工业网络脆弱性链分析研究

M. Cheminod, I. Bertolotti, L. Durante, A. Valenzano
{"title":"工业网络脆弱性链分析研究","authors":"M. Cheminod, I. Bertolotti, L. Durante, A. Valenzano","doi":"10.1109/WFCS.2008.4638740","DOIUrl":null,"url":null,"abstract":"The ever-increasing adoption at the factory field level of COTS (commercial off-the-shelf) hardware and software to host both real-time control tasks and a general-purpose operating system on the same machine is profoundly influencing the extent of threats that a factory network and computing infrastructure shall be prepared to deal with. In fact, these machines share with their office automation counterparts the same kinds of vulnerabilities and, being often interconnected to computers providing services to the public, are prone to cyber-attacks. In this paper, the architecture and use of a software tool able to analyse a factory network for vulnerabilities are described. Automating the analysis is of outmost importance because, as the complexity of the network grows, the problem rapidly becomes hard to tackle by hand due to the subtle interactions that may occur among apparently unrelated vulnerabilities.","PeriodicalId":352963,"journal":{"name":"2008 IEEE International Workshop on Factory Communication Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"On the analysis of vulnerability chains in industrial networks\",\"authors\":\"M. Cheminod, I. Bertolotti, L. Durante, A. Valenzano\",\"doi\":\"10.1109/WFCS.2008.4638740\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The ever-increasing adoption at the factory field level of COTS (commercial off-the-shelf) hardware and software to host both real-time control tasks and a general-purpose operating system on the same machine is profoundly influencing the extent of threats that a factory network and computing infrastructure shall be prepared to deal with. In fact, these machines share with their office automation counterparts the same kinds of vulnerabilities and, being often interconnected to computers providing services to the public, are prone to cyber-attacks. In this paper, the architecture and use of a software tool able to analyse a factory network for vulnerabilities are described. Automating the analysis is of outmost importance because, as the complexity of the network grows, the problem rapidly becomes hard to tackle by hand due to the subtle interactions that may occur among apparently unrelated vulnerabilities.\",\"PeriodicalId\":352963,\"journal\":{\"name\":\"2008 IEEE International Workshop on Factory Communication Systems\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE International Workshop on Factory Communication Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WFCS.2008.4638740\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Workshop on Factory Communication Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WFCS.2008.4638740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

工厂现场越来越多地采用COTS(商用现货)硬件和软件,在同一台机器上托管实时控制任务和通用操作系统,这深刻地影响了工厂网络和计算基础设施应准备处理的威胁程度。事实上,这些机器与它们的办公自动化对应物有着相同的漏洞,而且经常与向公众提供服务的计算机相连,容易受到网络攻击。本文描述了一种能够分析工厂网络漏洞的软件工具的体系结构和使用方法。自动化分析是最重要的,因为随着网络复杂性的增长,由于明显不相关的漏洞之间可能发生微妙的相互作用,问题迅速变得难以手工解决。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
On the analysis of vulnerability chains in industrial networks
The ever-increasing adoption at the factory field level of COTS (commercial off-the-shelf) hardware and software to host both real-time control tasks and a general-purpose operating system on the same machine is profoundly influencing the extent of threats that a factory network and computing infrastructure shall be prepared to deal with. In fact, these machines share with their office automation counterparts the same kinds of vulnerabilities and, being often interconnected to computers providing services to the public, are prone to cyber-attacks. In this paper, the architecture and use of a software tool able to analyse a factory network for vulnerabilities are described. Automating the analysis is of outmost importance because, as the complexity of the network grows, the problem rapidly becomes hard to tackle by hand due to the subtle interactions that may occur among apparently unrelated vulnerabilities.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信