Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information security risk assessment method oriented to typical metallurgy process control system

A technology of control system and process control, which is applied in general control system, control/adjustment system, test/monitoring control system, etc., and can solve the problems of large control system network topology, complex information security management, long process, etc.

Inactive Publication Date: 2015-02-04
AUTOMATION RES & DESIGN INST OF METALLURGICAL IND
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] (1) The process and control network are relatively complex
Metallurgical enterprises are typical mixed-process enterprises. Metallurgical enterprises have the typical characteristics of industrial production processes, including continuous and discrete mixing, physical changes and chemical changes; Coupling between each other, involving a large number of automation equipment and subsystems, the control system network topology is relatively large, the complexity is high, and the security risk is relatively large
[0004] (2) High cost of single equipment
Due to the large-scale control network and strong process coupling in the metallurgical industry, it is difficult to define the security boundary; because it is closely connected with the physical world, the network has high requirements for real-time performance, availability, and business continuity [7]; metallurgical enterprises are big polluters, energy and environmental protection The requirements for the network also increase the complexity of system information security management
[0006] (4) Attack methods are becoming more and more advanced and concealed
The research on its security risk assessment technology needs to start from the perspective of cyber-physical integration, analyze the hacker's attack strategy from the perspective of control, establish a rational hacker's attack behavior model and attack target model, and then find the weak links of the system, and use appropriate technology for risk assessment , although there have been a lot of research and discussion on risk assessment in the field of industrial control and information security, the information security risk assessment of industrial control systems from the perspective of cyber-physical integration is still in its infancy. For metallurgical industry control system risk assessment technology research has not yet been reported

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security risk assessment method oriented to typical metallurgy process control system
  • Information security risk assessment method oriented to typical metallurgy process control system
  • Information security risk assessment method oriented to typical metallurgy process control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. Such as figure 1 shown, including the following steps:

[0045] (1) For the typical metallurgical process flow control system, the mathematical modeling of the control system based on cyber-physical fusion is carried out. Model method, in which the continuous dynamic model related to the metallurgical process flow is represented by a set of traditional linear or nonlinear differential equations / equations of state, and is realized with the Matlab Simulink toolbox; discrete events are represented by the Petri Net (PN) model, And use a Simulink toolbox PNL to implement, the PN discrete model can be integrated into the Simulink block diagram, and the synchronization state transfer of the petri Net model mainly depends on the triggering of external events. At the same time, the Petri Net model is extended to model the communication network component...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information security risk assessment method oriented to a typical metallurgy process control system and belongs to the technical field of industrial control system information security. The system robustness under different attack modes and policies is analyzed by establishing an attack model under the typical scenes of the metallurgy process, and therefore, the security risk assessment on the typical metallurgy process control system in different attack modes and a failure mode can be realized. Based on the risk theory, the method is used for performing the security risk assessment by use of a random probability algorithm by defining the metallurgy process control system as a physical information fusion system; from the two aspects of the occurrence probability and the influence of attack sources or failure sources, a security assessment method based on risk indexes is developed. Quantitative estimation is performed based on risk indexes; a security incident set is created based on the established physical information fusion model and attack model, and then the security incident set is combined with the calculated robustness assessment indexes for the quantitative estimation, and therefore, the weak security links in the control system can be located conveniently.

Description

technical field [0001] The invention belongs to the technical field of information security of industrial control systems, and in particular relates to an information security risk assessment method for typical metallurgical process control systems. Background technique [0002] The metallurgical industry is a pillar industry of my country's national economy and a basic industry related to the national economy and people's livelihood. The high integration of automation and informatization has become the development trend of the metallurgical industry, and the control network system based on Ethernet has been widely used. With the increasingly complex and advanced hacking methods and technologies, attacks targeting industrial control systems emerge in an endless stream. As a complex mixed process industry, the security situation of the metallurgical industry is relatively severe, mainly in the following aspects: [0003] (1) The process and control network are more complicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G05B23/02
CPCG05B23/024
Inventor 赵永丽芦永明陈宏志
Owner AUTOMATION RES & DESIGN INST OF METALLURGICAL IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products