期刊文献+

工业SCADA系统网络的安全服务框架研究 被引量:23

Information Security Service Frame of Industrial SCADA System
原文传递
导出
摘要 工业SCADA系统网络是当前自动化技术领域的热门技术,在重要工业过程中得到了广泛的应用。但工业控制网络的安全性是伴随其普遍应用而客观存在的,近年来,工业控制网络的安全问题已经越来越引起业界的重视。在研究了工业SCADA系统网络面临的安全问题,分析了现有工业控制网络安全产品及方案的能力与不足后,提出了一种工业SCADA系统网络的安全服务框架。 The industrial SCADA(Supervisory Control and Data Acquisition) system is a trend in the domain of auto-matic control technology,which has been widely used in some important industrial process.However,the security prob-lem of the industrial SCADA and system objectively exists in its deployment.Recent years,the information security problem of industrial control network has attracted much attention from the people.This article discusses in detail the information security of industrial SCADA the ability and deficiency of industrial network security products.Finally,a new information security service frame of industrial SCADA system is proposed.
出处 《信息安全与通信保密》 2010年第3期47-49,共3页 Information Security and Communications Privacy
关键词 SCADA系统 实时工业控制 安全威胁 安全服务框架 SCADA system real-time industrial control security threat information security service frame
作者简介 兰昆.1979年生,男,工程师,研究方向:电力网络系统及其信息安全技术; 饶志宏,1970年生,男,研究员,研究方向:通信网络及信息网络安全技术; 唐林.1978年生,男,高级工程师,研究方向:通信网络及信息网络安全技术; 康荣保.1981年生,男,工程师,研究方向:信息网络安全技术研究。
  • 相关文献

参考文献5

  • 1阳宪惠 徐用懋 魏庆福.现场总线技术及其应用[M].北京:清华大学出版社,2002.309-346.
  • 2Honeywell Inc.Securing Process Control Network External Communication[EB/OL].[2009-10-14].http://www.isd.mel.nist.gov/Projects/processcontrol/Honeywell_DMZ.pdf.
  • 3夏继强,邢春香,耿春明,满庆丰.工业现场总线技术的新进展[J].北京航空航天大学学报,2004,30(4):358-362. 被引量:18
  • 4NIST.System Protection Profile-Industrial Control System.Version 1.0[EB/OL].[2009-05-14].http://www.isd.mel.niSt.gov/Projects/processcontrol/SPP-ICSv1.0.pdf.
  • 5李鹏,王绍棣,王汝传.网络主动攻击技术研究与实现[J].信息安全与通信保密,2007,29(3):113-115. 被引量:5

二级参考文献21

  • 1[1]Allen William H,Marin Gerald A.MAGNA.modeling and generating network attacks[A].Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks(LCN'04)[C].Florida,2004:423-424.
  • 2[2]Kim H,Kang I,Bahk S.Real-time visualization of network attacks on high-speed links[J].IEEE Network,2004,18(5):30-39.
  • 3[3]McClure S,Scambray J,Kurtz G.Hacking Exposed:Network Security Secrets and Solutions[M].Fourth Edition.McGraw-Hill Osborne Media,2003:533-556.
  • 4[4]管海明,陈爱民.计算机网络对抗的四个层次[EB/OL].http://www.pcworld.cn/99/9934/3437d.asp.
  • 5[5]Cowan C,Wagle P,Pu C.et al.Buffer overflows:Attacks and defenses for the vulnerability of the decade[A].Proceedings of the Foundations of Intrusion Tolerant Systems(OASIS'03)[C],2003:227-237.
  • 6Buhler D, Kuchlin W. Remote fieldbus system management with Java and XML[J]. IEEE International Symposium on Industrial Electronics,2000,1:1 - 6
  • 7Wollschlaeger M, Neumann P, Bangemann T. Web services for remote maintenance of fieldbus based automation systems [ J ]. IEEE Africon Conference, 2002,1: 247 - 252
  • 8Lee K C, Lee S. Integrated network of Profibus-DP and IEEE 802.11 wireless LAN with hard real-time requirement[ J]. IEEE International Symposium on Industrial Electronics, 2001,3:1484 - 1489
  • 9Lee K C, Lee S. Performance evaluation of switched ethernet for real-time industrial communications[J]. Computer Standards & Interfaces,2002,24(5) :411 - 423
  • 10Jurgen J, Peter N. Switched ethernet for factory communication[ J ].IEEE Symposium on Emerging Technologies and Factory Automation ,2001,1:205 - 212

共引文献89

同被引文献112

引证文献23

二级引证文献146

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部