期刊文献+

工业控制系统安全研究现状 被引量:3

The status of industry control system security
下载PDF
导出
摘要 首先介绍了近年来工业控制系统在国计民生上举足轻重的作用,在关键工控系统领域发生恶意攻击事件将对国家、社会和经济的繁荣稳定产生巨大的负面影响。接着介绍工业控制系统基础体系架构和安全现状,结合工业控制系统和传统信息系统的对比,得出工业控制系统与传统IT信息系统在安全领域上的区别与联系。最后根据工控系统目前面临的特殊情况,提出了针对工业控制系统加强威胁检测和安全防范措施的可行性建议。 This paper introduces the role ol the industrial control system,which plays an important role inthe people,s livelihood in the recent years. The malicious attacks in the key industrial control system willhave a huge impact on the prosperity and stability ol the state,socity and economy. T h e n,it presents basicframework and security status ol industrial control system,which gives out the difference and connectionin the security,combining comparison of industrial control system and traditional information system.Lastly,it points out a feasible proposal of strengthening threat monitoring and safety precautions.
作者 谷俊涛
出处 《信息技术》 2016年第7期135-137,共3页 Information Technology
关键词 工控系统 网络安全 威胁检测 industrial control system network safety threat monitoring
  • 相关文献

参考文献7

二级参考文献70

  • 1L. Atzori, A. lera, G. Morabito. The Intemet of Things: A Survey[J]. Computer Networks, 2010, 54(15): 2787-2805.
  • 2B. Guo, D. Zhang, Z. Wang. Living with Internet of Things: The Emergence of Embedded Intelligence. Proc[C]. of the 2011 IEEE International Conference on Cyber, Physical, and Social Computing, Dalian, China, 2011.
  • 3郭斌 於志文 张大庆 周兴社.机会物联-兼谈物联网的社会性.中国计算机学会通讯,2011,7(12):50-55.
  • 4D.R. Choffnes, F.E. Bustamante. An integrated mobility and traffic model for vehicular wireless networks. Proc[C]. of the 2nd ACM International Workshop on Vehicular Ad hoc Networks, 2005, pp. 69-78.
  • 5N. Eagle, et al. Inferring Social Network Structure using Mobile Phone Data[C]. Proceedings of the National Academy of Sciences (PNAS), 2007, 106(36):15274-15278.
  • 6B. Guo, Z. Yu, D, Zhang, X. Zhou. Opportunistic loT: Exploring the Social Side of the Intemet of Things[C]. The 16th IEEE IntemationalConference on Computer Supported Cooperative Work in Design (CSCWD 2012), Wuhan, China, 2012.
  • 7L. Lihen, Z. H. Kamal, A. Gupta. Opportunistic Networks: Research Challenges in Specializing the P2P Paradigm[C]. Proc. 3rd International Workshop on P2P Data Management, Security and Trust, 2006, pp. 722-726.
  • 8M. Conti, M. Kumar. Opportunities in Opportunistic Computing[J]. IEEE Computer, 2010, 43(01): 42-50.
  • 9J.S. Kong, B.A. Rezaei, N. Sarshar, V.P. Roychowdhury, P.O. Boykin, Collaborative spare filtering using e-mail networks[J]. IEEE Computer, 2006, 39(08): 67-73.
  • 10A. Kapadia, N. Tri , C. Cornelius, D. Peebles, D. Kotz. AnonySense: Opportunistic and Privacy-Preserving Context Collection[C]. Proc. of 6th International Conferenfce on Pervasive Computing, 2008, pp. 280-297.

共引文献155

同被引文献15

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部