A efficient network security management model in industrial control system
- Authors
- Lim, J.-W.; Kim, I.-Y.; Kim, K.-J.; Park, J.-P.
- Issue Date
- Dec-2018
- Publisher
- Medwell Journals
- Keywords
- Cyber security; Industrial control; Intranet; Model; Network separation; Security management
- Citation
- Journal of Engineering and Applied Sciences, v.13, no.Specialissue12, pp.9461 - 9467
- Journal Title
- Journal of Engineering and Applied Sciences
- Volume
- 13
- Number
- Specialissue12
- Start Page
- 9461
- End Page
- 9467
- URI
- http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/34358
- DOI
- 10.3923/jeasci.2018.9461.9467
- ISSN
- 1816-949X
- Abstract
- The industrial control system constitutes an interdependent system through the cross-connection, so, the security policies for the maintenance of the closed network cannot be applied to the practical situations. Thus, the need for the development of the security management system applicable to various environments arises. In this study, we separated the industrial control network and suggested a security application model as an efficient security management system of the industrial control network. Also, in order to address the existing security problems, we proposed an efficient industrial control network security management system that was hierarchically defined in accordance with the domestic environment of the control network, under the application of hierarchical security model level 0-4 concept defined by the ISA-99. The proposed application security model of the industrial control network was systemized through the application of the separated industrial control network that is separated into the control network and the intranet or into the control network and the external network in accordance with the practical application environment. Also, the hierarchical security model is structured to direct the control system whichis the most important asset to be protected in the control network. Therefore, applying this model has an advantage that the security is strengthened in the process of converting the security system integrated into the internal control network into the multiple protection model. It is expected that if the physical one-way transmission device and the commercial security system provided through the one-way transmission device are developed, it could be flexibly applied to the proposed industrial control network security model. ? Medwell Journals, 2018.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - ETC > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.