Check patentability & draft patents in minutes with Patsnap Eureka AI!

Control code anomaly detection method and device

A control code and anomaly detection technology, which is applied in the field of control code anomaly detection methods and devices, can solve problems such as unrecognizable and affect the security of industrial control computers, and achieve the effect of ensuring safety

Active Publication Date: 2016-03-30
ZHEJIANG SUPCON RES
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the technical defects existing in the prior art that affect the security of industrial control computers due to the inability to detect the attacks within the system or the inability to identify unknown and new network attack methods, the present invention provides a control code anomaly detection method And the device can disable the attack even if the attack method cannot be identified or there is an attack inside the system, which improves the security of the industrial control computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control code anomaly detection method and device
  • Control code anomaly detection method and device
  • Control code anomaly detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] Method example:

[0041] see figure 1 , which is a flow chart of an embodiment of a control code anomaly detection method provided by the present invention.

[0042] The control code anomaly detection method provided in this embodiment includes the following steps:

[0043] Step S101: Send a real-time control code extraction request to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a control code anomaly detection method and device. The method includes the following steps that: a real-time control code extraction request is transmitted to an industrial control computer; real-time control codes transmitted by the industrial control computer are received, and the real-time control codes are compared with pre-stored control codes, if the real-time control codes are mismatched with the pre-stored control codes, the pre-stored control codes are transmitted to the industrial control computer, so that the industrial control computer replaces the real-time control codes with the pre-stored control codes. With the control code anomaly detection method and device of the invention adopted, attacks can be disabled when attack modes cannot be identified or attacks exist in a system, and therefore, the safety of the industrial control computer can be improved.

Description

technical field [0001] The invention relates to the field of industrial control, in particular to a control code abnormality detection method and device. Background technique [0002] Under the background of industrialization and informationization, more and more control systems used by modern industrial enterprises for production have been connected to the Internet to play the integration benefits of information systems. But the accompanying network security problems are also becoming more and more obvious. And because the industrial control system network does not pay enough attention to network security in the early stage of design or deployment, it also exacerbates the network security problem of the industrial control system. Once a security problem occurs, there will be greater losses than information network security incidents. For example, the famous "stuxnet" virus is a network attack on Siemens control system. [0003] Industrial control computer (referred to as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G05B23/02
CPCG05B23/0235G05B2219/23189
Inventor 冯冬芹薛金良
Owner ZHEJIANG SUPCON RES
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More