Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for preventing suspicious data package from attacking PLC via industrial Ethernet

A data packet, Ethernet technology, applied in electrical components, transmission systems, etc., can solve problems such as production accidents

Inactive Publication Date: 2015-06-24
BEIJING LIKONG HUACON TECH
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If hackers or viruses invade the computer and try to destroy the data in the PLC, it will cause a production accident, which is a malicious attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing suspicious data package from attacking PLC via industrial Ethernet
  • Method for preventing suspicious data package from attacking PLC via industrial Ethernet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0023] figure 1 Be the flow chart of the present invention, as figure 1 Shown, a kind of method that stops suspicious data packet from attacking PLC by industrial ethernet, comprises the following steps:

[0024] Step 1 sets up a protection device between the user computer and the PLC;

[0025] Step 2: The protection device intercepts and analyzes data packets in the industrial Ethernet network;

[0026] Step 3 compares the analysis results with the preset rules in the protection device to find the corresponding defense-in-depth module;

[0027] Step 4: The defense-in-depth module analyzes the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a method for preventing a suspicious data package from attacking a PLC via an industrial Ethernet. The method comprises the following steps that a protecting device is arranged between a user computer and the PLC; the data package in a network of the industrial Ethernet is intercepted and analyzed by the protecting device; an analysis result is compared with a preset rule in the protecting device, and a corresponding depth defense module is searched; a specific analysis is carried out on a protocol by the depth defense module; based on the judgment of the depth defense module, passing of the data package is prevented or allowed. The method is based on a deep package inspection technology, an in-depth analysis and an inspection are carried out on application layer content of the data package which tries to access the PLC, and the suspicious data package is blocked, so that attacking behaviors targeting a PLC register are prevented. Once the suspicious data package is intercepted, beside from rejecting the suspicious data package from entering a protected area, a TCP connection can be reset, or a data package which shows an error is sent to an upper computer, and the attacking behaviors are alerted, so that attacks from hackers or viruses are effectively intercepted, and the safety of data in the PLC is protected.

Description

technical field [0001] The invention relates to the technical field of industrial Ethernet security, in particular to a method for preventing suspicious data packets from attacking PLC through the industrial Ethernet. Background technique [0002] With the advent of the network information age, my country's industrial model has undergone earth-shaking changes, completely breaking the "information island" model. Enterprises are fully connected to the Internet, and production data can be easily aggregated and analyzed. This not only improves production efficiency, but also promotes the national strategy of energy conservation and emission reduction. . The beneficial changes that informatization has brought to the industry are obvious, but the subsequent network information security issues make people panic. [0003] A commercial firewall is a relatively common network security device, and it is the most commonly used protection facility on the network border. These functions ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1466
Inventor 谷永国何迪江
Owner BEIJING LIKONG HUACON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products