Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Networked numerical control system man-in-the-middle attack detection method based on Gaussian radial basis function classifier

A Gaussian radial basis, numerical control system technology, applied in transmission systems, instruments, characters and pattern recognition, etc., can solve the problems of lack, time lag, no safety management system, etc., to achieve easy implementation, simple theoretical framework, The effect of good generalization ability

Active Publication Date: 2019-10-08
ZHEJIANG UNIV OF TECH
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, due to the lack of network management, users who access the communication network will become the key target of network hackers, and directly steal confidential information by posing as users
[0005] At present, the security protection for industrial control systems is mostly focused on traditional IT security solutions, such as system upgrades, virus killing, installation of industrial firewalls, etc., but most of these solutions have a certain time lag and have not formed a complete set safety management system
In addition, there are essential differences between industrial control systems and information systems in terms of performance requirements, management requirements, and physical characteristics. Once criminals use the characteristics of industrial control systems to launch corresponding attacks, they can bypass existing IT security solutions and cause unsafe economic loss recovered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Networked numerical control system man-in-the-middle attack detection method based on Gaussian radial basis function classifier
  • Networked numerical control system man-in-the-middle attack detection method based on Gaussian radial basis function classifier
  • Networked numerical control system man-in-the-middle attack detection method based on Gaussian radial basis function classifier

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the technical solutions and design ideas of the present invention clearer, a detailed description will be given below in conjunction with the accompanying drawings.

[0047] refer to figure 1, most of the existing networked CNC systems can be divided into three parts: dispatch control center, IT security detection and protection part, and industrial site. There are many ways to realize NC technology at present, but the present invention only considers the networked numerical control system which realizes the management and control of numerical control program with the FTP file transfer protocol as the core. Under normal working conditions, the FTP protocol will send the NC program to each sub-node of the industrial site in the form of a file, and the local workstation in the sub-node will execute the program, and finally respond to the normal operation of the server and servo motor. However, the traditional FTP protocol has a large number of potential ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a networked numerical control system man-in-the-middle attack detection method based on a Gaussian radial basis function classifier, and the method comprises the steps: firstly, analyzing the physical sensor information of a numerical control system from the perspective of a control level; then, starting from the perspective of data driving, considering the data of the industrial control system under the offline condition as normal working condition data, and further analyzing the working condition data under the online condition by taking the normal working condition data as a reference; taking the deviation degree between the working condition data and the historical working condition data under the online condition as sample data; then, starting from the perspective of statistics, taking the mean value and the variance as feature information of the sample data; and finally, starting from the perspective of a machine learning method, training a support vectormachine based on a Gaussian radial basis function to obtain a classifier, and achieving correct classification of attacks. The method can solve the problem that a traditional IT security detection scheme is difficult to detect professional attacks; and the theoretical framework is simple, easy to implement and good in generalization capability.

Description

technical field [0001] The invention is applied to the network intrusion detection of the industrial control system, and relates to an intrusion detection method suitable for man-in-the-middle attacks on the networked numerical control system. Background technique [0002] Since the emergence of "Made in China 2025", China has gradually transformed from a big manufacturing country to a powerful manufacturing country, and a new round of industrial revolution centered on the deep integration of informatization and industrialization is booming. As the main direction of the new round of industrial revolution, intelligent manufacturing will promote the transformation from Chinese manufacturing to Chinese creation, from Chinese speed to Chinese quality, and from Chinese products to Chinese brands. [0003] In the modern manufacturing industry, the application of NC technology (NC—Numerical Control) has become increasingly widespread. The superiority of the NC system is reflected i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06K9/62
CPCH04L63/1416H04L63/1433H04L67/06G06F18/2414
Inventor 吴麒张文安缪银峰程蒋旭史秀纺洪榛俞立
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products