Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Man-in-the-middle attack detection method for networked CNC system based on Gaussian radial basis function classifier

A Gaussian radial basis, numerical control system technology, applied in transmission systems, instruments, calculations, etc., can solve the problems of lack, time lag, and no safety management system, and achieve easy implementation, simple theoretical framework, and good generalization. effect of ability

Active Publication Date: 2021-08-03
ZHEJIANG UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, due to the lack of network management, users who access the communication network will become the key target of network hackers, and directly steal confidential information by posing as users
[0005] At present, the security protection for industrial control systems is mostly focused on traditional IT security solutions, such as system upgrades, virus killing, installation of industrial firewalls, etc., but most of these solutions have a certain time lag and have not formed a complete set safety management system
In addition, there are essential differences between industrial control systems and information systems in terms of performance requirements, management requirements, and physical characteristics. Once criminals use the characteristics of industrial control systems to launch corresponding attacks, they can bypass existing IT security solutions and cause unsafe economic loss recovered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Man-in-the-middle attack detection method for networked CNC system based on Gaussian radial basis function classifier
  • Man-in-the-middle attack detection method for networked CNC system based on Gaussian radial basis function classifier
  • Man-in-the-middle attack detection method for networked CNC system based on Gaussian radial basis function classifier

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the technical solutions and design ideas of the present invention clearer, a detailed description will be given below in conjunction with the accompanying drawings.

[0044] refer to figure 1 , most of the existing networked CNC systems can be divided into three parts: dispatch control center, IT security detection and protection part, and industrial site. There are many ways to realize NC technology at present, but the present invention only considers the networked numerical control system which realizes the management and control of numerical control program with the FTP file transfer protocol as the core. Under normal working conditions, the FTP protocol will send the NC program to each sub-node of the industrial site in the form of a file, and the local workstation in the sub-node will execute the program, and finally respond to the normal operation of the server and servo motor. However, the traditional FTP protocol has a large number of potential...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A man-in-the-middle attack detection method for networked CNC systems based on Gaussian radial basis function classifiers. First, from the perspective of the control level, analyze the physical sensor information of the CNC system; then, from the perspective of data-driven, consider that the industrial control system is The data in the offline situation is the normal working condition data, and use this as a reference to further analyze the working condition data in the online situation; take the deviation degree between the working condition data in the online situation and the historical working condition data as the sample data; then, from the statistics From the perspective of learning, the mean and variance are used as the feature information of the sample data; finally, from the perspective of machine learning methods, a classifier is obtained through Gaussian radial basis function support vector machine training to achieve correct classification of attacks. The invention can solve professional attacks that are difficult to detect by traditional IT security detection schemes; the theoretical framework is simple, easy to implement and has good generalization ability.

Description

technical field [0001] The invention is applied to the network intrusion detection of the industrial control system, and relates to an intrusion detection method suitable for man-in-the-middle attacks on the networked numerical control system. Background technique [0002] Since the emergence of "Made in China 2025", China has gradually transformed from a big manufacturing country to a powerful manufacturing country, and a new round of industrial revolution centered on the deep integration of informatization and industrialization is booming. As the main direction of the new round of industrial revolution, intelligent manufacturing will promote the transformation from Chinese manufacturing to Chinese creation, from Chinese speed to Chinese quality, and from Chinese products to Chinese brands. [0003] In the modern manufacturing industry, the application of NC technology (NC—Numerical Control) has become increasingly widespread. The superiority of the NC system is reflected i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06K9/62
CPCH04L63/1416H04L63/1433H04L67/06G06F18/2414
Inventor 吴麒张文安缪银峰程蒋旭史秀纺洪榛俞立
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products