CN202856781U - Industrial control system main station safety device - Google Patents

Industrial control system main station safety device Download PDF

Info

Publication number
CN202856781U
CN202856781U CN201220435927.4U CN201220435927U CN202856781U CN 202856781 U CN202856781 U CN 202856781U CN 201220435927 U CN201220435927 U CN 201220435927U CN 202856781 U CN202856781 U CN 202856781U
Authority
CN
China
Prior art keywords
network
industrial control
safety device
outer net
control system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN201220435927.4U
Other languages
Chinese (zh)
Inventor
谢善益
梁智强
傅勇
胡朝辉
罗俊
梁志宏
胡川
周强峰
骆书剑
江泽鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electric Power Research Institute of Guangdong Power Grid Co Ltd
Chengdu Westone Information Industry Inc
Original Assignee
Electric Power Research Institute of Guangdong Power Grid Co Ltd
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electric Power Research Institute of Guangdong Power Grid Co Ltd, Chengdu Westone Information Industry Inc filed Critical Electric Power Research Institute of Guangdong Power Grid Co Ltd
Priority to CN201220435927.4U priority Critical patent/CN202856781U/en
Application granted granted Critical
Publication of CN202856781U publication Critical patent/CN202856781U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

Disclosed is an industrial control system main station safety device, characterized in that the device is arranged at the border of the industrial control main station system. The device comprises an external network host, an internal network host, and a non-network isolation channel, wherein the external network host is connected with the external network; the internal network host is connected with the internal network; and the external network host and the internal network host are connected via a non-network isolation channel formed by a user-defined private bus and an isolation card (PCIE bus and processing chip). The industrial control system main station safety device of the utility model provides network communication authentication and encryption service for the main station and terminal and realizes the confidentiality, integrity, and anti-replaying protection of the data transmission. Meanwhile, the industrial control system main station safety device of the utility model adopts the technical scheme featuring non-network isolation as well as internal and external hosts, and realizes the safety isolation of the internal network and the external network of the main station.

Description

A kind of industrial control system main website safety device
Technical field
The utility model relates to a kind of industrial control system main website safety device that strengthens the intranet and extranet seperating safety.
Background technology
Industrial control system (ICS) is the general name to various control systems such as SCADA, DCS, PCS, PLC, is widely used in the industries such as electric power, petrochemical industry, water conservancy, industry manufacturing, municipal administration.Industrial control system is comprised of main website, network and terminal, and its principle is that terminal gathers industrial process data, by network data is delivered to main website, sends control command by network to terminal after the main website analysis, terminal fill order and to the main website return results.
Development along with computer and network technologies, the particularly fast development of information-based industrialization degree of depth fusion and Internet of Things, the industrial control system product adopts puppy parc, common hardware, common software more and more, be connected with the public network such as the Internet in every way, virus, wooden horse, Loopholes of OS etc. threaten and spread at industrial control system; On the other hand, traditional industrial control system does not consider to interconnect necessary Communication Security Problem in design substantially, does not almost have isolation features, and the safeguard function under the Internet and business administration net environment is very weak.Therefore industrial control system reduced Security of the system, and the message of main website and terminal room is not considered the secure contents such as authentication, data integrity, data encryption and preventing playback attack substantially yet when realizing systemic openness.If any point of industrial control system is subject to network attack, all very likely cause huge loss, therefore, the safety problem of industrial control system is badly in need of solving.
The utility model content
Technical problem to be solved in the utility model just provides a kind of industrial control system main website safety device that strengthens the intranet and extranet seperating safety.
Solve the problems of the technologies described above, the technical solution adopted in the utility model is:
A kind of industrial control system main website safety device, it is characterized in that: described device is located at Industry Control main station system border, this device comprises outer net main frame, intranet host and non-network isolated channel, the outer net main frame links to each other with outer net, intranet host links to each other with Intranet, and the outer net main frame is connected by the non-network isolated channel that is comprised of self-defined privately owned bus and isolation card (PCIE bus and process chip) with intranet host.
Described outer net main frame is by the network firewall module, realization effectively prevents from attacking from the disparate networks of outer net based on the access control function of address and port, and the blocking-up hacker utilizes procotol leak and Loopholes of OS invasion, in the default situation, the not open any port of outer net main frame.
Intranet host: link to each other with Intranet, be responsible for the IKE key agreement, the data that meet the VPN security strategy are carried out the encryption and decryption processing, and utilize L7 layer filtering module that illegal industrial control communication stipulations data are abandoned, then send the data to the service front-end processor of Intranet or send to the outer net main frame by non-network isolated channel.
Adopt the utility model technology, key agreement and VPN process and meet the state's close IPSEC of doing VPN technologies standard; Support the SM1 algorithm of 128 bit groupings, the SM2 algorithm of 256 bits and the SM3 algorithm of 256 bits; Support the ECC certificate verification; Security strategy and key (device keys, session key, working key) are present in intranet host, are subjected to the outer net Host Protection.
Described non-network isolated channel connects the internal, external network main frame, driven with isolation card hardware (PCIE bus and process chip) by isolation card to form, and be the unique channel of interaction data between the internal, external network main frame.
When interior (outside) host's machine is when outwards (interior) host machine sends data, the head of at first peeling off ethernet frame only is left the IP message part, encapsulate by self-defined proprietary protocol, carry out the characteristic information examination through PCIE bus transfer to non-network isolated channel, examine unsuccessfully and then abandon, pass and then be transmitted to outer (interior) host machine, last outer (interior) host machine is peeled off according to self-defined proprietary protocol, and re-assembly the IP message, thereby effectively isolated invalid data bag between the intranet and extranet main frame, realized the non-Network Isolation of intranet and extranet main frames.Wherein, the examination of the characteristic information of non-network isolated channel refers to the characteristic information in the protocol header of enciphered data message is examined.
Beneficial effect: the utility model provides network service authentication and cryptographic services for main website and terminal; realize confidentiality, integrality, the anti-playback protection of transfer of data; this device adopts non-Network Isolation and inside and outside two host computer system technical scheme simultaneously, has realized the safety isolation of main website Intranet and outer net.
Description of drawings
Fig. 1 is that safety device system of main website forms and the applied environment schematic diagram;
Fig. 2 is to outer net host data handling process schematic diagram from intranet host;
Fig. 3 is to intranet host flow chart of data processing schematic diagram from the outer net main frame.
Embodiment
Below in conjunction with the drawings and specific embodiments, the utility model is described more fully.
Fig. 1 shows industrial control system main website safety device composition of the present utility model and applied environment, the main website safety device is comprised of intranet host, outer net main frame and non-network isolated channel, the outer net main frame links to each other with external network, intranet host links to each other with internal network, and intranet host links to each other by non-network isolated channel with the outer net main frame.Wherein intranet host is the core of main website safety device; mainly contain the important module such as configuration management, the filtration of L7 layer, VPN processing and IKE key agreement; security strategy and key (device keys, session key, working key) etc. are present in intranet host; and protect by external host and non-network isolated channel; prevent from attacking from the disparate networks of outside, the blocking-up hacker utilizes the invasion of procotol leak and Loopholes of OS.
What Fig. 2 described is to outer net host data handling process from intranet host, that is to say the business datum of the industry terminal transmission from Intranet main website front end processor to outer net, through the processing procedure that the safety device intranet host VPN of main website encrypts, non-network isolated channel transmits, the outer net main frame is transmitted.Mainly be divided into following steps: step 1, main website safety device intranet host is accepted the clear data of Intranet main website front end processor; Step 2, intranet host carries out the Screening of L7 layer to the clear data that the intranet host front end processor sends, and illegal industrial control communication stipulations data are abandoned; Step 3, intranet host carries out the VPN encryption according to the VPN strategy; Step 4, intranet host is peeled off the Ethernet head to encrypt data, encapsulates and be sent to non-network isolated channel by proprietary protocol; Step 5, non-network isolated channel are carried out characteristic examination, if examination not by abandon, if pass, then send the outer net main frame; Step 6, outer net main frame are according to the proprietary protocol decapsulation, and restructuring IP message; Step 7, outer net main frame are carried out the firewall filtering processing, and data are sent outer net.Wherein non-network isolated channel carries out characteristic examination and refers to the characteristic information in the protocol header of enciphered data message is examined.
What Fig. 3 described is from the outer net main frame to the intranet host flow chart of data processing, i.e. the processing procedure that outer net industry terminal is deciphered and transmitted through main website safety device outer net host machine attack examination, the transmission of non-network isolated channel, intranet host VPN to the business datum of Intranet main website front end processor.Mainly be divided into following steps: step 1, main website safety device outer net main frame receives the encrypt data from the terminal security protector; Step 2, outer net main frame are carried out the attack signature examination; Step 3, the outer net main frame is peeled off the Ethernet head to data, encapsulates and be sent to non-network isolated channel by proprietary protocol; Step 4, non-network isolated channel are carried out characteristic examination, if examination not by abandon, if pass, then send intranet host; Step 5, intranet host be according to the proprietary protocol decapsulation, the IP message of laying equal stress on; Step 6, intranet host carries out the VPN decryption processing; Step 7, intranet host L7 layer filters invalid industrial control communication data, at last clear data is sent Intranet.
Pass through the utility model; on the one hand; the main website safety device adopts two host computer systems and non-network security channel isolation; strengthened main website internal-external network seperating safety; on the other hand; main website safety device and terminal security protector are set up the VPN passage; message to main website and industrial terminal room is encrypted processing; utilize the security feature of IPSEC VPN; realize the confidentiality of transfer of data; integrality; anti-playback protection; and encryption key produces by both sides' dynamic negotiation, adopts the ECC certificate verification, also guaranteed authentication strict between main website and the industrial terminal.

Claims (4)

1. industrial control system main website safety device, it is characterized in that: described safety device is located at Industry Control main station system border, safety device comprises outer net main frame, intranet host and non-network isolated channel, the outer net main frame links to each other with outer net, intranet host links to each other with Intranet, and the outer net main frame is connected by the non-network isolated channel that is comprised of self-defined privately owned bus and isolation card with intranet host.
2. industrial control system according to claim 1 main website safety device, it is characterized in that: described outer net main frame includes the network firewall module, open any port in the default situation; The outer net main frame is peeled off the network layer that the packet that receives filters laggard row packet, and with the Packet Generation peeled off to channel isolation; Channel isolation sends it to interior outdoor main unit after data are examined; Interior outdoor main unit restructuring IP message, and carry out decryption processing.
3. industrial control system according to claim 2 main website safety device, it is characterized in that: described intranet host includes L7 layer filtering module illegal industrial control communication stipulations data is abandoned, and then sends the data to the service front-end processor of Intranet or sends to the outer net main frame by non-network isolated channel.
4. industrial control system according to claim 2 main website safety device, it is characterized in that: described non-network isolated channel is comprised of PCIE bus and process chip, is the unique channel of interaction data between the internal, external network main frame.
CN201220435927.4U 2012-08-29 2012-08-29 Industrial control system main station safety device Expired - Lifetime CN202856781U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201220435927.4U CN202856781U (en) 2012-08-29 2012-08-29 Industrial control system main station safety device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201220435927.4U CN202856781U (en) 2012-08-29 2012-08-29 Industrial control system main station safety device

Publications (1)

Publication Number Publication Date
CN202856781U true CN202856781U (en) 2013-04-03

Family

ID=47987924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201220435927.4U Expired - Lifetime CN202856781U (en) 2012-08-29 2012-08-29 Industrial control system main station safety device

Country Status (1)

Country Link
CN (1) CN202856781U (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103401756A (en) * 2013-08-21 2013-11-20 北京华烽泰特科技有限公司 Security protection system used for industrial network
CN103457948A (en) * 2013-08-29 2013-12-18 网神信息技术(北京)股份有限公司 Industrial control system and safety device thereof
CN103475478A (en) * 2013-09-03 2013-12-25 广东电网公司电力科学研究院 Terminal safety protection method and equipment
CN103490895A (en) * 2013-09-12 2014-01-01 北京斯庄格科技有限公司 Industrial control identity authentication method and device with state cryptographic algorithms
CN103746920A (en) * 2014-01-24 2014-04-23 成都卫士通信息产业股份有限公司 Method for realizing data transmission based on gatekeeper
CN103812861A (en) * 2014-01-20 2014-05-21 广东电网公司电力科学研究院 IPSEC (internet protocol security) VPN (virtual private network) device, isolation method thereof and isolation system thereof
CN104320332A (en) * 2014-11-13 2015-01-28 济南华汉电气科技有限公司 Multi-protocol industrial communication safety gateway and communication method with gateway applied
CN104486336A (en) * 2014-12-12 2015-04-01 冶金自动化研究设计院 Device for safely isolating and exchanging industrial control networks
CN105072025A (en) * 2015-08-05 2015-11-18 北京科技大学 Safe protective gateway and system for modern industrial control system network communication
CN105187388A (en) * 2015-08-07 2015-12-23 深圳市科陆电子科技股份有限公司 Method for realizing network security isolation with concentrator and concentrator
CN106411816A (en) * 2015-07-29 2017-02-15 研祥智能科技股份有限公司 Industrial control system, secure interconnection system and processing method thereof
CN106941494A (en) * 2017-03-30 2017-07-11 中国电力科学研究院 A kind of security isolation gateway and its application method suitable for power information acquisition system
CN107276987A (en) * 2017-05-17 2017-10-20 厦门奥普拓自控科技有限公司 A kind of the special line physical isolation industrial data means of communication and system
CN108521423A (en) * 2018-04-10 2018-09-11 江苏亨通工控安全研究院有限公司 HWIL simulation industry control network target range system
CN109194662A (en) * 2018-09-13 2019-01-11 江苏站企动网络科技有限公司 A kind of network-based business information services system
CN109947040A (en) * 2019-02-22 2019-06-28 信联科技(南京)有限公司 A kind of safe and intelligent programmable logic controller (PLC) and application based on open system
CN110417756A (en) * 2019-07-11 2019-11-05 北京百度网讯科技有限公司 Across a network data transmission method and device
CN111142484A (en) * 2019-12-24 2020-05-12 南京轩世琪源软件科技有限公司 Industrial control system and control method
CN112596483A (en) * 2020-12-17 2021-04-02 浙江国利网安科技有限公司 Data acquisition method and system based on unidirectional import equipment
CN112671719A (en) * 2020-12-08 2021-04-16 山东鲁能软件技术有限公司 Network security isolation method and device based on data stripping and construction method thereof
CN115694945A (en) * 2022-10-25 2023-02-03 北京珞安科技有限责任公司 Industrial terminal host maintenance method, system and equipment

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103401756A (en) * 2013-08-21 2013-11-20 北京华烽泰特科技有限公司 Security protection system used for industrial network
CN103457948A (en) * 2013-08-29 2013-12-18 网神信息技术(北京)股份有限公司 Industrial control system and safety device thereof
CN103475478A (en) * 2013-09-03 2013-12-25 广东电网公司电力科学研究院 Terminal safety protection method and equipment
CN103475478B (en) * 2013-09-03 2017-04-12 广东电网公司电力科学研究院 Terminal safety protection method and equipment
CN103490895B (en) * 2013-09-12 2016-09-14 电小虎能源科技(北京)有限公司 A kind of industrial control identity authentication applying the close algorithm of state and device
CN103490895A (en) * 2013-09-12 2014-01-01 北京斯庄格科技有限公司 Industrial control identity authentication method and device with state cryptographic algorithms
CN103812861A (en) * 2014-01-20 2014-05-21 广东电网公司电力科学研究院 IPSEC (internet protocol security) VPN (virtual private network) device, isolation method thereof and isolation system thereof
CN103812861B (en) * 2014-01-20 2017-02-08 广东电网公司电力科学研究院 Isolation method and system for IPSEC (internet protocol security) VPN (virtual private network) device
CN103746920A (en) * 2014-01-24 2014-04-23 成都卫士通信息产业股份有限公司 Method for realizing data transmission based on gatekeeper
CN103746920B (en) * 2014-01-24 2017-03-15 成都卫士通信息产业股份有限公司 A kind of method that data transfer is realized based on gateway
CN104320332A (en) * 2014-11-13 2015-01-28 济南华汉电气科技有限公司 Multi-protocol industrial communication safety gateway and communication method with gateway applied
CN104486336A (en) * 2014-12-12 2015-04-01 冶金自动化研究设计院 Device for safely isolating and exchanging industrial control networks
CN106411816B (en) * 2015-07-29 2021-02-05 研祥智能科技股份有限公司 Industrial control system, safety interconnection system and processing method thereof
CN106411816A (en) * 2015-07-29 2017-02-15 研祥智能科技股份有限公司 Industrial control system, secure interconnection system and processing method thereof
CN105072025A (en) * 2015-08-05 2015-11-18 北京科技大学 Safe protective gateway and system for modern industrial control system network communication
CN105072025B (en) * 2015-08-05 2018-03-13 北京科技大学 For the security protection gateway and system of modern industrial control system network service
CN105187388B (en) * 2015-08-07 2018-05-11 深圳市科陆电子科技股份有限公司 The method and concentrator of network security isolation are realized using concentrator
CN105187388A (en) * 2015-08-07 2015-12-23 深圳市科陆电子科技股份有限公司 Method for realizing network security isolation with concentrator and concentrator
CN106941494A (en) * 2017-03-30 2017-07-11 中国电力科学研究院 A kind of security isolation gateway and its application method suitable for power information acquisition system
CN107276987A (en) * 2017-05-17 2017-10-20 厦门奥普拓自控科技有限公司 A kind of the special line physical isolation industrial data means of communication and system
CN108521423A (en) * 2018-04-10 2018-09-11 江苏亨通工控安全研究院有限公司 HWIL simulation industry control network target range system
CN109194662A (en) * 2018-09-13 2019-01-11 江苏站企动网络科技有限公司 A kind of network-based business information services system
CN109947040B (en) * 2019-02-22 2021-10-08 信联科技(南京)有限公司 Safe intelligent programmable logic controller based on open system and application
CN109947040A (en) * 2019-02-22 2019-06-28 信联科技(南京)有限公司 A kind of safe and intelligent programmable logic controller (PLC) and application based on open system
CN110417756A (en) * 2019-07-11 2019-11-05 北京百度网讯科技有限公司 Across a network data transmission method and device
CN110417756B (en) * 2019-07-11 2022-09-27 北京百度网讯科技有限公司 Cross-network data transmission method and device
CN111142484A (en) * 2019-12-24 2020-05-12 南京轩世琪源软件科技有限公司 Industrial control system and control method
CN111142484B (en) * 2019-12-24 2021-04-30 南京轩世琪源软件科技有限公司 Industrial control system and control method
CN112671719A (en) * 2020-12-08 2021-04-16 山东鲁能软件技术有限公司 Network security isolation method and device based on data stripping and construction method thereof
CN112596483A (en) * 2020-12-17 2021-04-02 浙江国利网安科技有限公司 Data acquisition method and system based on unidirectional import equipment
CN115694945A (en) * 2022-10-25 2023-02-03 北京珞安科技有限责任公司 Industrial terminal host maintenance method, system and equipment
CN115694945B (en) * 2022-10-25 2023-05-23 北京珞安科技有限责任公司 Industrial terminal host maintenance method and equipment

Similar Documents

Publication Publication Date Title
CN202856781U (en) Industrial control system main station safety device
CN109842585B (en) Network information safety protection unit and protection method for industrial embedded system
CN102882789B (en) A kind of data message processing method, system and equipment
CN107172020A (en) A kind of network data security exchange method and system
TW200307423A (en) Password device and method, password system
CN102664896A (en) Safety network transmission system and method based on hardware encryption
CN111800436B (en) IPSec isolation network card equipment and secure communication method
CN109344639A (en) A kind of distribution automation double protection safety chip, data transmission method and equipment
CN101521667B (en) Method and device for safety data communication
CN107094137A (en) A kind of VPN security gateways
CN110011786A (en) A kind of IP secret communication method of high safety
CN102882850A (en) Cryptographic device and method thereof for isolating data by employing non-network way
CN110691074B (en) IPv6 data encryption method and IPv6 data decryption method
CN105635154A (en) Flexible MACSec message encryption and authentication implementation method and device on chip
CN103763301B (en) A kind of system and method for use ppp protocol encapsulations IPsec frame structures
CN106161386A (en) A kind of method and apparatus realizing that IPsec shunts
CN102111377A (en) Network cipher machine
CN110417706A (en) A kind of safety communicating method based on interchanger
CN110768958B (en) IPv4 data encryption method and IPv4 data decryption method
CN111541663A (en) Link exchange encryption system based on national password standard
CN103269301A (en) Desktop type IPSecVPN cryptographic machine and networking method
CN114124416A (en) System and method for quickly exchanging data between networks
Huang et al. The Research of VPN on WLAN
CN105721458A (en) Industrial Ethernet switching method based on ISG security password technique
CN102868686B (en) Method for enhancing data encryption based on ESP (encapsulating security payload) encapsulation

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term

Granted publication date: 20130403

CX01 Expiry of patent term