[1] |
陶耀东,李宁,曾广圣. 工业控制系统安全综述[J]. 计算机工程与应用, 2016,52(13):8-18.
|
[2] |
蒲石,陈周国,祝世雄. 震网病毒分析与防范[J]. 信息网络安全, 2012(2):40-43.
|
[3] |
LANGNER R. Stuxnet: Dissecting a cyberwarfare weapon[J]. IEEE Security & Privacy, 2011,9(3):49-51.
|
[4] |
信息安全与通信保密采编部. 乌克兰电网被黑事件[J]. 信息安全与通信保密, 2016(9):25.
|
[5] |
LIPOVSKY R, CHEREPANOV A. Blackenergy Trojan Strikes Again:Attacks Ukrainian Electric Power Industry[EB/OL]. (2016-01-04)[2022-05-10]. https://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry.
|
[6] |
谛听安全分析团队. 工业网络空间安全态势分析报告 [EB/OL]. (2016-05-22)[2022-05-10]. http://www.aqniu.com/industry/16076.html.
|
[7] |
赵帆,罗向阳,刘粉林. 网络空间测绘技术研究[J]. 网络与信息安全学报, 2016,2(9):1-11.
|
[8] |
王欢欢,张冬梅,于亮. 一种针对工控系统的网络探测方法[C]// 第十九届全国青年通信学术年会论文集. 2014:19-23.
|
[9] |
FENG X, LI Q, WANG H, et al. Characterizing industrial control system devices on the Internet[C]// 2016 IEEE 24th International Conference on Network Protocols (ICNP). 2016:1-10.
|
[10] |
MIRIAN A, MA Z, ADRIAN D, et al. An Internet-wide view of ICS devices[C]// 2016 14th Annual Conference on Privacy, Security and Trust (PST). 2016:96-103.
|
[11] |
FENG X, LI Q, WANG H, et al. Acquisitional rule-based engine for discovering internet-of-thing devices[C]// Proceedings of the 27th USENIX Conference on Security Symposium. 2018:327-341.
|
[12] |
于新铭. 基于协议分析的工业互联网资产探测系统的设计与实现[D]. 北京:北京邮电大学, 2020.
|
[13] |
SHODAN. SHODAN搜索引擎[EB/OL]. [2022-05-10] .https://www.shodan.io/.
|
[14] |
FOFA网络空间测绘. 网络空间资产检索系统[DB/OL]. [2022-05-10]. https://fofa.info/.
|
[15] |
谛听安全分析团队. 2018年工业控制网络安全态势白皮书[R/OL]. [2022-05-10]. https://www.freebuf.com/articles/paper/262522.html.
|
[16] |
ZDOMEYE. 知道创宇网络空间雷达[EB/OL]. [2022-05-10]. https://www.zoomeye.org/.
|
[17] |
SEMEVORATME P. Modbus[M]. Building Arduino PLCs. Apress,2017.
|
[18] |
MODICON I. Modicon Modbus Protocol Reference Guide[Z]. Schneider, 1996.
|
[19] |
陈卓. 基于无状态连接的工控系统扫描平台的设计与实现[D]. 北京:北京邮电大学, 2018.
|
[20] |
TAMBOLI S, RAWALE M, THORAIET R, et al. Implementation of Modbus RTU and Modbus TCP communication using Siemens S7-1200 PLC for batch process[C]// 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM). 2015:258-263.
|
[21] |
张俊伟,关峰,汪文熙,等. 电力系统IEC104规约典型报文应用解析[J]. 电子测试, 2016(24):33.
|
[22] |
DNP. A DNP3 protocol primer[EB/OL]. [2022-05-10].http://www.dnp.org/portals/O/AboutUs/DNP3%20 Primer%20Rev%20A.pdf.
|
[23] |
MACKIEWICZ R E. Overview of IEC61850 and benefits[C]// 2006 IEEE PES Power Systems Conference and Exposition. 2006:623-630.
|
[24] |
李秋锐. 计算机网络安全扫描技术研究[J]. 网络安全技术与应用, 2012(1):23-25.
|
[25] |
沙超,陈云芳. 一种基于TCP/IP协议栈的操作系统识别技术[J]. 计算机技术与发展, 2006,16(10):125-127.
|
[26] |
赵建军. 网络空间终端设备识别技术研究[D]. 兰州:兰州理工大学, 2016.
|
[27] |
游建舟,吕世超,孙玉砚,等. 物联网蜜罐综述[J]. 信息安全学报, 2020,5(4):138-156.
|