Industrial control network security faces challenges, and it is imperative to accelerate the construction of my country’s industrial control security system

In 2010, Iran’s nuclear facilities were attacked by Stuxnet virus; in December 2015, Ukrainian power plants were attacked by hackers, and a large area of ​​residents was out of power; in April 2018, the industrial router Morsa EDR-810 exposed 17 serious vulnerabilities... in the past In the past few years, network security incidents have come into people's sight frequently, and every time it has been impressive.

“Cyber ​​security incidents require a constant alarm, based on independent innovation, in order to get rid of the situation where core technology products are controlled by others, and based on independent innovation, can we achieve the coordinated advancement of development and security." On the 29th, the National Engineering Laboratory of Industrial Control Information Security Technology At the three council meetings, Fang Binxing, an academician of the Chinese Academy of Engineering, called out.

Industrial control network security faces challenges, and it is imperative to accelerate the construction of my country’s industrial control security system

Industrial control network security challenges

What is an industrial control network? Fang Binxing introduced, in simple terms, it is the "3+3" model, that is, three elements: computing, communication, and control; three network forms: the Internet, the Internet of Things, and the sensor network. Among them, control is fundamental. In the case of interconnection, information needs to be transmitted, and the transmission depends on communication, so communication is the support. The role of communication is to use calculations to decide how to control better, because what we finally pursue is intelligent control, that is, intelligent manufacturing, which depends on calculations.

Industrial Internet focuses on information processing and interconnection with information systems. Industrial Internet of Things focuses on on-site network transmission, identification and control. Industrial sensor network is a part of Internet of Things, focusing on information collection, construction of accurate, real-time, and university data collection Transmission system.

Surrounding this model, Fang Binxing said that industrial control networks are facing severe security challenges, such as industrial control systems that are increasingly becoming the primary target of hacker attacks and cyber warfare. According to data, in the first half of 2017 alone, about 18,000 malicious software targeting industrial control systems were discovered; industrial big data as a core resource of the enterprise faces severe security risks; core technology products are low in autonomous controllability and are subject to others; lack of industrial control network security High simulation environment, etc.

"In short, the application of new technologies such as cloud computing, big data, and the Internet of Things has increased the openness and uncertainty of industrial processing processes. Security risks have further concentrated. The industrial control network is facing severe security challenges. It is urgent to build industrial control. The core key technology system of cyber security." Fang Binxing said.

Specifically, backdoors are common in foreign industrial equipment, and there is no guarantee for national and corporate security. At the end of 2013, a military industrial company purchased a large number of high-end equipment from Guangzhou and shipped it to Lanzhou. After it was turned on in Lanzhou, it could not run and was locked. After the company communicated with the agent in Guangzhou, the agent questioned that the purchase location was in Guangzhou, but the operation and use were in Lanzhou, and an application was required to be used.

"What is a backdoor? I can control you without notifying you that it has this function." Fang Binxing said, people can monitor your geographic coordinates, and if they find that the geographic coordinates are changed, you are forbidden to use it. Tell you this feature.

The core technology must be autonomous and controllable

The number of industrial information security vulnerabilities has been increasing year after year, and more than half of the security vulnerabilities are high-risk vulnerabilities... Therefore, the core technology must be firmly in our hands.

"Why always talk about national products, not that national products will not do bad things, but that they dare not do bad things because the law can sanction them. At most foreigners are not allowed to market. Therefore, the key technology must be autonomous Be controllable and ensure safety under the legal framework. Problems that cannot be solved by management rely on technology, and problems that cannot be solved by technology rely on management. However, there are still many core equipment and technologies in the hands of others." Fang Binxing said.

Fang Binxing said that to build a comprehensive security system for industrial Internet security, we should first start with self-controllability, that is, intrinsic safety. There can be no human factors. Self-controllable can solve no human factors. Then there are safety experiment platforms, deep protection systems and Public service system, etc.

Specifically, the essential guarantee is to be autonomous and controllable from all levels, and to solve their own problems at all levels, including the automated implementation of industrial control systems, the industrialization of industrial core products and equipment, and the innovative research of industrial control core technologies.

Fang Binxing said that industrial security includes sensor networks, the Internet and computer networks. The computer network is an external network, and it is more common for external networks to have external networks, and traditional security methods can be used. Intranet Internet of Things and sensor networks need to have an intranet approach. This must fit the industrial control system to solve the problem and construct its complete system. Of course, there is also a set of situational awareness in the intranet to know what risks it will have in its future direction.

Academician Fang's speech was unanimously endorsed by the participating experts. Jin Hongrong, deputy general manager of China Electronics Corporation, said that China Electronics regards the promotion of industrial Internet and intelligent manufacturing business as a basic, strategic, and long-term work for its industrial transformation and upgrading, and researched and proposed China Electronics’ “two platforms and one project” intelligence. Manufacturing business promotion plan.

In the future, China Electronics will leverage its own core technological advantages of independent and controllable technologies accumulated in the field of cyber security, promote the in-depth integration of cyber security technology and intelligent manufacturing technology, ensure the safety of industrial control in the manufacturing industry, and promote the intelligent transformation and upgrading of the manufacturing industry. Contribute to the construction of a network power "China Electronic Solution".

With the theme of "Industrial Control System Information Security Status and Systematic Construction", this conference aims to accelerate the construction of my country's industrial control security assurance system, promote exchanges and cooperation in the industrial control security industry, and create an ecological environment for network security and informatization in my country's industrial control field.

LED Display

Led Display,Led Screen,Led Display Screen,led monitor

Guangzhou Chengwen Photoelectric Technology co.,ltd , https://www.cwstagelight.com