350 rub
Journal Neurocomputers №11 for 2013 г.
Article in number:
Hazard assessment of the threat of Covent in industrial LonWorks networks neuron chip
Authors:
I. I. Bezukladnikov - Senior Lecturer, Perm National Research Polytechnic University
E. L. Kon - Ph.D. (Eng.), Professor, Perm National Research Polytechnic University
E. L. Kon - Ph.D. (Eng.), Professor, Perm National Research Polytechnic University
Abstract:
This paper proposes a new method for assessing the risk posed by one of the most dangerous threats to the information security of industrial systems - covert channels. It shows the inapplicability of use for this purpose, known approaches based on the use of single-performance characteristics of a covert channel. Article proposes an approach to assess that by analyzing several criteria - performance, resource constraints and attack scenario. The approaches for assessing these criteria, as well as an example of using the proposed method for assessing the risk of a real LonWorks-infrastructure are shown.
Pages: 53-58
References
- Bezukladnikov I.I., Kon E.L. Problema skrytykh kanalov v promyshlennykh informacionno-upravljajushhikh i infokommunikacionnykh setjakh // Promyshlennye ASU i kontrollery. 2011. № 7.
- Bezukladnikov I.I., Kon E.L. Skrytye kanaly v promyshlennykh upravljajushhikh sistemakh // Problemy tekhniki i tekhnologijj telekommunikacijj: Tr.XIMezhdunar. nauchno-tekhn. konf. Kazan: Izd-voKGTU. 2011.
- National Institute of Standarts and Technology. NIST800-82. Guide to Industrial Control Systems Security. http://csrc.nist.gov/publications/ drafts/800-82/draft_sp800-82-fpd.pdf
- Computer Security Requirements. Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments. DoD, 1985.