期刊文献+

第五十四讲 面向工业嵌入式设备的可信安全防护体系 被引量:3

Chapter 54:Trusted Security Defense Architecture for Industrial Embedded Device
下载PDF
导出
摘要 针对目前工业控制系统所面临的愈演愈烈的信息安全问题,本文提出了一种面向工业嵌入式设备的可信安全防护体系。首先分析了工业嵌入式设备的信息安全脆弱性,以及现有安全防护方法的不足,然后介绍了面向嵌入式设备的可信安全防护技术架构,包括高实时可信计算技术、程序级虚拟化隔离技术、工业通信访问控制技术以及多融合联动响应模型。该防护体系为工业嵌入式设备构建了可信安全的运行环境,保障工业控制系统的安全稳定运行。 In order to resolve the increasing information security issues in today's industrial control system, this paper presents a trusted security defense architecture for industrial embedded device. Furthermore, this paper first analyzes the vulnerabilities of the existing industrial embedded device, and discusses the disadvantages of the traditional security defense methods. In particular, this paper introduces the trusted security defense technologies for industrial embedded device in detail, including the high real-time trusted computing technology, application-level virtualization isolation technology, communication control technology and multi-function coordination and response model. Above all, this defense architecture not only builds a trusted operating environment, but also improves the security of today's industrial control system.
出处 《仪器仪表标准化与计量》 2015年第6期18-21,共4页 Instrument Standardization & Metrology
基金 国家863高技术研究发展计划(No.2015AA043901)
关键词 工业嵌入式设备 信息安全 可信计算 访问控制 Industrial Embedded Device Information Security Trusted Computing Communication Control
  • 相关文献

参考文献12

  • 1B. Genge, C. Siaterlis, I. N. Fovino, et al.A cyber-physical experimentation environment for the security analysis of networked industrial control systems. Computer and Electrical Engineering[J]. 2012, 38(5):1146-1161.
  • 2李鸿培,忽朝俭,王晓鹏.2014工业控制系统的安全研究与实践[J].计算机安全,2014(5):36-59. 被引量:26
  • 3ICS-CERT. ICS-CERT Year in review 2013. https://ics-cert.us-cert.gov/sites/default/files/documents/ Year In Review_FY2013_Final.pdf, Feb. 2014.
  • 4N. A. S. Mirza, H. Abbas, F. A. Khan, et al. Anticipating advanced persistent threat (APT) countermeasures using collaborative security mechanisms. Proceedings of 2014 International Symposium on Biometrics and Security Technologies (ISBAST)[C].Kuala Lumpur, Malaysia, Aug. 2014, pp.129-132.
  • 5工业和信息化部.关于加强工业控制系统信息安全管理的通知.http://www.miit.gov.cn/n11293472/n11293832/n12843926/n13917012/14294613.html.0ct.2011.
  • 6K. Stouffer, J. Falco, and K. Scarfone. Guide to industrial control systems (ics) security, http://csrc.nist. gov/publications/nistpubs/800-82/SP800-82-final.pdf, Jun. 2011.
  • 7D. Beresford. Exploiting siemenssimatic $7 PLCs. https://media.blackhat.com/bh-us- 11/Beresford/ BH US11 Beresford $7 PLCs WP.pdf, Aug. 2011.
  • 8张盛山,尚文利,万明,张华良,曾鹏.基于区域/边界规则的Modbus TCP通讯安全防御模型[J].计算机工程与设计,2014,35(11):3701-3707. 被引量:19
  • 9B. Zhu, S. Sastry. SCADA-specific intrusion detection/prevention systems: a survey and taxonomy. Proceedings of the First Workshop on Secure Control Systems (SCS' 10)[C]. Stockholm, Sweden, Apr. 2010.
  • 10P. A. S. Ralston, J. H. Graham, J. L. Hieb. Cyber security risk assessment for SCADA and DCS networks, ISA Transactions[J]. 2007, 46(4):583-594.

二级参考文献158

共引文献303

同被引文献30

引证文献3

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部