期刊文献+

基于数据驱动的工业信息安全防护 被引量:2

Data driven industrial control system cyber security
下载PDF
导出
摘要 传统信息安全防御体系强调网络边界和主机防护,但随着云计算、大数据、人工智能等新技术在工业控制领域中的融合应用,利用传统手段进行有效防御变得越来越困难,传统理念、传统技术已经无法应对越来越严重的工业信息安全威胁。需要利用大数据、威胁情报等新型技术来保护工业企业安全运营。 Traditional cyber security emphasize boundary and node protection,but with the convergence of new technologies such as cloud computing,big data,and artificial intelligence in industrial automation,the validity of traditional methodology becomes more and more poor. Traditional technology has been unable to cope with ICS cyber security risk. New technologies such as big data and threat intelligence are introduced to protect industrial cyber security.
作者 王弢 崔君荣 Wang Tao, Cui Junrong(360 Enterprise Security Group, Beijing 100015,Chin)
机构地区 [
出处 《信息技术与网络安全》 2018年第6期3-5,共3页 Information Technology and Network Security
关键词 数据驱动 工业信息安全 威胁情报 data driven industrial control system cyber security threat intelligence
  • 相关文献

参考文献1

二级参考文献14

  • 1北京神州绿盟信息安全科技股份有限公司.2013工业控制系统及其安全性研究报告[EB/OL].http://www.nsfocus.corn/report/NSFOCUS_lCS_Security_Report 20130624.pdf, 2014-10-10.
  • 2ICS-CERT. ICS-CERT Monitor October/November/December 2012 [ EB / O L ] .h ttps : / / ics- cert.us-cert.gov / sites/ default/ fil es/ I CS- CERT_Monthly_Monitor Oct-Dec2012_2.pdf, 20 14-1 0- 10.
  • 3ICS-CERT. ICS-CERT Monitor April/May/June 2013[EB/OL]. https://ics-cert.us-cert.gov/sites/default/files/ICS-CERT_Monitor_ April-June2013.pdt, 2014-10- I0.
  • 4Michael Robinson. The SCADA threat landscapeIC]//Proceedings of 1st International Symposium for ICS & SCADA Cyber Security Research, 2013:33-41.
  • 5Yasakethu S.L.P., Jiang J. Intrusion detection via machine learning for SCADA system protection[C]//Proceedings of 1st International Symposium for ICS & SCADA Cyber Security Research, 2013:1111-105.
  • 6Provos N. A virtual honeypot framework[C]//Proceedings of the 13th Conference on USENIX Security Symposium, 2004:1-14.
  • 7Paul Baecher, Markus Koetter, Thorsten Holz, et al. The Nepenthes platform: An efficient approach to collect malware[C[//Proceedings of 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006), 2006:165-184.
  • 8Nepenthes Development Team. Dionaea[EB/OL]. http://dionaea. carnivore.it/, 2011-05-15.
  • 9Kieran McLaughlin, Sakir Sezer, Paul Smith, et al. PRECYSE: Cyber-attack detection and response for industrial control systems[C]// Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research, 2014:67-71.
  • 10Laurens Lemaire, Jorn Lapon, Bart De Decker, et al. A SysML extension for security analysis of industrial control systems[C]//Proceedings of the 2nd International Symposium for ICS & SCADA Cyber Security Research, 2014: 1-9.

共引文献54

同被引文献5

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部