期刊文献+

工业控制系统信息安全实验平台设计 被引量:2

Design of Information Security Experiment Platform of Industrial Control System
下载PDF
导出
摘要 为更好地开展工业控制系统信息安全研究,设计了一种工业控制系统信息安全实验平台。包括攻击端、防护模块、防护规则配置端、监控端和控制器等硬件模块的工业控制系统信息安全平台拓扑架构,以及拒绝服务攻击和伪造数据包攻击与防护的整个过程;设计了信息安全平台的软件框架,并以Modbus/TCP协议为例进行了深度包解析设计。最终,通过实验和测试,验证了设计的工业控制系统信息安全实验平台的性能。 According to the requirements of information security of the industrial control system, we designed an experiment platform based on Modbus/TCP communication protocol. This paper introduces the experimental environment and topology of the information security platform, which includes the complete progress of attacking and protecting and hardware modules such as the attack end, protection module, rule configuration module, monitoring module and controller. We designed the software framework of the platform, which is divided to deep packet analysis of application layer and access control of the deep packet analysis. Here, the application layer includes the function code of the Modbus/TCP protocol, the length of application layer data, coil address, port number and protocol ID. The combination of software and hardware forms the protection module of the information security experiment platform of industrial control system. The protection performance of the platform is proven through practical demonstration.
出处 《实验室研究与探索》 CAS 北大核心 2016年第12期118-121,共4页 Research and Exploration In Laboratory
基金 四川省科技支撑计划项目(2015GZ0105)
关键词 MODBUS/TCP 防护模块 访问控制 Modbus/TCP protection module access control
  • 相关文献

参考文献8

二级参考文献172

  • 1蔡锋,张岑,李代甜.SCADA系统在石油管线中的应用[J].石油化工自动化,2007,43(2):58-59. 被引量:11
  • 2方兰,王春雷,赵刚.SCADA系统结构特点及其脆弱性分析[C].全国抗恶劣环境计算机第十七届学术年会论文集,2007.
  • 3Joe St Sauver. SCADA Security and Critical Infrastructure[C]. Oregon Infraguard Meeting 2004.
  • 4高国辉.西门子被曝工业系统漏洞或影响多数工业化国家[N].南方日报.2011-6-8.
  • 5P.A.S. Ralston et al. Cyber security risk assessment for SCADA and DCS networks[C]. ISA Transactions 46 (2007): 583-594.
  • 6NIST SP800-82.Guide to Industrial Control Systems(ICS)Security[S].Gaithersburg,USA:National Institute of Standards and Technology(NIST),2011.
  • 7Simon H A.The architecture of complexity[C] //Proceedings of the American Philosophical Society.Philadelphia,USA:Batsford,1962:467-482.
  • 8Bishop M.Computer Security[M].Boston,USA:Addison Wesley,2003.
  • 9Department of Homeland Security(DHS).Cyber Security Assessments of Industrial Control System[S].Washington DC,USA:Department of Homeland Security(DHS),2010.
  • 10The European Network and Information Security Agency(ENISA).Protecting Industrial Control Systems,Recommendations for Europe and Member States[R].Heraklion,Greece:Recommendations for Europe and Member States,2011.

共引文献398

同被引文献27

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部