Journal of System Simulation ›› 2021, Vol. 33 ›› Issue (6): 1466-1488.doi: 10.16182/j.issn1004731x.joss.20-0875

Previous Articles     Next Articles

Review on Key Technologies of Industrial Control System Security Simulation

Wang Bailing1,2, Liu Hongri1,2,3, Zhang Yaofang1,2, Lü Sicai1,2, Wang Zibo1,2, Wang Qimeng4   

  1. 1. Harbin Institute of Technology at Weihai School of Computer Science and Technology, Weihai 264209, China;
    2. Harbin Institute of Technology Research Institute of Cyberspace Security, Harbin 150001, China;
    3. Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen 518000;
    4. Fengtai Technology (Beijing) Co., LTD, Beijing 100097, China);
  • Received:2020-10-11 Revised:2021-01-26 Online:2021-06-18 Published:2021-06-23

Abstract: In order to cope with the increasingly serious industrial internet security problems, simulation is viewed as a critical backboned technology for drilling of network attack and defense, tracking back and analyzing of security incidents, as well as validating of pre-research technology. On the basis of summarizing the studies of three types of typical industrial control system security simulation platform, the key technologies used in industrial control cyber range and industrial control honeynets are highlighted. Technologies are summarized, such as the virtualization technology of industrial control network and industrial control components, the construction technology of industrial control target field dominated by flow simulation and behavior simulation, the trapping technology of industrial control honeynet under the interconnection of multiple honeypots, and the data acquisition and evaluation technology. The challenges and future trends in the field of security simulation of industrial control systems are presented.

Key words: industrial internet security simulation, virtualization, industrial control cyber range, industrial control honeynets

CLC Number: