期刊文献+

工业互联网的安全挑战及应对策略 被引量:20

Security Challenges and Countermeasures of the Industrial Internet
下载PDF
导出
摘要 从设备、网络、控制、应用、数据、人员等方面全面分析了工业互联网面临的挑战,提出了应对安全挑战的10项策略,并创新性地出了整体建议和指导日常安全运营的PC4R自适应防护框架。指出工业互联网应用企业、安全服务企业、监管部门,需要采取提出的应对措施,形成联动的机制,从体制改革、管理流程优化、人员意识培养、技术创新等方面着手,构建PC4R的自适应防御架构,共同打造安全的工业互联网。 In this paper, we analyze the chal enges faced by the industrial Internet, and put forward 10 strategies from the aspects of equipment, network, control, application, data, personnel and so on. The PC4R adaptive protection framework is also proposed in this paper, which guides the daily safety operation of the industrial Internet enterprise. The industrial Internet companies, security services companies, network regulators should take measures to form linkage mechanism, and construct the PC4R adaptive defense framework from the aspects of the system reform, management process optimization, personnel training, technological innovation and so on. In this way, the secure Internet industry can be built.
出处 《中兴通讯技术》 2016年第5期36-41,46,共7页 ZTE Technology Journal
关键词 工业互联网 安全挑战 应对策略 PC4R自适应防护框架 industrial Internet security chal enges strategies PC4R adaptive protection framework
  • 相关文献

参考文献1

二级参考文献17

  • 1Stouffer K, Falco J, Scarfone K. Guide to Industrial Control Systems (ICS) Security, NIST: special publication 800- 82 [R]. 2011. 被引量:1
  • 2Falliere N, Murchu L O, Chien E. W32. Stuxnet dossier, Symantec white paper [R]. 2010. 被引量:1
  • 3Bencsdth B, Pek G, Buttydn L, et al. Duqu: A Stuxnet-like malware found in the wild [R/OL]. (2011-10). http:// www. crysys, hu/publications/files/bencsathPBFllduqu, pdf. 被引量:1
  • 4sKyWlper Analysis Team. sKyWlper (a. k.a. Flame a. k. a. Flamer) : A complex malware for targeted attacks [R/OL]. (2012 05). http://www, crysys, hu/skywiper/skywiper, pdf. 被引量:1
  • 5Caselli M, Had?iosmanovi? D, Zambon E, et al. On the feasibility of device fingerprinting in industrial control systems [C]// 8th International Workshop on Critical Information Infrastructures Security, CRITIS. 2013:155 - 166. 被引量:1
  • 6Cheminod M, Durante L, Valenzano A. Review of security issues in industrial networks [J]. IEEE Transactions on Industrial Informatics, 2013, 9(1).. 277- 293. 被引量:1
  • 7Barbosa R R R, Sadre R, Pras A. A first look into SCADA network traffic [C]//Proceedings of 2012 IEEE Network Operations and Management Symposium, NOMS. 2012. 被引量:1
  • 8Pleijsier E. Towards anomaly detection in SCADA networks using connection patterns [C]// 18th Twente Student Conference on IT. 2013. 被引量:1
  • 9Crotti M, Dusi M, Gringoli F, et al. Traffic classification through simple statistical fingerprinting [J]. SIGCOMM Comput Commun Rev, 2007, 37(1) : 5 - 16. 被引量:1
  • 10Garitano I, Siaterlis C, Genge B, et al. A method to construct network traffic models for process control systems [C]// Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies and Factory Automation, ETFA. 2012. 被引量:1

共引文献18

同被引文献162

引证文献20

二级引证文献106

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部