Control systems widely used in the national infrastructures are mainly aimed at regular performances of the specified tasks. Therefore, whitelisting security solutions or program that define all usable assets and approachable relationships between rules are widely applied to. The working procedure of the whitelisting control system can be described not just by simple accessing abilities, but various rules such as communication period, frequency, sequence of communication objects, concurrency and inclusion relation etc. As a whitelisting has recently developed more complicatedly, it is believed that the research of the information visualizing which helps the users recognize priority information and the research of the UI which let users manage those information more efficiently are necessary. We have set an extended form of whitelisting that is required for control system security, and it is also based on general requirements in that field. Basing on the analysis of relevant tools and interviews with security experts, we propose a visualize method to manage whitelist information more easily and effectively.
CITATION STYLE
Chae, A. B., Yun, J. H., Kim, S. K., Seo, K. I., & Kim, S. W. (2017). Data visualization for network access rules of critical infrastructure. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10273 LNCS, pp. 35–54). Springer Verlag. https://doi.org/10.1007/978-3-319-58521-5_3
Mendeley helps you to discover research relevant for your work.