Research on vulnerability and security technology of industrial Ethernet protocol
To solve the information security of industrial control system,the safety of industrial Ethernet protocol was studied deeply,the research status of protocol security protection was reported and the vulnerability of the five-major protocol was analyzed.Firstly,the architecture of industrial control s...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-11-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017277/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539410854674432 |
---|---|
author | Tao FENG Ye LU Jun-li FANG |
author_facet | Tao FENG Ye LU Jun-li FANG |
author_sort | Tao FENG |
collection | DOAJ |
description | To solve the information security of industrial control system,the safety of industrial Ethernet protocol was studied deeply,the research status of protocol security protection was reported and the vulnerability of the five-major protocol was analyzed.Firstly,the architecture of industrial control system and industrial Ethernet protocol was discussed.Secondly,from the three aspects of external active defense technology,internal passive defense technology and protocol security improvement,a perfect industrial Ethernet protocol security protection model was put forward,and the main protection technology was discussed.Finally,the future development direction and research ideas of information security improvement of industrial Ethernet protocol were pointed out. |
format | Article |
id | doaj-art-280c330aacb44ddfa7cd624e29598fde |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2017-11-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-280c330aacb44ddfa7cd624e29598fde2025-01-14T07:14:01ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-11-013818519659715699Research on vulnerability and security technology of industrial Ethernet protocolTao FENGYe LUJun-li FANGTo solve the information security of industrial control system,the safety of industrial Ethernet protocol was studied deeply,the research status of protocol security protection was reported and the vulnerability of the five-major protocol was analyzed.Firstly,the architecture of industrial control system and industrial Ethernet protocol was discussed.Secondly,from the three aspects of external active defense technology,internal passive defense technology and protocol security improvement,a perfect industrial Ethernet protocol security protection model was put forward,and the main protection technology was discussed.Finally,the future development direction and research ideas of information security improvement of industrial Ethernet protocol were pointed out.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017277/industrial control systemindustrial Ethernet protocolinformation securitydefense technology |
spellingShingle | Tao FENG Ye LU Jun-li FANG Research on vulnerability and security technology of industrial Ethernet protocol Tongxin xuebao industrial control system industrial Ethernet protocol information security defense technology |
title | Research on vulnerability and security technology of industrial Ethernet protocol |
title_full | Research on vulnerability and security technology of industrial Ethernet protocol |
title_fullStr | Research on vulnerability and security technology of industrial Ethernet protocol |
title_full_unstemmed | Research on vulnerability and security technology of industrial Ethernet protocol |
title_short | Research on vulnerability and security technology of industrial Ethernet protocol |
title_sort | research on vulnerability and security technology of industrial ethernet protocol |
topic | industrial control system industrial Ethernet protocol information security defense technology |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017277/ |
work_keys_str_mv | AT taofeng researchonvulnerabilityandsecuritytechnologyofindustrialethernetprotocol AT yelu researchonvulnerabilityandsecuritytechnologyofindustrialethernetprotocol AT junlifang researchonvulnerabilityandsecuritytechnologyofindustrialethernetprotocol |