Access control method for dnp communication based on neural network

An access control and neural network technology, applied in the field of industrial control information security, can solve problems such as unrecognizable and unpreventable firewalls, and achieve the effects of improving security and reliability, ensuring security, and preventing fraudulent attacks

Inactive Publication Date: 2019-01-25
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the data packets of spoofing attacks conform to the DNP3.0 protocol rules, but traditional firewalls cannot recognize them, so they cannot prevent such attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method for dnp communication based on neural network
  • Access control method for dnp communication based on neural network
  • Access control method for dnp communication based on neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] figure 1 It is a DNP3.0 communication topology diagram.

[0032] In this example, if figure 1 As shown, the DNP3.0 communication topology includes a master station and multiple sub-stations. Adding communication access control between the master station and the sub-stations can effectively prevent attacks without changing the network topology of the control system. The principle is as follows figure 2 As shown, this improves the security and reliability of the DNP3.0 communication process and ensures the safety of the power system.

[0033] Combine below image 3 The DNP communication access control method based on neural network described in the present invention is described in detail, specifically comprises the following steps:

[0034] S1, capture data packets

[0035] Use the Netfilter framework of Linux between the master station and the slave station to capture all DNP3.0 data packets within a unit time T on the DNP3.0 protocol port, so that the data packets...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a neural network-based DNP communication access control method, which constructs a feature sequence by extracting the destination address, source address, direction bit, source station flag and application layer function code in the DNP3.0 protocol, and utilizes the neural network Learn the above feature sequence to obtain the detection model of access control; then preprocess the captured data packets to obtain the sequence to be detected, after the sequence to be detected passes the detection of the detection model, it is judged whether the data packet is allowed to pass, thus completing DNP3. 0 communication access control.

Description

technical field [0001] The invention belongs to the technical field of industrial control information security, and more specifically relates to a neural network-based DNP3.0 communication access control method. Background technique [0002] DNP3.0 (Distributed Network Protocol Version 3.0) is a communication protocol suitable for the field intelligent terminal and the control master station of the distribution automation system, and is widely used in the power system. The security of the DNP3.0 protocol is very important to the power system. [0003] However, DNP3.0 is an open protocol, its message structure and data format are public, and without sufficient security measures, there are potential security risks. Attackers can use datagrams that conform to the rules of the DNP3.0 protocol to For example, during the transmission of DNP3.0 protocol packets, attackers can intercept or tamper with DNP3.0 data packets by using data packets conforming to DNP3.0 protocol rules, ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L69/06
Inventor 辛晓帅程超郭娅雯邹见效彭超张健
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products