İlhan et al., 2019 - Google Patents
Requirement analysis for cybersecurity solutions in industry 4.0 platformsİlhan et al., 2019
- Document ID
- 10044142304736155846
- Author
- İlhan
- Karaköse M
- Publication year
- Publication venue
- 2019 International Artificial Intelligence and Data Processing Symposium (IDAP)
External Links
Snippet
Increasing technology and the use of the Internet have brought the Industry 4.0 revolution. Internet of Things, smart devices, smart objects, information, and data are in many systems in an era of developing the technology. The main components of the industry 4.0 such as …
- 238000004458 analytical method 0 title description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mullet et al. | A review of cybersecurity guidelines for manufacturing factories in industry 4.0 | |
| İlhan et al. | Requirement analysis for cybersecurity solutions in industry 4.0 platforms | |
| Singh | Understanding and Implementing Effective Mitigation Strategies for Cybersecurity Risks in Supply Chains | |
| Alcaraz et al. | Security aspects of SCADA and DCS environments | |
| Mylrea et al. | Cybersecurity and optimization in smart “autonomous” buildings | |
| US20240305664A1 (en) | Cybersecurity operations mitigation management | |
| Karampidis et al. | Industrial cybersecurity 4.0: Preparing the operational technicians for industry 4.0 | |
| US10148678B2 (en) | Cybersecurity system with differentiated capacity to deal with complex cyber attacks | |
| Eggers et al. | Vulnerabilities in artificial intelligence and machine learning applications and data | |
| Akter et al. | Cloud forensic: Issues, challenges, and solution models | |
| Kalinaki | Ransomware threat mitigation strategies for protecting critical infrastructure assets | |
| Ayala | Cyber-physical attack recovery procedures | |
| Miloslavskaya | Developing a network security intelligence center | |
| Frederick et al. | Analysis on Cybersecurity Control and Monitoring Techniques in Industrial IoT: Industrial Control Systems | |
| Karahan et al. | Unveiling the Shadows: Anticipating Future Cyber Risks and Their Impacts on Businesses | |
| Bundela et al. | Identification and analysis of security issues in cloud computing | |
| Kul et al. | Forensics in Cyber-Physical Systems | |
| Pahi et al. | A public-private-partnership model for na-tional cyber situational awareness | |
| Kapiton et al. | Automated setup system security configuration of network equipment. | |
| Cohen | Cybersecurity for critical infrastructure: addressing threats and vulnerabilities in Canada | |
| Laraib | Importance of E‐Maintenance for Railways Logistic | |
| Aslam et al. | Cyber Security in Cyber Physical Systems: Challenges and Opportunities | |
| Tuomala | Human factor, cyber hygiene, cyber-physical systems, and industrial control systems in the context of cybersecurity | |
| Bronk | Operation of Transport and Logistics in a Time of (Cyber) Insecurity | |
| Haque | Cyber Resilience Analytics for Cyber-Physical Systems |