Cloud-edge collaborative industrial control network safety protection method based on strategy library

A security protection and industrial control network technology, applied in neural learning methods, computer security devices, biological neural network models, etc., can solve the problem that the security protection system cannot meet low-latency response

Pending Publication Date: 2021-11-30
HARBIN INST OF TECH AT WEIHAI
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of the present invention is to solve the problem that the existing industrial control system security protection system mainly cannot meet the low-latency response. The present invention provides a cloud-edge collaborative industrial control network security protection method based on a policy library

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud-edge collaborative industrial control network safety protection method based on strategy library
  • Cloud-edge collaborative industrial control network safety protection method based on strategy library
  • Cloud-edge collaborative industrial control network safety protection method based on strategy library

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] This embodiment is specifically a policy library-based cloud-edge collaborative industrial control network security protection method, the method includes the following steps:

[0046] Step 1: Data Acquisition and Preprocessing

[0047] In practical applications, it is collected by the data acquisition and supervisory control (SCADA) system of the respective application scenarios. Data collection items mainly include real-time and historical data of operation in the industrial control system, as well as auxiliary data from other systems.

[0048] Firstly, the data after feature selection is normalized, which is beneficial to speed up the training of subsequent models. The present invention uses the min-max standardization method, also known as dispersion standardization, which is a linear transformation of the original data, so that the result value is mapped to [0-1]. The conversion function is as follows:

[0049]

[0050] Where max is the maximum value of the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud-edge collaborative industrial control network safety protection method based on a strategy library. The method comprises the steps: generating an abnormal condition recognition rule library through a generative adversarial network (GAN) of a generative model network, namely a long short-term memory (LSTM) network, and a novel discrimination model network, namely a DendriteNetworks DD, at a cloud end; and then deploying the rules to corresponding edge ends, matching a corresponding coping strategy for each rule, and finally forming a cloud-edge collaborative strategy library to meet the low-delay safety protection of the industrial control network. A side end of the method comprises a data collection module and a strategy library module, and a cloud end comprises a data processing module, a generative adversarial network module, a rule generation module and a rule library module. Meanwhile, the rule base and the strategy base further comprise prediction rules generated by time sequence features extracted by the long and short-term memory network and recognition rules generated by the dendritic network. Policy corresponding to different rules can be set by an administrator of the industrial control system.

Description

technical field [0001] The invention belongs to the field of anomaly detection of industrial control systems, and in particular relates to a policy library based on cloud-edge collaboration technology to meet the relatively stringent low-time-delay requirements of industrial control system security. Background technique [0002] The use of information technology in my country's industrial field involves almost every aspect of industrial production. The development of industrial control systems can be said to be very rapid, and it can even be said to be an indispensable part of my country's modern industrial production. However, due to the development of networking and informatization of industrial control systems, more and more loopholes in the design of the original system are exposed, which magnifies the security risks and intrusion threats faced by the system. The types of loopholes include but are not limited to communication protocol loopholes, operation System vulnerab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06K9/62G06N3/00G06N3/04G06N3/08
CPCG06F21/577G06N3/08G06N3/006G06N3/044G06N3/045G06F18/2411
Inventor 季振洲贾东升李冲和树繁孔胜嵩
Owner HARBIN INST OF TECH AT WEIHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products