Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An implementation method of opcua protocol supporting mimic system

A technology of mimicking systems and implementation methods, applied in the field of network communication, can solve the problems of complex network functions, difficult for attackers to observe and predict, and complex computing functions.

Active Publication Date: 2021-02-12
ZHEJIANG LAB
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Chinese patent CN201610853938.7 "A Device, Method, and Equipment for Encapsulating Heterogeneous Functional Equivalents" proposes a mimic security defense technology, which can obtain a favorable endogenous defense situation from initiative, variability, and randomness. The environment changes dynamically, which is difficult for attackers to observe and predict, thus greatly increasing the difficulty and cost of attacks including unknown exploitable vulnerabilities and backdoors
Due to the asynchrony of the OPCUA (OLE (Object Linking and Embedding) for Process Control) protocol process and the differences in random numbers and timestamps in the interaction process of different systems, the OPCUA protocol cannot be used in such figure 1 Normal operation on the mimic system shown
[0004] Chinese patent CN201610853938.7 solves the problem of network element security protection very well, but at present, network functions are becoming more and more complex, and there are more and more types of security attacks. For example, in network edge computing, network elements not only have network transmission functions, as well as storage and calculation functions. The data stored by network elements usually exceeds G bytes or even T bytes, and the calculation functions are complicated. If the mimicry judgment function of Chinese patent CN201610853938. In terms of ruling accuracy, it is difficult to meet the actual needs of the network
[0005] Chinese patent CN202010521038.9 solves the problem of TCP normalization very well, but due to the large differences between different applications, there are problems such as time stamp, incremental serial number, channel ID, etc. that need to be normalized, and there are abnormalities in the application In the case of restart, it is necessary to be able to keep in sync with the application processes in other executives after the restart and other problems need to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An implementation method of opcua protocol supporting mimic system
  • An implementation method of opcua protocol supporting mimic system
  • An implementation method of opcua protocol supporting mimic system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] An implementation method of an OPCUA protocol supporting mimic system of the present invention mainly includes a unified resource management module, an OPCUA state synchronization module and an OPCUA output agent module. The OPCUA protocol is applied in the form of an OPCUA process in the mimic system.

[0030] Such as figure 2 As shown, the OPCUA process includes six states: establishing a TCP connection, HELLO interaction, establishing a secure channel, obtaining an endpoint, establishing a session, and activating a session. Each state corresponds to different configuration information. Among them, the configuration information corresponding to the establishment of the TCP connection state mainly includes the information of the TCP three-way handshake, such as the sliding window size, random number, etc.; the configuration information corresponding to the HELLO interaction state mainly includes the value of the interactive sending and receiving data cache size; the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing the mimetic system supported by the OPCUA protocol. The method includes synchronous normalization of output messages and quick start of the OPCUA application on the mimetic system. An OPCUA process runs on each executive body of the mimic system, and the mimic system appears as a single system to the outside. In order to ensure that the OPCUA processes on multiple execution bodies can run normally, it must be ensured that the OPCUA processes on each execution body can run synchronously and the output content is consistent. The present invention guarantees output synchronization by sending control messages at the output agent; through the resource management module, all resources are managed uniformly, and the OPCUA process on all running execution bodies applies for resources from the resource management module to solve the normalization problem; in the OPCUA state synchronization module The current OPCUA running state and the configuration information required for its interaction are saved in the file, and the OPCUA process on the executive body can read the running state and configuration information to achieve quick startup.

Description

technical field [0001] The invention belongs to the field of network communication, and in particular relates to a method for realizing a mimetic system supported by the OPCUA protocol. Background technique [0002] While cyberspace is developing vigorously, it is facing a severe security situation. There are a large number of malicious attacks against cyberspace. In addition, the network system is complex and inevitably has loopholes. Therefore, cyberspace has both external threats and internal security threats. Vulnerability issues are intertwined, and security risks are severe and complex. In the new cyberspace security situation, traditional defense methods based on prior knowledge are difficult to deal with various attacks. It is necessary to change defense thinking, define new defense boundaries, consolidate the depth of defense, and move from passive to active defense with endogenous security. [0003] Chinese patent CN201610853938.7 "A Device, Method, and Equipment ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/08
CPCH04L41/028H04L67/56
Inventor 闫林林
Owner ZHEJIANG LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products