{"title":"ICS当前面临的网络安全挑战","authors":"Animesh Pattanayak, Matt W. Kirkland","doi":"10.1109/ICII.2018.00013","DOIUrl":null,"url":null,"abstract":"After a cyber-incident on an Industrial Control System (ICS), there is frequently an immediate incident response. However, after restoring the critical service, there is often little in the way of forensics to discover the source, impact, or events of the attack. In part, this is due to the challenge areas in ICSs cybersecurity outlined in this document. This paper discusses common challenges, some mitigations to those challenges, and applies them briefly to past attacks.","PeriodicalId":330919,"journal":{"name":"2018 IEEE International Conference on Industrial Internet (ICII)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Current Cyber Security Challenges in ICS\",\"authors\":\"Animesh Pattanayak, Matt W. Kirkland\",\"doi\":\"10.1109/ICII.2018.00013\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"After a cyber-incident on an Industrial Control System (ICS), there is frequently an immediate incident response. However, after restoring the critical service, there is often little in the way of forensics to discover the source, impact, or events of the attack. In part, this is due to the challenge areas in ICSs cybersecurity outlined in this document. This paper discusses common challenges, some mitigations to those challenges, and applies them briefly to past attacks.\",\"PeriodicalId\":330919,\"journal\":{\"name\":\"2018 IEEE International Conference on Industrial Internet (ICII)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference on Industrial Internet (ICII)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICII.2018.00013\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Industrial Internet (ICII)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICII.2018.00013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
After a cyber-incident on an Industrial Control System (ICS), there is frequently an immediate incident response. However, after restoring the critical service, there is often little in the way of forensics to discover the source, impact, or events of the attack. In part, this is due to the challenge areas in ICSs cybersecurity outlined in this document. This paper discusses common challenges, some mitigations to those challenges, and applies them briefly to past attacks.