The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Industrial control system(ICS) is floorboard of control system in industrial production. With the transformation and upgrading of ICS, more IT technologies are used in it. The security problem has been paid more and more attention in recent years. In this paper, we proposed a fuzz test based method to detect the malware in the industrial control systems. In the proposed method, we use the configuration...
More standardized, networked and intelligentized nature of industry 4.0 has intensified critical infrastructures cyberthreats. According to cyber-physical systems (CPS) layered architecture and security requirements in industry 4.0, a cyber-physical systems testbed based on cloud computing and software defined network (SDN), or CPSTCS is proposed. The CPSTCS uses a network testbed based on cloud computing...
In this paper, we analyze both BMH algorithm and QS algorithm, focus on the improvement of QS, and present FQS algorithm which can apply to HTTP data reduction. For building this algorithm, we considered character features of pattern strings in HTTP application data, improved the collating sequence of characters in matching process, and had the bad characters jumping strategy improved for increasing...
Governments, companies, universities and research institutes are pushing the research and development of cyber-physical systems (CPS). However, the development of cyber-physical systems is constrained by security factors. According to this situation, this paper describes CPS security properties and basic theories, summarizes security attacks to cyber-physical systems as a theoretical reference for...
Network vulnerability can be analyzed automatically by attack graph. Attack graph tools can generate attack paths in network and show users the network vulnerabilities analyzing process for network security risk analysis. There are some problems such as state space explosion, the high complexity of algorithms, being difficult to demonstrate graphically, and so on, for attack graph generation and visualization...
Cyber-Physical System (CPS) is a system of system which integrates physical system with cyber capability in order to improve the physical performance. It is being widely used in areas closely related to national economy and people's livelihood, therefore CPS security problems have drawn a global attention and an appropriate risk assessment for CPS is in urgent need. Existing risk assessment for CPS...
Stuxnet event in 2010 causes the intense attention all over the world about information security problems of industrial control systems, how to assure the security of industrial control systems has become a hot topic both in the industry sectors and in academic community. In this paper, we focus on security testing of industrial control devices. We first review the existing security certifications...
With the rapid development of information and automatic control technology, more and more industrial control system(ICS) like SCADA, is interconnected with Ethernet and directly connected to internet, which greatly improve the efficiency of data sharing and introduced in security threats at the same time. As the important components of critical infrastructure, if attacked, will behave abnormal and...
Industrial control system (ICS) plays an important role in the critical infrastructure, and any compromise in their security can result in grave consequences. Since the occurrence of “Stuxnet” event in 2010, the information security problems of ICS cause the intense attentions all over the world. How to assure the security of ICS has become a hot topic in governments, industrial sectors and academic...
Software assurance in software development process becomes an important part of ICT supply chains risk management, and also has been one of the most advanced information security technologies. Based on the researches of software assurance, this paper studies the development and current research of software security assurance in the background of software security being concerned by more and more people,...
Cloud computing is the delivery of computing and storage capacity as a service to users. Cloud storage, as a subservice of infrastructure as a service (IaaS) in cloud computing, is a model of networked online storage where data is stored in virtualized pools of storage. As fast development and application of cloud computing and cloud storage, users concern more and more about security and privacy...
Internet Protocol Television (IPTV) is a critical service in converged networking environment. It promises to deliver a world of content and services to “any device, anywhere, anytime.” The number of global IPTV subscribers is expected to grow from 28 million in 2009 to 83 million in 2013, and the global IPTV market revenues are forecasted to grow from US$12 billion in 2009 to US$38 billion in 2013...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.