各安全措施的实施成本,结合系统的总体成本约束,对系统的整体安全需求集进行优化。Step 7: According to the implementation cost of each security measure, combined with the overall cost constraints of the system, optimize the overall security requirement set of the system.

工业控制系统中,其安全防护(包括功能安全保障和信息安全防护)并不是越多越好,在安全需求设计阶段,安全防护是受到系统分配的安全防护总成本的约束。因此,在通过上述六个步骤得到系统的整体安全需求集后,还需要根据系统的安全防护总体成本约束,对需求集进行优化,获得在满足成本约束前提下的系统整体安全需求集。In the industrial control system, its security protection (including functional security and information security protection) is not as good as possible. In the stage of security requirement design, security protection is constrained by the total cost of security protection allocated by the system. Therefore, after obtaining the overall security requirement set of the system through the above six steps, it is necessary to optimize the requirement set according to the overall cost constraints of the system's security protection to obtain the overall security requirement set of the system under the premise of meeting the cost constraints.

(1)分析所有安全需求,评估其实施成本。(1) Analyze all security requirements and evaluate their implementation costs.

在进行优化前,首先需要分析系统整体安全需求集中每一则安全需求应对的风险,列举出能够减缓该风险的所有安全措施(即能够提供相同类型的安全防护的措施),构成一类安全措施集合。对于每一类安全措施集合,评估其实施成本。安全措施的实施成本是指系统为实施安全措施而需要付出的额外代价,这里通过计算量和通信量两个指标来衡量,计算量成本利用专家评估结果通过估算的方法获得,通信量成本指安全措施需要额外增加的通信字节数,可以根据具体的安全措施直接确定。Before optimization, it is first necessary to analyze the risk of each security requirement in the overall system security requirements set, and list all security measures that can mitigate the risk (that is, measures that can provide the same type of security protection), forming a class of security measures gather. For each set of security measures, evaluate their implementation costs. The implementation cost of security measures refers to the additional cost that the system needs to pay for the implementation of security measures. Here, it is measured by two indicators of calculation volume and communication volume. Measures require an additional increase in the number of communication bytes, which can be directly determined according to specific security measures.

(2)获取系统安全需求设计的总成本约束。(2) Obtain the total cost constraint of system security requirement design.

然后,根据系统的设计规范,获取系统的安全防护(包括功能安全和信息安全)总的成本约束,即系统为功能安全保障和信息安全防护所能够付出的最大,包括总的计算量成本和总的通信量成本。Then, according to the design specifications of the system, the total cost constraints of system security protection (including functional safety and information security) are obtained, that is, the maximum that the system can pay for functional safety protection and information security protection, including the total cost of calculation and the total communication cost.

(3)对系统的整体安全需求集进行优化。(3) Optimize the overall security requirement set of the system.

系统整体安全需求集的具体优化过程如图6所示,具体流程为:(a)首先,将步骤(6)中获得的系统整体安全需求集,按照每则需求所应对的风险等级大小由低到高排序。(b)依据安全措施的实施成本,计算整个需求集的实施总成本,若没有超出系统安全防护总的成本约束,则完成优化过程;若超出系统安全防护总的成本约束,则继续。(c)首先判断Rsystem中的需求是否已处理完,若处理完,则说明在当前系统安全防护总的成本约束下,无法设计出满足系统或行业风险等级要求的系统安全需求,需要修改系统安全防护总的成本约束,然后再重新进行系统安全需求设计;若没有处理完,则顺序取出一则需求,在其对应的安全措施集合中,选取比当前需求中选定的安全措施成本更低的安全措施,作为该则需求修改后的结果,然后继续。(d)依据步骤三和五判断该则修改后的需求能否满足对应资产对风险的要求,若能满足则跳转到(b);若不能满足则跳转到(c)。The specific optimization process of the system's overall security requirement set is shown in Figure 6. The specific process is as follows: (a) First, the system's overall security requirement set obtained in step (6) is adjusted from low to low according to the risk level of each requirement. to high sort. (b) According to the implementation cost of security measures, calculate the total implementation cost of the entire requirement set. If the total cost constraint of system security protection is not exceeded, the optimization process is completed; if the total cost constraint of system security protection is exceeded, continue. (c) First judge whether the requirements in the R system have been processed. If the processing is completed, it means that under the current system security protection total cost constraints, the system security requirements that meet the system or industry risk level requirements cannot be designed, and the system needs to be modified The total cost constraints of security protection, and then re-design the system security requirements; if it has not been processed, take out a requirement in sequence, and select the security measure that is lower in cost than the security measure selected in the current requirement in the corresponding set of security measures security measures, as a result of this requirement modification, and continue. (d) According to steps 3 and 5, it is judged whether the modified demand can meet the risk requirements of the corresponding asset, and if it can be satisfied, then jump to (b); if not, then jump to (c).

最终得到优化后系统整体安全需求集Rsystem,即融合功能安全需求与信息安全需求、且满足系统成本约束的系统安全需求集。Finally, the optimized overall system security requirement set R system is obtained, that is, the system security requirement set that integrates functional security requirements and information security requirements and satisfies system cost constraints.

本领域的技术人员容易理解,以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。It is easy for those skilled in the art to understand that the above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modifications, equivalent replacements and improvements made within the spirit and principles of the present invention, All should be included within the protection scope of the present invention.

Claims (10)

1.一种工业控制系统功能安全与信息安全的需求分析及融合方法,其特征在于,所述方法包括如下步骤:1. A requirement analysis and fusion method of industrial control system functional safety and information security, characterized in that, the method comprises the steps of: (1)分析系统中的资产,明确其相关属性,形成系统资产清单;(1) Analyze the assets in the system, clarify their related attributes, and form a list of system assets; (2)依据系统的资产清单,分析系统资产失效可能引发的危害事故,评估其后果,根据系统资产与危害事件之间的关联性确定危害事故发生的可能性;(2) Based on the system asset list, analyze the hazardous accidents that may be caused by the failure of system assets, evaluate their consequences, and determine the possibility of hazardous accidents according to the correlation between system assets and hazardous events; (3)根据危害事故的分析结果,评估其功能安全方面的潜在风险,结合行业对系统的风险承受能力,确定哪些危害事件需要进一步采取功能安全保障措施,进而确定对系统中功能安全需求集;(3) Based on the analysis results of hazardous accidents, evaluate the potential risks in terms of functional safety, and combine the industry's risk tolerance for the system to determine which hazardous events require further functional safety protection measures, and then determine the set of functional safety requirements in the system; (4)根据系统的资产,分析资产的固有漏洞及其可能面临的信息安全威胁及对应的防护措施;(4) According to the assets of the system, analyze the inherent vulnerabilities of the assets and the information security threats they may face and the corresponding protective measures; (5)根据资产的重要性等级、其漏洞被利用的可能性,采用模糊评估的方法评估资产的信息安全风险等级,结合系统能够承受的信息安全风险等级,判断需要加强保护的系统资产,进而确定资产的信息安全防护措施,所有资产需要的保护措施就形成了系统的信息安全需求集;(5) According to the importance level of the assets and the possibility of their vulnerabilities being exploited, the fuzzy evaluation method is used to evaluate the information security risk level of the assets, combined with the information security risk level that the system can withstand, to judge the system assets that need to be strengthened, and then Determine the information security protection measures for assets, and the protection measures required by all assets form the information security requirements set of the system; (6)将上述步骤(3)中得到的功能安全需求集与步骤(5)中信息安全需求集进行冲突协调,通过定性的方法对两种安全需求进行融合得到系统整体的安全需求集;(6) Coordinate the conflict between the functional security requirement set obtained in step (3) and the information security requirement set in step (5), and combine the two security requirements by a qualitative method to obtain the overall security requirement set of the system; (7)依据各安全措施的实施成本,结合系统的总体成本约束,对系统的整体安全需求集进行优化,具体过程为:(7) According to the implementation cost of each security measure, combined with the overall cost constraints of the system, optimize the overall security requirement set of the system. The specific process is as follows: (7.1)分析系统整体安全需求集中每一则安全需求应对的风险,列举出能够减缓该风险的所有安全措施,构成一类安全措施集合;对于每一类安全措施集合,评估其实施成本;(7.1) Analyze the risk of each security requirement in the overall security requirement set of the system, list all the security measures that can mitigate the risk, and form a set of security measures; for each set of security measures, evaluate its implementation cost; (7.2)根据系统的设计规范,获取系统的安全防护总的成本约束,即系统为功能安全保障和信息安全防护所能够付出的最大,包括总的计算量成本和总的通信量成本;(7.2) According to the design specifications of the system, obtain the total cost constraint of the system's security protection, that is, the maximum that the system can pay for functional security and information security protection, including the total calculation cost and the total communication cost; (7.3)依据系统的总成本约束,结合各安全措施集合中各安全措施的实施成本,对系统的整体安全需求集进行优化:(7.3) According to the total cost constraints of the system, combined with the implementation cost of each security measure in each security measure set, optimize the overall security requirement set of the system: (7.3.1)首先,将步骤(6)中获得的系统整体安全需求集,按照每则需求所应对的风险等级大小由低到高排序;(7.3.1) First, sort the overall system security requirements set obtained in step (6) from low to high according to the risk level that each requirement addresses; (7.3.2)依据安全措施的实施成本,计算整个需求集的实施总成本,若没有超出系统安全防护总的成本约束,则完成优化过程;若超出系统安全防护总的成本约束,则继续;(7.3.2) According to the implementation cost of security measures, calculate the total implementation cost of the entire requirement set. If the total cost constraint of system security protection is not exceeded, the optimization process is completed; if the total cost constraint of system security protection is exceeded, continue; (7.3.3)首先判断系统的整体安全需求集中的需求是否已处理完,若处理完,则说明在当前系统安全防护总的成本约束下,无法设计出满足系统或行业风险等级要求的系统安全需求,需要修改系统安全防护总的成本约束,然后再重新进行系统安全需求设计;若没有处理完,则顺序取出一则需求,在其对应的安全措施集合中,选取比当前需求中选定的安全措施成本更低的安全措施,作为该则需求修改后的结果,然后继续;(7.3.3) First judge whether the requirements of the system's overall security requirements concentration have been processed. If they have been processed, it means that under the current total cost constraints of system security protection, it is impossible to design a system security that meets the requirements of the system or industry risk level. requirements, the total cost constraints of system security protection need to be modified, and then the system security requirements design needs to be re-designed; Security measures with lower cost of security measures, as a result of the modification of this requirement, and continue; (7.3.4)依据步骤(3)和(5)判断该则修改后的需求能否满足对应资产对风险的要求,若能满足则跳转到(7.3.2);若不能满足则跳转到(7.3.3)。(7.3.4) According to steps (3) and (5), judge whether the modified demand can meet the risk requirements of the corresponding assets. If it can be satisfied, then go to (7.3.2); if not, go to to (7.3.3). 2.如权利要求1所述的工业控制系统功能安全与信息安全的需求分析及融合方法,其特征在于,所述步骤(2)具体包括:2. The demand analysis and fusion method of industrial control system functional safety and information security as claimed in claim 1, characterized in that, said step (2) specifically comprises: (2.1)根据系统资产清单及各资产可能引发的危害事故,确定系统中可能发生的危害事故集合;(2.1) According to the list of system assets and the possible hazards caused by each asset, determine the set of possible hazards in the system; (2.2)对危害事故集合中的每种危害事故根据专家评估结果采用模糊综合评估方法评估其发生后产生的后果;(2.2) Use the fuzzy comprehensive evaluation method to evaluate the consequences of each hazardous accident in the hazardous accident set according to the expert evaluation results; (2.3)依据系统资产间的依赖关系,结合资产的失效概率,确定危害事故集合中的每种危害可能发生的概率。(2.3) According to the dependencies among system assets, combined with the failure probability of assets, determine the probability that each hazard in the hazard accident set may occur. 3.如权利要求1或2所述的工业控制系统功能安全与信息安全的需求分析及融合方法,其特征在于,所述步骤(3)具体包括:3. The demand analysis and fusion method of industrial control system functional safety and information security as claimed in claim 1 or 2, characterized in that, said step (3) specifically comprises: (3.1)结合危害事故发生造成的后果和可能发生的概率,评估各类危险事件的功能安全风险;(3.1) Evaluate the functional safety risks of various hazardous events in combination with the consequences of hazardous accidents and the probability of occurrence; (3.2)结合各类危险事件的应对措施,根据各类危险事件功能安全风险等级,判断是否需要施加对应的功能安全保障措施来降低或消除风险;(3.2) Combined with the response measures for various dangerous events, and according to the functional safety risk level of various dangerous events, judge whether it is necessary to apply corresponding functional safety measures to reduce or eliminate risks; (3.3)将整个系统所需的功能安全保障综合起来,形成系统的功能安全需求集。(3.3) Integrate the functional safety guarantees required by the entire system to form a functional safety requirement set for the system. 4.如权利要求1或2所述的工业控制系统功能安全与信息安全的需求分析及融合方法,其特征在于,所述步骤(4)具体包括:4. The demand analysis and fusion method of industrial control system functional safety and information security as claimed in claim 1 or 2, characterized in that, said step (4) specifically comprises: (4.1)针对资产清单中的各种资产,依据其固有的漏洞,分析可能面临的威胁列表、以及所有可用的保护措施;(4.1) For each asset in the asset list, analyze the list of possible threats and all available protection measures based on their inherent vulnerabilities; (4.2)分析资产的固有漏洞和可能面临的信息安全威胁,依据行业的历史数据,利用专家评估的数据通过模糊评估方法判断各种漏洞可能被威胁所利用的概率。(4.2) Analyze the inherent vulnerabilities of assets and possible information security threats. Based on the historical data of the industry, use the data evaluated by experts to judge the probability that various vulnerabilities may be exploited by threats through fuzzy evaluation methods. 5.如权利要求1或2所述的工业控制系统功能安全与信息安全的需求分析及融合方法,其特征在于,所述步骤(5)具体包括:5. The demand analysis and fusion method of industrial control system functional safety and information security as claimed in claim 1 or 2, characterized in that, said step (5) specifically comprises: (5.1)将资产对应的漏洞列表中的每个漏洞可能被利用的概率进行模糊化得到对应的模糊向量;(5.1) Fuzz the probability that each vulnerability in the vulnerability list corresponding to the asset may be exploited to obtain the corresponding fuzzy vector; (5.2)根据系统的资产列表获得其在系统中的重要性程度,并同样将其进行模糊化,得到对应的模糊向量;(5.2) Obtain the degree of importance in the system according to the asset list of the system, and also fuzzify it to obtain the corresponding fuzzy vector; (5.3)将信息安全风险按照行业或系统要求划分等级;(5.3) Classify information security risks according to industry or system requirements; (5.4)设计系统的信息安全风险模糊评估的隶属度矩阵;结合资产重要性的模糊向量和对应漏洞被利用可能性的模糊向量,计算出该漏洞的风险模糊向量;并通过模糊向量的反模糊化得到该漏洞的风险等级;(5.4) Design the membership matrix of the information security risk fuzzy assessment of the system; combine the fuzzy vector of asset importance and the fuzzy vector of the possibility of exploiting the corresponding vulnerability to calculate the risk fuzzy vector of the vulnerability; and defuzzify the fuzzy vector Calculate the risk level of the vulnerability; (5.5)根据系统中资产对信息安全风险的承受能力,判断该漏洞是否需要进行防护,若是则给出防护措施;(5.5) According to the ability of assets in the system to withstand information security risks, determine whether the vulnerability needs to be protected, and if so, provide protective measures; (5.6)依据上述(5.1)-(5.5)完成所有资产的所有漏洞的评估与防护;将整个系统的将系统的信息安全防护措施综合起来,形成系统的信息安全需求集。(5.6) Complete the assessment and protection of all vulnerabilities of all assets according to the above (5.1)-(5.5); integrate the information security protection measures of the entire system to form the information security requirements set of the system. 6.如权利要求1或2所述的工业控制系统功能安全与信息安全的需求分析及融合方法,其特征在于,所述步骤(6)具体包括:6. The demand analysis and fusion method of industrial control system functional safety and information security as claimed in claim 1 or 2, wherein said step (6) specifically comprises: (6.1)分别将功能安全需求集和信息安全需求集,按照预防类、检测类、响应类进行分类;预防类需求是指在功能安全保障或信息安全防护中起预防作用的措施对应的需求;检测类需求是指在功能安全保障或信息安全防护中进行实时检测对应的需求;响应类需求是指在功能安全保障或信息安全防护中在检测到问题后系统有针对性的进行响应对应的需求;(6.1) Classify the functional safety requirement set and the information security requirement set according to prevention, detection and response; prevention requirements refer to the requirements corresponding to the measures that play a preventive role in functional safety assurance or information security protection; Detection requirements refer to the corresponding requirements for real-time detection in functional security or information security protection; response requirements refer to the corresponding requirements for the system to respond in a targeted manner after detecting problems in functional security or information security protection ; (6.2)对于功能安全需求集和信息安全需求集中的预防类需求,没有交叉的,则直接添加进系统整体安全需求集中;有交叉的,针对上层的预防类需求以信息安全需求为准,针对下层的预防类需求以功能安全需求为准,去掉冲突的需求,然后融入系统整体安全需求集中;(6.2) If there is no intersection between the functional safety requirements set and the preventive requirements in the information security requirements set, it will be directly added to the overall system security requirements set; The prevention requirements of the lower layer are based on the functional safety requirements, and the conflicting requirements are removed, and then integrated into the overall security requirements of the system; (6.3)对于功能安全需求集和信息安全需求集中没有交叉的检测类需求,直接添加入系统整体安全需求集中;对于有交叉的检测类需求,按照求并集的方式进行融合,然后添加进系统整体安全需求集中;(6.3) For detection requirements that do not cross between the functional safety requirements set and the information security requirements set, they are directly added to the overall system security requirements set; for detection requirements that do overlap, they are merged in the way of union, and then added to the system Concentration of overall security requirements; (6.4)对于功能安全需求集和信息安全需求集中响应类需求,分析功能安全需求集和信息安全需求集中的各种响应类需求,结合系统的实际情况,依次制定每个需求的冲突解决策略。(6.4) For the functional safety requirement set and information security requirement set and response requirements, analyze the various response requirements in the functional safety requirement set and information security requirement set, and formulate the conflict resolution strategy for each requirement in turn in combination with the actual situation of the system. 7.如权利要求1或2所述的工业控制系统功能安全与信息安全的需求分析及融合方法,其特征在于,所述步骤(1)具体包括:7. The demand analysis and fusion method of industrial control system functional safety and information security as claimed in claim 1 or 2, wherein said step (1) specifically comprises: (1.1)搜集、分析及整理系统的设计文档、说明文档以及用例图;(1.1) Collect, analyze and organize the design documents, description documents and use case diagrams of the system; (1.2)分析系统中的功能、数据信息、软硬件资源以及系统运行涉及的人员,将系统的资产进行分类,分为信息资产、软件资产、物理资产、服务、人员以及无形资产,确定资产的属性,包括:资产名称、数量、位置、随机失效概率、资产失效后可能引发的危害事故、资产的重要性以及资产的固有漏洞;其中资产的重要性分为非常重要、重要、一般、不重要、非常不重要五个等级,最后形成系统的资产清单。(1.2) Analyze the functions, data information, software and hardware resources and personnel involved in the system operation in the system, classify the assets of the system into information assets, software assets, physical assets, services, personnel and intangible assets, and determine the assets Attributes, including: asset name, quantity, location, random failure probability, possible hazards after asset failure, asset importance, and inherent vulnerabilities of assets; the importance of assets is divided into very important, important, general, and unimportant , very unimportant five grades, and finally form a systematic asset list. 8.如权利要求7所述的工业控制系统功能安全与信息安全的需求分析及融合方法,其特征在于,所述步骤(1.2)中:8. The requirement analysis and fusion method of industrial control system functional safety and information security as claimed in claim 7, is characterized in that, in described step (1.2): 信息资产包括数据库和数据文件、合同协议、系统文件、研究信息、用户手册、操作或者支持规程、基本维持运行的安排、审核踪迹、归档信息;软件资产包括应用软件、系统软件、开发工具、实用程序;物理资产包括工业控制系统设备、电控设备、通信设备可移动媒体;服务包括设计、安装、调试、运行、维护、计算和通信服务、公用服务设施;人员包括系统涉及的所有人员,考虑人员的资格、技能以及经验;无形资产是指系统涉及的组织机构的声誉、形象。Information assets include databases and data files, contract agreements, system files, research information, user manuals, operating or support procedures, arrangements for basic maintenance, audit trails, and archived information; software assets include application software, system software, development tools, utility procedures; physical assets include industrial control system equipment, electronic control equipment, and communication equipment; removable media; services include design, installation, commissioning, operation, maintenance, computing and communication services, and public service facilities; personnel include all personnel involved in the system, and consider The qualifications, skills and experience of personnel; intangible assets refer to the reputation and image of the organizations involved in the system. 9.如权利要求2所述的工业控制系统功能安全与信息安全的需求分析及融合方法,其特征在于,所述步骤(2.3)具体包括:9. The demand analysis and fusion method of industrial control system functional safety and information security as claimed in claim 2, characterized in that, said step (2.3) specifically comprises: 计算危害事件ai可能发生的概率,依据系统的资产清单,分析危害事故与资产之间的关系,包括:Calculate the probability of hazardous events a i that may occur, and analyze the relationship between hazardous events and assets based on the system's asset list, including: (2.3.1)几种资产同时失效引发某一危害事故,危害事件ai可能发生的概率为其中为第j个资产的失效概率,j取值为1,2或3;(2.3.1) Several assets fail at the same time to cause a certain hazardous accident, the probability that the hazardous event a i may occur is in is the failure probability of the jth asset, and j takes the value of 1, 2 or 3; (2.3.2)几种资产中,只要有一种资产失效,则引发危险事件,危害事件ai可能发生的概率为 (2.3.2) Among several assets, as long as one asset fails, a dangerous event will be triggered, and the probability that the dangerous event a i may occur is (2.3.3)前两种情况的混合,危害事件ai可能发生的概率为 (2.3.3) The mixture of the first two situations, the probability that the hazardous event a i may occur is 10.如权利要求6所述的工业控制系统功能安全与信息安全的需求分析及融合方法,其特征在于,所述步骤(6.4)具体包括:10. The demand analysis and fusion method of industrial control system functional safety and information security as claimed in claim 6, characterized in that, said step (6.4) specifically comprises: 对于安全关键系统,制定冲突解决策略为:“当响应类需求集Rsafety-r和Rsecurity-r中的需求有冲突时,以Rsafety-r中的需求为准,删除Rsecurity-r中冲突的需求”;For safety-critical systems, formulate a conflict resolution strategy as follows: "When there is a conflict between the requirements in the response class requirements set R safety-r and R security-r , the requirements in R safety-r shall prevail, and the requirements in R security-r shall be deleted. Conflicting needs”; 或者以发生冲突的需求涉及的资产所面临的功能安全风险,与信息安全风险之间的大小来制定冲突解决策略;然后将功能安全需求集和信息安全需求集中的响应类需求逐一对比,没有冲突的直接添加入系统整体安全需求集中;有冲突的,按照制定的冲突解决策略进行解决,然后融入到系统整体安全需求集中。Or formulate a conflict resolution strategy based on the size of the functional security risks faced by the assets involved in the conflicting requirements and the information security risks; then compare the functional security requirements set and the response requirements in the information security requirements set one by one, and there is no conflict directly added into the overall system security requirement set; if there is a conflict, resolve it according to the established conflict resolution strategy, and then integrate it into the overall system security requirement set.
CN201510276161.8A 2015-05-27 2015-05-27 The demand analysis of industrial control system functional safety and information security and fusion method Active CN105045251B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510276161.8A CN105045251B (en) 2015-05-27 2015-05-27 The demand analysis of industrial control system functional safety and information security and fusion method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510276161.8A CN105045251B (en) 2015-05-27 2015-05-27 The demand analysis of industrial control system functional safety and information security and fusion method

Publications (2)

Publication Number Publication Date
CN105045251A CN105045251A (en) 2015-11-11
CN105045251B true CN105045251B (en) 2017-11-14

Family

ID=54451855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510276161.8A Active CN105045251B (en) 2015-05-27 2015-05-27 The demand analysis of industrial control system functional safety and information security and fusion method

Country Status (1)

Country Link
CN (1) CN105045251B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9967274B2 (en) * 2015-11-25 2018-05-08 Symantec Corporation Systems and methods for identifying compromised devices within industrial control systems
CN105635112B (en) * 2015-12-18 2019-03-15 国家电网公司 Evaluation Method of Information System Security Performance
CN106548286B (en) * 2016-10-28 2017-12-26 华中科技大学 The functional safety of industrial control system and information security real time coordination control method
CN106790190B (en) * 2016-12-30 2019-11-19 北京神州绿盟信息安全科技股份有限公司 A kind of Vulnerability Management system and method
CN109787935A (en) * 2017-11-13 2019-05-21 广东工业大学 A kind of smart home security protection system
CN108600155A (en) * 2018-03-07 2018-09-28 上海洺淀智能科技有限公司 A kind of convergence-level network security prevents the industrial control system invaded outside
CN109543419B (en) * 2018-11-30 2020-12-04 杭州迪普科技股份有限公司 Method and device for detecting asset security
EP3923167A1 (en) * 2020-06-10 2021-12-15 Siemens Aktiengesellschaft Method for creating an automated security analysis of an installation, device and computer program product
CN112015385B (en) * 2020-07-28 2022-02-11 华东师范大学 Protocol security property oriented formalized collaborative specification method and graphic modeling system
CN111898930A (en) * 2020-08-21 2020-11-06 中国石油大学(华东) Petrochemical safety equipment data acquisition method and system fusing information safety failure
CN112116227A (en) * 2020-09-08 2020-12-22 恩善(厦门)信息科技有限公司 Industrial control information security risk assessment model based on distributed inspection
CN112946631B (en) * 2021-01-28 2024-07-16 中煤科工集团重庆研究院有限公司 Point domain identification system and method for slope risk monitoring
CN113434866B (en) * 2021-06-30 2022-05-20 华中科技大学 Unified risk quantitative evaluation method for instrument function safety and information safety strategies
CN115686796B (en) * 2022-11-15 2025-08-22 华中科技大学 A coordinated optimization method and system for functional safety and information security of intelligent instruments
CN118827240B (en) * 2024-09-18 2024-12-13 北京源堡科技有限公司 Risk management methods, systems, equipment and media for integrated functions and information security

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236758A (en) * 2011-07-26 2011-11-09 天津大学 Security repository-based security requirement acquisition method
CN102289619A (en) * 2011-07-26 2011-12-21 天津大学 Level-driving security demand analysis method
CN102799834A (en) * 2012-06-07 2012-11-28 天津大学 System-asset-based software security requirement analysis method
CN103023889A (en) * 2012-11-29 2013-04-03 武汉华中电力电网技术有限公司 Safety margin risk quantification method
CN103095712A (en) * 2013-01-24 2013-05-08 无锡南理工科技发展有限公司 Security policy level joint modeling method based on consultative objective risk analysis system (CORAS)-Petri

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012226680A (en) * 2011-04-22 2012-11-15 Internatl Business Mach Corp <Ibm> Management system, management method and management program for managing industrial control system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236758A (en) * 2011-07-26 2011-11-09 天津大学 Security repository-based security requirement acquisition method
CN102289619A (en) * 2011-07-26 2011-12-21 天津大学 Level-driving security demand analysis method
CN102799834A (en) * 2012-06-07 2012-11-28 天津大学 System-asset-based software security requirement analysis method
CN103023889A (en) * 2012-11-29 2013-04-03 武汉华中电力电网技术有限公司 Safety margin risk quantification method
CN103095712A (en) * 2013-01-24 2013-05-08 无锡南理工科技发展有限公司 Security policy level joint modeling method based on consultative objective risk analysis system (CORAS)-Petri

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
An information systems security risk assessment model under uncertain environment;N.Feng,M.Li;《Appl. Soft Comput》;20111231;第11卷(第7期);第4332-4340页 *
安全无止境——解析工控系统中的功能安全与信息安全;卢祁;《中国仪器仪表》;20130225(第2期);第29-32页 *
嵌入式系统的功能安全与信息安全;吴雪黎,武雪峰,杨光,王继志;《信息技术与信息化》;20120630(第6期);第84-87页 *
工业控制系统信息安全仿真平台的设计与实现;周晓敏,李璇,黄双;《可编程控制器与工厂自动化》;20150430(第4期);第35-40页 *
工业控制网络的信息安全威胁与脆弱性分析与研究;陈星,贾卓生;《计算机科学》;20131031;第39卷(第10期);第188-190页 *
现场总线检测系统的信息融合方法及其应用;周纯杰,王永骥;《计算技术与自动化》;20040331;第23卷(第1期);第86-88页 *

Also Published As

Publication number Publication date
CN105045251A (en) 2015-11-11

Similar Documents

Publication Publication Date Title
CN105045251B (en) The demand analysis of industrial control system functional safety and information security and fusion method
CN112114579B (en) A security measurement method for industrial control systems based on attack graph
CN109246153A (en) Network safety situation analysis model and network safety evaluation method
CN105516130B (en) Data processing method and device
CN108881110B (en) Security situation assessment and defense strategy combined decision method and system
CN103366123A (en) Software risk assessment method based on defect analysis
CN108108624B (en) Product and service-based information security quality assessment method and device
CN102799834A (en) System-asset-based software security requirement analysis method
CN114003920A (en) Security assessment method and device for system data, storage medium and electronic equipment
CN104320271B (en) A kind of network equipment safety evaluation method and device
CN115982711A (en) Quantitative evaluation method for data security risk
CN117614978A (en) An information security communication management system for digital workshops
CN105046421A (en) Comprehensive safety evaluation method for electric vehicle charging facility
CN111415102B (en) Electric power monitoring system toughness evaluation method based on entropy method
Ruo-xin et al. Model for cloud computing security assessment based on AHP and FCE
McCormack et al. Ethical ai governance: Methods for evaluating trustworthy ai
CN118606089A (en) Smart contract group operation and maintenance information management method and system based on blockchain
Tse et al. Risks facing smart city information security in Hangzhou
CN106790211A (en) A kind of Mathematical Statistical System and method for predicting malware infection
Park et al. Security requirements prioritization based on threat modeling and valuation graph
CN115640581A (en) Data security risk assessment method, device, medium and electronic equipment
Kaneko et al. Cc-case as an integrated method of security analysis and assurance over life-cycle process
Jung et al. Prioritizing cloud service threats for succession to information security management system
Kiran et al. A Critical study of information security risk assessment using fuzzy and entropy methodologies
CN119922014B (en) Private cloud security management method based on multidimensional feature data analysis

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant