Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for generating controller anti-attack security policy

A security strategy and controller technology, applied in transmission systems, electrical components, etc., can solve the problems of low security protection reliability, easy security loopholes, large security protection granularity, etc. The effect of small granularity and high security refinement

Active Publication Date: 2021-06-11
HANGZHOU HOLLYSYS AUTOMATION
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to ensure the security of the controller, most manufacturers usually deploy devices such as firewalls, network-managed switches or routers on site, and use the security policies in these devices to defend the border of the controller in units of regions. Since there are multiple controllers in each area, the granularity of security protection is large, the reliability of security protection is low, and security vulnerabilities are prone to exist.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for generating controller anti-attack security policy
  • Method and system for generating controller anti-attack security policy
  • Method and system for generating controller anti-attack security policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The core of the present application is to provide a controller attack defense security policy generation method, which can reduce the security protection granularity of the controller, thereby improving the reliability of security protection and avoiding security loopholes. Another core of the present application is to provide a security policy generation system for controller attack prevention, a controller, and a computer-readable storage medium.

[0048] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application provides a controller anti-attack security policy generation method, which is applied to the controller, including: analyzing the security configuration information in the received configuration project file to form a network structure diagram; traversing the network structure diagram to establish a control The Unicom relationship between the device and the target network terminal; use the Unicom relationship to obtain the attribute information of the target network terminal; generate a security policy based on the attribute information. It can be seen that the controller itself generates a security policy, and the granularity of security protection is smaller, which means that the degree of security refinement is high, thereby improving the reliability of the security protection of the controller and avoiding security loopholes. Moreover, the controller can be protected without the equipment in the prior art, which reduces the cost. The present application also provides a security policy generation system for controller attack prevention, a controller, and a computer-readable storage medium, all of which have the above beneficial effects.

Description

technical field [0001] The application relates to the field of industrial control network security protection, and in particular to a method for generating a controller anti-attack security policy, a system for generating a controller anti-attack security policy, a controller, and a computer-readable storage medium. Background technique [0002] The distributed control system has a wide range of applications, and is mainly used in various industries such as steel, petroleum, chemical industry, electric power, building materials, machinery manufacturing, automobiles, textiles, transportation, and environmental protection. Distributed control systems impose strict requirements on the deterministic execution time of programs. And in any case, the accuracy of the controller IO input, IEC operation, and IO output cycle should be guaranteed. [0003] The controller is the core of the distributed control system, and once it encounters a fault, it will cause significant loss of lif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/20H04L63/205
Inventor 王欣黄玲李蒙
Owner HANGZHOU HOLLYSYS AUTOMATION
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More