Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial control system security data verification system and method

A technology for industrial control systems and secure data, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as single key, compatibility, and problems, and achieve the effect of resisting network attacks and not being easy to identify

Active Publication Date: 2020-03-24
GUANGDONG UNIV OF TECH
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the SCTP protocol itself has good defense capabilities against denial-of-service attacks and man-in-the-middle attacks, the authentication method is a symmetric encryption authentication structure with a single key, and its defense against unauthorized commands and replay attacks is weak; the Sec_Modbus protocol uses symmetric encryption and digital signature technology to achieve confidentiality requirements and authentication, use the SHA-256 hash algorithm to calculate the digest of the message, and use the synchronization principle and the one-way design of the hash function to realize the anti-replay attack method based on the hash chain, but This method needs to change the communication protocol used by the original system, has compatibility problems, and does not support domestic cryptographic algorithms; uses TCP storage-type covert channels to perform hash verification on Modbus data, and is targeted by content-based detection methods risk of detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control system security data verification system and method
  • Industrial control system security data verification system and method
  • Industrial control system security data verification system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0051] It should be understood that this application applies to the industrial control system safety data verification system, please refer to figure 1 , figure 1 It is a system architecture diagram of the safety data verification system of the industrial control system in the embodiment of the present application, such as figure 1 as shown, figure 1 It includes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an industrial control system security data verification system and method. The method comprises the following steps of adjusting the time interval of adjacentdata packets by using a time hidden channel to represent check information so that a time hidden channel between the main terminal unit and the remote terminal unit is established; completing the processes of sending and receiving the authentication information of an Modbus-TCP data packet; wherein the verification information is generated through an unlimited type hash algorithm; therefore, the time delay of the Modbus-TCP data packet can be detected; when the communication time delay does not accord with the verification information of the time hidden channel, the communication between the main terminal unit and the remote terminal unit is blocked, and an alarm is generated, so that various network attacks can be resisted, and the invention is not easy to identify based on a content detection method and supports a domestic cryptographic algorithm.

Description

technical field [0001] The present application relates to the technical field of industrial control system security, in particular to an industrial control system security data verification system and method. Background technique [0002] Data acquisition and monitoring system (SCADA, Supervisory Control And Data Acquisition) is an important part of industrial control system. Traditional SCADA locks the interface in a specified range through physical means, which leads to only considering functionality and stability when designing and deploying. Safety considerations are lacking. In the actual operation of the industrial control system, the attacker penetrates into the SCADA internal network through system background loopholes or human negligence, and conducts network attacks such as data tampering on the normal operation of the industrial control system, thereby secretly causing continuous physical damage to industrial equipment. . [0003] For data tampering attacks on i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L63/1441H04L63/18H04L9/3236H04L67/12
Inventor 凌捷朱智燊谢锐柳毅
Owner GUANGDONG UNIV OF TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More