CN108055261B - 工业网络安全系统部署方法及安全系统 - Google Patents
工业网络安全系统部署方法及安全系统 Download PDFInfo
- Publication number
- CN108055261B CN108055261B CN201711307207.3A CN201711307207A CN108055261B CN 108055261 B CN108055261 B CN 108055261B CN 201711307207 A CN201711307207 A CN 201711307207A CN 108055261 B CN108055261 B CN 108055261B
- Authority
- CN
- China
- Prior art keywords
- industrial
- safety
- network
- layer
- industrial control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711307207.3A CN108055261B (zh) | 2017-12-11 | 2017-12-11 | 工业网络安全系统部署方法及安全系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711307207.3A CN108055261B (zh) | 2017-12-11 | 2017-12-11 | 工业网络安全系统部署方法及安全系统 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108055261A CN108055261A (zh) | 2018-05-18 |
CN108055261B true CN108055261B (zh) | 2020-11-06 |
Family
ID=62123871
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711307207.3A Active CN108055261B (zh) | 2017-12-11 | 2017-12-11 | 工业网络安全系统部署方法及安全系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108055261B (zh) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109543301A (zh) * | 2018-11-22 | 2019-03-29 | 苏州健雄职业技术学院 | 一种基于工业控制的网络安全攻击原型建模方法 |
CN109495502B (zh) * | 2018-12-18 | 2021-06-01 | 北京威努特技术有限公司 | 一种工控网络安全健康指数评估方法和装置 |
CN111381567B (zh) * | 2018-12-27 | 2021-11-05 | 北京安控科技股份有限公司 | 一种用于工业控制系统的安全检测系统和方法 |
CN110135170A (zh) * | 2019-05-24 | 2019-08-16 | 武汉华电工研科技有限公司 | 一种工控信息安全评测方法 |
CN111343169B (zh) * | 2020-02-19 | 2022-02-11 | 中能融合智慧科技有限公司 | 一种工控环境下安全资源汇聚与情报共享的系统及方法 |
CN112291208A (zh) * | 2020-10-16 | 2021-01-29 | 兖州煤业股份有限公司 | 一种不同局域网之间数据安全共享的方法 |
CN112543123B (zh) * | 2020-12-17 | 2023-07-28 | 云南昆钢电子信息科技有限公司 | 工业自动控制系统安全防护及预警系统 |
CN112560061B (zh) * | 2020-12-18 | 2024-05-03 | 国家工业信息安全发展研究中心 | 工业互联网数据安全防护能力评估方法及设备部署方法 |
CN114338080B (zh) * | 2021-11-24 | 2024-05-28 | 华能核能技术研究院有限公司 | 核电仪控系统网络安全保护等级的确定方法、装置及设备 |
CN114157493A (zh) * | 2021-12-06 | 2022-03-08 | 中国船级社 | 一种工控系统网络安全仿真测试平台及计算机设备 |
CN114844953A (zh) * | 2022-05-12 | 2022-08-02 | 机械工业仪器仪表综合技术经济研究所 | 基于工业互联网的石化装置仪表自控设备安全监测系统 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101094056A (zh) * | 2007-05-30 | 2007-12-26 | 重庆邮电大学 | 无线工业控制网络安全系统及安全策略实现方法 |
CN201909992U (zh) * | 2011-01-14 | 2011-07-27 | 中华人民共和国湖北出入境检验检疫局 | 一种基于vpn技术的远程机房环境监控设备 |
CN103036886A (zh) * | 2012-12-19 | 2013-04-10 | 珠海市鸿瑞软件技术有限公司 | 工业控制网络安全防护方法 |
CN105915402A (zh) * | 2016-07-05 | 2016-08-31 | 杨林 | 工业控制网络安全防护系统 |
CN106709613A (zh) * | 2015-07-16 | 2017-05-24 | 中国科学院信息工程研究所 | 一种适用于工业控制系统的风险评估方法 |
CN106899553A (zh) * | 2015-12-19 | 2017-06-27 | 北京中船信息科技有限公司 | 一种基于私有云的工业控制系统安全防护方法 |
CN107067179A (zh) * | 2017-04-20 | 2017-08-18 | 中国电子技术标准化研究院 | 一种工业控制系统标准符合性评估系统 |
-
2017
- 2017-12-11 CN CN201711307207.3A patent/CN108055261B/zh active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101094056A (zh) * | 2007-05-30 | 2007-12-26 | 重庆邮电大学 | 无线工业控制网络安全系统及安全策略实现方法 |
CN201909992U (zh) * | 2011-01-14 | 2011-07-27 | 中华人民共和国湖北出入境检验检疫局 | 一种基于vpn技术的远程机房环境监控设备 |
CN103036886A (zh) * | 2012-12-19 | 2013-04-10 | 珠海市鸿瑞软件技术有限公司 | 工业控制网络安全防护方法 |
CN106709613A (zh) * | 2015-07-16 | 2017-05-24 | 中国科学院信息工程研究所 | 一种适用于工业控制系统的风险评估方法 |
CN106899553A (zh) * | 2015-12-19 | 2017-06-27 | 北京中船信息科技有限公司 | 一种基于私有云的工业控制系统安全防护方法 |
CN105915402A (zh) * | 2016-07-05 | 2016-08-31 | 杨林 | 工业控制网络安全防护系统 |
CN107067179A (zh) * | 2017-04-20 | 2017-08-18 | 中国电子技术标准化研究院 | 一种工业控制系统标准符合性评估系统 |
Non-Patent Citations (1)
Title |
---|
工业控制系统三层网络的信息安全检测与认证;沈清泓;《自动化博览》;20140731;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN108055261A (zh) | 2018-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108055261B (zh) | 工业网络安全系统部署方法及安全系统 | |
Asghar et al. | Cybersecurity in industrial control systems: Issues, technologies, and challenges | |
Stergiopoulos et al. | Cyber-attacks on the Oil & Gas sector: A survey on incident assessment and attack patterns | |
Ibne Hossain et al. | Modeling and assessing cyber resilience of smart grid using Bayesian network-based approach: a system of systems problem | |
US8949668B2 (en) | Methods and systems for use in identifying abnormal behavior in a control system including independent comparisons to user policies and an event correlation model | |
CN111107108B (zh) | 一种工业控制系统网络安全分析的方法 | |
Kim et al. | STRIDE‐based threat modeling and DREAD evaluation for the distributed control system in the oil refinery | |
Nasr et al. | Alarm based anomaly detection of insider attacks in SCADA system | |
Munro | SCADA–A critical situation | |
Johnson | Barriers to the use of intrusion detection systems in safety-critical applications | |
Ayala et al. | Cyber-physical attack recovery procedures | |
Babbar et al. | Framework and methodological solutions for cyber security in Industry 4.0 | |
Rao et al. | Critical review of cybersecurity protection procedures and practice in water distribution systems | |
Øien et al. | A survey on cybersecurity barrier management in process control environments | |
Chenaru et al. | Improving operational security for web-based distributed control systems in wastewater management | |
Oudina et al. | Comprehensive Risk Classification and Mitigation in the Petroleum Cyber-Physical Systems of the Oil and Gas Industry. | |
de Moura et al. | A cyber-security strategy for internationally-dispersed industrial networks | |
Hunter | ‘til the Next Zero-Day Comes: Ransomware, Countermeasures, and the Risks They Pose to Safety | |
CN114465800A (zh) | 烟草行业工控网络安全防护架构和网络安全防护方法 | |
Houmb et al. | Intelligent risk based cybersecurity protection for industrial systems control-a feasibility study | |
Smidts et al. | Next-Generation Architecture and Autonomous Cyber-Defense | |
Luiijf | SCADA security good practices for the drinking water sector | |
Chernov et al. | Problems of information security and availability of automated process control systems | |
Thron et al. | Requirements and challenges for digital forensic readiness in industrial automation and control systems | |
Kosmowski et al. | Integrated safety and security analysis of hazardous plants and systems of critical infrastructure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Wang Jun Inventor after: Li Yongni Inventor after: Qu Feng Inventor after: Li Zhenxing Inventor after: Li Baiyi Inventor after: Shao Zetian Inventor before: Li Yongni Inventor before: Qu Feng Inventor before: Li Zhenxing Inventor before: Li Baiyi Inventor before: Shao Zetian |
|
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Wang Jun Inventor after: Li Yongni Inventor after: Qu Feng Inventor after: Li Zhenxing Inventor after: Li Baiyi Inventor after: Shao Zetian Inventor before: Li Yongni Inventor before: Qu Feng Inventor before: Li Zhenxing Inventor before: Li Baiyi Inventor before: Shao Zetian |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |