Supercharge Your Innovation With Domain-Expert AI Agents!

Security protection method and system for DNP3 protocol

A security protection and protocol technology, applied in transmission systems, electrical components, etc., can solve problems such as hidden safety hazards and industrial control network information security issues

Active Publication Date: 2021-04-16
BEIJING CHANGYANG TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the interconnection between the enterprise information network and the industrial control network, there are also some security risks. The common security threats in the enterprise information network are introduced into the industrial control network, such as network viruses, hacker attacks, and malicious operations. The industrial control network brings serious information security problems, and the "Stuxnet" virus incident is a typical example
Since the data exchange between hardware suppliers and software developers is transparent as long as the DNP3 rules are followed, more and more security risks are introduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method and system for DNP3 protocol
  • Security protection method and system for DNP3 protocol
  • Security protection method and system for DNP3 protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0035] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0036] figure 1 An exemplary system architecture 100 of a security protection method for the DNP3 protocol according to the embodiment of the present application is shown.

[0037] Such as figure 1 As shown, the system architecture 100 may include terminal devices 101 , 10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security protection method and system for a DNP3 protocol. The method comprises the following steps: extracting a TCP protocol application layer data packet in a TCP / IP message of an internet access of a DNP3 client; analyzing the data packet according to a frame structure defined by a DNP3 protocol, extracting a feature data frame conforming to a format defined by the DNP3 protocol in the data packet, judging whether the feature data frame contains a service interface or not, and if not, discarding the TCP / IP message; checking a service interface white list of the feature data frame according to a DNP3 protocol, judging whether the feature data frame is legal or not, and if not, discarding the TCP / IP message; and extracting a request data frame in the feature data frame, checking an object group variant white list of the request data frame according to a DNP3 protocol to judge whether the request data frame is legal or not, if so, allowing the TCP / IP message to be transmitted to a DNP3 server, and otherwise, discarding the TCP / IP message. According to the invention, the security protection of the DNP3 protocol is realized, and a basis is provided for the construction of a DNP3 protocol firewall.

Description

technical field [0001] The invention relates to the technical field of industrial information, in particular to a safety protection method and system for the DNP3 protocol. Background technique [0002] In the field of industrial control, in order to realize the interoperability between the application software and hardware products of the industrial control system, it is necessary to solve the problems of system integration and data communication at the application level. DNP is called Distributed Network Protocol, which is a telecontrol communication protocol launched by HARRS company, and is a mainstream communication protocol in the current power system automation product market. DNP3 is a national standard formulated by the American IEEE Electrical Engineering Society on the basis of IEC. [0003] With the deep integration of industry and information technology, in industrial enterprises such as electric power, energy, chemical industry, water conservancy, pharmaceutic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 明鹏
Owner BEIJING CHANGYANG TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More