Formal detection method for defense of information physical fusion system

A technology of cyber-physical fusion and detection method, which is applied in the field of formal detection of cyber-physical fusion system defense, can solve problems such as increasing the impact of false data injection attacks, and achieve the effect of improving system security

Inactive Publication Date: 2019-07-26
杭州逍邦网络科技有限公司
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Regarding the false data injection attack, its full description is: If the attacker can determine the current configuration of the CPS, it can inject malicious measurement data that misleads the state detection process, without being detected by any detection technique, the attacker can exploit the state estimation algorithm Small measurement errors that can be tolerated, thus further increasing the impact of false data injection attacks without being detected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Formal detection method for defense of information physical fusion system
  • Formal detection method for defense of information physical fusion system
  • Formal detection method for defense of information physical fusion system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] A formalized detection method for cyber-physical fusion system defense, detection and verification of CPS false data injection attacks based on timed automata, including the construction of models of each part of CPS and the verification of CPS security attributes. The construction of models of each part of CPS mainly includes system Modeling, attacker modeling, automatic recovery mechanism modeling; CPS general layered network security architecture includes management layer, supervision layer, real-time control layer and physical layer; in the management layer, information is exchanged between the hardware of the system through the Internet , functions include: historical data storage, data management and some other tasks; the function of the supervisory layer is to configure system parameters and monitor the overall stability and security of the system; the controller of the real-time control layer is connected with the physical layer equipment, and the controller dir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a formal detection method for defense of an information physical fusion system. Based on detection and verification of a CPS false data injection attack of a time automaton, the method comprises the steps of building models of all parts of the CPS and verifying CPS security attributes, firstly modeling components of all levels according to a CPS universal hierarchical network security system structure, then completing modeling of a false data injection attacker and an automatic recovery mechanism, and finally forming a complete system so as to carry out verification. The method has the beneficial effects that the timed automaton is a state machine containing time constraints, the CPS often has time requirements, and modeling and verification of the CPS are simple and easy by using the timed automaton. The CPS behavior safety is modeled, verified and analyzed, and the system safety of the CPS can be effectively improved.

Description

technical field [0001] The invention belongs to the technical field of information security and formalized methods, and in particular relates to a formalized detection method for cyber-physical fusion system defense. Background technique [0002] Cyber ​​Physical Systems (Cyber ​​Physical Systems, hereinafter referred to as CPS) security is one of the important technical foundations of intelligent manufacturing. As a new field that is still in the development stage, CPS still has many problems to be solved urgently in terms of key security technologies. , CPS is the fundamental link between information systems and equipment that controls industrial production and maintains critical infrastructure services. Interconnections between CPS and information systems create exploitable security gaps due to a number of factors, such as the legacy of CPS information security applications and the tendency of CPS developers to sacrifice system integrity and confidentiality. cost over us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24H04L29/08
CPCH04L41/145H04L63/14H04L67/12
Inventor 陈会兵戴宏伟王钊琦何卡特王婷
Owner 杭州逍邦网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products