Research on vulnerability and security technology of industrial Ethernet protocol

To solve the information security of industrial control system,the safety of industrial Ethernet protocol was studied deeply,the research status of protocol security protection was reported and the vulnerability of the five-major protocol was analyzed.Firstly,the architecture of industrial control s...

Full description

Saved in:
Bibliographic Details
Main Authors: Tao FENG, Ye LU, Jun-li FANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017277/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539410854674432
author Tao FENG
Ye LU
Jun-li FANG
author_facet Tao FENG
Ye LU
Jun-li FANG
author_sort Tao FENG
collection DOAJ
description To solve the information security of industrial control system,the safety of industrial Ethernet protocol was studied deeply,the research status of protocol security protection was reported and the vulnerability of the five-major protocol was analyzed.Firstly,the architecture of industrial control system and industrial Ethernet protocol was discussed.Secondly,from the three aspects of external active defense technology,internal passive defense technology and protocol security improvement,a perfect industrial Ethernet protocol security protection model was put forward,and the main protection technology was discussed.Finally,the future development direction and research ideas of information security improvement of industrial Ethernet protocol were pointed out.
format Article
id doaj-art-280c330aacb44ddfa7cd624e29598fde
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-11-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-280c330aacb44ddfa7cd624e29598fde2025-01-14T07:14:01ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-11-013818519659715699Research on vulnerability and security technology of industrial Ethernet protocolTao FENGYe LUJun-li FANGTo solve the information security of industrial control system,the safety of industrial Ethernet protocol was studied deeply,the research status of protocol security protection was reported and the vulnerability of the five-major protocol was analyzed.Firstly,the architecture of industrial control system and industrial Ethernet protocol was discussed.Secondly,from the three aspects of external active defense technology,internal passive defense technology and protocol security improvement,a perfect industrial Ethernet protocol security protection model was put forward,and the main protection technology was discussed.Finally,the future development direction and research ideas of information security improvement of industrial Ethernet protocol were pointed out.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017277/industrial control systemindustrial Ethernet protocolinformation securitydefense technology
spellingShingle Tao FENG
Ye LU
Jun-li FANG
Research on vulnerability and security technology of industrial Ethernet protocol
Tongxin xuebao
industrial control system
industrial Ethernet protocol
information security
defense technology
title Research on vulnerability and security technology of industrial Ethernet protocol
title_full Research on vulnerability and security technology of industrial Ethernet protocol
title_fullStr Research on vulnerability and security technology of industrial Ethernet protocol
title_full_unstemmed Research on vulnerability and security technology of industrial Ethernet protocol
title_short Research on vulnerability and security technology of industrial Ethernet protocol
title_sort research on vulnerability and security technology of industrial ethernet protocol
topic industrial control system
industrial Ethernet protocol
information security
defense technology
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017277/
work_keys_str_mv AT taofeng researchonvulnerabilityandsecuritytechnologyofindustrialethernetprotocol
AT yelu researchonvulnerabilityandsecuritytechnologyofindustrialethernetprotocol
AT junlifang researchonvulnerabilityandsecuritytechnologyofindustrialethernetprotocol