Skip to main content

A New Formal Description Model of Network Attacking and Defence Knowledge of Oil and Gas Field SCADA System

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7234))

Abstract

In this paper, we analyse the factors affecting the network security of a gas SCADA system. We model the security problem in the SCADA system into an online digital intelligent defensing process, including all reasoning judgment, thinking and expression in attacking and defence. This model abstracts and establishes a corresponding and equivalent network attacking and defence knowledge system. Also, we study the formal knowledge theory of SCADA network for oil and gas fields though exploring the factors state space, factors express, equivalence partitioning etc, and then put forward a network attack effect fuzzy evaluation model using factor neural network theory. The experimental results verify the effectiveness of the model and the algorithm, which lays the foundation for the research of the simulation method.

The paper is supported by National Natural Science Foundation Project. (Grant No. 61175122).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ragsdale, D.J., Surdu, J.R., Carver, C.A.: Information assurance education through active learning.The IWAR Laboratory (2002)

    Google Scholar 

  2. De Vivo, M., de Vivo, G.O., Isern, G.: Internet security attacks at the basic levels. Operating Systems Review 32(2) (2002)

    Google Scholar 

  3. Teo, L., Zheng, Y., Ahn, G.: Intrusion detection force: an infrastructure for internet-scale intrusion detection. In: Proceedings of the First IEEE International Workshop on Information Assurance (IWIA 2003), Darmstadt, Germany, pp. 73–91 (2003)

    Google Scholar 

  4. Zheng, L., Liu, Z., Wu, Y.: Network warfare on the battlefield. Military science press, Beijing (2002)

    Google Scholar 

  5. Liu, Z., Liu, Y.: Factor neural network theory and implementation strategy research. Beijing Normal University Press, Beijing (1992)

    Google Scholar 

  6. Zhang, S., Tang, C., Zhang, Q., et al.: Based on the efficiency of network attack against method classification and formalism description. Information and Electronic Engineering 2(3), 161–167 (2004)

    Google Scholar 

  7. Huang, G., Ren, D.: Based on of both-branch fuzzy decision and fuzzy Petri nets the attackStrike model. Computer Applications 27(11), 2689–2693 (2007)

    MathSciNet  Google Scholar 

  8. Huang, G., Qiao, K., Zhu, H.: Based on the fuzzy attack FPN graph model and productionAlgorithm. J. Microelectronics and Computer (5), 162–165 (2007)

    Google Scholar 

  9. Guo, C., Liu, Z., et al.: The virtual network attack and defense analysis model. Computer Engineering and Applications 44(25), 100–103 (2008)

    Google Scholar 

  10. Wang, P.Z., Sugeno, M.: The factors field and back-ground structure for fuzzy subsets. Fuzzy Mathematics 2(2), 45–54 (1982)

    MathSciNet  MATH  Google Scholar 

  11. Guo, C.-X., Liu, Z.-L., Miao, Q.: Network attack planning model and its generating algorithm. Computer Engineering and Applications 46(31), 121–123 (2010)

    Google Scholar 

  12. Guo, C.-X., Liu, Z.-L., Zhang, Z.-N., Tao, Y.: Network Attack Knowledge Model Based on Factor Space Theory. Telecommunication Engineering 49(10), 11–14 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, L. et al. (2012). A New Formal Description Model of Network Attacking and Defence Knowledge of Oil and Gas Field SCADA System. In: Wang, H., et al. Web Technologies and Applications. APWeb 2012. Lecture Notes in Computer Science, vol 7234. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29426-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29426-6_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29425-9

  • Online ISBN: 978-3-642-29426-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics