Venerability and protection tool surveys of industrial control system

Kuan Chu Lu, I. Hsien Liu, Jung Shian Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The rapid development of the Internet has also accelerated the growth of the Internet of Things, IOT. The isolated systems have been transformed to open ones by the key infrastructures of IOT which has been made the operation of the entire system more convenient. But relatively, the security of key infrastructure will face unprecedented threats. Therefore, it is necessary to establish a safe and secure way for the Industrial Control Systems, ICS, to operate through remote control. In other words, it is necessary to understand in depth the tools that can protect the country's economy and security of the system and prevent attackers from invading the ICS system or avoiding at-tacks on ICS systems. This study will explore the current tools and technologies used to discover ICS system vulnerabilities and provide alternative methods to protect SCADA system security.

Original languageEnglish
Title of host publicationProceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages511-515
Number of pages5
ISBN (Electronic)9781538691847
DOIs
Publication statusPublished - 2018 Dec 26
Event6th International Symposium on Computing and Networking Workshops, CANDARW 2018 - Takayama, Japan
Duration: 2018 Nov 272018 Nov 30

Publication series

NameProceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018

Conference

Conference6th International Symposium on Computing and Networking Workshops, CANDARW 2018
Country/TerritoryJapan
CityTakayama
Period18-11-2718-11-30

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Statistics, Probability and Uncertainty
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Venerability and protection tool surveys of industrial control system'. Together they form a unique fingerprint.

Cite this