Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for generating security policy against attack for a controller

A security strategy and controller technology, applied in transmission systems, electrical components, etc., can solve the problems of easy security loopholes, large security protection granularity, and low security protection reliability, and achieve small security protection granularity and security refinement High, not easy to be tapped or counterfeit effect

Active Publication Date: 2018-12-14
HANGZHOU HOLLYSYS AUTOMATION
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to ensure the security of the controller, most manufacturers usually deploy devices such as firewalls, network-managed switches or routers on site, and use the security policies in these devices to defend the border of the controller in units of regions. Since there are multiple controllers in each area, the granularity of security protection is large, the reliability of security protection is low, and security vulnerabilities are prone to exist.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for generating security policy against attack for a controller
  • A method and system for generating security policy against attack for a controller
  • A method and system for generating security policy against attack for a controller

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The core of the present application is to provide a controller attack defense security policy generation method, which can reduce the security protection granularity of the controller, thereby improving the reliability of security protection and avoiding security loopholes. Another core of the present application is to provide a security policy generation system for controller attack prevention, a controller, and a computer-readable storage medium.

[0048] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for generating anti-attack security policy of a controller, which is applied to the controller. The method comprises the following steps: analyzing security configuration information in a received configuration engineering file to form a network structure diagram; traversing the network structure diagram and establishing the communication relationship between the controller and the target network terminal; obtaining attribute information of a target network terminal by using the communication relationship; based on the attribute information, generating a security policy. It can be seen that the controller generates its own security policy, and the granularity of security protection is smaller, that is, the degree of security refinement is higher, so as to improve the reliability of security protection of the controller and avoid the existence of security loopholes. Moreover, the controller can be protected without the prior art equipment, and the cost isreduced. The invention also provides a method for generating anti-attack security policy of a controller, a controller and a computer-readable storage medium, all of which have the above beneficial effects.

Description

technical field [0001] The application relates to the field of industrial control network security protection, and in particular to a method for generating a controller anti-attack security policy, a system for generating a controller anti-attack security policy, a controller, and a computer-readable storage medium. Background technique [0002] The distributed control system has a wide range of applications, and is mainly used in various industries such as steel, petroleum, chemical industry, electric power, building materials, machinery manufacturing, automobiles, textiles, transportation, and environmental protection. Distributed control systems impose strict requirements on the deterministic execution time of programs. And in any case, the accuracy of the controller IO input, IEC operation, and IO output cycle should be guaranteed. [0003] The controller is the core of the distributed control system, and once it encounters a fault, it will cause significant loss of lif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/20H04L63/205
Inventor 王欣黄玲李蒙
Owner HANGZHOU HOLLYSYS AUTOMATION
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More