期刊文献+

中美两国工控系统安全发展对比研究 被引量:1

Contrastive studies of Chinese and US development of Industrial Control System (ICS)
在线阅读 下载PDF
导出
摘要 随着科技的不断发展,工业化与网络化的不断融合,工业控制系统开始越来越多的采用标准、通用的通信协议和软硬件系统,并且以各种方式接入互联网,从而造成病毒、木马等网络安全威胁向工控领域迅速扩散,并已逐步威胁到国家安全。本文将就中美两国的工业控制系统安全发展现状进行对比分析研究,为我国未来的工控安全发展提供参考借鉴。 With the rapid development of science and technology and the continuous fusion of industrialization and informatization, industrial control systems (ICSs) are more and more adopting standard, universal communication protocols and software/hardware systems, and being connected to the Internet in various manners. It causes security threats (such as viruses and trojans) to spread promptly into the field of industrial control. Meanwhile, "it causes threats to national security. This paper presents the contrastive studies of Chinese and US development of ICSs cybersecurity, aiming to provide references for the future development of ICSs in China.
作者 金晶
出处 《国防科技》 2017年第4期109-116,共8页 National Defense Technology
关键词 工控系统 网络安全 关键基础设施 安全标准 管理 Industrial Control Systems (ICSs) cybersecurity critical infrastructure the standards of ICS security the management of ICS security
  • 相关文献

参考文献4

二级参考文献14

  • 1北京神州绿盟信息安全科技股份有限公司.2013工业控制系统及其安全性研究报告[EB/OL].http://www.nsfocus.corn/report/NSFOCUS_lCS_Security_Report 20130624.pdf, 2014-10-10.
  • 2ICS-CERT. ICS-CERT Monitor October/November/December 2012 [ EB / O L ] .h ttps : / / ics- cert.us-cert.gov / sites/ default/ fil es/ I CS- CERT_Monthly_Monitor Oct-Dec2012_2.pdf, 20 14-1 0- 10.
  • 3ICS-CERT. ICS-CERT Monitor April/May/June 2013[EB/OL]. https://ics-cert.us-cert.gov/sites/default/files/ICS-CERT_Monitor_ April-June2013.pdt, 2014-10- I0.
  • 4Michael Robinson. The SCADA threat landscapeIC]//Proceedings of 1st International Symposium for ICS & SCADA Cyber Security Research, 2013:33-41.
  • 5Yasakethu S.L.P., Jiang J. Intrusion detection via machine learning for SCADA system protection[C]//Proceedings of 1st International Symposium for ICS & SCADA Cyber Security Research, 2013:1111-105.
  • 6Provos N. A virtual honeypot framework[C]//Proceedings of the 13th Conference on USENIX Security Symposium, 2004:1-14.
  • 7Paul Baecher, Markus Koetter, Thorsten Holz, et al. The Nepenthes platform: An efficient approach to collect malware[C[//Proceedings of 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006), 2006:165-184.
  • 8Nepenthes Development Team. Dionaea[EB/OL]. http://dionaea. carnivore.it/, 2011-05-15.
  • 9Kieran McLaughlin, Sakir Sezer, Paul Smith, et al. PRECYSE: Cyber-attack detection and response for industrial control systems[C]// Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research, 2014:67-71.
  • 10Laurens Lemaire, Jorn Lapon, Bart De Decker, et al. A SysML extension for security analysis of industrial control systems[C]//Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research, 2014: 1-9.

共引文献82

同被引文献10

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部