Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety protection method and system for iec60870-5-104 protocol

A security protection and protocol technology, applied in the field of security protection methods and systems for the IEC60870-5-101 protocol, can solve problems such as low reliability, achieve the effect of avoiding security risks and ensuring confidentiality

Active Publication Date: 2018-08-21
INSECTECH BEIJING CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a security protection method and system for the IEC60870-5-104 protocol, which is used to solve the problem of low reliability in the communication of the industrial control system based on the IEC60870-5-104 protocol in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method and system for iec60870-5-104 protocol
  • Safety protection method and system for iec60870-5-104 protocol
  • Safety protection method and system for iec60870-5-104 protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts belong to the protection scope of the present invention.

[0029] It should be noted that, in the case of no conflict, the implementations in the present application and the features in the implementations can be combined with each other.

[0030] It should also be noted that in this article, relational terms such as first and second etc. are only used to distinguish one entity or operation from another ent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety protection method for an IEC60870-5-104 protocol, which comprises the following steps: carrying out protocol parsing of a TCP / IP (Transmission Control Protocol / Internet Protocol) layer on an external access request, and determining legality of the TCP / IP layer of the external access request according to a first preset white list; carrying out grouping on the external access request, and detecting integrity of a frame composed of the external access request; determining a frame type of the external access request; when the external access request is of an S format frame or a U format frame, allowing the external access request to group according to a TCP / IP protocol and forwarding to an internal communication port; and when the external access request is of an I format frame, determining the legality of an application layer of the external access request according to a second preset white list. The invention further provides a corresponding safety protection system. According to the method and the system disclosed by the invention, by carrying out multi-stage safety protection on the TCP / IP layer and the application layer, various attacks to an industrial control device or system adopting the protocol can be effectively resisted, and the safety risk due to the lack of a safety protection mechanism in the prior art is effectively avoided.

Description

technical field [0001] The invention relates to the field of industrial information technology, in particular to a safety protection method and system for the IEC60870-5-101 protocol. Background technique [0002] IEC60870-5-104 protocol (IEC104) is the basis of IEC60870-5-104, which is the supporting standard of IEC60870-5-101 basic telecontrol task in order to meet the application of network technology in power system and use the network to transmit telecontrol information. formulated above. Its name is "IEC60870-5-101 network access with standard transmission file set", this agreement combines the application layer of IEC60870-5-101 with the transmission function provided by TCP / IP (Transmission Control Protocol / Internet Protocol). Various network types can be used in TCP / IP, including X.25, FR (Frame Relay), ATM (Asynchronous Transfer Mode) and ISDN (Integrated Service DataNetwork). [0003] At present, traditional firewalls and other equipment are mostly used in indus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/14H04L63/20
Inventor 陈惠欣
Owner INSECTECH BEIJING CO LTD