Industrial control network security influence analysis method based on function analysis

An industrial control network and impact analysis technology, applied in the field of network security, can solve problems such as adverse effects on the operation of systems, networks and related equipment, threats to industrial control systems, software and data availability, integrity and confidentiality, etc.

Active Publication Date: 2020-08-25
SHANGHAI NUCLEAR ENG RES & DESIGN INST CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Information security attacks will affect the availability, integrity, and confidentiality of software and data, adversely affect the operation of systems, networks, and related equipment, and pose a threat to industrial control systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control network security influence analysis method based on function analysis
  • Industrial control network security influence analysis method based on function analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0021] The present invention expresses the function as a target-means hierarchical structure by analyzing the function of the process system in a hierarchical structure. This hierarchical analysis starts from the top-level function, and decomposes the top-level function step by step into the process system that realizes the function, the sub-functions of the process system, and finally decomposes into the underlying process equipment that realizes the function, so as to obtain the function-sub-function-equipment level relationship. Then, by studying the interactive relationship between the digital industrial control system and the controlled process equipment, a collection of process equipment and associated digital industrial con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial control network security influence analysis method based on function analysis. The method comprises the steps: performing function hierarchical modeling and function decomposition; constructing a function tree topological graph; performing asset collection and analysis, and performing function and equipment association; analyzing a network security attack; evaluating the influence of functional consequences; generating a function topological graph, and establishing the hierarchical relationship from functions to equipment, thereby achieving the objective quantification of equipment information security importance; and analyzing the final actual influence of the information security attack on the process system and the path of the influence of the information security attack on the process system, so the objective quantification of the information security risk degree is realized.

Description

technical field [0001] The invention belongs to the field of network security, in particular to an industrial control network security impact analysis method based on function analysis. Background technique [0002] Since the Stuxnet worm attacked Iran's nuclear facilities in 2010, all walks of life at home and abroad have attached great importance to the information security of industrial control systems. Information security attacks will affect the availability, integrity, and confidentiality of software and data, adversely affect the operation of systems, networks, and related equipment, and pose a threat to industrial control systems. For information security attacks, how to intuitively understand the final impact of information security attacks on the process system is very important for system designers and system users. By studying the actual impact of digital devices affected by information security attacks on the entire system process, make Designers have a clearer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/20H04L41/12H04L63/145H04L63/1441H04L41/145
Inventor 常箫毛磊郑威张淑慧
Owner SHANGHAI NUCLEAR ENG RES & DESIGN INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products