首页> 外文会议>SPE Intelligent Energy International Conference and Exhibition >Intelligent Monitoring and Control: Essential Guidance for Critical Infrastructure Security
【24h】

Intelligent Monitoring and Control: Essential Guidance for Critical Infrastructure Security

机译:智能监控:关键基础设施安全的基本指导

获取原文

摘要

Energy companies recognize that they have become high-value targets and that their operations can be disrupted using only cyber means. Supervisory Control and Data Acquisition (SCADA) systems Distributed Control Systems (DCS), and Process Control Systems (PCS) are of specific interest to attackers as these operate critical infrastructure. Risk management is extremely difficult because every risk has a high cost attached and there are no reliable statistics to assess the likelihood of a risk occurring. The challenge is to understand an organization's risk profile and tailor its risk management strategy accordingly. Industrial networks facilitate the free flow of messages that can allow poison packets to transmit with potentially disastrous effect. For instance, Distributed Network Protocol (DNP3) Secure Authentication does not protect against implementation failures in the device that can be exploited through malformed packets, therefore making protocol-aware validation and restrictions essential. A comprehensive approach to restricting what can and does occur within an industrial control network will help effectively mitigate the systemic risks that are inherent within the industrial control environment. To comprehensively protect the critical infrastructure that powers civilian businesses and homes, the intelligent approach demands a secure-system design that controls and monitors all entities within the control system from users to vulnerability-prone endpoints and protocols. Not all attacks occur from external sources and so boundary protections such as data-diodes and firewalls are not enough. Such solutions, however, also must preserve operational efficiency to assure that the cure is not worse than the malware, in relation to operational efficiency.
机译:能源公司认识到他们已成为高价值目标,并且它们的运营可以仅使用网络手段中断。监控和数据采集(SCADA)系统分布式控制系统(DCS)和过程控制系统(PCS)对攻击者具有特定兴趣,因为这些攻击者是这些操作的关键基础架构。风险管理极为困难,因为每一个风险都有很高的成本,并且没有可靠的统计数据来评估风险发生的可能性。挑战是了解组织的风险概况,并相应地定制其风险管理战略。工业网络促进了可以允许毒药数据包传递潜在灾难性效果的自由信息。例如,分布式网络协议(DNP3)安全身份验证不会防止可以通过格式化数据包利用的设备中的实现故障,从而使协议感知验证和限制必不可少。限制可以在工业控制网络内部发生的综合方法将有助于有效地减轻工业控制环境中固有的系统风险。为了全面保护权力为平民企业和家庭提供权力的关键基础设施,智能方法要求控制和监控控制系统中的所有实体的安全系统设计,从用户到漏洞 - 易受易受伤害的端点和协议。并非所有攻击都发生在外部来源,因此数据二极管和防火墙等边界保护是不够的。然而,这种解决方案也必须保持运营效率,以确保治疗不如操作效率的恶意软件更糟糕。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号