期刊文献+

工业控制系统的安全技术与应用研究综述 被引量:19

Summary of Security Technology and Application in Industrial Control System
在线阅读 下载PDF
导出
摘要 为应对控制系统与互联网技术深度融合引发的安全新挑战,抵御震网病毒、火焰病毒、BlackEnergy等靶向攻击,针对工业控制系统漏洞挖掘、修复与控制等技术滞后,以及工业控制安全面临的"难发现、难监测、难防护"等问题,通过对工业控制系统的理论模型、关键技术、装备研制及测试评估进行研究,以漏洞挖掘与利用研究为主线,以理论与体系架构研究和安全技术测试验证平台的建设为基础,以动态监测防护和主动防御为目标,以测试样例集的攻防验证与典型示范为应用,提出了包含工业控制系统漏洞挖掘、深度检测、动态防护、主动防御等的整体安全技术解决方案,设计并构建了集漏洞挖掘、验证评估、动态防护、主动防御于一体的工业控制系统安全技术体系。 In order to face the new challenges caused by the deep integration of control system and Internet technology and resist the target attack,such as shock virus,flame virus and BlackEnergy,aiming at the technical lag of industrial control system vulnerability mining,repair and control,and the problems of“difficult to detect,difficult to monitor,difficult to protect”,this paper researched the theoretical model,key technology,equipment development and test evaluation of industrial control system.Besides,through taking the research of vulnerability mining and utilization as the main line,taking theoretical system architecture research and test verification platform construction as the basis,taking dynamically monitoring protection and active defense as the goal,taking test example set attack and defense verification and typical demonstration as the applicationl,this paper proposed security technology solutions including industrial control system vulnerability mining,depth detection,dynamic protection,active defense,and designed the integrated security technology system including vulnerability mining,verification and evaluation,dynamic protection and active defense.
作者 锁延锋 王少杰 秦宇 李秋香 丰大军 李京春 SUO Yan-feng;WANG Shao-jie;QIN Yu;LI Qiu-xiang;FENG Da-jun;LI Jing-chun(School of Computer and Communication Engineering,University of Science and Technology Beijing,Beijing 100083,China;National Research Center of Information Technology Security,Beijing 100084,China;Institute of Software,Chinese Academy of Sciences,Beijing 100083,China;The First Research Institute of the Ministry of Public Security,Beijing 100083,China;The 6th Research Institute of China Electronics Corporation,Beijing 100083,China)
出处 《计算机科学》 CSCD 北大核心 2018年第4期25-33,共9页 Computer Science
基金 国家863计划项目:漏洞验证评估与综合服务平台研究(2012AA012901)资助
关键词 工业控制系统 漏洞挖掘 验证评估 动态防护 主动防御 Industrial control system Vulnerability mining Validation evaluation Dynamic protection Active defense
  • 相关文献

参考文献6

二级参考文献34

  • 1王浩,吴中福,王平.工业控制网络安全模型研究[J].计算机科学,2007,34(5):96-98. 被引量:16
  • 2陈晓苏,林植,肖道举.基于策略的网络安全防护系统框架研究[J].计算机工程与科学,2007,29(6):7-9. 被引量:11
  • 3HRISTOVA A, SCHLEGEL R, OBERMEIER S.Security assessment methodology for industrial control system products [C]∥The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems. [S.l.]: IEEE, 2014: 264-269.
  • 4RALSTON P A S, GRAHAM J H, HIEB J L. Cyber security risk assessment for SCADA and DCS networks [J].ISA Transaction, 2007, 46(4): 583-594.
  • 5WANG L J, WANG B, PENG Y J. Research the information security risk assessment technique based on Bayesian network [C]∥2010 3rd International Conference on Advanced Computer Theory and Engineering. Chengdu: [s.n.], 2010: V3 600 V3 604.
  • 6BIAN N Y, WANG X Y, MAO L. Network security situational assessment model based on improved AHP_FCE [C]∥2013 6th International Conference on Advanced Computational Intelligence. Hangzhou: [s.n.], 2013: 200-205.
  • 7GB/T 20984 2007,信息安全风险评估规范[S].北京:中国标准出版社,2007.
  • 8GB/T 26333 2010,工业控制网络安全评估规范[S].北京:中国标准出版社,2010.
  • 9魏瑜豪,张玉清.基于Fuzzing的MP3播放软件漏洞发掘技术[J].计算机工程,2007,33(24):158-160. 被引量:28
  • 10胡毅,于东,刘明烈.工业控制网络的研究现状及发展趋势[J].计算机科学,2010,37(1):23-27. 被引量:44

共引文献154

同被引文献209

引证文献19

二级引证文献146

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部