Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial control security audit system based on protocol deep analysis and application thereof

A security auditing and industrial control technology, applied in the field of student education management, can solve the problems of insufficient monitoring, lack, waste of processing time and computing power, etc., and achieve the effect of improving protection ability and level, and ensuring timeliness

Inactive Publication Date: 2021-02-02
北京珞安科技有限责任公司
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the industrial control security audit system has the following deficiencies: First, it lacks the distinction between industrial Ethernet and industrial process behavior abnormalities, which reduces the accuracy of information processing; second, when analyzing known protocols, it is impossible to perform fast Identification wastes valuable processing time and computing power. Finally, the existing industrial control security audit system generally only monitors network traffic, ignoring the feature that can be monitored, such as the abnormal time series of network traffic of different devices, and the monitoring is not comprehensive enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control security audit system based on protocol deep analysis and application thereof
  • Industrial control security audit system based on protocol deep analysis and application thereof
  • Industrial control security audit system based on protocol deep analysis and application thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0030] Such as Figure 1-4 As shown, the present invention proposes an industrial control security audit system based on protocol depth analysis and its application, including on-site monitoring layer, control layer, physical layer, industrial control security audit module and security protection management platform, industrial Ethernet and field bus interface Between the on-site monitoring layer and the physical layer, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an industrial control safety audit system based on protocol deep analysis and an application thereof. The system comprises an on-site monitoring layer, a control layer, a physical layer, an industrial control safety audit module and a safety protection management platform, the industrial Ethernet and an on-site bus are located between the field monitoring layer and the physical layer, the on-site monitoring layer performs data transmission and behavior control on the control layer through the industrial Ethernet, the physical layer is connected with the on-site bus through a sensor, an actuator and the like, and the on-site monitoring layer is mainly used for abnormality detection of an industrial network; according to the invention, targeted detection of abnormalbehaviors can be carried out, the accuracy is high, a physical layer realizes effective physical blocking of malicious behaviors such as network attacks and illegal access in operation of industrial control system equipment by controlling an interface of an external control line, and loss is stopped in time; the industrial control system equipment terminal security protection method is good in compatibility, better in applicability, convenient in equipment increase and decrease, and capable of flexibly updating the alarm rule base and improving the protection capability.

Description

technical field [0001] The invention relates to the field of student education management, in particular to an industrial control safety audit system based on protocol depth analysis and its application. Background technique [0002] Modern industrial control enterprises include not only production control systems, but also information management systems such as production management and quality control. The integration of control systems and information systems has become the general trend, and the interconnection of production control systems and management information systems has become an important part of ICS. Basic structure; due to the emergence of hacker conferences, white hat communities, and open source communities, it is becoming easier and easier to obtain the attack methods of industrial control systems. These have greatly reduced the difficulty of network attacks against industrial control systems; and with the gradual promotion and application of industrial Et...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G05B19/418
CPCG05B19/41875G05B2219/32368Y02P90/02
Inventor 王永峰关勇张晓东彭静
Owner 北京珞安科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products