Network anti-intrusion method and system for industrial automation operation

An industrial control system and anti-intrusion technology, applied in transmission systems, digital transmission systems, instruments, etc., can solve problems such as poor product quality, malicious program tampering, and high production costs, so as to improve security and credibility, The effect of maintaining network security and reducing load pressure

Inactive Publication Date: 2022-07-01
NANJING XUANSHI QIYUAN SOFTWARE TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the trend of the Internet of Everything has gradually increased the chance of peripheral attacks and intrusion into intelligent equipment, resulting in the intrusion of intelligent industrial equipment and the phenomenon of malicious tampering of programs, resulting in production errors in industrial equipment and substandard products. This leads to higher production costs and poor product quality.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network anti-intrusion method and system for industrial automation operation
  • Network anti-intrusion method and system for industrial automation operation
  • Network anti-intrusion method and system for industrial automation operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In the following description, numerous specific details are set forth in order to provide a more thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without one or more of these details. In other instances, some technical features known in the art have not been described in order to avoid obscuring the present invention.

[0048] The applicant believes that the measures such as user authentication, firewall and data encryption adopted in the prior art in order to deal with network intrusion have been unable to meet the anti-intrusion requirements of industrial systems under the penetration of intelligent equipment interconnection. Therefore, in order to better cope with the phenomenon of being invaded in the process of industrial production, the present application proposes a network intrusion prevention method and system oriented to industrialization operations. Through the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to the industrial operation-oriented network anti-intrusion method and the industrial operation-oriented network anti-intrusion system provided by the invention, by analyzing network intrusion threats, anti-intrusion measures are specifically taken, so that the purpose of maintaining network security is achieved, and the stability of intelligent industrial equipment is improved. The method specifically comprises the following steps: analyzing and acquiring a current overall communication protocol based on an industrial control system in a current application; constructing an intrusion detection model, and receiving communication data; analyzing the communication data by using the intrusion detection model to obtain abnormal data; obtaining an intrusion type according to the abnormal data; and formulating a corresponding coping method according to the intrusion type. Wherein the load pressure in the operation process is reduced in a data dimension reduction mode. Besides, the intrusion detection result is uploaded to the block chain by means of instantiation and the like by utilizing the characteristics of decentralization and tampering difficulty of the block chain, so that a tampering prevention mechanism of the intrusion detection data is realized, and the security and credibility of the intrusion detection data are improved.

Description

technical field [0001] The invention relates to the technical field of network security of automatic control, in particular to a network anti-intrusion method and system for industrial automation operations. Background technique [0002] Based on the rapid development of Internet technology, in order to better realize data sharing and meet the basic source of data analysis, industrial automation control systems have gradually established a huge information exchange system through the Internet. The independent entity architecture gradually realizes data interaction based on Internet technology, breaking the phenomenon of information islands. [0003] However, the trend of the Internet of Everything has gradually increased the chances of peripheral attacks and intrusions into intelligent equipment, leading to the phenomenon of intelligent industrial equipment being invaded and programs being maliciously tampered with, resulting in production errors and substandard products of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40G06K9/62
CPCH04L63/1416H04L63/1425G06F18/2115G06F18/241
Inventor 王银叶尧珍谢宏鲍怡香
Owner NANJING XUANSHI QIYUAN SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products