System and method for protecting technical systems from cyber attacks

A technical system and control system technology, applied in the direction of transmission system, knowledge-based computer system, instrument, etc., can solve the problem of not allowing monitoring and control

Active Publication Date: 2020-05-12
AO KASPERSKY LAB
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the known methods for protecting technical systems do not allow monitoring and controlling the operation of the different subsystems and levels of the technical system at defined times

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for protecting technical systems from cyber attacks
  • System and method for protecting technical systems from cyber attacks
  • System and method for protecting technical systems from cyber attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Exemplary aspects are described herein in the context of systems, methods and computer program products for protecting technical systems (TS) from cyber-attacks. Those skilled in the art will appreciate that the following description is illustrative only and is not intended to be limiting in any way. Other aspects will suggest to those skilled in the art with knowledge of the invention. Reference will now be made in detail to embodiments of exemplary aspects as shown in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings and the following description to refer to the same or like items.

[0028] A number of definitions and concepts will then be introduced, which will be used to describe various exemplary aspects of the disclosed systems and methods.

[0029] An object of control is a technical object against which an external action (control and / or disturbance) is directed to change its state, in one exemplary a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses systems and methods for protecting technical systems (TS) from cyber-attacks. Exemplary methods include: acquiring the actual state of the technical system; initializing the cybernetic control system (CCS) by synchronizing the cybernetic control system (CCS) with the technical system; State comparison; based on the comparison, identifying the deviation of the actual state of the technical system from the ideal state of the technical system; when a deviation is identified, checking the integrity of at least the functional interconnection of the state of one or more units of the technical system; based on the technical system Based on one or more proven maintained functional interconnections between the units of the technical system, determining whether the ideal state of the technical system is a modeling error; and based on one or more disturbed functional interconnections between the units of the technical system, Identify anomalies in technical systems.

Description

[0001] Cross References to Related Applications [0002] This application claims the benefit of priority from Russian Patent Application No. 2016105562 filed on February 18, 2016, which is incorporated herein by reference. technical field [0003] The present invention relates generally to the field of security, and more particularly to systems and methods for protecting technical systems from cyber-attacks. Background technique [0004] Cyber ​​attacks on technical systems (TS) of critical infrastructures, such as denial of service attacks, have increased significantly in recent years. Therefore, there is an ever-increasing need for improved protection of technical systems of critical infrastructure from such attacks. [0005] The most popular approach to protect technical systems of critical infrastructure is to model and filter the control parameters acting on technical objects of critical infrastructure. There are a wide variety of variants for implementing these meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1416H04L63/1458H04L63/1425G06F11/00G06F21/00G06N5/00H04L67/1095
Inventor 谢尔盖·V·戈尔德契克安德雷·B·拉夫兰特耶夫安德雷·P·杜克瓦洛夫
Owner AO KASPERSKY LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products