Tezislər / Theses



Yüklə 17,55 Mb.
Pdf görüntüsü
səhifə137/493
tarix02.10.2023
ölçüsü17,55 Mb.
#151572
1   ...   133   134   135   136   137   138   139   140   ...   493
BHOS Tezisler 2022 17x24sm

THE 3
rd
 INTERNATIONAL SCIENTIFIC CONFERENCES OF STUDENTS AND YOUNG RESEARCHERS 
dedicated to the 99
th
anniversary of the National Leader of Azerbaijan Heydar Aliyev
146
The expansion of cyber-attacks on ICS in recent years has revealed a 
vast number of security vulnerabilities in ICS. Extensive security solutions 
are proposed to eliminate vulnerabilities and increase ICS security. To the 
best of our knowledge, none of them offered or established a security test-
bed, which is critical for assessing the security of ICS tools and products. 
Mahdi Azimia et al. proposed a test-bed for evaluating the security of 
industrial applications in industrial environments by offering several metrics 
for static testing, dynamic testing, and network testing. In comparison to other 
detection platforms, this platform thoroughly covers the ICS and gives metrics 
for evaluations. Based on existing and current SCADA/DNP3 security 
challenges, AAmir Shahzad and colleagues presented security solutions 
(using cryptography implementations) to safeguard the communication 
(SCADA/DNP3 protocol communication), and attack (abnormal) scenarios 
were established within each test-bed implementation. The technique 
efficiently compensates for the firewall's, DMZs', and IPsec SSL/lack TLS's of 
performance.
Peng Jie and colleagues presented a type of distributed firewall that, 
when compared to a typical boundary firewall, adds a protective layer among 
internal subnets. When set configure, it may build multiple configurations for 
each service object and fully account the operating applications and network 
processing demand. The white list mechanism is used in firewall rule setup, 
which makes dynamic assessments of behavior between the control network 
and the information network. Except that, we should try our utmost to maintain 
functional isolation and prevent malicious malware from spreading to other 
production equipment by severely limiting inter-subnet connection.



Yüklə 17,55 Mb.

Dostları ilə paylaş:
1   ...   133   134   135   136   137   138   139   140   ...   493




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin