Security in Industrial Networks

作者: Jan Tore Sørensen

DOI:

关键词:

摘要: A major trend in the automation and power industries is transition from closed proprietary network solutions to open TCP/IP protocols running on Ethernet technologies. As these converge an all IP platform, new challenges requirements security level of devices arise. The introduction integrated operations oil gas industry has provided many benefits for industry, but it also opened up information flow between Distributed Control Systems (DCS), corporate subcontractor's networks. These developments increase posibility cyber vulnerabilities incidents DCS This thesis focus devices. We pressent discuss state art technologies protecting analyse a protocol assume role attacker, using this knowledge direct attacks against perform vulnerability testing industrial switches controllers at ABB's Corporate Research Center Oslo, scanner ''hacker'' tools known IT world. identify propose mitigation paths remove vulnerabilities.

参考文章(21)
Tim Grance, Joe Falco, Keith Stouffer, Karen Kent, Ron Ross, Guide to Supervisory Control and Data Acquisition (SCADA) and Other Industrial Control System Security ,(2006)
Sheila Frankel, Demystifying the IPsec puzzle ,(2001)
Klaus Grund, Manufacturing Automation Protocol Communications for Manufacturing. pp. 252- 276 ,(1990) , 10.1007/978-1-4471-1820-6_21
CHERYL L BEAVER, DONALD R GALLUP, WILLIAM D NEUMANN, MARK D TORGERSON, Key Management for SCADA Other Information: PBD: 1 Mar 2002. ,(2002) , 10.2172/792866
C. Stoll, The Cuckoo's Egg ,(1989)
Robert Dawson, Colin Boyd, Edward Dawson, Juan Gonzalez Nieto, SKMA: a key management architecture for SCADA systems grid computing. pp. 183- 192 ,(2006)
Yannick Chevalier, Luca Compagna, Jorge Cuellar, Paul Hankes Drielsma, Jacopo Mantovani, Sebastian Mödersheim, Laurent Vigneron, None, A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols Workshop on Specification and Automated Processing of Security Requirements - SAPS'2004. ,(2004)
Marshall T. Rose, The open book: a practical perspective on OSI obpp. ,(1990)
R. Shirey, Internet Security Glossary RFC. ,vol. 2828, pp. 1- 212 ,(2000)