期刊文献+

工控系统安全监测及溯源系统的设计与实现 被引量:5

Design and implementation of industrial control security monitoring and traceability system
下载PDF
导出
摘要 随着工控系统和互联网的交叉融合与边界模糊,边界部署的安全设备无法进行有效防护。已有的安全检测平台和系统,对工控系统安全事件的理解和整合能力不足。在深入理解工控系统的工业属性以及安全需求的基础上,结合深度数据包检测、网络威胁情报感知、协议解析及数据挖掘等人工智能方法,设计工控网络安全监测分析及溯源系统,实现数据驱动的工业互联网态势感知、检测预警、攻击溯源及反制,有效提升工控系统的安全实时检测、感知预警与防护水平。 With the continuous integration of industrial networks and the Internet,the network boundary is blurred,and the security equipment deployed at the boundary can not be effectively protected. Existing security detection platforms and systems have insufficient ability to understand and integrate safety events in Industrial Control Systems( ICS). On the basis of understanding of industrial attributes and security requirements,this paper designs an ICS security monitoring and traceability system,which combines artificial intelligence methods such as deep packet detection,network threat intelligence perception,protocol analysis,data mining and machine learning,to realize situational awareness,detection and early warning,attack traceability and countermeasure by data-driven industry. It can effectively enhance the security protection of ICS.
作者 张玫 曾彬 朱成威 Zhang Mei;Zeng Bin;Zhu Chengwei(Central South University of Forestry and Technology,Changsha 410080,China;Hunan YouDao Information Technology Co.,Ltd.,Changsha 410080,China;Institute of Deep-sea Science and Engineering,Chinese Academy of Sciences,Sanya 572000,China)
出处 《信息技术与网络安全》 2019年第1期14-19,共6页 Information Technology and Network Security
基金 湖南省教育厅一般项目(17C1651) 校青年基金项目(QJ2012008B)
关键词 工业控制系统 安全监测 深度数据包检测 攻击溯源 industrial control systems security monitoring deep packet inspection attack traceability
  • 相关文献

参考文献11

二级参考文献214

  • 1周东华,孙优贤,席裕庚,张钟俊.一类非线性系统参数偏差型故障的实时检测与诊断[J].自动化学报,1993,19(2):184-189. 被引量:26
  • 2李渭华,萧德云,方崇智.一种基于自适应滑动窗格形滤波算法的故障检测器[J].自动化学报,1996,22(2):251-253. 被引量:7
  • 3乔加新.基于MTS/COM+的OPC安全机制研究[J].计算机技术与发展,2007,17(6):151-154. 被引量:2
  • 4LAKHINA A, CROVELLA M, DIOT C. Diagnosing network-wide traffic anomalies [C]// Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications. New York, USA: ACM, 2004: 219-230. 被引量:1
  • 5LAKHINA A, CROVELLA M, DIOT C. Character- ization of network-wide anomalies in traffic flows [C] //Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference. New York, USA. ACM, 2004 : 201-206. 被引量:1
  • 6LAKHINA A, CROVELLA M, DIOT C. Mining anomalies using traffic feature distributions [J]. Computer Communication Review, 2005, 35(4) : 217-228. 被引量:1
  • 7RUBINSTEIN B, NELSON B, HUANG L, et al. Compromising PCA-based anomaly detectors for network-wide traffic, UCB/EECS-2008-73 [R]. Berkeley, USA: UCB, 2009. 被引量:1
  • 8CHATZIGIANNAKIS V, PAPAVASSILIOU S, ANDROULIDAKIS G. Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (Ma L) PCA-based approach[J]. Security and Communication Networks, 2009, 2(3): 289-304. 被引量:1
  • 9BRAUCKHOFFD, SALAMATIAN K, MAY M. Applying PCA for traffic anomaly detection: problems and solutions [C]// Proceedings of IEEE INFOCOM 2009. Piscataway, NJ, USA: IEEE, 2009: 2866- 2870. 被引量:1
  • 10ZAIDI Z, HAKAMI S, MOORS T, et al. Detection and identification of anomalies in wireless mesh networks using principal component analysis [J]. Journal of Interconnection Networks, 2009, 10(4): 517-534. 被引量:1

共引文献399

同被引文献25

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部