信息通信技术与政策

信息通信技术与政策

信息通信技术与政策 ›› 2022, Vol. 48 ›› Issue (10): 62-68.doi: 10.12267/j.issn.2096-5931.2022.10.009

专题:工业互联网 上一篇    下一篇

基于数据变化率检测的控制领域信息安全行为识别方法

Identification method of behaviors in OT security based on data change rate detection

马霄, 袁留记   

  1. 天融信科技集团股份有限公司,北京 100193
  • 收稿日期:2022-04-28 出版日期:2022-10-15 发布日期:2022-11-01
  • 作者简介:
    马霄 天融信科技集团股份有限公司工业互联网方案中心总监,主要从事自动化领域与信息安全领域技术研究与咨询工作,《工业互联网企业网络安全分类分级指南(试行)》评审专家组成员|袁留记 天融信科技集团股份有限公司工业互联网安全产品线总监,长期从事网络安全、物联网安全、工业互联网安全等新技术、工业互联网安全防护与管理体系构建等方面研究工作

MA Xiao, YUAN Liuji   

  1. Beijing Topsec Network Security Technology Co., Ltd., Beijing 100193, China
  • Received:2022-04-28 Online:2022-10-15 Published:2022-11-01

摘要:

随着两化融合的持续推进,信息安全问题不再仅存于信息网络,控制网络因自身的脆弱性问题,其攻击面相比较传统信息网络更大;又因其不可逆的特点,攻击影响范围更广。传统信息安全技术因兼容性、计算资源、容错性等多种问题,表现出极大的不适应性,如何构建行之有效的控制领域信息安全体系,切实保障生产过程的可用性,成为自动化与信息化从业者共同考虑的问题。在这一过程中,部分传统安全技术均需根据控制领域特点进行升级与优化。

关键词: 白名单技术, 行为分析, 抵御越限风险, 数据变化率检测

Abstract:

With the continuous integration of IT and OT, the information security problems no longer exist only in the IT network. Due to its own vulnerability, the OT network has a larger attack surface and wider scope of impact. Due to various problems such as compatibility, computing resources, and fault tolerance, traditional IT security technology is not fully suitable for OT security. Therefore, how to build effective OT security system and ensure normal production process has become the common issue of both automation and information professionals. In this process, some IT security technologies need to be upgraded and trimmed according to the characteristics of the OT field.

Key words: whitelisting techniques, behavioral analysis, protect against the risk of exceeding the limit, data rate change detection

中图分类号: