A fog computing industrial protocol construction method and system based on a generative adversarial network

An industrial protocol and construction method technology, which is applied in the field of fog computing industrial protocol construction method and construction system based on generative adversarial network, which can solve the problem that adversarial network has not been used in depth.

Active Publication Date: 2019-04-26
EAST CHINA NORMAL UNIV +1
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the field of security, there are also some studies that use machine learning models, but the new model of generative adversarial networks has not been used in depth.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A fog computing industrial protocol construction method and system based on a generative adversarial network
  • A fog computing industrial protocol construction method and system based on a generative adversarial network
  • A fog computing industrial protocol construction method and system based on a generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In conjunction with the following specific embodiments and accompanying drawings, the invention will be further described in detail. The process, conditions, experimental methods, etc. of implementing the present invention, except the content specifically mentioned below, are common knowledge and common knowledge in this field, and the present invention has no special limitation content.

[0033] The honeypot is deployed in the industrial system based on fog computing through traditional technology, but the actual industrial protocol is not used when deploying the honeypot, but the simulation protocol is used. For industrial protocols used in fog computing, its payload bytes can be represented by values ​​in [0, 255], which is consistent with the pixel format of grayscale images. Therefore, the industrial protocol stream can be converted into a single-channel grayscale image, for example, the hexadecimal Siemens S7 communication protocol can be a 10×10 grayscale image. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fog computing industrial protocol construction method based on a generative adversarial network. Different from a traditional defense method, a fog computing industrial control system model is adopted, a simulation protocol capable of being deployed to a honeypot system is constructed by utilizing a deep convolutional generative adversarial network, and then active defense and passive defense based on the honeypot technology are combined to protect the industrial system. The honeypot deployed outside the system not only can be used for knowing malicious behavior capture vulnerabilities of attackers, but also can be used for preventing and defending hackers' attacks to a certain extent, so that an active defense technology similar to the honeypot is necessary for afog computing industrial system with relatively low security. Deployment of an actual industrial protocol in a honey pot consumes time and labor, protocol information is exposed, potential safety hazards are caused, and the purpose of deception attackers cannot be well achieved by directly simulating a low-interaction static protocol flow rather than practically. Therefore, it is particularly important to construct a realistic simulation protocol to cheat an attacker.

Description

technical field [0001] The present invention relates to the field of fog computing industrial security, in particular to a method and system for constructing fog computing industrial protocols based on generative confrontation networks. Background technique [0002] Currently, on the one hand, security issues are becoming more challenging as industrial control systems evolve from isolated systems to interactive systems. Security incidents (such as Stuxnet and Duqu) have brought serious harm, so the security of industrial control systems has risen to the national strategic level and has been promoted in the global cyber-physical space. In recent years, the fog computing paradigm has brought intelligence down to industrial equipment in order to improve local computing capabilities, which further extends the concept of security to the boundaries of industrial networks. In the fog computing environment, in the face of increasingly complex industrial networks, it is not enough t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06N3/04G06N3/08G05B19/418
CPCG05B19/4186G06N3/08G06N3/045Y02P90/02
Inventor 刘虹陆楚
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products