A security impact analysis method for industrial control network based on functional analysis

An industrial control network and impact analysis technology, applied in the field of network security, can solve problems such as adverse effects on the operation of systems, networks and related equipment, threats to industrial control systems, software and data availability, integrity and confidentiality, etc.

Active Publication Date: 2022-07-22
SHANGHAI NUCLEAR ENG RES & DESIGN INST CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Information security attacks will affect the availability, integrity, and confidentiality of software and data, adversely affect the operation of systems, networks, and related equipment, and pose a threat to industrial control systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security impact analysis method for industrial control network based on functional analysis
  • A security impact analysis method for industrial control network based on functional analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the above objects, features and advantages of the present invention more clearly understood, the present invention will be described in further detail below with reference to the accompanying drawings and specific embodiments.

[0021] The present invention expresses the function as a target-means hierarchical structure by analyzing the function of the process system in a hierarchical structure. The hierarchical analysis starts from the top-level function, decomposes the top-level function into the process system that realizes the function, the sub-function of the process system, and finally decomposes it to the bottom-level process equipment that realizes the function, so as to obtain the function-sub-function-equipment hierarchy ization relationship. Then, by studying the interaction between the digital chemical control system and the controlled process equipment, a collection of digital chemical control system assets associated with the process equip...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial control network security impact analysis method based on function analysis, including function hierarchical modeling and function decomposition; building a function tree topology diagram; asset collection and analysis, associating functions and equipment; network security attack analysis; Impact assessment; generate a functional topology map and establish a hierarchical relationship from functions to equipment, thereby realizing the objective quantification of the importance of equipment information security; it can also analyze the final actual impact of information security attacks on the process system, as well as information security attacks on the process. The system affects the way, so as to realize the objective quantification of the information security risk degree.

Description

technical field [0001] The invention belongs to the field of network security, in particular to an industrial control network security impact analysis method based on function analysis. Background technique [0002] Since the Stuxnet worm attacked Iran's nuclear facilities in 2010, all circles at home and abroad have attached great importance to the information security of industrial control systems. Information security attacks will affect the availability, integrity and confidentiality of software and data, adversely affect the operation of systems, networks and related equipment, and pose a threat to industrial control systems. For information security attacks, how to intuitively understand the final impact of information security attacks on the process system is very important for system designers and system users. The designer has a clearer understanding of the vulnerabilities of the system and the links that need to focus on information security fortification, so that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/12H04L41/14
CPCH04L63/20H04L41/12H04L63/145H04L63/1441H04L41/145
Inventor 常箫毛磊郑威张淑慧
Owner SHANGHAI NUCLEAR ENG RES & DESIGN INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products