Concealed attack detection method for industrial control on-site equipment

An attack detection and field equipment technology, applied in program control, general control system, electrical testing/monitoring, etc., can solve the problem of inability to detect hidden attacks on industrial control field equipment, and achieve the effect of improving the level of security protection and effective detection

Active Publication Date: 2018-08-10
UNIV OF SCI & TECH BEIJING
View PDF9 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide a detection method for concealed attacks of industrial cont

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Concealed attack detection method for industrial control on-site equipment
  • Concealed attack detection method for industrial control on-site equipment
  • Concealed attack detection method for industrial control on-site equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0058] Aiming at the existing problem that the concealment attack of the industrial control field equipment cannot be detected, the present invention provides a detection method for the concealment attack of the industrial control field equipment.

[0059] Such as figure 1 As shown, the concealed attack detection method for industrial control field equipment provided by the embodiment of the present invention includes:

[0060] S101, comparing the observed output of the industrial control object with the predicted expected output, obtaining a residual sequence and performing residual preprocessing;

[0061] S102, calculating the permutation entropy of the residual sequence;

[0062] S103. If the decrease in permutation entropy of the residual sequence ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a concealed attack detection method for industrial control on-site equipment, and the method can achieve the effective detection of concealed attacks. The method comprises the steps: comparing observation output of an industrial control object with predicted expected output, obtaining a residual error sequence, and carrying out the residual error preprocessing; calculating apermutation entropy of the residual error sequence; determining that the industrial control object encounters the concealed attack if the descend range of the permutation entropy of the residual error sequence is greater than a preset first threshold value in a preset time interval, or else determining that the industrial control object does not encounter the concealed attack. The method is suitable for the concealed attack detection of the industrial control on-site equipment.

Description

technical field [0001] The invention relates to the technical field of industrial control information security, in particular to a method for detecting concealed attacks of industrial control field equipment. Background technique [0002] Industrial control systems (referred to as "industrial control systems", Industrial Control Systems, ICS) have been widely used in important fields such as finance, transportation, water conservancy, manufacturing, energy, military industry, etc., and are an important part of the country's key information infrastructure, directly affecting The national economy and the people's livelihood. [0003] In recent years, with the continuous integration of industrial control systems and the Internet, and the increasingly severe cyberspace security situation, there have been more and more attacks on industrial control systems. In 2010, the "Stuxnet" virus infected the industrial control program in Iran's Natanz uranium enrichment base, which contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G05B23/02
CPCG05B23/0243G05B2219/24065
Inventor 胡堰
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products