YUE Chuan, WANG Lide, SHEN Ping, et al. Qualitative analysis of cyber security vulnerability for Ethernet-based train communication network. [J]. Electric drive for locomotives (4):45-54(2022)
DOI:
YUE Chuan, WANG Lide, SHEN Ping, et al. Qualitative analysis of cyber security vulnerability for Ethernet-based train communication network. [J]. Electric drive for locomotives (4):45-54(2022) DOI: 10.13890/j.issn.1000-128X.2022.04.007.
Qualitative analysis of cyber security vulnerability for Ethernet-based train communication network
Interactions between the Ethernet-based train communication network (ETCN) and the outside information environment are increasing rapidly
which means that ETCN is facing severe cyber security threats. There is no systematic and macroscopic qualitative analysis of the vulnerability of ETCN at home and abroad
therefore it is urgent to analyze its security vulnerability. Firstly
from the perspective of network protocols and network devices
a macroscopic qualitative analysis of the vulnerabilities of ETCN were carried out. Secondly
potential attacks against ETCN were analyzed through the subjects
routes
and behaviors of attacks. At last
an ETCN attack testbed was built to conduct experiments on several kinds of primary attacks. Experimental results indicate that the vulnerabilities exploited by these attacks exist in ETCN and are easy to be compromised.
关键词
列车通信网络工业以太网网络攻击安全脆弱性分析信息物理系统
Keywords
train communication networkindustrial Ethernetnetwork attacksecurity vulnerability analysiscyber-physical system
references
简捷. 基于以太网的列车通信网络多业务调度优化策略研究[D]. 北京: 北京交通大学, 2020.
JIAN Jie. Optimization strategy of multi-service schedule in Ethernet-based train communication networks[D]. Beijing: Beijing Jiaotong University, 2020.
WU Dazhong, REN Anqi, ZHANG Wenhui, et al. Cybersecurity for digital manufacturing[J]. Journal of Manufacturing Systems, 2018, 48 Part C: 3-12.
SONG Shouxin, XU Jia, CHEN Mingli, et al. The mechanism and evaluation of vulnerability factors’ progressive growth[J]. Journal of Beijing Jiaotong University (Social Sciences Edition), 2017, 16(2): 57-65.
PAUL A, SCHUSTER F, KÖNIG H. Towards the protection of industrial control systems - conclusions of a vulnerability analysis of profinet IO[C]//Springer. International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Heidelberg: Springer, 2013: 160-176.
LAN Li, ZHANG Youpeng. Vulnerability analysis of railway time synchronization network protocol based on stochastic Petri net[J]. Journal of the China Railway Society, 2017, 39(8): 85-92.
王轶楠. 电力信息物理系统建模及网络攻击环境下的脆弱性研究[D]. 杭州: 浙江大学, 2019.
WANG Yinan. Modeling technique and vulnerability assessment of electrical cyber physical systems considering cyber attacks[D]. Hangzhou: Zhejiang University, 2019.
LI Jie, RAO Dong, ZHANG Wenbin. Train control and monitor system of electric train for Beijing Daxing airport express[J]. Railway Locomotive & Car, 2019, 39(6): 106-110.
CHEN Taifu, NING Zhenjun, LI Siyuan. Implementation of link management for Ethernet train backbone network based on information exchange[J]. Electric Locomotives & Mass Transit Vehicles, 2020, 43(5): 39-44.
WANG Zhongyao. Ethernet transmission specification for PHM system of intelligent EMUs for Beijing-Zhangjiakou line[J]. Rail Transportation Equipment and Technology, 2020(1): 56-59.
XIAN Ming, BAO Weidong, WANG Yongjie, et al. Introduction to effect evaluation of network attacks[M]. Changsha: National University of Defense Technology Press, 2007: 7-16.