Next generation SCADA security: best practices and client puzzles

作者: C.L. Bowen , T.K. Buennemeyer , R.W. Thomas

DOI: 10.1109/IAW.2005.1495984

关键词:

摘要: Supervisory control and data acquisition (SCADA) systems are found throughout the public utility industry. As part of our national critical infrastructure, SCADA used to monitor, manage spatially separated sites. mirroring rapid changes occurring in larger information technology (IT) networking industry by becoming more flexible at same time interconnected. These primitive being upgraded using commercial-off-the-shelf (COTS) hardware software, migrated standard formats network protocols, particularly transport protocol (TCP) for end-to-end control. Throughout this transition, system networks must be well defended maintain level service required their customers.

参考文章(6)
Georgia Killcrece, Klaus-Peter Kossakowski, Robin Ruefle, Mark Zajicek, State of the Practice of Computer Security Incident Response Teams (CSIRTs) Defense Technical Information Center. ,(2003) , 10.21236/ADA421664
Behrouz A. Forouzan, TCP/IP Protocol Suite ,(1999)
A. Bruce, R. Lee, A framework for the specification of SCADA data links IEEE Transactions on Power Systems. ,vol. 9, pp. 560- 564 ,(1993) , 10.1109/59.317565
Chun-Lien Su, Chan-Nan Lu, Tsun-Yu Hsiao, Simulation study of Internet based inter control center data exchange for complete network modeling IEEE Transactions on Power Systems. ,vol. 17, pp. 1177- 1183 ,(2002) , 10.1109/TPWRS.2002.805021