MATEC Web Conf.
Volume 173, 20182018 International Conference on Smart Materials, Intelligent Manufacturing and Automation (SMIMA 2018)
|Number of page(s)||5|
|Section||Modeling, Analysis, and Simulation of Intelligent Manufacturing Processes|
|Published online||19 June 2018|
Construction and Evaluation of Defense-in-Depth architecture in SCADA System
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, 100195 E-park C1 Norh, No. 80 Xingshikou Road, Haidian District, Beijing, China
2 School of Cyber Security, University of Chinese Academy of Sciences, 100049 No.19(A) Yuquan Road, Shijingshan District, Beijing, P.R.China
Corresponding author : firstname.lastname@example.org
The increasing use of common computer technologies in SCADA systems has brought convenience and at the same time introduced unprecedented security threats. SCADA system is becoming an attacker's target day by day. As attackers gain more understanding of industrial control systems, attacker's attack methods are more and more sophisticated, and the attack intensity is also increasing day by day. Faced with many security threats and risks, traditional security precautions cannot be effectively implemented. Therefore, this paper proposes an improved SCADA defense system, and evaluates it by using a variety of attacks. Experiments show that the defense-in-depth model we proposed is very effective against a variety of attacks.
© The Authors, published by EDP Sciences, 2018
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.