期刊文献+

基于国产商用密码和策略协同的工业网络纵深安全防护技术

Industrial Network Deep Security Protection Technology Based on Domestic Commercial Cryptography and Strategy Collaboration
下载PDF
导出
摘要 随着工业化与信息化的融合发展,工业控制网络面临的安全威胁日益增多,安全形势日益严峻。针对工控信息安全事件频发的现状,为防范相关安全风险,在研究工业网络结构与特点以及安全防护需求的基础上,设计了适用于不同场景、不同层次、不同设备,基于纵深防护和多策略协同的综合安全体系,并在典型行业工业网络中实现应用推进,形成了覆盖密码保障、多层防护、综合管控等多个维度的安全保障能力和整体解决方案。 With the integration and development of industrialization and information technology,security threats faced by industrial control networks are becoming more numerous,and the security situation is becoming increasingly severe.In view of the frequently occurred ICS information security incidents,in order to prevent related security risks,on the basis of researching the structure and characteristics of industrial networks, as well as the demand for security protection, this paper designs a comprehensivesecurity architecture based on deep protection and multi-strategy collaboration that can adapt to differentscenarios, different levels, and different devices, which is applied and promoted in typical industrialnetworks, forming a security guarantee capability and overall solution covering multiple dimensions suchas cryptography protection, multi-layer protection, and comprehensive control.
作者 刘波 赖军 李立 幸享宏 LIU Bo;LAI Jun;LI Li;XING Xianghong(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《信息安全与通信保密》 2023年第9期56-64,共9页 Information Security and Communications Privacy
关键词 工业网络 纵深防护 国产商用密码 策略协同 industrial network deep protection domestic commercial cryptography strategy collaboration
  • 相关文献

参考文献4

二级参考文献24

  • 1IC S - C E R T _M o n ito r_O ct - D e c2 0 1 3 . IC S - M M 201312 U S . [EB/OL] . [2013 - 12 - 18] h ttp :/ / i c s - cert, u s - cert, g o v /m o n ito rs/I C S - M M 2 0 1 3 1 2 .
  • 2斯托林斯. 密码编码学与网络安全: 原理与实践[M] . 北京:电子工业出版社,2 0 1 1 :1 5 6 - 2 1 3 .
  • 3L iu , D , N ing P . E fficien t distribution o f key chain com m itm ents forb ro adcast authentication in distribu ted sen sor networks [C] / /P roceedin gs o f the 10th A n nu al Network and D istributed SystemSecurity S y m p o siu m ,2 0 0 2 : 89 - 9 6 .
  • 4F alco J , G ilsin n J , Stouffer K . IT security for in du strial controlsystem s : requirem ents sp ecificatio n and perform ance testin g [C] / /N D IA H om elan d Security Sym posium & E x h ib itio n ,2 0 0 4 :1 1 7 - 1 2 9 .
  • 5D zung D , N aed ele M , H off T P , et al. Security for in du strialcom m unication system s [J] . P roceedin gs o f the I E E E ,2 0 0 5 , 9 3 ( 6 ) :4 7 - 5 0 .
  • 6Lamport L. Password authentication with insecure communication[J] .Communication of the A C M , 1 9 8 1 ,2 4 (1 1 ) :770 - 772.
  • 7彭杰,刘力.工业控制系统信息安全性分析[J].自动化仪表,2012,33(12):36-39. 被引量:22
  • 8兰昆,唐林,张晓.密码技术在工业控制系统中的应用研究[J].自动化仪表,2015,36(10):72-76. 被引量:7
  • 9孟雁.工业控制系统安全隐患分析及对策研究[J].保密科学技术,2013,0(4):16-21. 被引量:2
  • 10孙易安,胡仁豪.工业控制系统漏洞扫描与挖掘技术研究[J].网络空间安全,2017,8(1):75-77. 被引量:12

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部