2020
DOI: 10.1109/mias.2019.2943630
|View full text |Cite
|
Sign up to set email alerts
|

A Guide to Securing Industrial Control Networks: Integrating IT and OT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0
6

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 1 publication
0
11
0
6
Order By: Relevance
“…e Automatic Control Network is connected to numbers of HMIs and PLCs in fields, which are responsible for logic and control computing tasks to manipulate and regulate sensors or actuators in the Physical Control Network. Among them, the IT networks are made up of the Enterprise Control Network and the Perimeter Network, and other subnets belong to the OT networks [1].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…e Automatic Control Network is connected to numbers of HMIs and PLCs in fields, which are responsible for logic and control computing tasks to manipulate and regulate sensors or actuators in the Physical Control Network. Among them, the IT networks are made up of the Enterprise Control Network and the Perimeter Network, and other subnets belong to the OT networks [1].…”
Section: Methodsmentioning
confidence: 99%
“…Since information technology (IT) was introduced into all walks of life, the threat from hackers and virus attacks have never been got rid of. However, it does not prevent industrial enterprises from adopting the commercial-off-the-shelf software and hardware and the general network connectivity into operational technology (OT) networks, such as industrial control networks [1]. e IT/OT convergence provides attackers more opportunities to launch targeted attacks whose consequences can be disastrous against the real physical world.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it can be seen from the above comparative analysis that due to the late start of China's industrialization, the manufacturing capacity and internet utilization capacity in the industrial field are relatively weak compared with those of developed countries. Therefore, it is necessary to take into account the development of both soft services and hard links, attach importance to IT/OT integration [25] [26]. A more systematic and comprehensive reference architecture of IIP should be developed from the hardware and software aspects.…”
Section: ) Further Consideration Of Reference Architecture Of Iipmentioning
confidence: 99%
“…First, ICS was originally designed mainly for a proprietary and closed infrastructure without considering too much about security issues, as traditional critical infrastructures are sort of isolated and are not vulnerable to cyberattacks. With these infrastructures being connected to the Internet through IoTs, a wide range of cyberattacks, including distributed denial-ofservice (DDoS), malware, breach attack, Brute force attack, Man-in-the-middle attack, SQL injection, and phishing, are threatening the operation of ICS to provision normal support for services [11], [12], [13], [14]. In addition, ICS is in a position for data acquisition in critical infrastructures.…”
mentioning
confidence: 99%