Unlock instant, AI-driven research and patent intelligence for your innovation.

Man-in-the-middle attack detection method for gas SCADA system based on single classification support vector machine

A technology of support vector machine and attack detection, which is applied in transmission systems, electrical components, computer components, etc., can solve problems affecting people's normal production and life, casualties and property, and large impact, and achieve large feature changes and good detection effect, obvious effect

Active Publication Date: 2019-09-24
ZHEJIANG UNIV OF TECH
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The urban gas high-pressure pipeline network has the greatest impact on the entire city. Because the man-in-the-middle attack has invaded the gas SCADA system, it is difficult to detect at the network layer. Once a man-in-the-middle attack occurs, it may cause casualties and major property losses, and affect people's health normal production and life

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Man-in-the-middle attack detection method for gas SCADA system based on single classification support vector machine
  • Man-in-the-middle attack detection method for gas SCADA system based on single classification support vector machine
  • Man-in-the-middle attack detection method for gas SCADA system based on single classification support vector machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the technical scheme and design idea of ​​the present invention clearer, we describe it in detail in conjunction with the accompanying drawings.

[0044] refer to figure 1 , a gas SCADA system, including on-site control systems (PLC, DCS, SIS, etc.), remote RTU, instruments and actuators, etc. refer to figure 2 , a man-in-the-middle attack means that the attacking party and the two ends of the communicator have established independent connections, and can exchange the data they receive, so that the two ends of the communication think that they are directly talking to each other through a private connection, but During the communication process, all communication content has been completely controlled by the attacker. During the man-in-the-middle attack, the attacker can insert new content during the communication process. The man-in-the-middle attack method adopted is xPot. xPot is a 4G interface device that can be used as a small device for internal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a man-in-the-middle attack detection method for a gas pipe network SCADA system based on a single classification support vector machine. The man-in-the-middle attack detection method comprises the following steps: 1) performing feature extraction on valve switch signal data returned by a gas pipe network SCADA system sensor; 2) firstly, training a single classification support vector machine model by using data sets operated under all normal working conditions of the gas SCADA system; secondly, verifying the accuracy of the model by using a verification set, verifying the generalization ability of the single classification support vector machine model by using a test set, and finding an optimal single classification support vector machine model by continuously adjusting a kernel function and penalty parameters; and 3) real-time attack detection: returning a valve switch signal of the gas SCADA system in real time according to the sampling time, carrying out coding calculation on the signal, putting the data characteristics into the trained support vector machine model, and judging whether the valve at the sampling time point is attacked or not. According to the method, the man-in-the-middle attack of the gas SCADA system is effectively detected.

Description

technical field [0001] The invention relates to the field of gas SCADA system attack detection and specifically designs a gas SCADA system man-in-the-middle attack detection method based on a single classification support vector machine. Background technique [0002] As a clean, low-emission and efficient energy source, natural gas has a good substitute for traditional energy sources in power generation, transportation, and chemical industry. With the continuous expansion of the urban natural gas pipeline network, the manual management mode and management methods can no longer meet the requirements of "reasonable planning, scientific management, and safe gas use". The response capacity and processing efficiency for emergencies are difficult to meet the needs of the rapid development of urban construction. Therefore, natural gas companies need a more convenient and timely way to realize the automation and scientificity of pipeline network operation, pipeline maintenance, pip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1416G06F18/2411
Inventor 张文安程蒋旭吴麒胡浩陈钢缪银锋史秀纺陈博
Owner ZHEJIANG UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More