摘要
火电厂传统分散控制系统(DCS)设备层采用硬接线方式,不存在通信安全问题,随着公开、透明的工控协议通信网络代替传统DCS硬接线进入设备层,工控协议所具有的协议漏洞及容易受到网络攻击的特性开始显现。本文分析了火电厂控制系统设备层通信网络协议存在的漏洞和攻击问题,重点分析了攻击防护,并给出了攻击方式的示例。最后提出,在漏洞防护上,应采用管理措施和技术措施相结合;在攻击防护上,建议在实现PROFIBUS、MODBUS等工控协议时,增加时间戳和会话机制,或在建立PROFIBUS、MODBUS等工控协议通信前,实现基于身份的验证机制。
The device layer of conventional distributed control system(DCS) in power plants adopts hardwired mode,so there is no talent problem in communication safety.With the open and transparent industrial control protocol communication network replacing the conventional DCS hardwire into the device layer,the protocol loopholes of industrial control communication protocol and the characteristics of being vulnerable to network attacks begin to highlight.This paper analyzes the loopholes and attacks of the communication network protocol in the device layer,focuses on the analysis of attack protection and gives an example of attack mode.At last,it points out that,on the protection of loopholes,management measures and technical measures should be adopted.It suggests to increase the time stamp and session mechanism when implementing industrial control protocols such as PROFIBUS and MODBUS,or to implement identity based authentication mechanism before establishing industrial protocol communication.
作者
崔逸群
王文庆
刘超飞
毕玉冰
董夏昕
CUI Yiqun;WANG Wenqing;LIU Chaofei;BI Yubing;DONG Xiaxin(Xi’an Thermal Power Research Institute Co.,Ltd.,Xi’an 710054,China)
出处
《热力发电》
CAS
北大核心
2020年第6期152-156,共5页
Thermal Power Generation
基金
中国华能集团有限公司总部科技项目(HNKJ20-H40)。
关键词
DCS
通信安全
设备层
协议漏洞
网络攻击
火电厂
防护措施
DCS
communication security
device layer
protocol loophole
network attack
thermal power plant
protective measures