Response method for industrial control system network attack based on virtual operation and state transition

An industrial control system and network attack technology, applied in transmission systems, electrical components, etc., can solve the problems of only considering network attack monitoring and defense, expanding losses, and limited, to avoid malicious control and destruction, and improve network attack response capabilities. Effect

Active Publication Date: 2021-03-30
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods have a certain effect on defending against network attacks, but since only the monitoring and defense of network attacks are considered, once the defense is breached and the intruder has begun to interfere with the normal operation of the field equipment, how to effectively protect the field Equipment suffers as little damage as possible and is protected from continuous attack hazards.
In fact, the role of defense strategies is often limited. If an industrial control system does not have an effective strategy to restore and isolate the system in time after the defense is breached, it is very likely that the intruder will take the initiative or further attack through continuous attacks. Extend the loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Response method for industrial control system network attack based on virtual operation and state transition
  • Response method for industrial control system network attack based on virtual operation and state transition
  • Response method for industrial control system network attack based on virtual operation and state transition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The invention improves the stability of the industrial control system under the threat of network security by adding a recovery mechanism and an isolation mechanism. It solves the problem that the existing technology is difficult to fight against complex intrusions such as continuous network attacks. The present invention will be further described below in conjunction with the accompanying drawings and through specific embodiments.

[0025] The industrial control system based on virtual operation and state transition proposed by the present invention has two operating states: a normal state in which the field equipment operates normally and an abnormal state in which the field equipment is abnormal. The main structure of the industrial control system is as follows: figure 1 As shown, it mainly includes: field equipment, external control center, external data exchange center, internal data exchange center, virtualization equipment, isolation monitor, recovery controller...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an industrial control system network attack response method based on virtual operation and state transition. In the abnormal state of the industrial control system, the method proposes a recovery mechanism based on state transition, which is used for timely recovery of on-site equipment after the industrial control system is attacked. Normal operation; at the same time, an isolation mechanism based on virtual operation is proposed to isolate field devices after the industrial control system is attacked and avoid further malicious control. These two mechanisms are completed through the internal data exchange center and external data exchange center of the industrial control system. Match and trigger. The recovery mechanism ensures that the industrial control system will not lose its operating capability or cause serious consequences after an abnormality occurs; the isolation mechanism ensures that after the external control center of the industrial control system is invaded and controlled by the network, the field equipment will not be continuously affected. The further impact of the wrong instructions issued improves the cyber attack response capability of the industrial control system.

Description

technical field [0001] The invention relates to the network security problem of control loss after an industrial control system is attacked by a network, in particular to a method for responding to a network attack of an industrial control system based on virtual operation and state transition. Background technique [0002] Industrial control system (referred to as industrial control system) is an automatic control system used in industrial fields such as energy, water supply, and industrial automation. Based on the data obtained from the remote site, the industrial control system analyzes the operation of the field equipment, and according to the pre-designed response strategy, sends the corresponding control instructions to the field equipment to monitor and ensure the normal operation of the field equipment. Today, industrial control systems are combined with Ethernet and a common operating system is introduced, which significantly improves work efficiency and openness. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/1425H04L63/20
Inventor 丁旭阳游新童谢盈张小松杜解王筱翔
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products