Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information safety simulation model and terminal of industrial control system

An industrial control system and information security technology, applied in the field of network security, can solve problems that affect system operation, network instability, and failure to provide industrial control network security risk simulation and demonstration.

Active Publication Date: 2018-10-12
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above-mentioned simulation technology is not an independent module, and needs to be realized by relying on the power simulation system. When it is implemented, if it is applied in a real power system network, it will cause network instability or even packet loss, which will affect the system operation.
Therefore, it is necessary to prepare an additional power system network, and the power system network is relatively complex, and the cost of preparing a set is relatively high, resulting in a significant reduction in the scope of application of the simulation technology; in addition, due to the special format of the power system dedicated protocol, the above simulation technology is mainly based on The Internet attack method realizes the simulation of industrial control network attack, and the ability to analyze and identify power proprietary protocols is poor, and it is impossible to tamper or forge power data packets, so it is impossible to simulate and detect the network security of the power monitoring system; in addition, the above-mentioned The network security simulation technology of the power monitoring system is limited to the hijacking simulation and attack verification of industrial control messages, and there is no network security simulation consideration for terminal hosts (including various servers, engineer stations, etc.); and the above simulation technology cannot provide industrial control network security. Risk simulations and demonstrations do not match training, an important function of a true simulation platform
[0007] In summary, the existing network security attack simulation technology for industrial control systems has dependencies, limitations and non-professional technical problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety simulation model and terminal of industrial control system
  • Information safety simulation model and terminal of industrial control system
  • Information safety simulation model and terminal of industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] An industrial control system information security simulation model, reference figure 1 , the model is an independent information security simulation model, including: a network security simulation module 11, a network security product simulation module 12 and a network security training module 13;

[0058] The network security simulation module 11 is used to perform security compliance detection on the network structure of the industrial control system, perform security detection on the network traffic of the industrial control system, and perform security detection on the network host of the industrial control system;

[0059] The network security product simulation module 12 is used to test the function, vulnerability and performance of the network security product, obtain test information, and evaluate the conformity between the identification information of the network security product and the test information;

[0060] The network security training module 13 is use...

Embodiment 2

[0178] An industrial control system information security simulation terminal, on which the industrial control system information security simulation model in the first embodiment above is installed.

[0179] The computer program product of the industrial control system information security simulation model and the terminal provided by the embodiments of the present invention includes a computer-readable storage medium storing program codes, and the instructions included in the program codes can be used to execute the method described in the preceding method embodiments. For the specific implementation of the method, refer to the method embodiments, which will not be repeated here.

[0180] Those skilled in the art can clearly understand that for the convenience and brevity of description, the specific working process of the above-described system and device can refer to the corresponding process in the foregoing method embodiments, which will not be repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information safety simulation model and terminal of an industrial control system. The information safety simulation model comprises a network safety simulation module,a network safety product simulation module and a network safety training module; the network safety simulation module conducts safety compliance detection on the network structure of the industrial control system,conducts safety detection on the network flow of the industrial control system and conducts safety detection on a network host of the industrial control system; the network safety product simulation module tests the function,loopholes and performance of a network safety product,obtains testing information,and evaluates the conformity of identification information and the testing informationof the network safety product; the network safety training module simulates the usage scenario,the operating scenario and the emergency response scenario of the industrial control system. The information safety simulation model is more professional and diversified in function in the aspect of network safety simulation and wide in applicable range,and does not rely on a power simulation system,so that the technical problems of dependence on a network safety attack simulation technology of the industrial control system,limitation and non-professional performance of an existing information safetysimulation model are solved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an industrial control system information security simulation model and a terminal. Background technique [0002] At present, the data exchange between the various systems of the industrial control system (that is, the industrial control system) of the power industry is becoming more and more frequent, and the security intensity requirements of the power integrated monitoring system have reached the national security strategy standard. The development of the industrial Internet also makes the industrial control security of power generation companies often suffer from malicious attacks. [0003] The grid capacity is huge, and the power generation methods are becoming more and more diverse (from the original thermal power generation, hydropower generation to today's wind power generation and photovoltaic power generation), the network security of the power monitoring system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G05B23/02
CPCG05B23/0243G05B2219/24065
Inventor 张桐桐范渊黄进
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products