A kind of method of the big data collection based on industrial control system safety protection equipment
Technical field
It is more particularly to a kind of anti-safely based on industrial control system the present invention relates to field of industrial control safety technical field
The big data acquisition method of shield equipment.
Background technology
Industrial big data is the core technology and motive force of intelligence manufacture, and visible asking is understood and solved using data
Topic;Sightless problem is analyzed and predicted using data;New knowledge is excavated from data, recycles knowledge to go to redefine
Problem so that visible or sightless problem can be avoided in manufacture system.Therefore the excavation of industrial big data is big number
According to the basis of analysis.
Requirement due to industrial control system to real-time is very high, if requiring that control device is remembered while normal operating
Configuration, computational load and storage pressure that all of operating process can bring complexity to control device are recorded, gather and report, these
Cause the negative effect of the real-time to whole control system.But the optimization of Industry Control flow needs actual motion to operate again
Specific data whole industrial control system is optimized totally, in particular for the very first time find system operation occur appoint
What problem and potential information security hidden danger are required for the service data of full and accurate production process.
As standard network and Internet technology are in the extensive use of industrial control system, the safe prestige of industrial control system
The side of body just increasingly sharpens, and many industrial control systems have installed safety protection equipment additional to solve increasingly serious safety problem, this kind of peace
Full protection equipment possesses the function of access control, state-detection and depth Packet analyzing.The security protection of these safety protection equipments
, it is necessary to one has efficacious prescriptions using what industrial control system safety protection equipment carried out industrial big data collection on the basis of function
Method.
The content of the invention
Therefore, the invention provides the big data acquisition method that a kind of place is based on industrial control system safety protection equipment,
For solving on the premise of former industrial control system practical operation and security protection system normal work is ensured, it is right to realize
The problems such as big data of industrial control system is gathered safely.
To reach above-mentioned purpose, the technical proposal of the invention is realized in this way:
A kind of method of the big data collection based on industrial control system safety protection equipment, it is man-machine in industrial control system
Interface, host computer, safety protection equipment and slave computer are connected with router, while slave computer is connected with field apparatus, peace
Full protection equipment is connected with big data system and display device, the big data based on industrial control system safety protection equipment
Acquisition method includes following three step:
A. control protocol data are configured by industrial control system safety protection equipment to be closed with the mapping of practical operation data
System;
B. industrial control system safety protection equipment is parsed to control protocol order and data so as to obtain industrial life
The practical operation data of product, and by the practical operation data record after parsing and storage set to industrial control system security protection
It is standby;
C. by industrial control system safety protection equipment store practical operation data transfer is to big data system and deposits
Storage is in big data system.
Industrial control system safety protection equipment access industrial network, and the information of each network element network Nei is obtained, including:
IP address, MAC Address and tcp port information.
Industrial control system safety protection equipment is analyzed between host computer, slave computer in network by tcp port
Control protocol order, and packet to control protocol order parses, parsing obtains the network element as host computer and conduct
The network element of slave computer.
Industrial control system safety protection equipment can also configure the customized information of output report, customized information be according to
The information of family demand customization includes:The next machine information, temporal information, device parameter information, exectorial record information.
Industrial control system safety protection equipment obtains the packet of the control protocol order between host computer and slave computer
Afterwards, according to protocol rule, the control protocol order for receiving and data are parsed, obtains the number of original control protocol order
According to.
Industrial control system safety protection equipment is according to the control protocol order being pre-configured with and data and practical operation number
According to mapping relations, control protocol order and data are converted into practical operation data, while being recorded and stored in Industry Control
In system safety protection equipment.
Industrial control system safety protection equipment will be stored in industrial control system safety protection equipment according to customized information
Practical operation data genaration chart and/or list file, and as requested output to designated equipment, including display device
And/or printing device.
Industrial control system safety protection equipment according to customized information or interim customized information, storage in Industry Control system
Practical operation data genaration data sheet or packet in system safety protection equipment.
Industrial control system safety protection equipment is transferred to the data sheet or packet of generation greatly by network system
Data system is simultaneously stored in big data system.
Beneficial effects of the present invention:The present invention can utilize existing industrial control system safety protection equipment, not increase
On the premise of stiffened part, software module is strengthened again and is integrated, make its complete existing equipment protecting information safety while
Collecting device as industrial big data.
Brief description of the drawings
Fig. 1 is the network structure of safety protection equipment gathered data of the present invention based on industrial control system,
Fig. 2 is industrial control system safety protection equipment composition schematic diagram,
Fig. 3 is the schematic diagram of the mapping relations of control protocol data and practical operation data,
Fig. 4 is the schematic diagram that safety protection equipment exports practical operation data,
Fig. 5 is the flow of IP/MAC addresses, tcp port and the data flow of network element device in industrial control system,
Fig. 6 is the flow chart for extracting control protocol data and being converted into practical operation data,
Fig. 7 is output control protocol data or practical operation data drawing list and/or the flow chart of report.
Reference:
100- industrial control systems, 102- slave computers,
104- host computers, 106- man-machine interfaces,
108- field apparatus, 110- routers,
112- safety protection equipments, 202- big data system equipments,
204- display devices, 304- processors,
306- users circle mouthful, 402- processors,
404- network element address, port analysis module,
406- resolve packet modules, 408- data/report generation module,
410- data management interfaces, 412- memory cell,
414- display interfaces, 510-TCP/IP protocol suites,
The interface of 602- safety protection equipments and industrial big data equipment,
The interface of 604- safety protection equipments and display device.
Specific embodiment
Presently preferred embodiments of the present invention is described in detail below in conjunction with the accompanying drawings, reference number refers to the group in the present invention
Part, technology, realize to be easier to be understood under appropriate circumstances so as to advantages and features of the invention.Following description is right
The materialization of claim of the present invention, and other related to claim do not clearly state implement the power of falling within
The scope that profit is required.
In Fig. 1 represents industrial control system 100, host computer 104 (is respectively comprising multiple slave computers with slave computer 102
102-1~102-n) between communicated by communication interface according to industrial control protocols;Slave computer 102 and man-machine interface 106
Between communicated by communication interface in the presence of an application programming interfaces, for various parameters management, download program install etc.
Operation;Slave computer 102 (102-1~102-n) issues control association by output interface to field apparatus 108 (108-1~108-m)
View order, field apparatus 108 (108-1~108-m) is by input interface to slave computer 102 (102-1~102-n) feed back on-site
Metrical information, such as including temperature, pressure, rotating speed etc. information;Safety protection equipment 112 is based on ICP/IP protocol and passes through network
Communication interface is connected with the network router 110 in industrial control system;Safety protection equipment 112 is based on application program API again
It is connected with big data system by router;Safety protection equipment 112 is connected by display interface device with display device 204.
The figure of safety protection equipment 112 is as shown in Fig. 2 safety protection equipment 112 includes that network communication interface is used to externally lead to
Letter;Safety means processor 402 is used for the calculating and management of modules in safety protection equipment 112;Network element address, port point
Analysis module 404 is used for network element IP/MAC Address, tcp port and data flow scanning analysis;Resolve packet module 406 is used to control
Protocol command processed and resolve packet and data conversion;Data/report generation module 408 is used for data drawing list and report generation;
Data management interface 410 is used to pre-define control protocol order and the configuration of practical operation data mapping relations and data pipe
Reason;Memory cell 412 be used for store initial data, intermediate conversion data and other need data storage,.
Realizing that the big data gatherer process based on industrial control system safety protection equipment of the invention is:First have to lead to
Cross safety protection equipment 112 mapping relations of control protocol order and practical operation data are recorded and stored, in such as Fig. 3
Peration data be to need the content that is configured of concrete condition according to scene, and control protocol order and protocol data source
In standard industry control protocol specification.
Next to that the output data of display carries out record output to be required to user by safety protection equipment 112, in Fig. 4
Configuration be need according to user need customized information set display data drawing list content, including but not limited to whether show
The data of specific control instruction, the time range of display, specific span etc..
Next the flow chart of step as shown in Figure 5 as shown in step S11, starts safety protection equipment 112 to network element ground
Location, port analysis module 404, to the IP/MAC addresses of network element, tcp port and data flow information scanning are analyzed.Such as step S12
Shown, network element address, port analysis module 404 monitor the network traffics on router 110 by network communication module, and judgement is
It is no network traffics occur, there is no flow to return and continue to monitor;If there is network traffics, as shown in step S13, IP/MAC is extracted
Whether address, tcp port, next as shown in step S14, contrasted to have and conflicted with known IP/MAC addresses, occurs conflicting
(identical IP has corresponded to different MAC Address), then send warning information and return to restarting drive sweep, if without IP/MAC ground
Location conflicts, then extract the IP/MAC addresses of host computer and slave computer, and tcp port number, then as shown in step S15, and deposits
Existing network element IP/MAC Address in storage unit 412 is compared, if with the presence of identical IP/MAC network elements, return after
Resume studies and take, if new IP/MAC addresses, then new host ip/MAC Address, tcp port to storage are stored as shown in step S16
Unit 412, the record as shown in step S17 includes device id, IP/MAC addresses, tcp port number (the i.e. industry control of host computer network element
Protocol type processed) and slave computer network element device id, IP/MAC addresses, tcp port number (i.e. industrial control protocols type).
Control protocol order is converted to practical operation data step as shown in fig. 6, by the data in safety protection equipment 112
Packet analyzing module 406 to control protocol order and resolve packet and conversion,.As shown in step S21, resolve packet module
406 read a new network traffic recording from memory cell 402, as shown in step S22, first check for the control in record
Whether protocol command is known legitimate protocol command data, if illegal, carries out error handling processing, returns and reads next note
Record.If agreement is legal, as shown in step S23, the control protocol order data of this record is analyzed, then as shown in step S24
By control protocol data and time of origin storage in memory cell 412, then according to control protocol order as shown in step S25
Control protocol order is converted to practical operation data and stores single in storage by the mapping relations of data and practical operation data
In unit 412, it is then back to carry out the next data conversion of record.
Step as shown in Figure 7 is to require output data according to user, is given birth to by the data in safety protection equipment 112/report
Data drawing list and report are generated into module 408.Resolve packet module 406 determines whether data as stated in step s 31 first
Chart output request, if having request as shown in step S32, requires from storage data drawing list output according to user customized information
Unit 412 extracts corresponding data and generates data record, predefined data chart is generated according to step S33 and output is arrived
On the display device 204 being connected with safety protection equipment 112.Then determine whether that data report is exported further according to step S34
Request, if having request as step S35 extract data record, further according to shown in step S36, according to user customized information to data
Report output request extracts corresponding data and generates data sheet or packet is sent to and security protection from memory cell 412
In the connected big data system 202 of equipment 112.
Embodiments of the invention are the foregoing is only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair
Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
It should be noted that above-described embodiment the present invention will be described rather than limiting the invention, and this
Art personnel can design alternative embodiment without departing from the scope of the appended claims.In claim
In, any reference symbol being located between bracket should not be configured to limitations on claims.Word " including " be not excluded for depositing
In element or step not listed in the claims.Word "a" or "an" before element do not exclude the presence of it is multiple this
The element of sample.The use of word first, second, and third does not indicate that any order.These words can be construed to title.