期刊文献+

工业控制系统网络资产探测技术研究 被引量:3

Research on Network Asset Detection Technology of Industrial Control System
下载PDF
导出
摘要 工业控制系统的安全关系到国计民生,是国家安全的重要组成部分。随着物联网技术不断发展,工业控制系统网络已经深入到各行业,但由于设计的缺陷或安全手段的缺乏,工业控制系统相关资产极易受到黑客的攻击和利用。探测、知晓暴露在互联网环境下的工控资产是实现工业控制系统信息监测、发现安全漏洞和把握网络空间安全态势的重要步骤。本文介绍工业控制系统网络资产探测常用的探测方法,利用端口探测技术扫描目标主机上的端口,根据端口开放情况使用工控协议和通用协议的网络资产探测技术发现工控设备和收集资产信息。通过互联网实验,对探测结果数据进行全面分析,总结工业控制系统网络资产探测技术特点,并指出目前技术存在的问题,对未来的发展进行展望。 The security of the industrial control system is related to the national economy and people’s livelihood,and is an impor⁃tant part of national security.With the continuous development of the Internet of Things technology,the industrial control system network has penetrated into various industries.However,due to design defects or lack of security means,the relevant assets of the industrial control system are extremely vulnerable to hackers and exploits.Detecting and knowing the industrial control assets ex⁃posed to the Internet environment is an important step to realize the information monitoring of the industrial control system,find security loopholes and grasp the security situation of cyberspace.This paper introduces the commonly used detection methods for industrial control system network asset detection.The port detection technology is used to scan the ports on the target host,and then the industrial control protocol and general protocol network asset detection technology is used to discover industrial control equipment and collect asset information according to the port opening.Through the Internet experiment,the data of the detection results are comprehensively analyzed,the characteristics of the network asset detection technology of the industrial control system are summarized,the problems existing in the current technology are pointed out,and the future development is prospected.
作者 蒋星宇 徐锐 张若愚 张志勇 JIANG Xing-yu;XU Rui;ZHANG Ruo-yu;ZHANG Zhi-yong(Cyberspace Security Key Laboratory of Sichuan Province,Chengdu 610041,China;No.30 Institute of CETC,Chengdu 610041,China)
出处 《计算机与现代化》 2023年第2期89-95,共7页 Computer and Modernization
关键词 工业控制系统 网络资产探测 资产指纹 协议探测 industrial control system network asset detection asset fingerprint protocol detection
  • 相关文献

参考文献8

二级参考文献109

  • 1陈星,贾卓生.工业控制网络的信息安全威胁与脆弱性分析与研究[J].计算机科学,2012,39(S2):188-190. 被引量:29
  • 2洪宏,张玉清,胡予濮,戴祖锋.网络安全扫描技术研究[J].计算机工程,2004,30(10):54-56. 被引量:30
  • 3王轶骏,薛质,李建华.基于TCP/IP协议栈指纹辨识的远程操作系统探测[J].计算机工程,2004,30(18):7-9. 被引量:9
  • 4David Helan. Stuxnet: analysis,myths and realities [J].Actusecu 27,2010:14-23.
  • 5Amr Thabet.Stuxnet_Malware_Analysis_Paper[J].Freelancer Malware Researcher, 2010: 3-28.
  • 6Nicolas Falliere, Liam O Murchu, Eric Chien.W32.Stuxnet Dossier[R]. Symantec company, 2011.16-38.
  • 7Matrosov, Rodionov.StuxnetZUnder the Microscope 1.3[R]. ESET Company, 2010.24-65,.
  • 8Mark Russinovich. Analyzing a Stuxnet Infection with the Sysintemals Tool[EB/OL]. http://blogs.technet.com/b/markrussinovich/archive/2011 /03/30/3416253.aspx, 2010.
  • 9安天实验室对Stuxnet蠕虫攻击工业控制系统事件的综合报告[R].安全实验室,2010.4-11.
  • 10Fyodor.Remote OS detection via TCP/IP Stack FingerPrinting[EB/OL].http://www.insecure.org/nmap/nmap-fingerprinting-article.html.,1998-10-18.

共引文献145

同被引文献10

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部