{"title":"Analysis of Network-based Data Collection Mechanisms Applicable in Securing Critical Infrastructures","authors":"Katalin Ferencz, Erno Rigó","doi":"10.1109/CINTI-MACRo57952.2022.10029629","DOIUrl":null,"url":null,"abstract":"One of the important directions of the digital trends defining our everyday life is the integration of smart devices into our systems, so that thanks to this we can collect more and more detailed data and control certain units remotely or automatically. As a result, our systems, which until now only operated in an isolated environment, are now connected to external services, or even establish a network connection to the Internet. However, this can have serious and dangerous consequences, pronounced in the case of systems that are considered critical infrastructure, because the wider the network range achieved, the more vulnerabilities and security gap can appear in the systems. In this article, we will present some options for network-based data collection methods, as well as highlight their most important properties and their parameters, which are useful to consider when planning a network system.","PeriodicalId":18535,"journal":{"name":"Micro","volume":"19 1","pages":"000299-000304"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Micro","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINTI-MACRo57952.2022.10029629","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
One of the important directions of the digital trends defining our everyday life is the integration of smart devices into our systems, so that thanks to this we can collect more and more detailed data and control certain units remotely or automatically. As a result, our systems, which until now only operated in an isolated environment, are now connected to external services, or even establish a network connection to the Internet. However, this can have serious and dangerous consequences, pronounced in the case of systems that are considered critical infrastructure, because the wider the network range achieved, the more vulnerabilities and security gap can appear in the systems. In this article, we will present some options for network-based data collection methods, as well as highlight their most important properties and their parameters, which are useful to consider when planning a network system.