期刊文献+

入侵检测技术在工业互联网安全领域的应用研究 被引量:2

Research on Application of Intrusion Detection Technology in Field of Industrial Internet Security
下载PDF
导出
摘要 近年来,工业互联网安全问题层出不穷。虽然传统的防护安全机制已经应用到工业互联网各领域,但对于监视控制系统底层的进程及活动的机制研究仍有所欠缺。基于以上现状,提出了一种基于奇异值分解的针对信号采集端的检测技术。从工作原理和检测过程的角度,分析了其所提出的检测技术与传统入侵检测方法的区别;通过分析工业控制系统的数据回放结果,验证了入侵的有效性。底层网络的检测方法与上层网络其他安全设备和安全策略的共同防护机制,能够有效提高工业互联网系统安全防护技术。 In recent years,industrial Internet security problems have emerged.Although traditional protective security mechanisms have been applied to various areas of the industrial Internet,research on mechanisms for monitoring process and activities at the bottom of control systems is still lacking.Based on the above status quo,a detection technique based on singular value decomposition for the signal acquisition side is proposed.The differences between the proposed detection technique and traditional intrusion detection methods are analyzed from the perspective of the working principle and detection process,and the effectiveness of the intrusion is verified by analyzing the data playback results of the industrial control system.The detection method of the underlying network and the common protection mechanism of other security devices and security policies of the upper network can effectively improve the security protection technology of the industrial Internet system.
作者 孙逊 SUN Xun(INESA(Group)Co.,Ltd.,Shanghai 200233,China)
出处 《自动化仪表》 CAS 2022年第10期73-75,80,共4页 Process Automation Instrumentation
关键词 工业互联网 工控系统 入侵检测 网络安全 奇异值分解 等级保护 关键基础设施 安全策略 Industrial internet Industrial control system Intrusion detection Network security Singular value decomposition Hierarchical protection Critical infrastructure Security policy
  • 相关文献

参考文献5

二级参考文献39

  • 1缪学勤.20种类型现场总线进入IEC61158第四版国际标准[J].自动化仪表,2007,28(z1):25-29. 被引量:17
  • 2张静.图书馆用户数字资源利用行为实证研究[J].广东工业大学学报(社会科学版),2012,12(4):74-78. 被引量:5
  • 3丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 4麦永浩,袁翔珠等.信息安全法学教程[M].武昌:武汉大学出版社.2008.163-186.
  • 5CNCERT国家互联网应急中心.2010年中国互联网网络安全报告[EB/OL].http://www.cert.org.ch.2011-04-12/2011-07-13.
  • 6赛门铁克公司.赛门铁克第十六期互联网安全威胁报告[EB/OL.]http://www.symantec.com,2011-04-11/2011-07-13.
  • 7Loskutov A, Istomin I, Kotlyarov O, Data Analysis:Generalizations of the Local Approximation Method by Singular Spectrum Analysis, nlin. CD/0109022, 2001.
  • 8Broomhead D. S, King G. P, Extracting qualitative dynamics from experimental data, Physica D,1986,20:217-236,.
  • 9Nikias C. L, Mendel J, Signal processing with higher order spectra, IEEE Signal Processing Magazine,1993,10:10-37.
  • 10HughesJ R (马仁飞译).临床实用脑电图学[M].人民卫生出版社,1997..

共引文献61

同被引文献9

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部