(18.210.12.229) 您好!臺灣時間:2021/03/05 12:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:何怡樺
研究生(外文):Yi-Hua Ho
論文名稱:以模型為基礎的風險管理與量測指標
論文名稱(外文):Model-based risk management and metrics
指導教授:范金鳳范金鳳引用關係
指導教授(外文):Chin-Feng Fan
學位類別:碩士
校院名稱:元智大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:66
中文關鍵詞:CORAS風險度量測指標生存性強壯性修復性
外文關鍵詞:CORASRiskMetricsReliabilityRobustnessRecovery
相關次數:
  • 被引用被引用:1
  • 點閱點閱:210
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
資訊安全處理資料被非法侵入使用的問題,軟體安全則考量因軟體的錯誤或缺陷引起危及生命財產損失的議題。因此為了有效地防止攻擊者入侵和破壞,工業控制系統必須從資訊安全和軟體安全兩方面著手。本論文提出一套技術將資訊安全和軟體安全結合,以延伸CORAS圖建構破壞劇情,並將改良的HZAOP方法分析可能產生的攻擊以計算風險度。另外發展可信賴性量測指標供系統量測,可做為系統在開發時期的回饋以降低風險。最後以鍋爐系統為模擬案例,以說明方法的有效性。
Security deals with unauthorized accessing of data. On the other hand, safety deals with hazards due to human unintentional errors or software defects. However, to prevent malicious attackers from intrusion and sabotage, industry control systems have to consider both information security and software safety. This thesis proposes techniques combining information security and software safety. We extended CORAS method to model sabotages and used improved HZAOP to analyze sabotage scenarios. Then risks can be calculated. We also develop metrics to evaluate and manage security risks. These metrics can be used as feedbacks to improve design. A steam boiler system is simulated as a case study to demonstrate the effectiveness of our methods.
第一章 概論.........................................................................................................................1
第二章 研究背景.................................................................................................................3
2.1 HAZOP (HAZard and Operability,危害與可操作性分析) .............................3
2.2 CORAS..................................................................................................................4
2.3 故障樹(fault trees) ...............................................................................................4
2.4 BBNs (Bayesian Belief Networks,貝氏信心網路) ....................................5
第三章 研究方法.................................................................................................................7
3.1 建構工業控制系統的正常與不正常情境下的狀態轉換圖...........................7
3.2 發展工業控制系統異常劇情模塑...................................................................11
3.3 建構故障樹..........................................................................................................13
3.4 計算風險度..........................................................................................................15
3.5 發展可信賴性量測指標....................................................................................16
3.5.1 生存性(Survivability) .........................................................19
3.5.2強壯性(Robustness) ..................................................................23
3.5.3 修復性(Recovery)...........................................................................26
3.5.4 潛在弱點(Potential vulnerability) ..................................................28
第四章 案例模擬...............................................................................................................31
4.1 系統描述.............................................................................................................31
4.2 系統狀態.............................................................................................................32
4.3 正常情境與不正常情境下的狀態轉換圖.....................................................34
4.4 異常劇情模塑....................................................................................................38
4.5 建構故障樹並計算風險度...............................................................................49
4.6 量測指標.............................................................................................................53
4.7 程式模擬.............................................................................................................56
第五章 結論和未來工作..................................................................................................63
[1]Nancy G.Leveson , “SAFEWARE, System Safety and Computers,” Addison-Wesley Publishing Company, 1995, ISBN: 0-201-11972-2

[2]Ministry of Defence, “Defence Standard 00-58, Issue 2,” MoD, 2000

[3]CORAS, http://coras.sourceforge.net

[4]J. O. Aagedal, F. den Braber, et al., “Model-based risk assessment to improve enterprise security,” Proc. Enterprise Distributed Object Communication (EDOC 2002), pp. 51-62, 2002.

[5]OMG, "UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms (QoS)", Adopted Specification, ptc/2004-06-01, June 2004.

[6]Ida Hogganvik, Ketil Stølen, “On the comprehension of security risk scenarios,” In Proc. 13th International Workshop on Program Comprehension (IWPC''2005), pages 115-124, IEEE Computer Society, 2005.

[7]Mass Soldal Lund, Folker den Braber, Ketil Stolen, “Maintaining Results from Security Assessments,“ Proceedings of the Seventh European Conference on Software Maintenance and Reengineering, pp. 341, 2003.

[8]Gerhard Schellhorn, Andreas Thums, Wolfgang Reif, “Formal Fault Tree Semantics,” In. Proc. of The 6th World Conference on Integrated Design and Process Technology, Pasadena,. CA, 2002.

[9]Norman Fenton, http://www.dcs.qmul.ac.uk/~norman/

[10]Finn V. Jensen, “An Introduction to Bayesian Networks,” Bookcraft Ltd., England, 1996, ISBN: 0-387-91502-8

[11]Unified Modeling Language (UML), http://www.uml.org/

[12]Grady Booch 7 James Rumbaugh, Ivar Jacobson 著, 張裕益 譯, “UML使用手冊,”博碩文化出版, 2001

[13]Reuven Gallant, “Diagrammatic reasoning with statecharts,” The 22nd Convention of Electrical and Electronics Engineers in Israel, pp. 98- 100, 2002.

[14]Xiaoshan Li, Zhiming Liu, He Jifeng, “A Formal Semantics of UML Sequence Diagram,” Software Engineering Conference, 2004. Proceedings. 2004 Australian, pp. 168- 177.

[15]Seung, M.C., Hyung, H.K., Sung, D.C., and Doo, H.B.: A semantics of sequence diagrams. Information Processing Letters, Vol. 48(3), pp. 125-130, Elsevier North-Holland, ISSN: 0020-0190, 2002.

[16]Rune Winther1, Ole-Arnt Johnsen2, and Bjørn Axel Gran3, “Security Assessments of Safety Critical Systems Using HAZOPs,” Proceedings of the 20th International Conference on Computer Safety, Reliability and Security, Lecture Notes In Computer Science; Vol. 2187, pp.14-24, 2001.

[17]K. T. Kosmowski ,“Risk analysis and management in sociotechnical systems,” Artículo presentado en el Safety Net Meeting, Atenas, Grecia, Junio 7-10 2000.

[18]Stilianos Vidalis ,“A Critical Discussion of Risk and Threat Analysis Methods and Methodologies,” School of Computing Technical Report CS-04-03 - Issued: July 2004.

[19]Roger S. Pressman, “Software engineering, A practitioner’s approach, sixth Edition, “ Higher Education, 2005.

[20]John DeVale and Phil Koopman , “Robust Software: No More Excuses,” Proc. of DSN 2002.

[21]Robyn R. Lutz , “Targeting Safety-Related Errors During Software Requirements Analysis,” Foundations of Software Engineering, Proceedings of the 1st ACM SIGSOFT symposium on Foundations of software engineering, pp. 99 - 106.

[22]Darin England, Jon Weissman, Jayashree Sadagopan, “A New Metric for Robustness with Application to Job Scheduling,” High Performance Distributed Computing, 2005. HPDC-14. Proceedings. 14th IEEE International Symposium, pp. 24-27.

[23]S. Ali, A. A. Maciejewski, H. J. Siegel, and J-K. Kim, “Definition of a Robustness Metric for Resource Allocation,” in the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 10 pages, Nice, France, April 22-26, 2003.

[24]Donald G. Firesmith, “Common Concepts Underlying Safety, Security, and Survivability Engineering,” Technical Note CMU/SEI-2003-TN-033, Software Engineering Institute, Pittsburgh, Pennsylvania, December 2003.

[25]Voas, J.M. Ghosh, A.K., “Software Fault Injection for Survivability,” DARPA Information Survivability Conference and Exposition, 2000. DISCEX ''00. Proceedings, vol.2, pp. 338-346, 2000.

[26]Knight, John, Elisabeth A. Strunk and Kevin J. Sullivan, ”Towards a Rigorous Definition of Information System Survivability,” DISCEX 2003, Washington DC (April 2003)

[27]Jeffrey Voas , ”Building Software Recovery Assertions from a Fault Injection-based Propagation Analysis,” Proceedings of the 21st International Computer Software and Applications Conference, pp. 505 – 510, 1997.

[28]Cristian, Flaviu, "Exception Handling And Software-Fault Tolerance." 10th International Symposium on Fault-Tolerant Computing, October 1980, pp. 97-103.

[29]Russell J. Abbott, "Resourceful Systems for Fault Tolerance, Reliability, and Safety," ACM Computing Surveys, Vol. 22, #1, March, 1990, pp. 35-68.

[30]Russel J. Abbott, "Resourceful systems for fault tolerance, reliability and safety", ACM Computing Survey 22(1) 1990 pp. 35-68.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔