Abstract
In this paper, we analyse the factors affecting the network security of a gas SCADA system. We model the security problem in the SCADA system into an online digital intelligent defensing process, including all reasoning judgment, thinking and expression in attacking and defence. This model abstracts and establishes a corresponding and equivalent network attacking and defence knowledge system. Also, we study the formal knowledge theory of SCADA network for oil and gas fields though exploring the factors state space, factors express, equivalence partitioning etc, and then put forward a network attack effect fuzzy evaluation model using factor neural network theory. The experimental results verify the effectiveness of the model and the algorithm, which lays the foundation for the research of the simulation method.
The paper is supported by National Natural Science Foundation Project. (Grant No. 61175122).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ragsdale, D.J., Surdu, J.R., Carver, C.A.: Information assurance education through active learning.The IWAR Laboratory (2002)
De Vivo, M., de Vivo, G.O., Isern, G.: Internet security attacks at the basic levels. Operating Systems Review 32(2) (2002)
Teo, L., Zheng, Y., Ahn, G.: Intrusion detection force: an infrastructure for internet-scale intrusion detection. In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA 2003), Darmstadt, Germany, pp. 73–91 (2003)
Zheng, L., Liu, Z., Wu, Y.: Network warfare on the battlefield. Military science press, Beijing (2002)
Liu, Z., Liu, Y.: Factor neural network theory and implementation strategy research. Beijing Normal University Press, Beijing (1992)
Zhang, S., Tang, C., Zhang, Q., et al.: Based on the efficiency of network attack against method classification and formalism description. Information and Electronic Engineering 2(3), 161–167 (2004)
Huang, G., Ren, D.: Based on of both-branch fuzzy decision and fuzzy Petri nets the attackStrike model. Computer Applications 27(11), 2689–2693 (2007)
Huang, G., Qiao, K., Zhu, H.: Based on the fuzzy attack FPN graph model and productionAlgorithm. J. Microelectronics and Computer (5), 162–165 (2007)
Guo, C., Liu, Z., et al.: The virtual network attack and defense analysis model. Computer Engineering and Applications 44(25), 100–103 (2008)
Wang, P.Z., Sugeno, M.: The factors field and back-ground structure for fuzzy subsets. Fuzzy Mathematics 2(2), 45–54 (1982)
Guo, C.-X., Liu, Z.-L., Miao, Q.: Network attack planning model and its generating algorithm. Computer Engineering and Applications 46(31), 121–123 (2010)
Guo, C.-X., Liu, Z.-L., Zhang, Z.-N., Tao, Y.: Network Attack Knowledge Model Based on Factor Space Theory. Telecommunication Engineering 49(10), 11–14 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, L. et al. (2012). A New Formal Description Model of Network Attacking and Defence Knowledge of Oil and Gas Field SCADA System. In: Wang, H., et al. Web Technologies and Applications. APWeb 2012. Lecture Notes in Computer Science, vol 7234. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29426-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-29426-6_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29425-9
Online ISBN: 978-3-642-29426-6
eBook Packages: Computer ScienceComputer Science (R0)