350 rub
Journal Neurocomputers №11 for 2013 г.
Article in number:
Covert channels in the Neuron Chip-based industrial control systems
Authors:
I. I. Bezukladnikov - Senior Lecturer, Perm National Research Polytechnic University
E. L. Kon - Ph.D. (Eng.), Professor, Perm National Research Polytechnic University
E. L. Kon - Ph.D. (Eng.), Professor, Perm National Research Polytechnic University
Abstract:
This article reviews the one of the most dangerous types of non-traditional security threats of industrial systems-covert channels. Developed by the authors is given an open classification of covert channels on the basis of the form of under-utilization of an information resource, which includes, along with well-known, several new classes of covert channels. For a part of such classes in the article are examples of possible covert channels, which operate on the basis of industrial fieldbus-based network Neuron Chip.
Pages: 47-52
References
- Bezukladnikov I.I., Kon E.L. Skrytye kanaly v raspredelennykh avtomatizirovannykh sistemakh // Vestnik UGATU. 2010. Ufa: 2010.
- Bezukladnikov I.I., Kon E.L. Problema skrytykh kanalov v promyshlennykh informacionno-upravljajushhikh i infokommunikacionnykh setjakh // Promyshlennye ASU i kontrollery. 2011. №7.
- Bezukladnikov I.I., Kon E.L. Skrytye kanaly v promyshlennykh upravljajushhikh sistemakh // Problemy tekhniki i tekhnologijj telekommunikacijj: Tr. XI Mezhdunar. nauchno-tekhn. konf. Kazan: Izd-vo KGTU. 2011.
- Timonina E.E. Analiz ugroz skrytykh kanalov i metoda postroenija garantirovanno zashhishhennykh raspredelennykh avtomatizirovannykh sistem. Diss. d.t.n. M.: 2004.
- National Institute of Standarts and Technology. NIST800-82. Guide to Industrial Control Systems Security. http://csrc.nist.gov/publications/ drafts/800-82/draft_sp800-82-fpd.pdf
- Computer Security Requirements. Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments. DoD, 1985.