CN109739203A - A kind of industrial network Border Protection system - Google Patents
A kind of industrial network Border Protection system Download PDFInfo
- Publication number
- CN109739203A CN109739203A CN201910135999.3A CN201910135999A CN109739203A CN 109739203 A CN109739203 A CN 109739203A CN 201910135999 A CN201910135999 A CN 201910135999A CN 109739203 A CN109739203 A CN 109739203A
- Authority
- CN
- China
- Prior art keywords
- network
- industrial
- security
- net
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Abstract
The present invention proposes a kind of industrial network Border Protection system, net system, Office Network system and industrial fireproof wall system are adopted including production net system, number, production net system adopts net system by industrial fireproof wall system connection number and data one-way transmission may be implemented, control and operation to equipment can be completed in production is netted, it includes industry control security audit platform that number, which adopts net system, and the Office Network system further includes the supervision of industrial control system information security and analysis platform, Production Scheduling System and client;The present invention by industry control security audit platform can logarithm adopt net system and produce network system sum number and adopt the communication of net system and make behavioural analysis, pass through the communication link state in the achievable real time monitoring network of exception monitoring module, improve the safety of industrial network Border Protection system, it can be to the data packet depth inspection based on application layer by industrial fireproof wall system, communication security is improved, there is remarkable result to the core asset protection of production network system.
Description
Technical field
The present invention relates to data application field more particularly to a kind of industrial network Border Protection systems.
Background technique
In recent years, industrial control system information security events constantly occur, " shake net ", " flame ", " contaminated area ", " Havex "
Equal Malwares have seriously affected the stable operation of key industry infrastructure, sufficiently reflect industrial control system information security
It is faced with severe situation.Industrial control system Information Security Risk and event number are still in rising trend, and situation is very tight
It is high.
The primary content of network security isolating and protecting is exactly to realize in network network flow between some important subsystems
Access control, this is the basis of network safety prevention, the security threat that industry control network is faced at present be not only routine IT
Attack means or virus infection, and then can be for industry control communications protocol and the attack for controlling equipment inherently safe defect and loophole
Industrial control system is brought more at serious harm, so the assurance of access control granularity becomes the root of industry control network Security Construction success or failure
This factor, existing port level access control policy can not accomplish the protection of industrial protocol malicious code attack, this is just needed
Setting has the industrial fireproof wall system of the inspection of industrial protocol deep packet (DPI) function significantly more efficient to provide at network boundary
The protection of industrial protocol application layer.Therefore, the present invention proposes a kind of industrial network Border Protection system, in the prior art to solve
Shortcoming.
Summary of the invention
In view of the above-mentioned problems, the present invention by industry control security audit platform can logarithm adopt net system and production network system and
Behavioural analysis is made in the communication that number adopts net system, passes through the communication link shape in the achievable real time monitoring network of exception monitoring module
State, the form that the anomalous communication occurred in system is alerted summarize displaying, and in the network that can trace to the source viral wooden horse propagation road
Diameter, detection industrial control system whether there is security breaches and hidden danger, improve the safety of industrial network Border Protection system, pass through work
Industry firewall system can not only be protected in port, can more be improved to the data packet depth inspection based on application layer
Communication security, on the basis of guaranteeing that automation and the transmission of network of relation communication information are reliable, available, perfect intelligence manufacture net
Network safety, to the attack protection of the core asset of production network system, anti-virus, anti-significant effect of stealing secret information.
The present invention proposes that a kind of industrial network Border Protection system, including production net system, number adopt net system, Office Network system
System and industrial fireproof wall system, the production net system includes PLC, sensor, intelligence instrument and DCS system, the PLC, biography
Sensor, intelligence instrument and DCS system pass through industrial fireproof wall system connection number and adopt net system, and the PLC, sensor and intelligence
Energy instrument is singly connected with station control server, and the production net system adopts net system by industrial fireproof wall system connection number can
To realize data one-way transmission, control and operation to equipment can be completed in production is netted, and it includes work that the number, which adopts net system,
Control security audit platform, acquisition server, real-time data base, Web database server and relational database, the acquisition service
Device, real-time data base, Web database server and relational database are all connected with industry control security audit platform, and the acquisition takes
Business device and real-time data base are used to acquire and update the real time data of PLC, sensor, intelligence instrument, the Web database service
Device and relational database are used to handle the data of DCS system, and the number adopts net system and passes through the connection office of industrial fireproof wall system
Net system, the Office Network system also include industry control security audit platform, real-time data base, Web database server and relationship
Database, the industry control security audit platform can logarithm adopt net system and produce network system sum number and adopt the communication of net system and make
Behavioural analysis, and the Office Network system further include industrial control system information security supervision with analysis platform, Production Scheduling System and
Client, the industrial control system information security supervision and analysis platform include exception monitoring module, credible computing terminal, move and deposit
Storage media managing and control system and network security management platform, shown exception monitoring module connect credible computing terminal, and the exception
Monitoring modular, credible computing terminal and mobile memory medium managing and control system are all connected with network security management platform, the network peace
Full management platform is for receiving alarm and log from industrial fireproof wall system and trusted terminal.
Further improvement lies in that: the industrial fireproof wall system uses the technology of industry communications protocol white list, built-in PC/
A variety of proprietary industrial communication protocols such as Modbus/DNP3/Profinet/.
Further improvement lies in that: it is described equipped with firewall configuration online modification module in the industrial fireproof wall system
Firewall configuration online modification module can the industrial fireproof wall system strategy in real time to configuration modify, and do not influence factory
Real-time communication.
Further improvement lies in that: the powering mode of the firewall configuration online modification module is dual power supply, and is taken
It is loaded with power alarm output unit, the firewall configuration online modification module can configure Bypass function.
Further improvement lies in that: the exception monitoring module includes network traffic data monitoring unit, Network Abnormal data
Alarm and trace-back unit, operation note and protocol depth analytical unit, information stealth alarm unit and unknown device access are reminded
Unit, the network traffic data monitoring unit, the alarm of Network Abnormal data and trace-back unit, operation note and protocol depth point
Analysis unit, information stealth alarm unit and unknown device access reminding unit cooperate with the communication link in achievable real time monitoring network
Line state, the form that the anomalous communication occurred in system is alerted summarize displaying, and in the network that can trace to the source viral wooden horse biography
Path is broadcast, and detects industrial control system with the presence or absence of security breaches and hidden danger.
Further improvement lies in that: the credible computing terminal is and the institute using cryptographic hardware as the credible computing terminal of core
It is secure and trusted to state the communication environment that achievable calculating environment, production net system, number are adopted between net system and Office Network system.
Further improvement lies in that: the credible computing terminal includes the safety by authorization server and security client
The client process all for overall measure system, and metric is committed to authorization server, the authorization server
The metric received can be carried out generating white list after editing, be provided to security client and be downloaded, pacified
Full client protects system and application according to the white list downloaded, and by the exception information in system and application and blocks
Log is cut to carry out being uploaded to industry control security audit platform.
Further improvement lies in that: the mobile memory medium managing and control system can realize host to the identity of mobile memory medium
Certification, host update the admission control of mobile memory medium and host to the downloading of access information.
Further improvement lies in that: the industry control security audit platform further includes access and the use row realized to mobile device
Strictly to be audited, auditing objectives include turn-on time, the active station of access, access main body, accessed object, access side
Formula, access result, date and time and user information.
The invention has the benefit that by industry control security audit platform can logarithm adopt net system and production network system and
Behavioural analysis is made in the communication that number adopts net system, passes through the communication link shape in the achievable real time monitoring network of exception monitoring module
State, the form that the anomalous communication occurred in system is alerted summarize displaying, and in the network that can trace to the source viral wooden horse propagation road
Diameter, detection industrial control system whether there is security breaches and hidden danger, improve the safety of industrial network Border Protection system, pass through work
Industry firewall system can not only be protected in port, can more be improved to the data packet depth inspection based on application layer
Communication security, on the basis of guaranteeing that automation and the transmission of network of relation communication information are reliable, available, perfect intelligence manufacture net
Network safety passes through firewall group to the attack protection of the core asset of production network system, anti-virus, anti-significant effect of stealing secret information
State online modification module can the industrial fireproof wall system strategy in real time to configuration modify, and do not influence factory and lead in real time
News, greatly reduce project implementation risk, and calculating environment, production net system, number can be improved by credible computing terminal and adopt net
Communication environment between system and Office Network system is secure and trusted, and unknown malicious code is immunized and destroys, copes with high level malice
Attack.
Detailed description of the invention
Fig. 1 is present system structural schematic diagram.
Specific embodiment
In order to deepen the understanding of the present invention, the present invention is further described below in conjunction with embodiment, the present embodiment
For explaining only the invention, it is not intended to limit the scope of the present invention..
According to Fig. 1, the present embodiment proposes a kind of industrial network Border Protection system, including production net system, number
Adopt net system, Office Network system and industrial fireproof wall system, the production net system include PLC, sensor, intelligence instrument and
DCS system, the PLC, sensor, intelligence instrument and DCS system pass through industrial fireproof wall system connection number and adopt net system, and
The PLC, sensor and intelligence instrument are singly connected with station control server, and the production net system passes through industrial fireproof wall system
System connection number adopts net system and data one-way transmission may be implemented, and the control and operation to equipment can be completed in production is netted, institute
Stating number and adopting net system includes industry control security audit platform, acquisition server, real-time data base, Web database server and relationship
Database, the acquisition server, real-time data base, Web database server and relational database are all connected with industry control and examine safely
Platform is counted, and the acquisition server and real-time data base are used to acquire and update the real-time number of PLC, sensor, intelligence instrument
According to the Web database server and relational database adopt net system and pass through work for handling the data of DCS system, the number
Industry firewall system connect Office Network system, the Office Network system also include industry control security audit platform, real-time data base,
Web database server and relational database, the industry control security audit platform can logarithm adopt net system and production network system
Behavioural analysis is made in the communication that sum number adopts net system, and the Office Network system further includes the supervision of industrial control system information security and divides
Platform, Production Scheduling System and client are analysed, the industrial control system information security supervision and analysis platform include exception monitoring mould
Block, credible computing terminal, mobile memory medium managing and control system and network security management platform, shown exception monitoring module connection can
Believe computing terminal, and the exception monitoring module, credible computing terminal and mobile memory medium managing and control system are all connected with network peace
Full management platform, the network security management platform is for receiving alarm and day from industrial fireproof wall system and trusted terminal
Will.
The industrial fireproof wall system uses the technology of industry communications protocol white list, built-in PC/Modbus/DNP3/
A variety of proprietary industrial communication protocols such as Profinet/.
Equipped with firewall configuration online modification module in the industrial fireproof wall system, the firewall configuration is repaired online
Change module can the industrial fireproof wall system strategy in real time to configuration modify, and do not influence factory's real-time communication.
The powering mode of the firewall configuration online modification module is dual power supply, and exports equipped with power alarm
Unit, the firewall configuration online modification module can configure Bypass function.
The exception monitoring module include network traffic data monitoring unit, Network Abnormal data alarm and trace-back unit,
Operation note and protocol depth analytical unit, information stealth alarm unit and unknown device access reminding unit, the network number
According to flow monitoring unit, the alarm of Network Abnormal data and trace-back unit, operation note and protocol depth analytical unit, information stealth
Alarm unit and unknown device access reminding unit cooperate with the communication link state in achievable real time monitoring network, will be in system
The anomalous communication of generation summarizes displaying in the form alerted, and in the network that can trace to the source viral wooden horse propagation path, and detect work
Control system whether there is security breaches and hidden danger.
The credible computing terminal is and the achievable calculating ring using cryptographic hardware as the credible computing terminal of core
The communication environment that border, production net system, number are adopted between net system and Office Network system is secure and trusted.
The credible computing terminal includes by authorization server and security client, and the security client is for spending comprehensively
All processes of amount system, and metric is committed to authorization server, the authorization server can be to the measurement received
Information carries out generating white list after being edited, and is provided to security client and is downloaded, under security client foundation institute
The white list of load protects system and application, and the exception information in system and application is uploaded to log is intercepted
Industry control security audit platform.
The mobile memory medium managing and control system can realize host to the authentication of mobile memory medium, host to movement
The admission control of storage medium and host update the downloading of access information.
The industry control security audit platform further includes realizing that access to mobile device and usage behavior are strictly audited,
Auditing objectives include turn-on time, the active station of access, access main body, accessed object, access mode, access result, date
And time and user information.
By industry control security audit platform can logarithm adopt net system and produce network system sum number and adopt the communication of net system and do
Behavioural analysis out, by the communication link state in the achievable real time monitoring network of exception monitoring module, by what is occurred in system
Anomalous communication summarizes displaying in the form alerted, and in the network that can trace to the source viral wooden horse propagation path, detection industrial control system is
No there are security breaches and hidden danger, improve the safety of industrial network Border Protection system, not only by industrial fireproof wall system
It can be protected in port, more communication security can be improved to the data packet depth inspection based on application layer, guaranteed certainly
On the basis of dynamicization and the transmission of network of relation communication information are reliable, available, perfect intelligence manufacture internet security, to production net
The attack protection of the core asset of network system, anti-virus, anti-significant effect of stealing secret information, can be real by firewall configuration online modification module
When modify to the industrial fireproof wall system strategy of configuration, and do not influence factory's real-time communication, greatly reduce project reality
Risk is applied, calculating environment, production net system, number can be improved by credible computing terminal and adopt between net system and Office Network system
Communication environment it is secure and trusted, be immunized unknown malicious code destroy, cope with high level malicious attack.
The basic principles, main features and advantages of the invention have been shown and described above.The technical staff of the industry should
Understand, the present invention is not limited to the above embodiments, and the above embodiments and description only describe originals of the invention
Reason, without departing from the spirit and scope of the present invention, various changes and improvements may be made to the invention, these changes and improvements
It all fall within the protetion scope of the claimed invention.The claimed scope of the invention is by appended claims and its equivalent circle
It is fixed.
Claims (9)
1. a kind of industrial network Border Protection system, it is characterised in that: adopt net system, Office Network system including production net system, number
System and industrial fireproof wall system, the production net system includes PLC, sensor, intelligence instrument and DCS system, the PLC, biography
Sensor, intelligence instrument and DCS system pass through industrial fireproof wall system connection number and adopt net system, and the PLC, sensor and intelligence
Energy instrument is singly connected with station control server, and the production net system adopts net system by industrial fireproof wall system connection number can
To realize data one-way transmission, control and operation to equipment can be completed in production is netted, and it includes work that the number, which adopts net system,
Control security audit platform, acquisition server, real-time data base, Web database server and relational database, the acquisition service
Device, real-time data base, Web database server and relational database are all connected with industry control security audit platform, and the acquisition takes
Business device and real-time data base are used to acquire and update the real time data of PLC, sensor, intelligence instrument, the Web database service
Device and relational database are used to handle the data of DCS system, and the number adopts net system and passes through the connection office of industrial fireproof wall system
Net system, the Office Network system also include industry control security audit platform, real-time data base, Web database server and relationship
Database, the industry control security audit platform can logarithm adopt net system and produce network system sum number and adopt the communication of net system and make
Behavioural analysis, and the Office Network system further include industrial control system information security supervision with analysis platform, Production Scheduling System and
Client, the industrial control system information security supervision and analysis platform include exception monitoring module, credible computing terminal, move and deposit
Storage media managing and control system and network security management platform, shown exception monitoring module connect credible computing terminal, and the exception
Monitoring modular, credible computing terminal and mobile memory medium managing and control system are all connected with network security management platform, the network peace
Full management platform is for receiving alarm and log from industrial fireproof wall system and trusted terminal.
2. a kind of industrial network Border Protection system according to claim 1, it is characterised in that: industrial fireproof wall system
System uses the technology of industry communications protocol white list, a variety of proprietary industrial communications such as built-in PC/Modbus/DNP3/Profinet/
Agreement.
3. a kind of industrial network Border Protection system according to claim 1, it is characterised in that: industrial fireproof wall system
Equipped with firewall configuration online modification module in system, the firewall configuration online modification module can be in real time to the industry of configuration
Firewall system strategy is modified, and does not influence factory's real-time communication.
4. a kind of industrial network Border Protection system according to claim 3, it is characterised in that: the firewall configuration exists
The powering mode of line modified module is dual power supply, and equipped with power alarm output unit, the firewall configuration is online
Modified module can configure Bypass function.
5. a kind of industrial network Border Protection system according to claim 1, it is characterised in that: the exception monitoring module
It is single including network traffic data monitoring unit, the alarm of Network Abnormal data and trace-back unit, operation note and protocol depth analysis
Member, information stealth alarm unit and unknown device access reminding unit, the network traffic data monitoring unit, Network Abnormal number
It is mentioned according to alarm and trace-back unit, operation note and protocol depth analytical unit, information stealth alarm unit and unknown device access
Awake unit cooperates with the communication link state in achievable real time monitoring network, the shape that the anomalous communication occurred in system is alerted
Formula summarizes displaying, and in the network that can trace to the source viral wooden horse propagation path, and detect industrial control system with the presence or absence of security breaches and
Hidden danger.
6. a kind of industrial network Border Protection system according to claim 1, it is characterised in that: the credible computing terminal
For using cryptographic hardware as the credible computing terminal of core, and the achievable calculating environment, production net system, number adopt net system and
Communication environment between Office Network system is secure and trusted.
7. a kind of industrial network Border Protection system according to claim 1, it is characterised in that: the credible computing terminal
Including by authorization server and security client, the security client process all for overall measure system, and by degree
Amount information is committed to authorization server, and the authorization server can carry out the metric received to generate after editing white
List is provided to security client and is downloaded, security client according to the white list downloaded to system and application into
Row protection, and the exception information in system and application is carried out being uploaded to industry control security audit platform with log is intercepted.
8. a kind of industrial network Border Protection system according to claim 1, it is characterised in that: the mobile memory medium
Managing and control system can realize admission control and host of the host to the authentication, host of mobile memory medium to mobile memory medium
The downloading of access information is updated.
9. a kind of industrial network Border Protection system according to claim 1, it is characterised in that: the industry control security audit
Platform further includes realizing that access to mobile device and usage behavior are strictly audited, and auditing objectives include turn-on time, connect
The active station, access main body, accessed object, access mode, access result, date and the time that enter and user information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910135999.3A CN109739203B (en) | 2019-02-25 | 2019-02-25 | Industrial network boundary protection system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910135999.3A CN109739203B (en) | 2019-02-25 | 2019-02-25 | Industrial network boundary protection system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109739203A true CN109739203A (en) | 2019-05-10 |
CN109739203B CN109739203B (en) | 2021-09-21 |
Family
ID=66368104
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910135999.3A Active CN109739203B (en) | 2019-02-25 | 2019-02-25 | Industrial network boundary protection system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109739203B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112073431A (en) * | 2020-09-24 | 2020-12-11 | 中广核工程有限公司 | Security defense method and system for industrial control system network |
CN112258683A (en) * | 2020-10-20 | 2021-01-22 | 云账户技术(天津)有限公司 | Inspection method and device for business system |
CN112437040A (en) * | 2020-10-26 | 2021-03-02 | 北京珞安科技有限责任公司 | Industrial network security firewall boundary protection system |
CN112838948A (en) * | 2020-12-30 | 2021-05-25 | 江苏亨通工控安全研究院有限公司 | Integrated industrial safety supervision and analysis system |
CN113176765A (en) * | 2021-04-22 | 2021-07-27 | 深圳市威斯登信息科技有限公司 | Safety monitoring method and system for operation state of industrial control device |
CN113315794A (en) * | 2020-02-26 | 2021-08-27 | 宝山钢铁股份有限公司 | Hardware architecture of computing system network for online intelligent analysis of blast furnace production |
CN113949539A (en) * | 2021-09-27 | 2022-01-18 | 广东核电合营有限公司 | Protection method for network security of KNS system of nuclear power plant and KNS system |
CN114006760A (en) * | 2021-11-01 | 2022-02-01 | 西安思源学院 | Database information security prevention and control system |
CN114660974A (en) * | 2022-04-22 | 2022-06-24 | 珠海市洛奇云联科技有限公司 | Industrial manufacturing intelligent system and remote control method thereof |
CN114788230A (en) * | 2019-12-19 | 2022-07-22 | 西门子交通有限责任公司 | Transmission device for transmitting data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1422585A2 (en) * | 2002-11-19 | 2004-05-26 | Rockwell Software Inc. | System and methodology providing audit recording and tracking in real time industrial controller environment |
CN102546638A (en) * | 2012-01-12 | 2012-07-04 | 冶金自动化研究设计院 | Scene-based hybrid invasion detection method and system |
CN103036886A (en) * | 2012-12-19 | 2013-04-10 | 珠海市鸿瑞软件技术有限公司 | Industrial controlling network safety protecting method |
CN103441926A (en) * | 2013-08-27 | 2013-12-11 | 西北工业大学 | Security gateway system of numerically-controlled machine tool network |
CN106559399A (en) * | 2015-09-30 | 2017-04-05 | 北京军地联合网络技术中心 | A kind of the Internet mobile terminal synthesis managing and control system |
-
2019
- 2019-02-25 CN CN201910135999.3A patent/CN109739203B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1422585A2 (en) * | 2002-11-19 | 2004-05-26 | Rockwell Software Inc. | System and methodology providing audit recording and tracking in real time industrial controller environment |
CN102546638A (en) * | 2012-01-12 | 2012-07-04 | 冶金自动化研究设计院 | Scene-based hybrid invasion detection method and system |
CN103036886A (en) * | 2012-12-19 | 2013-04-10 | 珠海市鸿瑞软件技术有限公司 | Industrial controlling network safety protecting method |
CN103441926A (en) * | 2013-08-27 | 2013-12-11 | 西北工业大学 | Security gateway system of numerically-controlled machine tool network |
CN106559399A (en) * | 2015-09-30 | 2017-04-05 | 北京军地联合网络技术中心 | A kind of the Internet mobile terminal synthesis managing and control system |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114788230A (en) * | 2019-12-19 | 2022-07-22 | 西门子交通有限责任公司 | Transmission device for transmitting data |
CN113315794A (en) * | 2020-02-26 | 2021-08-27 | 宝山钢铁股份有限公司 | Hardware architecture of computing system network for online intelligent analysis of blast furnace production |
CN112073431A (en) * | 2020-09-24 | 2020-12-11 | 中广核工程有限公司 | Security defense method and system for industrial control system network |
CN112258683B (en) * | 2020-10-20 | 2022-07-01 | 云账户技术(天津)有限公司 | Inspection method and device for business system |
CN112258683A (en) * | 2020-10-20 | 2021-01-22 | 云账户技术(天津)有限公司 | Inspection method and device for business system |
CN112437040A (en) * | 2020-10-26 | 2021-03-02 | 北京珞安科技有限责任公司 | Industrial network security firewall boundary protection system |
CN112838948A (en) * | 2020-12-30 | 2021-05-25 | 江苏亨通工控安全研究院有限公司 | Integrated industrial safety supervision and analysis system |
CN112838948B (en) * | 2020-12-30 | 2023-02-28 | 江苏亨通工控安全研究院有限公司 | Integrated industrial safety supervision and analysis system |
CN113176765A (en) * | 2021-04-22 | 2021-07-27 | 深圳市威斯登信息科技有限公司 | Safety monitoring method and system for operation state of industrial control device |
CN113949539A (en) * | 2021-09-27 | 2022-01-18 | 广东核电合营有限公司 | Protection method for network security of KNS system of nuclear power plant and KNS system |
CN114006760A (en) * | 2021-11-01 | 2022-02-01 | 西安思源学院 | Database information security prevention and control system |
CN114006760B (en) * | 2021-11-01 | 2023-07-18 | 西安思源学院 | Database information security prevention and control system |
CN114660974A (en) * | 2022-04-22 | 2022-06-24 | 珠海市洛奇云联科技有限公司 | Industrial manufacturing intelligent system and remote control method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN109739203B (en) | 2021-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109739203A (en) | A kind of industrial network Border Protection system | |
US9954903B2 (en) | Industrial network security translator | |
JP6749106B2 (en) | Anomaly detection in an industrial communication network, anomaly detection system, and method for anomaly detection | |
JP6923265B2 (en) | Configurable Robustness Agent in Plant Security Systems | |
CN109922085B (en) | Safety protection system and method based on CIP (common interface protocol) in PLC (programmable logic controller) | |
CN109995796B (en) | Industrial control system terminal safety protection method | |
CN109976239B (en) | Industrial control system terminal safety protection system | |
WO2021063068A1 (en) | Operation and maintenance control and operation and maintenance analysis method and apparatus, system, and storage medium | |
CA2980033C (en) | Bi-directional data security for supervisor control and data acquisition networks | |
Eden et al. | A forensic taxonomy of SCADA systems and approach to incident response | |
CN103490895A (en) | Industrial control identity authentication method and device with state cryptographic algorithms | |
CN103441926A (en) | Security gateway system of numerically-controlled machine tool network | |
Abouzakhar | Critical infrastructure cybersecurity: A review of recent threats and violations | |
CN115150208A (en) | Zero-trust-based Internet of things terminal secure access method and system | |
Katulić et al. | Protecting Modbus/TCP-Based Industrial Automation and Control Systems Using Message Authentication Codes | |
Dolezilek et al. | Cybersecurity based on IEC 62351 and IEC 62443 for IEC 61850 systems | |
CN112532612A (en) | Industrial control network safety protection system | |
Gao | Cyberthreats, attacks and intrusion detection in supervisory control and data acquisition networks | |
Papa et al. | A transfer function based intrusion detection system for SCADA systems | |
Li et al. | Network security in the industrial control system: A survey | |
CN212084141U (en) | Safety reinforcement management device for industrial control terminal | |
CN111314278A (en) | Safety detection method based on Ethernet IP industrial control protocol | |
Ravindrababu et al. | Analysis of Vulnerability Trends and Attacks in OT Systems | |
Mahmood et al. | Securing Industrial Internet of Things (Industrial IoT)-A Reviewof Challenges and Solutions | |
Conte de Leon et al. | Cybersecurity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |