期刊文献+

工业控制系统中PLC面临的网络空间安全威胁 被引量:9

The PLC of Industrial Control System Facing Security Threats from Cyberspace
下载PDF
导出
摘要 可编程逻辑控制器(PLC)出现以来,在工业自动控制方面得到广泛应用。随着工业化和信息化的进一步深入融合,物联网、智能硬件的出现,越来越多的PLC暴露在互联网中。由于PLC最初是为自动化控制而开发,在安全性方面几乎没有考虑,造成在网PLC极易遭受到攻击,并造成对真实物理设备的实质性损坏。文章模拟还原了一种新型针对PLC攻击的过程——攻击者可以通过网络入侵工具入侵PLC,拥有PLC访问权限后,可上传下载代码,将PLC变成网关,通过工业控制系统作为跳板来攻击企业工业控制系统和企业业务网络。这种攻击的潜伏过程时间长,在攻击达到实际破坏前很难被发现和中止。文章通过对该攻击过程的分析,为PLC的安全评估和防护提供了借鉴和技术支撑。 Since invented, Programmable Logic Controner(PLC) is widely used in Industrial Control Systems(ICS).With the gradual fusion o f industrialization and informationization,more technology like smart hardware & the Internet of Things IoT was used in ICS, and more PLCs exposed on the Internet.For originally only for automation control without considering security, PLC was attacked by hacker have occurred sometimes,and caused substantial damage to real physical device. The paper simulated the reduction process of a new type attack on PLC. Hackers use tools to invade PLC. PLCs Which can be uploaded and downloaded code turn into the gateway. Then they use PLC as tools to access other ICS and information systems. Malicious code is long latent period and hard to moniter.It is hard to stop when the attack occurred. The paper provides the attack process for the analysis and research, and provide reference for the research of the PLC and ICS safety.
出处 《信息网络安全》 2016年第9期228-233,共6页 Netinfo Security
关键词 PLC 工业控制系统 网络攻击 PLC ICS cyberspace attack
  • 相关文献

参考文献12

二级参考文献78

  • 1方凯彬,闫巍.移动互联网应用代码安全测试方法的使用[J].中国检验检疫,2013(11):31-32. 被引量:2
  • 2张仕斌,何大可.Fuzzy Model for Trust Evaluation[J].Journal of Southwest Jiaotong University(English Edition),2006,14(1):23-28. 被引量:7
  • 3曾明 李建军.Internet访问管理与代理服务器[M].北京:人民邮电出版社,1999.3-6. 被引量:4
  • 4刘素丽 李彤红.Internet编程[M].北京:电子工业出版社,1995.132-178. 被引量:2
  • 5Siemens.SIMATIC S7-200可编程序控制器系统手册.E20001-H5540-C400-V2-5D00,2002-04. 被引量:1
  • 6D E Denning. An intrusion detection model. IEEE Trans on Software Engineering, 1987, 13(2): 222~232 被引量:1
  • 7N Ye. A Markov chain model of temporal behavior for anomal detection. The 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000 被引量:1
  • 8S Jha, K Tan, R Maxion. Markov chains, classifiers, and intrusion detection A. Computer Security Foundations Workshop, the 14th IEEE, Cape Breton, Novia Scotia, Canada, 2001 被引量:1
  • 9E Eskin, L Wenke, S J Stolfo. Modeling system calls for intrusion detection with dynamic window sizes. DARPA Information Survivability Conf & Exposition Ⅱ, Anaheim, California, 2001 被引量:1
  • 10C Warrender, S Forrest, B Pearlmutter. Detecting intrusion using system calls: Alternative data models. In: Proc of the 1999 IEEE Symposium on Security and Privacy. Oakland, California: IEEE Computer Society, 1999. 133~145 被引量:1

共引文献149

同被引文献52

引证文献9

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部