期刊文献+

城市燃气工控系统安全风险问题梳理与安全防护实践

The Safety Protection Practice and Risk in City Gas Industrial Control System
下载PDF
导出
摘要 本文介绍了重庆燃气集团股份有限公司(以下简称重庆燃气集团)工业控制系统信息安全的现状及面临的安全风险问题。按照重庆燃气集团工业控制系统信息安全等级保护三级的定位,基于纵深综合防御理念,结合重庆燃气集团工业控制系统的现状及特点,提出了一种工控信息安全解决方案,并对方案的实施进行了论述。实际运行效果表明:该方案能够保障工控系统的信息安全,同时为工控系统信息安全问题的研究提供了思路,对其他城市燃气企业工控信息安全建设具有一定的参考和指导意义。 This paper introduces the current situation of information security of industrial control system of Chongqing Gas Group Co., Ltd.(hereinafter referred to as Chongqing Gas Group) and the security risks it faces. According to the three-level positioning of information security grade protection of industrial control system of Chongqing Gas Group, based on the concept of comprehensive defense in depth, combined with the current situation and characteristics of industrial control system of Chongqing Gas Group, an industrial control information security solution is proposed, and the implementation of the scheme is discussed. The actual operation results show that the scheme can guarantee the information security of industrial control system, and provide ideas for the research of information security of industrial control system. It has certain reference and guiding significance for the construction of industrial control information security of other urban gas enterprises.
作者 刘彧晋 李璇 Liu Yujin;Li Xuan
出处 《城市燃气》 2019年第4期20-23,共4页 Urban Gas
关键词 工业控制系统 信息安全 纵深综合防御 功能码 深度检测 industrial control system infbrmation security comprehensive defense in depth function code depth detection
  • 相关文献

参考文献2

二级参考文献29

  • 1段冲,梁建青,段绍明,王睿.SCADA系统在西气东输管道中的应用[J].石油工程建设,2007,33(4):5-7. 被引量:13
  • 2Peng Y, Jiang C Q, Xie F, et al. Industrial control system cybersecurity research[J]. Journal of Tsinghua University: Science and Technolo- gy, 2012, 52(4) : 1396 - 1408.
  • 3Kang D H, Kim B K, Na J C. Cyber threats and defence approaches in SCADA systems[ C]//2014 16th International Conference on Ad- vanced Communication Technology (ICACT). Piscataway, NJ, USA : IEEE, 2014 : 324 - 327.
  • 4Knijff R M. Control system/SCADA forensics, what's the d fference? [J]. Digital Investigation, 2014, II (3) : 160 -174.
  • 5Industrial Control Systems Cyber Emergency Response Team. ICS-CERT year in review[ EB/OL]. (201d -02 -24) [ 2015 -03 -011. https: // ics-cert, us-cert, gov/sites/default/files/documents/Year In Review_FY2013_Final. pdf.
  • 6Modbus-IDA. Modbus messaging on TCP/IP implementation guide vl.0a[ EB/OL]. (2004 -06 -04) [2015 -03 -01 ]. http: //www. mod- bus. org/docs/Modbus_Messaging_lmplementation_Guide V1 0a. pdf.
  • 7Goldenberg N, Wool A. Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems[ J ]. International Journal of Critical Infrastructure Protection, 2013, 6 (2): 63- 75.
  • 8Kobayashi T H, Batista A B, Brito A M, et al. Using a packet manipulation tool for security analysis of industrial network protocols [ C ]// IEEE Conference on Emerging Technologies and Factory Automation. Piscataway, NJ, USA : IEEE, 2007 : 744 - 747.
  • 9NSFOCUS. Industry control system security report [ EB/OL 1. ( 2013 - 06 - 24 ) [ 2015 - 03 - 02 ]. http : //www. nsfocus, com. cn/report/NS- FOCUS ICS Security_Report_20130624. pdf.
  • 10Huitsing P, Chandia R, Papa M, et al. Attack taxonomies for the Modbus protocols[ J]. International Journal of Critical Infrastructure Protec- tion, 2008(1): 37-44.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部