350 rub
Journal Highly available systems №3 for 2013 г.
Article in number:
ICS Security control by detecting and fixing vulnerabilities
Authors:
D.A. Moskvin - Ph.D. (Eng.) Neobit Ltd. E-mail: moskvin@neo-bit.ru
Abstract:
The results of studies must determine the ability to detect vulnerabilities, and ICS equipment. This will identify components of the ICS which are the most vulnerable to the adverse effects. Also this must provide the ability to classify the corresponding vulnerability to develop methods and specialized software for ICS vulnerability detection.
Pages: 59-62
References

  1. Dormann W., Plakosh D. Vulnerability Detection in ActiveX Controls through Automated Fuzz Testing. Pittsburgh: CERT. 2010. 14 c.
  2. Leverett E.P. Quantitatively Assessing and Visualising Industrial System Attack Surfaces. Cambridge: University of Cambridge. 2011. 54 c.
  3. Pery'shkin S.V. Vy'delenie ustojchivy'x fragmentov setevogo trafika i oczenka ix staczionarnosti dlya sistemy' analiza povedeniya setej // Voprosy' zashhity' informaczii. M.: Vserossijskij nauchno-issledovatel'skij institut mezhotraslevoj informaczii - Federal'ny'j informaczionno-analiticheskij czentr oboronnoj promy'shlennosti. 2010. № 3. S. 42-49.
  4. Dzung D., Naedele M., von Hoff Th., Crevatin M. Security for Industrial Communication Systems // Proceedings of the IEEE. Raleigh: ABB Corp. Res. 2005. № 93. S. 1152-1177.