Abstract
At present, the cyberspace security confrontation between countries is becoming more and more fierce. As the main target of cyber warfare, the power industrial control system is always at the forefront of network attack and destruction. The existing security protection of china's power industrial control system mainly focuses on boundary protection. The security protection of the industrial control system itself is insufficient, and it is unable to effectively deal with the emergence of various high-concealment APT attacks. The application of new technologies such as the Internet of Things has further expanded the attack surface. According to the research idea of “reliable hardware, system immunity, unified framework, and controllable software”, this paper proposes an ontology security protection framework and key technologies for power industrial control system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhang, C.Y., Yang, X.Y., Liang, W., Qi, Y.Z.: Research on attack threat analysis technology of power industrial control system. Electr. Appl. 38(02), 85–90+107 (2019)
Bell, R.: Introduction to IEC 61508. In: ACM International Conference Proceeding Series. vol. 162 (2006)
Mitchell, C., (ed.): Trusted Computing, vol. 6. IET, UK (2005)
Yang, B., Feng, D., Qin, Y., Zhang, Y.: TrustZone-based trusted mobile terminal cloud service security access solution. J. Software 27 (06), 1366–1383 (2016)
Götzfried, J., Eckert, M., Schinzel, S., et al.: Cache attacks on Intel SGX. In: Proceedings of the 10th European Workshop on Systems Security, pp. 1–6 (2017)
Jäger, L., Petri, R.: DICE harder: a hardware implementation of the device identifier composition engine. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1–8 (2020)
Shen, C.X.: Building a strong line of defense for network security with trusted computing 3.0. Internet Econ. (08), 42–45 (2019)
Klein, G., Elphinstone, K., Heiser, G., et al.: seL4: formal verification of an OS kernel. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles. ACM, pp. 207–220 (2009)
Integrity-178B Separation Kernel Security Target. SAIC. 2011–01–31. Retrieved from 22 March 2011
Shi, W., Cao, J., Zhang, Q., et al.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)
Veen, V.V.D., Andriesse, D., Gkta, E., et al.: Practical Context-Sensitive CFI. In: The 22nd ACM SIGSAC Conference. ACM (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, W., Zhu, S., Yang, K., Qi, L., Cong, Z. (2022). RIShield: An Ontology Security Framework and Key Technologies for Power Industrial Control System. In: Li, X. (eds) Advances in Intelligent Automation and Soft Computing. IASC 2021. Lecture Notes on Data Engineering and Communications Technologies, vol 80. Springer, Cham. https://doi.org/10.1007/978-3-030-81007-8_32
Download citation
DOI: https://doi.org/10.1007/978-3-030-81007-8_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-81006-1
Online ISBN: 978-3-030-81007-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)