A security monitoring method for power industrial control terminals based on business logic consistency

An industrial control terminal, business logic technology, applied in electrical components, data processing applications, instruments, etc., can solve problems such as virus spread, terminal anti-virus software cannot be detected and killed, and power system damage.

Active Publication Date: 2020-08-04
HUANAN IND TECH RES INST OF ZHEJIANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

"Stuxnet", "Flame" and the viruses in the blackout in Ukraine are all cyber attack forces, which cause damage to the power system through power industrial control terminals
The attacker is familiar with the attacked system and network structure, the attack technology used is advanced, the virus spread and damage is very hidden, and the existing terminal anti-virus software cannot detect and kill

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security monitoring method for power industrial control terminals based on business logic consistency
  • A security monitoring method for power industrial control terminals based on business logic consistency
  • A security monitoring method for power industrial control terminals based on business logic consistency

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The purpose and effects of the present invention will become more apparent by referring to the accompanying drawings in detail of the present invention.

[0059] figure 1 It is a flow chart of a method for monitoring security of an electric power industrial control terminal based on business logic consistency, and the flow chart includes (i) the process of generating a security rule set with training data; and (ii) performing security monitoring of an electric power industrial control terminal based on a security rule set and a parameter set Methods. in particular:

[0060] Step 1: Collecting status data from the power industrial control terminal, the method specifically includes:

[0061] (1) Select all equipment terminals participating in the business according to the specific power business process. For example, a specific business needs equipment A and B to cooperate to complete;

[0062] (2) During the service life cycle, continuously monitor and collect status...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety monitoring method of electric power industrial control terminal based on service logic consistency, the invention aims at the safety problem of the electric power industrial control terminal equipment introduced by the diversified information in the 'Internet +' intelligent grid system, breaks through the existing attack detection method simply relying on the network space information, and puts forward a safety method of the electric power industrial control terminal based on the service logic consistency. By sampling the multi-modal data of physical world information and cyberspace information, normalized processing and temporal correlation, and through training, the safety monitoring set and parameter constraint set are obtained for safety monitoring andanomaly identification. From the business level, the method can effectively early-warn the state abnormality caused by equipment performance difference, equipment failure and hacker intrusion, and realize the 'time-state-service' trinity consistency safety monitoring of the electric power industrial control terminal based on equipment time logic, state logic and business logic.

Description

technical field [0001] The invention relates to a safety monitoring method for electric power industrial control terminals, in particular to a safety monitoring method based on the logic consistency of electric power business. [0002] technical background [0003] In the power system, the main function of the grid is to distribute and transmit electrical energy. In the Internet age of the 21st century, the power grid as an energy infrastructure must also be inseparable from informatization. While informatization is highly flexible, it also brings many threats and uncertainties. As the "siblings" of the power industrial control system, the power industrial control terminal plays a pivotal role in the process of power informatization. "Stuxnet", "Flame" and the viruses in the Ukraine blackout incident are all cyber attack forces, which cause damage to the power system through power industrial control terminals. The attacker is familiar with the system and network structure u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/12
CPCG06Q10/06393G06Q50/06
Inventor 颜钢锋王轶楠
Owner HUANAN IND TECH RES INST OF ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products