Chuan-Gang Liu, Chin-Jui Wu, I. Liu, Chi-Che Wu, Jung-Shian Li
{"title":"基于动态地址分配机制的工业控制系统安全保护","authors":"Chuan-Gang Liu, Chin-Jui Wu, I. Liu, Chi-Che Wu, Jung-Shian Li","doi":"10.1145/3440943.3444716","DOIUrl":null,"url":null,"abstract":"In recent years, industrial control systems (ICS) are widely used in many occasions, which makes information security of ICS an important issue. This study discusses the communication and management on ICS to make ICS intelligent. We proposed a method to avoid attack of communication, and elaborated the means of our proposed communication in which all communication parties communicate with each other without transmitting IP information. Moreover, as an intelligent ICS, the transmission module we design can detect anomaly in the system and change the transmission rule based on our algorithm, also known as a type of moving target defense. Therefore, we proposed the scheme to improve the transmission security in ICS. The experimental results also show that our scheme can be feasible in ICS.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"s3-29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems\",\"authors\":\"Chuan-Gang Liu, Chin-Jui Wu, I. Liu, Chi-Che Wu, Jung-Shian Li\",\"doi\":\"10.1145/3440943.3444716\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, industrial control systems (ICS) are widely used in many occasions, which makes information security of ICS an important issue. This study discusses the communication and management on ICS to make ICS intelligent. We proposed a method to avoid attack of communication, and elaborated the means of our proposed communication in which all communication parties communicate with each other without transmitting IP information. Moreover, as an intelligent ICS, the transmission module we design can detect anomaly in the system and change the transmission rule based on our algorithm, also known as a type of moving target defense. Therefore, we proposed the scheme to improve the transmission security in ICS. The experimental results also show that our scheme can be feasible in ICS.\",\"PeriodicalId\":310247,\"journal\":{\"name\":\"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications\",\"volume\":\"s3-29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3440943.3444716\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3440943.3444716","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems
In recent years, industrial control systems (ICS) are widely used in many occasions, which makes information security of ICS an important issue. This study discusses the communication and management on ICS to make ICS intelligent. We proposed a method to avoid attack of communication, and elaborated the means of our proposed communication in which all communication parties communicate with each other without transmitting IP information. Moreover, as an intelligent ICS, the transmission module we design can detect anomaly in the system and change the transmission rule based on our algorithm, also known as a type of moving target defense. Therefore, we proposed the scheme to improve the transmission security in ICS. The experimental results also show that our scheme can be feasible in ICS.