SIA OpenIR  > 工业控制网络与系统研究室
工控网络局域可信计算环境构建方法与验证
Alternative TitleConstruction Method and Verification of Local Trusted Computing Environment in Industrial Control Network
尚文利1,3,4,5; 张修乐1,2,3,4; 刘贤达1,3,4,5; 尹隆1,3,4,5
Department工业控制网络与系统研究室
Source Publication信息网络安全
ISSN1671-1122
2019
Issue4Pages:1-10
Contribution Rank1
Funding Organization国家自然科学基金面上项目[61773368] ; 国家电网公司科技项目[52110118001H] ; 中国科学院战略性先导科技专项[XDC02000000]
Keyword工业控制系统 可信PLC 可信计算环境 深度信念网络
Abstract工业控制系统终端设备层信息安全防护能力相对薄弱,构建工控设备层局域可信计算环境对于大幅度提高工业控制系统信息安全防护能力具有重要意义。文章提出基于可信PLC的工控网络安全应用设计,从终端控制设备的安全问题入手,完成对设备自身及其所在网络的安全防护,构建高安全、高可信的工控网络运行环境。仿真实验结合可信PLC和工控系统专用安全产品等,搭建工控网络局域可信计算架构,验证可信PLC可信启动过程,引导可信PLC进行安全功能数据交换。使用基于深度信念网络的异常检测模型,对可信计算环境下的正常通信数据和遭受模拟攻击的数据进行检测。对比实验结果验证了工控网络局域可信计算环境的安全性和可信性。
Other AbstractThe information security protection capability of terminal system layer of industrial control system is relatively weak. Constructing the trusted computing environment of the local industrial control equipment layer is of great significance for greatly improving the information security protection capability of industrial control system. This paper proposes the design of industrial control network security application based on trusted PLC. Starting from the security problem of terminal control equipment, the application design completes the security protection of the equipment itself and its network, and constructs high-security and high-trusted industrial control network operating environment. The simulation experiment combines the trusted PLC and the special safety products of industrial control system to build the local trusted computing architecture of industrial control network, verify the trusted start-up process of trusted PLC, and guide the trusted PLC to exchange the security function data. The anomaly detection model based on deep belief network is used to detect the normal communication data and the data subjected to the simulated attack in the trusted computing environment. The experimental results verify the security and credibility of the local trusted computing environment of industrial control network.
Language中文
Document Type期刊论文
Identifierhttp://ir.sia.cn/handle/173321/24669
Collection工业控制网络与系统研究室
Corresponding Author尚文利
Affiliation1.中国科学院沈阳自动化研究所
2.沈阳理工大学自动化与电气工程学院
3.中国科学院机器人与智能制造创新研究院
4.中国科学院网络化控制系统重点实验室
5.中国科学院大学
Recommended Citation
GB/T 7714
尚文利,张修乐,刘贤达,等. 工控网络局域可信计算环境构建方法与验证[J]. 信息网络安全,2019(4):1-10.
APA 尚文利,张修乐,刘贤达,&尹隆.(2019).工控网络局域可信计算环境构建方法与验证.信息网络安全(4),1-10.
MLA 尚文利,et al."工控网络局域可信计算环境构建方法与验证".信息网络安全 .4(2019):1-10.
Files in This Item: Download All
File Name/Size DocType Version Access License
工控网络局域可信计算环境构建方法与验证.(2572KB)期刊论文出版稿开放获取CC BY-NC-SAView Download
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[尚文利]'s Articles
[张修乐]'s Articles
[刘贤达]'s Articles
Baidu academic
Similar articles in Baidu academic
[尚文利]'s Articles
[张修乐]'s Articles
[刘贤达]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[尚文利]'s Articles
[张修乐]'s Articles
[刘贤达]'s Articles
Terms of Use
No data!
Social Bookmark/Share
File name: 工控网络局域可信计算环境构建方法与验证.pdf
Format: Adobe PDF
This file does not support browsing at this time
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.