Decentralized control system attack intrusion detection device and method thereof

A decentralized control system, intrusion detection technology, applied in general control systems, control/regulation systems, program control, etc., can solve the problem of high false negative and false positive rates, limited equipment resources, and increased network security threats and risks. and other problems to achieve the effect of reducing the false negative rate and false positive rate and ensuring the accuracy

Pending Publication Date: 2021-11-30
SHANGHAI UNIVERSITY OF ELECTRIC POWER
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] As the distributed control system gradually uses open and generalized protocols, the network security threats and risks faced by the distributed control system are also increasing. Since the distributed control system directly controls the work of field equipment, once it is attacked and invaded, it will not only cause huge damage. Economic loss and possible danger to personal safety and the environment
Intrusion detection technology is one of the most important security precautions in the decentralized control system. It can detect known and unknown attacks and improve the ability to identify attacks and early warning. However, due to the real-time requirements of the decentralized control system and limited equipment resources, the current Some intrusion detection efficiency is low, its false negative rate and false positive rate are high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized control system attack intrusion detection device and method thereof
  • Decentralized control system attack intrusion detection device and method thereof
  • Decentralized control system attack intrusion detection device and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0036] Such as figure 1 As shown, a distributed control system attack and intrusion detection device includes a data processing module 1 connected to a distributed control system network router, the data processing module 1 is connected to a database module 2, and the database module 2 is bidirectionally connected to the attack intrusion detection module 3, and the data The processing module 1 obtains communication link data from the distributed control system network router, and extracts attack symptom characteristic data from the communication link data;

[0037] The attack intrusion detection module 3 is used to analyze the attack symptom characteristic data according to the set attack intrusion confidence rule base, and obtain the attack detection result;

[0038] The database module 2 is used to receive and store the attack symptom characteristic data output by the data processing module 1, and receive and store the attack detection result output by the attack intrusion d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a decentralized control system attack intrusion detection device and a method thereof. The system comprises a data processing module connected with a decentralized control system network router, the data processing module is connected to a database module, and the database module is in bidirectional connection with an attack intrusion detection module. The data processing module obtains communication link data from the distributed control system network router and extracts attack symptom feature data from the communication link data; the attack intrusion detection module analyzes the attack symptom feature data according to a set attack intrusion confidence rule base to obtain an attack detection result; and the database module receives and stores the attack symptom feature data and the attack detection result. Compared with the prior art, the method has the advantages that the attack intrusion confidence rule base mutually mapped with different attack intrusion types is established, so that the attack intrusion can be reliably detected and early warned in real time, the detection efficiency and accuracy are ensured, and the operation safety of the distributed control system is effectively improved.

Description

technical field [0001] The invention relates to the technical field of security monitoring of industrial control systems, in particular to an attack and intrusion detection device and method for a distributed control system. Background technique [0002] The distributed control system is a new generation of instrument control system based on the microprocessor, which adopts the design principles of decentralized control functions, centralized display and operation, taking into account the design principles of division and autonomy and comprehensive coordination. The distributed control system is called DCS (Distributed Control System) for short. It adopts the basic design concept of decentralized control, centralized operation and management, and adopts a multi-layer hierarchical, cooperative and autonomous structure. Its main feature is its centralized management and decentralized control. At present, DCS has been widely used in various industries such as electric power, me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G05B19/418
CPCG05B19/4184G05B2219/31088Y02P90/02
Inventor 钱虹张栋良张俊张超凡
Owner SHANGHAI UNIVERSITY OF ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products