Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Intrusion detection method and system for networked control system based on ontology model

A networked control and intrusion detection technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., to achieve low false alarm rate, improve detection efficiency, and improve detection capabilities

Active Publication Date: 2017-02-08
HUAZHONG UNIV OF SCI & TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to solve the above-mentioned problems when the existing network intrusion detection method is used in a master-slave single network segment networked control system, and to provide an ontology model-based networked control system intrusion detection method and system, the purpose of which is to be able to Real-time, efficient, and comprehensive networked control system intrusion detection in resource-constrained environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method and system for networked control system based on ontology model
  • Intrusion detection method and system for networked control system based on ontology model
  • Intrusion detection method and system for networked control system based on ontology model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. It should be noted here that the descriptions of these embodiments are used to help understand the present invention, but are not intended to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0054] like figure 1 As shown, a networked control system intrusion detection method is established in the networked control system that needs to detect intrusion. The networked control system includes a master node, K slave nodes (K is a positive integer) and an industrial communication network, and its communication macrocycle is T milliseconds. The intrusion detection method adopts a distributed structure, and the detection master node is deployed on the master node...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a networked control system intrusion detection method and system based on an ontology model. According to the method, the networked control system ontology model is built; intrusion detection is carried out based on the ontology model; and after decision is weighed, the final detection result is obtained. The system comprises a master node, a plurality of slave nodes and an industrial communication network responsible for message transmission. The master node is responsible for finishing the collection of host activity audit data of itself, collection of all network messages, detection of control closed circulation corresponding to the master node, control object detection, detection of host activity audit data of all nodes in the whole system, network activity detection and detection result coordination. Each slave node is responsible for completing detection of control closed circulation corresponding to the slave node and uploading the detection result to the master node as well as collecting the host activity audit data of the node itself and uploading the host activity audit data to the master node. According to the intrusion detection method and system, the intrusion detection can be performed in resource-constrained environments efficiently, comprehensively and in real time, thereby reducing industrial network control system safety reconstruction cost.

Description

technical field [0001] The invention relates to the field of information security defense of industrial control systems, and more specifically, to an intrusion detection method and system for networked control of industrial control systems. Background technique [0002] With the rapid development of computer technology, network communication technology and automatic control technology, the networked control system (Networked Control System, NCS) has realized the management, monitoring and control of a wide area, breaking the deadlock of traditional automation system information islands. The core and key of management and control integration has been widely used in national key infrastructure construction and industrial control fields. However, the open nature of the NCS network also makes it face various information security issues. For example, the "Gigafactory Virus" attacked Iran's Bushehr Nuclear Power Plant in 2010, seriously threatening the safe operation of nuclear re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 周纯杰黄双张琦秦元庆
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products