A threat detection method and security device based on fusion verification of key parameters

A threat detection and key parameter technology, applied in electrical testing/monitoring, testing/monitoring control systems, instruments, etc., can solve problems such as not making full use of security detection and protection, ignoring data consistency verification, etc., to achieve a rich level Security, good threat detection, and the effect of meeting individual needs

Active Publication Date: 2018-05-18
CHINA INFORMATION TECH SECURITY EVALUATION CENT
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing schemes ignore the verification of data consistency at different levels;
[0007] (3) The core of the industrial control network data flow is the process production data, operation instructions, control parameters, equipment status information and control equipment configuration parameters, etc., which is obviously different from the information flow on the traditional IT system network, and the existing solutions are not sufficient. Use this feature to carry out security detection and protection;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A threat detection method and security device based on fusion verification of key parameters
  • A threat detection method and security device based on fusion verification of key parameters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 1 It is a structural schematic diagram of the threat detection of the industrial control system in Embodiment 1. The system mainly conducts threat detection for typical industrial control systems including fieldbus layer, control layer, monitoring layer, scheduling layer and office layer.

[0043] The detected equipment at the field level mainly includes measuring instruments, actuators, frequency converters and remote input and output units.

[0044] The main equipment detected by the control layer includes the controller of the distributed control system, the programmable controller, the remote terminal unit and other equipment.

[0045] The main equipment detected by the host threat detection unit includes the server of the control system, the OPC server and the workstation (operator station, engineer station, etc.).

[0046] The firewall installed between the control layer and the scheduling layer detects the information exchange between the two layers, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a threat detection method based on key parameter fusion verification and an industrial control system safety device for realizing the method. According to the method, aiming at characteristics of a hierarchical structure of an industrial control system, a method for fusion verification of key parameters between vertical layers is employed. The threat detection method includes: firstly, threat detection of each layer of the industrial control system including a fieldbus layer is conducted; and then based on layered detection, vertical fusion verification of key parameters of the industrial control system such as key technological parameters, control parameters, and control instructions etc. is performed in order to overcome the defect of the layered detection method. According to the method, safety detection bugs caused by insufficient data fusion in defense in depth of the conventional industrial control system is solved, the personalized requirement of a threat detection device for the industrial control system is met, comprehensive threat detection for the safety of the industrial control system is realized, the safety of the industrial control system is improved, and safe and stable operation of a controlled process is guaranteed.

Description

technical field [0001] The invention belongs to the field of industrial control systems, and mainly relates to a threat detection method and safety device based on fusion verification of key parameters. Background technique [0002] The information security of industrial control systems, especially industrial control systems of critical infrastructure, is an important part of national security. In recent years, frequent network intrusions not only seriously threaten the safe and stable operation of key infrastructure, but also may cause loss of people's lives and property. It has important theoretical and practical significance to strengthen the intrusion detection of industrial control system to improve the system information security level. [0003] Due to the complexity of industrial control systems, it is difficult to ensure the information security of industrial control systems with a single protection strategy. In view of the structural characteristics of industrial ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G05B23/02
CPCG05B23/027G05B2219/24048
Inventor 陈冬青张翀斌谢丰彭勇伊胜伟
Owner CHINA INFORMATION TECH SECURITY EVALUATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products