Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Repeated machining process concealment attack detection method based on hidden Markov model

A hidden Markov and repetitive processing technology, applied to complex mathematical operations, electrical components, transmission systems, etc., can solve problems such as undetectable hidden attacks, and achieve the effects of wide application range, improved accuracy, and simple training

Active Publication Date: 2019-09-27
ZHEJIANG UNIV OF TECH
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the inability of the existing intrusion detection methods to detect covert attacks, it is assumed that covert attacks invade the control system and tamper with the output data of the control, and at the same time escape the detection of the industrial control system, while the sampling data of the external sensor is not detected. In order to effectively detect such attacks in industrial control systems, the present invention proposes a concealed attack detection method based on hidden Markov model, which detects whether there is an attack from the data characteristics sampled by the sensor. It is divided into three stages: model training, threshold determination and intrusion detection, and each stage requires data preprocessing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Repeated machining process concealment attack detection method based on hidden Markov model
  • Repeated machining process concealment attack detection method based on hidden Markov model
  • Repeated machining process concealment attack detection method based on hidden Markov model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the technical scheme and design idea of ​​the present invention clearer, we describe it in detail in conjunction with the accompanying drawings.

[0054] The research object is a repetitive processing process, and the sampling data is the position information of the X and Y axes, which is periodic and has natural disturbances.

[0055] refer to Figure 1 ~ Figure 3, a hidden Markov model-based concealment attack detection method for repeated processing processes. The implementation process is divided into three stages: model training, threshold determination, and intrusion detection, and each stage requires data preprocessing.

[0056] 1) In the model training phase, the process is as follows:

[0057] Step 1.1) Mean filtering

[0058] The processing of the X and Y axes in the repetitive machining process is similar. We take the X axis as an example, select N sampling periods, and T sampling points in each period. Because in each cycle, the data at e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A repeated machining process concealment attack detection method based on a hidden Markov model is divided into a model training stage, a threshold determination stage and an intrusion detection stage, and each stage needs to be subjected to data preprocessing operation; in order to retain useful information and prevent distortion, a mean filtering method is proposed to obtain a theoretical mean value, then a residual error is calculated, namely the mean value is substracted from a sampling value, and an absolute value is taken to obtain a residual error value sequence; after data preprocessing, Baum-Welch algorithm is used for training to obtain model parameters, a forward algorithm is used for estimating a probability value, a threshold value is determined, and finally whether an attack exists or not is judged by judging the affinity of a real-time observation sequence and a model. According to the method, disturbance and attacks can be extracted, concealment attacks can be effectively detected, adjustment can be conducted according to specific data in the aspects of a quantification method and a final judgment decision, and the application range is wide.

Description

technical field [0001] The invention belongs to the technical field of industrial control system security, and in particular relates to a hidden Markov model-based detection method for concealed attacks in repeated processing processes. Background technique [0002] In the industrial control system, with the deep integration of informatization and automation, the originally relatively independent industrial control system is increasingly interconnected with the enterprise management network, making the threat of security issues gradually spread to the industrial control system, and the security of the industrial control system The problem is becoming more and more prominent. Covert network attacks are high-tech attacks that use adversarial covert evasion techniques and use network control to steal confidential information or long-term control and destruction attacks. Under normal circumstances, hidden attacks are highly technical, highly concealed, and long-term persistent....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F17/10
CPCG06F17/10H04L63/1416
Inventor 张文安黄大建史秀纺陈博
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products