{"title":"Adaptive Change Technology of Encryption Strength Driven by Network Attack Threat","authors":"lan kun, Ping Kuang, Fan Yang","doi":"10.1145/3584714.3589125","DOIUrl":null,"url":null,"abstract":"Under the new situation that premeditated and persistent attacks have become the norm, resource-constrained industrial control equipment uses traditional encryption protection methods with fixed encryption strength and faces challenges such as simple stacking of protection capabilities, waste of resources and weak protection capabilities. Firstly, the technical principle of dynamic change of encryption strength driven by attack threat is discussed, and then the technology of adaptive change of encryption strength driven by attack threat (TD-ESAT) is proposed. Experiments and analysis show that in the real-time operation scenario of industrial control equipment, the protection efficiency of this method is significantly improved.","PeriodicalId":112952,"journal":{"name":"Proceedings of the 2022 International Conference on Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 International Conference on Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3584714.3589125","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Under the new situation that premeditated and persistent attacks have become the norm, resource-constrained industrial control equipment uses traditional encryption protection methods with fixed encryption strength and faces challenges such as simple stacking of protection capabilities, waste of resources and weak protection capabilities. Firstly, the technical principle of dynamic change of encryption strength driven by attack threat is discussed, and then the technology of adaptive change of encryption strength driven by attack threat (TD-ESAT) is proposed. Experiments and analysis show that in the real-time operation scenario of industrial control equipment, the protection efficiency of this method is significantly improved.