...
首页> 外文期刊>Journal of web engineering >Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis
【24h】

Enhance the ICS Network Security Using the Whitelist-based Network Monitoring Through Protocol Analysis

机译:通过协议分析使用基于白名单的网络监控增强ICS网络安全性

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

In our present technological age, most manual and semi-automated tasks are being automated for efficient productivity or convenience. In particular, industrial sites are rapidly being automated to increase productivity and improve work efficiency. However, while networks are increasingly deployed as an integral part of the automation of industrial processes, there are also many resultant dangers such as security threats, malfunctions, and interruption of industrial processes. In particular, while the security of business networks is reinforced and their information is not easily accessible, intruders are now targeting industrial networks whose security is relatively poor, wherein attacks could directly lead to physical damage. Therefore, numerous studies have been conducted to counter security threats through network traffic monitoring, and to minimize physical loss through the detection of malfunctions. In the case of industrial processes, such as in nuclear facilities and petroleum facilities, thorough monitoring is required as security issues can lead to significant danger to humans and damage to property. Most network traffic in industrial facilities uses proprietary protocols for efficient data transmission, and these protocols are kept confidential because of intellectual property and security reasons. Protocol reverse engineering is a preparatory step to monitor network traffic and achieve more accurate traffic analysis. The field extraction method proposed in this study is a method for identifying the structure of proprietary protocols used in industrial sites. From the extracted fields, the structure of commands and protocols used in the industrial environment can be derived. To evaluate the feasibility of the proposed concept, an experiment was conducted using the Modbus/TCP protocol and Ethernet/IP protocol used in actual industrial sites, and an additional experiment was conducted to examine the results of the analysis of conventional protocols using the file transfer protocol.
机译:在我们目前的技术时代,大多数手动和半自动任务是为了高效的生产率或便利性自动化。特别是,工业部位正在迅速自动化,以提高生产率并提高工作效率。然而,虽然网络越来越多地部署为工业过程自动化的组成部分,但也有许多产生的危险,例如安全威胁,故障和工业过程中断。特别是,虽然增强了业务网络的安全性,但他们的信息不容易访问,但入侵者现在定位其安全性相对较差的工业网络,其中攻击可能直接导致物理损坏。因此,已经进行了众多研究以通过网络流量监测对抗安全威胁,并通过检测故障来最大限度地减少物理损失。在工业过程的情况下,例如核设施和石油设施,作为安全问题可能导致对人类和财产损害的危险,需要彻底的监测。工业设施中大多数网络流量使用专有的有效数据传输协议,并且由于知识产权和安全原因,这些协议保密。协议逆向工程是监控网络流量并实现更准确的流量分析的准备步骤。本研究中提出的现场提取方法是用于识别工业部位中使用的专有协议结构的方法。从提取的字段中,可以导出工业环境中使用的命令和协议的结构。为了评估所提出的概念的可行性,使用实际工业站点中使用的Modbus / TCP协议和以太网/ IP协议进行实验,并进行了另外的实验,以检查使用文件传输分析传统协议的结果协议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号