Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2022, Vol. 48 ›› Issue (10): 62-68.doi: 10.12267/j.issn.2096-5931.2022.10.009

Previous Articles     Next Articles

Identification method of behaviors in OT security based on data change rate detection

MA Xiao, YUAN Liuji   

  1. Beijing Topsec Network Security Technology Co., Ltd., Beijing 100193, China
  • Received:2022-04-28 Online:2022-10-15 Published:2022-11-01

Abstract:

With the continuous integration of IT and OT, the information security problems no longer exist only in the IT network. Due to its own vulnerability, the OT network has a larger attack surface and wider scope of impact. Due to various problems such as compatibility, computing resources, and fault tolerance, traditional IT security technology is not fully suitable for OT security. Therefore, how to build effective OT security system and ensure normal production process has become the common issue of both automation and information professionals. In this process, some IT security technologies need to be upgraded and trimmed according to the characteristics of the OT field.

Key words: whitelisting techniques, behavioral analysis, protect against the risk of exceeding the limit, data rate change detection

CLC Number: