Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Non-intrusive PLC abnormality detection method based on power consumption analysis

A technology of power consumption analysis and anomaly detection, applied in the identification of patterns in signals, measuring devices, measuring electrical power, etc.

Active Publication Date: 2017-06-23
ZHEJIANG UNIV
View PDF5 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the limitations of hardware structure and software system, many proprietary devices in industrial control systems cannot apply traditional security protection methods, and cannot withstand frequent vulnerability scanning due to resource constraints; on the other hand, intrusive security protection methods such as installing the first Third-party software is likely to bring new potential risks to industrial control systems, and even short downtime or interruptions cannot be tolerated during the operation of industrial control systems
Therefore, traditional security protection methods cannot be well applied in practice, and a non-invasive security protection method is particularly necessary
As the key equipment in the industrial control system, PLC is directly connected with on-site sensors and actuators to control the implementation process of the industrial site. Once its operating instructions are maliciously tampered with, it will cause a huge disaster. This year, the attacks on PLC have increased significantly. , and currently there is no effective security protection method designed for PLC characteristics

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-intrusive PLC abnormality detection method based on power consumption analysis
  • Non-intrusive PLC abnormality detection method based on power consumption analysis
  • Non-intrusive PLC abnormality detection method based on power consumption analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Further illustrate the present invention below in conjunction with accompanying drawing.

[0044] Such as figure 1 As shown, PLC, as a key device in the industrial control system, will face various attacks. These attacks may come directly from the production management layer and field control layer, and may also come from the Internet. These attacks will obtain the control authority of the PLC, and then let the PLC run some malicious instructions, thereby destroying the control process on the site. While the anomaly detection system we proposed does not change the software and hardware structure of the PLC itself, a small 0.1 ohm resistor is connected to its power supply end. The connection of this resistor will neither affect the operation of the PLC nor give it pose potential risks. The anomaly detection system works by transmitting the voltage drop across the resistor to the host computer, so the entire anomaly detection system is equivalent to operating independen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a non-intrusive PLC abnormality detection method based on power consumption analysis. The method comprises the following steps: connecting a resistor in series between the power module of a PLC and the CPU module of the PLC, acquiring a voltage drop across the resistor by using a data acquisition device to obtain the power consumption information of the PLC in operation; subjecting the acquired power consumption to sample division, and extracting an appropriate feature set from each sample to form a characteristic value sample; training a neural network model based on a long short term memory unit according to the characteristic value sample during the normal operation of the PLC, and comparing a newly acquired to-be-tested power consumption characteristic value sample with the characteristic value information predicted by a LSTM network in order to determine whether the sample to be tested is an abnormal sample and thus determine whether the PLC is attacked. The method does not need to modify PLC hardware and software configuration, is non-invasive relative to an original industrial control system, can monitor the PLC in real time, and can detect the attack without the need to acquire the abnormal sample during the attack on the PLC.

Description

technical field [0001] The invention relates to the security field of industrial control systems, in particular to a detection and defense method for PLC attacks in the industrial control system, and specifically discloses a non-invasive PLC abnormality detection method based on power consumption analysis. Background technique [0002] The industrial control system is an important infrastructure of a country, which plays an important role in meeting the material needs of the people, ensuring sustainable economic development and maintaining social stability. If the industrial control system is damaged by malicious attackers, it may affect the normal development of the national economy and even cause social unrest. Therefore, it is of great significance to study the safety monitoring technology related to the industrial control system, which is closely related to the national economy and the people's livelihood. [0003] The original industrial control system operated in an i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G01R21/00G06N3/02G06K9/00G06K9/62
CPCH04L63/1441G06N3/02G01R21/00G06F2218/04G06F2218/08G06F18/217G06F18/214
Inventor 肖玉珺徐文渊马卓然张国明
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products