Computer Science ›› 2013, Vol. 40 ›› Issue (9): 125-129.

Previous Articles     Next Articles

Design and Application of Information Security in EPLC

ZHOU Hao,HUANG Shuang,HUANG Xiong-feng,LI Ke and ZHOU Chun-jie   

  • Online:2018-11-16 Published:2018-11-16

Abstract: With the deep integration of industrialization and informationization and the rapid development of system network interconnection,the issues of information security in EPLC attract more attention.This paper proposed a two-level control framework to ensure the information security.Detection based on attack signature database is employed to draw up the control schemes for the identifiable instructions at the inner level.And at the external level,redundancy techniques are used to conquer the unidentifiable instructions which are detected based on system models.Finally,a test EPLC platform on CortexA8-Linux was established to realize and verify the proposed approach,and the experimental results show that the EPLC not only could meet the real-time requirement,but also could detect and process those external instructions well.

Key words: Embedded PLC, Linux,Information security,Intrusion detection,Intrusion processing

[1] 王晓光.嵌入式PLC的设计与研究[D].成都:西华大学,2011
[2] 贺无名,余强国.基于嵌入式软PLC的矿井提升机控制系统设计[J].煤矿机械,2011,2(6):244-246
[3] 孟庆春,刘云卿.应用于PLC控制程序的Petri网执行模型[J].计算机科学,2009,6(10):150-159
[4] Koopman P.Embedded system security[J].IEEE Computer,2004,7(07)
[5] 张帅.ICS工业控制系统安全风险分析[J].信息安全与通信保密,2012(3):15-19
[6] 杨智君,田地,马骏骁,等.入侵检测技术研究综述[J].计算机工程与设计,2006,7(12):2119-2123,9
[7] 方来华.工业控制系统的信息安全[J].电气时代,2008(10):118-121
[8] Stouffer K,Falco J,Scarfone K.Guide to Industrial Control Systems Security[R].UK:National Institute of Standards and Technology,2011
[9] 唐文.工业自动化控制系统信息安全研究[J].计算机安全,2012(4):2-7
[10] 田海,崔桂梅,王晓红,等.西门子PLC控制网络的配置策略与应用[J].电气传动,2010(01):76-80
[11] 陈慕宁.工业自动化控制系统的设计[J].电脑编程技巧与维护,2008(16):27,2
[12] 刘阳.基于免疫原理的无线传感器网络入侵检测系统研究[D].北京:中国科学院研究生院(计算技术研究所),2008
[13] 刘俊年.基于linux系统的安全策略研究及其实现[D].成都:四川大学,2008
[14] 赵中敏.冗余设计在PLC控制系统中的应用[J].机床电器,2007(3):42-45
[15] 白琳.基于免疫优势克隆网络聚类的入侵检测[J].计算机科学,2012,9(07):82-86,8
[16] Hettich S,Bay S.The UCI KDD Archive.http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.Irvine,CA:University of California,Department of Information and Computer Science,1999
[17] 翟光群,陈向东,胡贵江.蜜罐与入侵检测技术联动系统的研究与设计[J].计算机工程与设计,2009,0(21):4845-4847,7

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!