Industrial control system security data verification system and method

A technology for industrial control systems and secure data, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as single key, compatibility, and problems, and achieve the effect of resisting network attacks and not being easy to identify

Active Publication Date: 2020-03-24
GUANGDONG UNIV OF TECH
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the SCTP protocol itself has good defense capabilities against denial-of-service attacks and man-in-the-middle attacks, the authentication method is a symmetric encryption authentication structure with a single key, and its defense against unauthorized commands and replay attacks is weak; the Sec_Modbus protocol uses symmetric encryption and digital signature technology to achieve confidentiality requirements and authentication, use the SHA-256 hash algorithm to calculate the di

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control system security data verification system and method
  • Industrial control system security data verification system and method
  • Industrial control system security data verification system and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0050] In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0051] It should be understood that this application is applied to the industrial control system safety data verification system, please refer to figure 1 , figure 1 The system architecture diagram of the industrial control system safety data verification system in the embodiment of the application, as shown in figur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an industrial control system security data verification system and method. The method comprises the following steps of adjusting the time interval of adjacentdata packets by using a time hidden channel to represent check information so that a time hidden channel between the main terminal unit and the remote terminal unit is established; completing the processes of sending and receiving the authentication information of an Modbus-TCP data packet; wherein the verification information is generated through an unlimited type hash algorithm; therefore, the time delay of the Modbus-TCP data packet can be detected; when the communication time delay does not accord with the verification information of the time hidden channel, the communication between the main terminal unit and the remote terminal unit is blocked, and an alarm is generated, so that various network attacks can be resisted, and the invention is not easy to identify based on a content detection method and supports a domestic cryptographic algorithm.

Description

technical field [0001] The present application relates to the technical field of industrial control system security, in particular to an industrial control system security data verification system and method. Background technique [0002] Data acquisition and monitoring system (SCADA, Supervisory Control And Data Acquisition) is an important part of industrial control system. Traditional SCADA locks the interface in a specified range through physical means, which leads to only considering functionality and stability when designing and deploying. Safety considerations are lacking. In the actual operation of the industrial control system, the attacker penetrates into the SCADA internal network through system background loopholes or human negligence, and conducts network attacks such as data tampering on the normal operation of the industrial control system, thereby secretly causing continuous physical damage to industrial equipment. . [0003] For data tampering attacks on i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L63/1441H04L63/18H04L9/3236H04L67/12
Inventor 凌捷朱智燊谢锐柳毅
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products