TY - GEN
T1 - Venerability and protection tool surveys of industrial control system
AU - Lu, Kuan Chu
AU - Liu, I. Hsien
AU - Li, Jung Shian
N1 - Funding Information:
ACKNOWLEDGEMENTS This work was supported by the MOST (Ministry of Science and Technology), Taiwan under contracts numbers MOST 107-2218-E-006-036-and MOST 107-2221-E-006-140-.
Publisher Copyright:
© 2018 IEEE.
PY - 2018/12/26
Y1 - 2018/12/26
N2 - The rapid development of the Internet has also accelerated the growth of the Internet of Things, IOT. The isolated systems have been transformed to open ones by the key infrastructures of IOT which has been made the operation of the entire system more convenient. But relatively, the security of key infrastructure will face unprecedented threats. Therefore, it is necessary to establish a safe and secure way for the Industrial Control Systems, ICS, to operate through remote control. In other words, it is necessary to understand in depth the tools that can protect the country's economy and security of the system and prevent attackers from invading the ICS system or avoiding at-tacks on ICS systems. This study will explore the current tools and technologies used to discover ICS system vulnerabilities and provide alternative methods to protect SCADA system security.
AB - The rapid development of the Internet has also accelerated the growth of the Internet of Things, IOT. The isolated systems have been transformed to open ones by the key infrastructures of IOT which has been made the operation of the entire system more convenient. But relatively, the security of key infrastructure will face unprecedented threats. Therefore, it is necessary to establish a safe and secure way for the Industrial Control Systems, ICS, to operate through remote control. In other words, it is necessary to understand in depth the tools that can protect the country's economy and security of the system and prevent attackers from invading the ICS system or avoiding at-tacks on ICS systems. This study will explore the current tools and technologies used to discover ICS system vulnerabilities and provide alternative methods to protect SCADA system security.
UR - http://www.scopus.com/inward/record.url?scp=85061447827&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85061447827&partnerID=8YFLogxK
U2 - 10.1109/CANDARW.2018.00099
DO - 10.1109/CANDARW.2018.00099
M3 - Conference contribution
AN - SCOPUS:85061447827
T3 - Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018
SP - 511
EP - 515
BT - Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 6th International Symposium on Computing and Networking Workshops, CANDARW 2018
Y2 - 27 November 2018 through 30 November 2018
ER -