作者: Hill Roger
DOI:
关键词: Conversation 、 Computer science 、 Network orchestration 、 Control (management) 、 Computer network 、 Industrial control system 、 Asset (computer security)
摘要: Techniques applicable to a network orchestration and security platform for network, such as an industrial control system (ICS) are disclosed. Such techniques include, example, methods characterize classify networked devices based upon conversation patterns, generate zones ICS assets characteristics identify record in non-intrusive way, create secure conduits between with no impact endpoint hose devices, systems therefor.