Hidden attack detection method based on multi-scale sample entropy and Bayesian network

A Bayesian network and attack detection technology, applied in special data processing applications, complex mathematical operations, electrical components, etc., can solve the problems of industrial control system protocol complexity, computer security technology is difficult to implement and difficult to obtain, etc. The effect of improving the ability of transformation, better effect, and high computational efficiency

Active Publication Date: 2021-05-14
ZHEJIANG UNIV OF TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to target the hidden attacks in the existing networked motion control systems, the detection methods usually start from the control theory. This type of method requires an accurate control theory model, but it is difficult to obtain in practical applications, and the complexity of the industrial control system protocol Insufficiency that makes it difficult to implement computer security technology, the present invention considers the situation that the networked motion control system under multiple sensors is under covert attack, and detects whether there is a sinusoidal attack in the networked motion control system according to the multi-sensor data feature fusion technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden attack detection method based on multi-scale sample entropy and Bayesian network
  • Hidden attack detection method based on multi-scale sample entropy and Bayesian network
  • Hidden attack detection method based on multi-scale sample entropy and Bayesian network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the technical scheme and design idea of ​​the present invention clearer, we describe it in detail in conjunction with the accompanying drawings.

[0058] The research object is a repetitive machining process, and the sampling data is the X and Y axis parameter information, which is periodic and has natural disturbances.

[0059] refer to figure 1 , most of the existing networked motion control systems are usually composed of a host computer, a lower computer and a servo drive system on the industrial site. The communication between the upper computer and the lower computer is realized through the EtherCAT fieldbus protocol.

[0060] refer to figure 2 , the sinusoidal attack is a covert attack. When the networked motion control system is attacked, the output of the controller in the control system is injected with a sinusoidal signal of a certain amplitude and frequency. The control process variable always fluctuates slightly within the working range, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A hidden attack detection method based on a multi-scale sample entropy and a Bayesian network adopts the technical scheme that 1, information of a plurality of physical sensors of a networked motion control system is analyzed, so that the effect of the provided method is better than that of a method based on a single sensor; 2, from the perspective of data driving, sensor information existing in a networked motion control system is fully utilized, and an accurate control system model is not depended on; and 3, through simple coarse graining operation, more information is obtained with low calculation cost, and certain detection performance is improved while the real-time performance of the networked motion control system is met. And 4, the Bayesian network is combined with certain priori knowledge, has better generalization ability, is extremely high in calculation efficiency, and is a detection method very suitable for a networked motion control system.

Description

technical field [0001] The invention belongs to the technical field of industrial control system safety, and in particular relates to an intrusion detection method suitable for concealed attacks on a networked motion control system to ensure the normal operation of the networked motion control system. Background technique [0002] With the increasing improvement of networked motion control system technology, various advanced technologies such as embedded technology, multi-standard industrial control network interconnection, and wireless technology have been organically integrated, expanding the development space in the field of industrial control. The advanced communication network technology makes the traditional motion control system begin to develop in the direction of networking, and the closedness of the system is broken, which leads to the networked motion control system facing information security threats such as viruses, Trojan horses, and hackers. [0003] There are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F30/20G06F17/18H04L29/06
CPCG06F30/20G06F17/18H04L63/1416Y02P90/02
Inventor 张文安张宝康黄大建吴麒
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products