Network asset characterization, classification, grouping and control

作者: Hill Roger

DOI:

关键词: ConversationComputer scienceNetwork orchestrationControl (management)Computer networkIndustrial control systemAsset (computer security)

摘要: Techniques applicable to a network orchestration and security platform for network, such as an industrial control system (ICS) are disclosed. Such techniques include, example, methods characterize classify networked devices based upon conversation patterns, generate zones ICS assets characteristics identify record in non-intrusive way, create secure conduits between with no impact endpoint hose devices, systems therefor.

参考文章(12)
Cheng-Yin Lee, Zlatko Krstulich, Virtual private network connection methods and systems ,(2004)
Simon H. Lightbody, Hal E. Etheridge, Stewart J. Harding, Theresa M. Köster, Markus F. Hirschbold, Douglas S. Ransom, System and method for seal tamper detection for intelligent electronic devices ,(2004)
K. Krishnamurthy, B. Vignesh, R. Kirubashankar, J. Indra, Design and Implementation of Web Based Remote Supervisory Control and Information System ,(2011)
Walid Negm, James J. Solderitsch, Amin Hassanzadeh, Shimon Modi, Shaan Mulchandani, Song Luo, Industrial security agent platform ,(2015)
David Formby, Abdul Raheem Beyah, Preethi Srinivasan, Device fingerprinting for cyber-physical systems ,(2016)
Lindteigen Ty, Protected Subnet Interconnect ,(2017)