A Security Architecture Model of Oil and Gas SCADA Network Based on Multi-Agent

Modern industrial automation control network SCADA system is facing more and more serious security threat. In order to meet the demand for oil and gas SCADA system security defense, by analyzing the security risk in oil and gas SCADA system and advantage of multiagent technology, formalization description security defense architecture based on multiagent is presented and the roles and tasks in the architecture are described and SCADA security defense framework based on multi-agent is designed, finally, simulation model based on agent security attack and defense is given. With the experimental simulation using neural network recognition algorithm, the reliability and validity of the model are verified by comparing detection rate and false rate. Compared with the traditional security and defense, this system makes full use of many advantages of the multi-Agent architecture, and has the advantages of accurate detection, high detection efficiency and timely response.

[1]  Sandia Report,et al.  Sandia SCADA Program High-Security SCADA LDRD Final Report , 2002 .

[2]  Jie Li,et al.  The Geological Disasters Defense Expert System of the Massive Pipeline Network SCADA System Based on FNN , 2012, APWeb Workshops.

[3]  Lin Weimin Study on Industrial Control SCADA System’s Information Security Protection System , 2012 .

[4]  P. Oman,et al.  Analyzing the security and survivability of real-time control systems , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[5]  Gail-Joon Ahn,et al.  Intrusion Detection Force: an infrastructure for Internet-scale intrusion detection , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..

[6]  Marco de Vivo,et al.  Internet security attacks at the basic levels , 1998, OPSR.

[7]  Zahir Tari,et al.  An Analytical Framework for Evaluating Survivability of SCADA Systems , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.