CN108594769A - A kind of industrial control system core network prevents safely outer invade and security evaluation device - Google Patents

A kind of industrial control system core network prevents safely outer invade and security evaluation device Download PDF

Info

Publication number
CN108594769A
CN108594769A CN201810189644.8A CN201810189644A CN108594769A CN 108594769 A CN108594769 A CN 108594769A CN 201810189644 A CN201810189644 A CN 201810189644A CN 108594769 A CN108594769 A CN 108594769A
Authority
CN
China
Prior art keywords
network
control system
security
industrial control
layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810189644.8A
Other languages
Chinese (zh)
Inventor
张义凯
张万军
闫翠云
倪志明
骆道庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Dian Dian Intelligent Technology Co Ltd
Original Assignee
Shanghai Dian Dian Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Dian Dian Intelligent Technology Co Ltd filed Critical Shanghai Dian Dian Intelligent Technology Co Ltd
Priority to CN201810189644.8A priority Critical patent/CN108594769A/en
Publication of CN108594769A publication Critical patent/CN108594769A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
    • G05B19/4185Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
    • G05B19/4185Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication
    • G05B19/41855Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication by local area network [LAN], network structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Manufacturing & Machinery (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of industrial control system core networks to prevent outer invade and security evaluation device safely, it is related to technical field of network security, including live execution level, field control layer, produce control layer, operator's management level and strategic decision layer, the scene execution level includes sensor and brake, the sensor includes temperature sensor and pressure sensor, live execution level further includes I/O network, I/O network is electrically connected with temperature sensor and pressure sensor, I/O network is electrically connected with HAT, I/O network is electrically connected with electromagnetic valve, I/O network has also been electrically connected motor, motor, switch and soft strater.The present invention causes enterprise's industrial control unit (ICU) network security to be paid attention to, control system can be allowed safe and reliable, it can prevent Migrant women from invading control device, Enterprise information system can be optimized, it can maximize and ensure enterprise assets safety, business administration can be promoted and enterprise staff Knowledge Capability can be improved.

Description

A kind of industrial control system core network prevents safely outer invade and security evaluation device
Technical field
The present invention relates to technical field of network security, specially a kind of industrial control system core network prevents safely outer invade With security evaluation device.
Background technology
Industrial control system refer to various automation control components and real time data is acquired, monitor it is excessively program-controlled Component processed collectively forms, and realizes to industrial equipment automatic operating, process control and the business process management system of monitoring.
Industrial control system Component units are set comprising human-computer interaction interface, the network equipment, controller equiment unit, scene Standby, with scientific technological advance, industrial information is also that burst pushes ahead vigorously to develop, and industrial control system network is to entire Industry Control Systemic effect is increasing.Industrial system network directly influence whole system reliable for operation, real-time, use, analysis, extension, It is advanced, the functions such as can safeguard;
For industrial system network security concerning entire industrial production lifeblood, the safe final purpose of industrial system is to ensure enterprise's production peace Entirely;Industrial system network security threats come from personal hacker, non-government organization, national government, employee's maloperation at present, and feature is to attack It hits and defines, attack in a organized way;Attack means are various, have a large amount of 0day;Attack process is complicated, while inside and outside attack
So doing security evaluation to industrial control system network in advance and protecting, this paper most important to entire industrial production system Only discuss to the security protection of system centre layer network and assessment;Central core network structure refers to monitoring system in industrial control system The network of system, operator station to production management system and its periphery carries out security evaluation to enterprise or factory system;To passing through Safety estimation system enterprise more confident could allow system operation, not over security evaluation, need to add safety protection equipment Central core network security can effectively be protected, prevent Industry Control active station, engineer station, system server, database by To exotic invasive, ensures system safe and reliable operation, do not allow enterprise to incur loss.
Invention content
(One)The technical issues of solution
The problem of prior art is primarily present, be to current enterprise to industrial control system network security recognize it is not deep enough, Think that network security is not important enough, reason is the puzzlement that their enterprises are not yet brought by exotic invasive, pays little attention at present; Industrial control system security evaluation system is not well established, causes many enterprises that can not judge their itself enterprise's industrial control system Whether network needs safety protection equipment;Industrial production enterprise not yet payes attention to this block at present.
(Two)Technical solution
In order to achieve the above object, the present invention is achieved by the following technical programs:A kind of industrial control system core network peace It is complete prevent it is outer invade with security evaluation device, including live execution level, field control layer, production control layer, operator's management level and Strategic decision layer, the scene execution level include sensor and brake, and the sensor includes that temperature sensor and pressure pass Sensor, the scene execution level further includes I/O network, and the I/O network is electrically connected with temperature sensor and pressure sensor, described I/O network is electrically connected with HAT, and the I/O network is electrically connected with electromagnetic valve, and the I/O network has also been electrically connected motor, horse It reaches, switch and soft strater, network security assessment is carried out in industrial control system network center layer or core layer and hang outside Include controller for exotic invasive system, the field control layer is prevented, the controller is connected separately with by fieldbus RTU, DC, PLC and local IO, the production control layer include monitoring network, monitoring system, engineer station, real-time data base and Communication processing module, the monitoring network are connected with monitoring system, engineer station, real-time data base and Communication processing module respectively It connects, it includes on-line analysis, industrial control system assets assessment, threat assessment, safety point to carry out security evaluation to system centre layer network Area's reasonable evaluation, node correspondence, security boundary, security of system are verified, and operator's management level include local Net, redundant database, historical data base, server and long-range intervention and engineering access modules, the server include ICCP clothes Be engaged in device, opc server, information data can and application server, the LAN respectively with redundant database, historical data base, Server and long-range intervention and the electrical connection of engineering access modules, data are collected by assets investigation, threat analysis, vulnerability analysis It requires, carry out rationally and arranges, demand analysis, safety recommendation, Security Construction implementation plan according to Risk Calculation, industry is controlled System security assessment processed has stage, each stage that can be divided into planning construction stage, Construction Acceptance stage, operation and maintenance rank Section, abandonment stage, assessment is mainly around fundamentals such as production business, control system, fragility, threat, risk, safety measures It carries out, evaluation process fully considers business its complexity, importance, availability, security incident, residual risk, demand for security etc. With fundamental association attributes, the strategic decision layer include corporate office network, industrial control system WEB application client, Company's host and commercial server, the corporate office network respectively with industrial control system WEB application client, company's host It is connected with commercial server, benign operation is carried out to network, carries out whether analysis and assessment need safeguard, passes through these works Have more industrial control system core layer networks to be analyzed, to obtain assessment table, then have by being carried out after ruggedized equipment Analysis assessment table is reported enterprise by comparative analysis, allows enterprise being capable of accurate judgement current industrial Control System NetWork state.
Preferably, benign operation is carried out to network, carries out whether analysis and assessment need safeguard, tool is needed to have:Work Control drain sweep tool, industry control application scanning tool, industry control validating vulnerability tool, industry control configuration inspection script, industry control flow analysis work Tool, industry control standard close rule assessment tool, own Product evaluation tool, investigation table.
Preferably, the I/O network of the live execution level is electrically connected with the controller of field control layer.
Preferably, the controller of the field control layer is electrically connected with the monitoring network of production control layer.
Preferably, the LAN for monitoring network and operator's management level, the wide area network or non-military of the production control layer Area is electrically connected.
Preferably, LAN, wide area network or the demilitarized zone of operator's management level and the company of strategic decision layer do Public network network is electrically connected.
(Three)Advantageous effect
The present invention provides a kind of industrial control system core network prevent safely it is outer invade with security evaluation device, having following has Beneficial effect:
The industrial control system core network prevent safely it is outer invade with security evaluation device, cause enterprise's industrial control unit (ICU) network to be pacified Full weight regards, and control system can be allowed safe and reliable, can prevent Migrant women from invading control device, can optimize enterprise Industry information network can maximize and ensure enterprise assets safety, can promote business administration and can improve enterprise staff knowledge Ability.
Description of the drawings
Fig. 1 is industrial control system schematic network structure of the present invention.
In figure:Level 4, company information central decision layer, Level 3, Enterprise information system centre management layer, Level 2, enterprise's industrial production control/monitoring layer, Level 1, industrial control system controller and its IO drive layer, Leve0, equipment Layer.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig. 1, the present invention provides a kind of technical solution:A kind of industrial control system core network prevents safely outer invade With security evaluation device, including live execution level, field control layer, production control layer, operator's management level and strategic decision layer, Live execution level includes sensor and brake, and sensor includes temperature sensor and pressure sensor, and live execution level also wraps I/O network is included, I/O network is electrically connected with temperature sensor and pressure sensor, and I/O network is electrically connected with HAT, I/O network electrical connection There are electromagnetic valve, I/O network to be also electrically connected motor, motor, switch and soft strater, in industrial control system network Central layer or core layer carry out network security assessment and plug-in device prevents exotic invasive system, field control layer from including control Device, the I/O network of live execution level are electrically connected with the controller of field control layer, and controller is connected separately with by fieldbus RTU, DC, PLC and local IO, production control layer include monitoring network, monitoring system, engineer station, real-time data base and communication The controller of processing module, field control layer is electrically connected with the monitoring network of production control layer, and monitoring network is respectively with monitoring System, engineer station, real-time data base are connected with Communication processing module, and carrying out security evaluation to system centre layer network is included in Line analysis, industrial control system assets assessment, threat assessment, security partitioning reasonable evaluation, node correspondence, security boundary, Security of system is verified, and operator's management level include LAN, redundant database, historical data base, server and long-range intervention With engineering access modules, the monitoring network of control layer and LAN, wide area network or the demilitarized zone electricity of operator's management level are produced Connection, server include ICCP servers, opc server, information data can and application server, LAN respectively with redundant digit According to library, historical data base, server and long-range intervention and the electrical connection of engineering access modules, by assets investigation, threat analysis, fragility Property analysis collect data and required according to Risk Calculation, carry out rationally and arrange, demand analysis, safety recommendation, Security Construction are real It plays tricks and draws, have stage, each stage that can be divided into planning construction stage, Construction Acceptance industrial control system security evaluation Stage, operation and maintenance stage, abandonment stage, assessment is mainly around production business, control system, fragility, threat, risk, peace The fundamentals such as full measure carry out, and evaluation process fully considers business its complexity, importance, availability, security incident, remnants Risk, demand for security etc. and fundamental association attributes, strategic decision layer include corporate office network, industrial control system WEB Applications client, company's host and commercial server, LAN, wide area network or the demilitarized zone of operator's management level and strategy are determined The corporate office network of plan layer is electrically connected, corporate office network respectively with industrial control system WEB application client, company's host It is connected with commercial server, benign operation is carried out to network, carries out whether analysis and assessment need safeguard, passes through these works Have more industrial control system core layer networks to be analyzed, to obtain assessment table, then have by being carried out after ruggedized equipment Analysis assessment table is reported enterprise by comparative analysis, allow enterprise can accurate judgement current industrial Control System NetWork state, to net Network carries out benign operation, carries out whether analysis and assessment need safeguard, and tool is needed to have:Industry control drain sweep tool, industry control application Scanning tools, industry control validating vulnerability tool, industry control configuration inspection script, industry control traffic analysis tool, industry control standard close rule assessment Tool, own Product evaluation tool, investigation table, additional information:Equipment is not analyzed, acquiescence field controller all meets Industry security certification, woth no need to verify.
Present device is to carry out network security assessment and plug-in in industrial control system network center layer or core layer Equipment prevents exotic invasive system;Steps are as follows:It includes on-line analysis to carry out security evaluation to system centre layer network(Industry control system System assets assessment, threat assessment, security partitioning reasonable evaluation, node correspondence, security boundary, security of system core It looks into);Preliminary analysis(Assets investigation, threat analysis, vulnerability analysis are collected data and required according to Risk Calculation, is closed Reason and arrangement);Interpretation of result(Demand analysis, safety recommendation, Security Construction implementation plan);For industrial control system safety Assessment has stage, each stage that can be divided into planning construction stage, Construction Acceptance stage, operation and maintenance stage, abandonment stage, Assessment is carried out mainly around fundamentals such as production business, control system, fragility, threat, risk, safety measures, is assessed Journey fully considers business:Complexity, importance, availability, security incident, residual risk, demand for security etc. and fundamental phase Close attribute.
At Level 4,3,2, benign operation is carried out to network, carries out whether analysis and assessment need safeguard, is needed Tool has:Industry control drain sweep tool, industry control application scanning tool, industry control validating vulnerability tool, industry control configuration inspection script, industry control stream Analysis tool, industry control standard conjunction rule assessment tool, own Product evaluation tool, investigation table are measured, these tool multiplexing industry controls are passed through System core layer network processed is analyzed, and to obtain assessment table, then is had by being compared and analyzed after ruggedized equipment, Analysis assessment table report enterprise, allow enterprise can accurate judgement current industrial Control System NetWork state, additional information:It is not right Equipment is analyzed, and acquiescence field controller all meets industry security certification, woth no need to verify.
The electric elements occurred in this article are electrically connected with extraneous main controller and 220V alternating currents, and main controller can be meter Calculation machine etc. plays the conventionally known equipment of control, involved in this article to correlation module be hardware system module or be existing The function module that technology Computer Software program or agreement are combined with hardware, the computer involved by the function module are soft The technology of part program or agreement being well known to those skilled in the art in itself is not the improvements of this system;This system Be improved to the interaction relationship between each module or connection relation, as the whole construction of system is improved, with Solve the problems, such as this system relevant art to be solved.
In conclusion the industrial control system core network prevent safely it is outer invade with security evaluation device, cause enterprise's work Industry controller network is paid attention to safely, and control system can be allowed safe and reliable, Migrant women can be prevented to control device Invasion, can optimize Enterprise information system, can maximize and ensure enterprise assets safety, can promote business administration and can carry High enterprise staff Knowledge Capability.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (6)

1. a kind of industrial control system core network prevents safely outer invade and security evaluation device, it is characterised in that:Including scene Execution level, field control layer, production control layer, operator's management level and strategic decision layer, the scene execution level includes sensing Device and brake, the sensor include temperature sensor and pressure sensor;
The scene execution level further includes I/O network, and the I/O network is electrically connected with temperature sensor and pressure sensor, described I/O network is electrically connected with HAT, and the I/O network is electrically connected with electromagnetic valve, and the I/O network has also been electrically connected motor, horse It reaches, switch and soft strater, network security assessment is carried out in industrial control system network center layer or core layer and hang outside It is standby to prevent exotic invasive system;
The field control layer includes controller, and the controller is connected separately with RTU, DC, PLC and local by fieldbus IO, the production control layer includes monitoring network, monitoring system, engineer station, real-time data base and Communication processing module, described Monitoring network is connected with monitoring system, engineer station, real-time data base and Communication processing module respectively, to system centre layer net It includes on-line analysis, industrial control system assets assessment, threat assessment, security partitioning reasonable evaluation, node that network, which carries out security evaluation, Correspondence, security boundary, security of system are verified;
Operator's management level include that LAN, redundant database, historical data base, server and long-range intervention and engineering are visited Ask module, the server include ICCP servers, opc server, information data can and application server, the LAN point It is not electrically connected with redundant database, historical data base, server and long-range intervention and engineering access modules, by assets investigation, prestige The side of body analysis, vulnerability analysis collect data and required according to Risk Calculation, carry out rationally and arrange, demand analysis, safety recommendation, Security Construction implementation plan has stage, each stage that can be divided into planning construction rank industrial control system security evaluation Section, Construction Acceptance stage, operation and maintenance stage, abandonment stage, assessment is mainly around production business, control system, fragility, prestige The fundamentals such as the side of body, risk, safety measure carry out, and evaluation process fully considers business its complexity, importance, availability, peace Total event, residual risk, demand for security etc. and fundamental association attributes;
The strategic decision layer includes corporate office network, industrial control system WEB application client, company's host and commercial clothes Business device, the corporate office network connect with industrial control system WEB application client, company's host and commercial server respectively It connects, benign operation is carried out to network, carries out whether analysis and assessment need safeguard, passes through the more industrial control systems of these tools Core layer network is analyzed, and to obtain assessment table, then has by being compared and analyzed after ruggedized equipment, analysis is commented Estimate table and report enterprise, allows enterprise being capable of accurate judgement current industrial Control System NetWork state.
2. a kind of industrial control system core network according to claim 1 prevent safely it is outer invade with security evaluation device, It is characterized in that:Benign operation is carried out to network, carries out whether analysis and assessment need safeguard, tool is needed to have:Industry control is leaked Sweep tool, industry control application scanning tool, industry control validating vulnerability tool, industry control configuration inspection script, industry control traffic analysis tool, work Control standard closes rule assessment tool, own Product evaluation tool, investigation table.
3. a kind of industrial control system core network according to claim 1 prevent safely it is outer invade with security evaluation device, It is characterized in that:The I/O network of the scene execution level is electrically connected with the controller of field control layer.
4. a kind of industrial control system core network according to claim 1 prevent safely it is outer invade with security evaluation device, It is characterized in that:The controller of the field control layer is electrically connected with the monitoring network of production control layer.
5. a kind of industrial control system core network according to claim 1 prevent safely it is outer invade with security evaluation device, It is characterized in that:The monitoring network of the production control layer and LAN, wide area network or the demilitarized zone electricity of operator's management level Connection.
6. a kind of industrial control system core network according to claim 1 prevent safely it is outer invade with security evaluation device, It is characterized in that:LAN, wide area network or the demilitarized zone of operator's management level and the corporate office net of strategic decision layer Network is electrically connected.
CN201810189644.8A 2018-03-08 2018-03-08 A kind of industrial control system core network prevents safely outer invade and security evaluation device Pending CN108594769A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810189644.8A CN108594769A (en) 2018-03-08 2018-03-08 A kind of industrial control system core network prevents safely outer invade and security evaluation device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810189644.8A CN108594769A (en) 2018-03-08 2018-03-08 A kind of industrial control system core network prevents safely outer invade and security evaluation device

Publications (1)

Publication Number Publication Date
CN108594769A true CN108594769A (en) 2018-09-28

Family

ID=63625772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810189644.8A Pending CN108594769A (en) 2018-03-08 2018-03-08 A kind of industrial control system core network prevents safely outer invade and security evaluation device

Country Status (1)

Country Link
CN (1) CN108594769A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639670A (en) * 2018-12-10 2019-04-16 北京威努特技术有限公司 A kind of industry control network security postures quantitative estimation method of knowledge based map
CN110262420A (en) * 2019-06-18 2019-09-20 国家计算机网络与信息安全管理中心 A kind of distributed industrial control network security detection system
CN114465800A (en) * 2022-02-10 2022-05-10 北京神州慧安科技有限公司 Industrial control network security protection architecture and network security protection method for tobacco industry

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639670A (en) * 2018-12-10 2019-04-16 北京威努特技术有限公司 A kind of industry control network security postures quantitative estimation method of knowledge based map
CN109639670B (en) * 2018-12-10 2021-04-16 北京威努特技术有限公司 Knowledge graph-based industrial control network security situation quantitative evaluation method
CN110262420A (en) * 2019-06-18 2019-09-20 国家计算机网络与信息安全管理中心 A kind of distributed industrial control network security detection system
CN114465800A (en) * 2022-02-10 2022-05-10 北京神州慧安科技有限公司 Industrial control network security protection architecture and network security protection method for tobacco industry

Similar Documents

Publication Publication Date Title
JP5921531B2 (en) Malicious attack detection and analysis
EP2651098B1 (en) Event processing system for an electrical power system
CN108594769A (en) A kind of industrial control system core network prevents safely outer invade and security evaluation device
CN111143308A (en) Federal learning-based high-low voltage motor data processing method, system and device
CN105471656A (en) Abstraction method specific to operation and maintenance information model of intelligent substation automation system
CN101674285A (en) Single sign-on system and method thereof
CN110311802A (en) Network operation method, device, electronic equipment and storage medium
Falco et al. IT security for industrial control systems
CN202363972U (en) Remote operation and maintenance platform of substation secondary system
KR20110081113A (en) Method and apparatus for providing controlled access to a computer system/facility resource for remote equipment monitoring and diagnostics
CN104978634A (en) Data processing system
CN108600155A (en) A kind of convergence-level network security prevents the industrial control system invaded outside
Zhang et al. Investigating the impact of cyber attacks on power system reliability
CN108900328A (en) A kind of electricity grid network data safety test macro and method
CN111031050B (en) Monitoring method and device for electricity consumption information acquisition system
EP3821303B1 (en) Cogen-mom integration using tabulated information recognition
CN110262313B (en) Electric power material key point remote monitoring system based on internet of things technology
CN110493200B (en) Industrial control system risk quantitative analysis method based on threat map
Kolosok et al. Cyber resilience of SCADA at the level of energy facilities
CN113411409B (en) Remote operation and maintenance traceability system of intelligent internet of things gateway
Kolosok et al. Problems of Cyber Security of Digital Substations
Wang et al. Intrusion detection model of SCADA using graphical features
CN105306489B (en) Method for detecting safety of electrical equipment
CN104854820B (en) Monitor control device and monitoring control method
Kiuchi et al. Security technologies, usage and guidelines in SCADA system networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180928