[1]Alladi T, Chamola V, Zeadally S. Industrial control systems: Cyberattack trends and countermeasures[EBOL]. Computer Communications, 2020[20240424]. https:dblp.orgdbjournalscomcomcomcom155.html#AlladiCZ20[2]卢列文, 路丹舒, 马跃强. 一种虚实结合的工控安全实训靶场平台设计[J]. 信息安全研究, 2024, 10(1): 7580[3]Kumar R, Kumar P, Tripathi R, et al. A distributed intrusion detection system to detect DDoS attacks in blockchainenabled IoT network[EBOL]. Journal of Parallel and Distributed Computing, 2022 [20240424]. https:dblp.orgdbjournalsjpdcjpdc164.html#Kumar KTGGH22[4]白波, 冯云, 刘宝旭, 等. 基于网络行为的攻击同源分析方法研究[J]. 信息安全学报, 2023, 8(2): 6680[5]Abdo H, Kaouk M, Flaus J M, et al. A safety security risk analysis approach of industrial control systems: A cyber bowtiecombining new version of attack tree with bowtie analysis[EBOL]. 2018[20240424]. https:dblp.orgdbjournalscompseccompsec72.html#AbdoKFM18[6]Masood Z, Samar R, Raja M A Z. Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure[J]. Computers & Security, 2019, 87: 101565[7]Xiao F, Chen E, Xu Q, et al. ICSTrace: A Malicious IP traceback model for attacking data of the industrial control system[EBOL]. 2021 [20240424]. https:dblp.orgdbjournalsscnscn2021.html#XiaoCXZ21[8]Zeng J, Chua Z L, Chen Y, et al. Watson: Abstracting behaviors from audit logs via aggregation of contextual semantics[COL]. 2021 [20240424]. https:dblp.orgdbconfndssndss2021.html[9]杨英杰, 冷强, 常德显, 等. 基于属性攻击图的网络动态威胁分析技术研究[J]. 电子与信息学报, 2019, 41(8): 18381846[10]Nedeljkovic D, Jakovljevic Z. CNN based method for the development of cyberattacks detection algorithms in industrial control systems[J]. Computers & Security, 2022, 114: 102585[11]Bryant B D, Saiedian H. Improving SIEM alert metadata aggregation with a novel killchain based classification model[J]. Computers & Security, 2020, 94: 101817[12]Zhu H, Niu W, Liao X, et al. Attacker traceability on ethereum through graph analysis[J]. Security and Communication Networks, 2022, 2022: 112[13]Kwon Y, Wang Fei, Wang Weihang, et al. MCI: Modelingbased causality inference in audit logging for attack investigation[COL]. [20240424]. https:dblp.orgdbconfndssndss2021.html[14]Straub J. Modeling attack, defense and threat trees and the cyber kill chain, ATTt&CK and stride frameworks as blackboard architecture networks[C] Proc of 2020 IEEE Int Conf on Smart Cloud. Piscataway, NJ: IEEE, 2020: 148153[15]潘亚峰, 周天阳, 朱俊虎,等. 基于ATT&CK的APT攻击语义规则构建[J]. 信息安全学报, 2021, 6(3): 7790
|