首页> 外文会议>International Conference on Computer Science and its Applications;International Conference on Ubiquitous Information Technologies and Applications >Security Information and Event Management Model Based on Defense-in-Depth Strategy for Vital Digital Assets in Nuclear Facilities
【24h】

Security Information and Event Management Model Based on Defense-in-Depth Strategy for Vital Digital Assets in Nuclear Facilities

机译:基于核设施中重要数字资产的防御深度战略的安全信息与事件管理模式

获取原文

摘要

After striking event of Stuxnet in Iran, international society recognizes that sabotage using cyber attack on nuclear facilities is no longer a hypothetical. The International Atomic Energy Agency, the IAEA, and the US nuclear facility regulatory authority recommends that nuclear licensees establish security measures to prevent/detect/response the cyber attack. Moreover, storing logs at the system to trace and support the incident investigation and analysis by their guidelines. In particular, since vital digital assets (VDA) to prevent and mitigate severe accidents in nuclear facilities, that possibly be direct targets for sabotage. Therefore, security measures for cyber attack detection and log collection are essential. SIEM is typical attack detection model through security information and log management, and various solutions are already used in many IT industries. But VDAs are difficult to purchase and implement commercial log collection and detection solutions. Because industrial control systems which used in VDAs are develop specifically for nuclear facilities, designed and performing safety and safety related functions. And nuclear facilities are necessary to meet safety and security requirements such as defense-in-depth strategy and boundary protection system to licensees designing SIEN network to implement central monitoring method. So we proposed DID-SIEM that is a security information and event management model based on defense-in-depth strategy.DID-SIEM is SIEM model that incorporates the design requirements to meet both the cyber security guidelines and operational constraints of nuclear facilities.
机译:在伊朗的斯法斯特人罢工事件之后,国际社会认识到使用网络攻击对核设施的破坏不再是假设的。国际原子能机构,国际原子能机构和美国核设施监管机构建议核许可证建立安全措施,以防止/检测/响应网络攻击。此外,在系统上存储日志以跟踪并支持其指南的事件调查和分析。特别是,由于重要的数字资产(VDA)预防和减轻核设施中的严重事故,可能是破坏的直接目标。因此,网络攻击检测和日志集合的安全措施至关重要。 Siem是通过安全信息和日志管理的典型攻击检测模型,并且在许多IT行业中已经使用了各种解决方案。但VDA很难购买和实施商业日志收集和检测解决方案。因为VDA中使用的工业控制系统专门用于核设施,设计和执行安全和安全相关功能。核设施是满足安全和安全要求,如防御深度战略和边界保护系统,以实现SIEN网络以实施中央监测方法。因此,我们提出了基于防御深度战略的安全信息和事件管理模型.DID-SIEM是暹粒模型,包括满足网络安全准则和核设施运行限制的设计要求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号