Industrial control security defense system

A security defense and industrial control technology, applied in general control systems, control/regulation systems, comprehensive factory control, etc., can solve the problems of endangering personnel health and public property safety, inability to quickly identify and eliminate crises, and increasing risks of industrial control systems, etc. problems, to achieve the effects of easy search and analysis, improvement of information security protection capabilities, and improvement of alarm response time

Active Publication Date: 2021-05-14
上海磐御网络科技有限公司
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the emergence of security loopholes, it will undoubtedly increase the risk of the industrial control system, which will affect the normal production order and even endanger the health of personnel and the safety of public property.
[0003] At present, due to the limitation that high-end hacking technology is difficult to learn and master, many people directly obtain existing industrial control system attack methods from the Internet, or directly use posing as operators, engineers, and manufacturer system upgrade technicians to directly enter the factory area to destroy. The industrial control security defense system cannot quickly identify and eliminate the crisis. At the same time, if the external computer, U disk and other equipment are misconnected to the device port, it is easy to cause the virus to directly enter the terminal equipment system to launch an attack. The existing industrial control security defense system generally divides the command Downgraded to lower levels, the response to the crisis was not timely enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control security defense system
  • Industrial control security defense system
  • Industrial control security defense system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027]In order to make the objects, technical solutions, and advantages of the present invention, the present invention will be further described in detail below with reference to the accompanying drawings. It should be understood that these descriptions are merely exemplary and are not to limit the scope of the invention. Further, in the following description, a description of known structures and techniques is omitted to avoid unnecessary obscuring the concepts of the present invention.

[0028]Such asFigure 1-4As shown, a industrial control safety defense system proposed by the present invention includes a potential threat exclusion layer, an industrial control security auditing system, a monitoring center, a field monitoring layer, a control layer, and a physical layer; potential threat exclusion layers include depth protocol parsing mechanisms and white List mechanism; field monitoring layer performs data exchange and behavior control over the control layer and physical layer by i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial control security defense system which comprises a potential threat exclusion layer, an industrial control security audit system, a monitoring center, a field monitoring layer, a control layer and a physical layer. The potential threat elimination layer comprises a deep protocol analysis mechanism and a white list mechanism; the field monitoring layer performs data exchange and behavior control on the control layer and the physical layer through an industrial Ethernet; the industrial control security auditing system can analyze and identify illegal operation, abnormal events and external attacks in an industrial control network from multiple angles and give an alarm in real time; identity recognition is carried out through multiple means, system operation authority can be limited, override operation and malicious operation are avoided, it is avoided that external equipment carries viruses to affect system safety, meanwhile, exclusive detection can be carried out on common attack means, and the operation resource occupancy is small. The alarm response time of the whole system can be prolonged through unified monitoring management of the monitoring center, and the accident handling speed is increased.

Description

Technical field[0001]The present invention relates to the field of industrial control system, and more particularly to an industrial control security defense system.Background technique[0002]The industrial control system mainly refers to the collection, monitoring of real-time data, and implements device automation and management and monitoring of business processes. It is mainly due to the management and monitoring of business processes. The characteristics of the real-time and data events of data transfer. Drive and data source actively push, etc. However, due to the emergence of security vulnerabilities, there is undoubtedly to increase risks for industrial control systems, which will affect normal production order, and even happen to health and public property safety.[0003]At present, due to the limitations of high-end hackers difficult to learn, many people directly acquire existing industrial control system attack methods directly from the network, or directly adopt the techni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G05B19/418
CPCG05B19/4184G05B2219/31088Y02P90/02
Inventor 黄龙飞
Owner 上海磐御网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products