CN108594769A - A kind of industrial control system core network prevents safely outer invade and security evaluation device - Google Patents
A kind of industrial control system core network prevents safely outer invade and security evaluation device Download PDFInfo
- Publication number
- CN108594769A CN108594769A CN201810189644.8A CN201810189644A CN108594769A CN 108594769 A CN108594769 A CN 108594769A CN 201810189644 A CN201810189644 A CN 201810189644A CN 108594769 A CN108594769 A CN 108594769A
- Authority
- CN
- China
- Prior art keywords
- network
- control system
- security
- industrial control
- layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000011156 evaluation Methods 0.000 title claims abstract description 33
- 239000010410 layer Substances 0.000 claims description 47
- 238000004458 analytical method Methods 0.000 claims description 29
- 238000012544 monitoring process Methods 0.000 claims description 21
- 238000004519 manufacturing process Methods 0.000 claims description 17
- 238000007726 management method Methods 0.000 claims description 15
- 238000010276 construction Methods 0.000 claims description 13
- 239000012792 core layer Substances 0.000 claims description 8
- 238000011835 investigation Methods 0.000 claims description 8
- 238000004891 communication Methods 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 5
- 238000007689 inspection Methods 0.000 claims description 4
- 238000012423 maintenance Methods 0.000 claims description 4
- 238000012854 evaluation process Methods 0.000 claims description 3
- 238000000638 solvent extraction Methods 0.000 claims description 3
- 238000012038 vulnerability analysis Methods 0.000 claims description 3
- 230000005611 electricity Effects 0.000 claims description 2
- 238000009776 industrial production Methods 0.000 description 4
- 238000000034 method Methods 0.000 description 3
- 238000010835 comparative analysis Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005206 flow analysis Methods 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000004886 process control Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009885 systemic effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/4185—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/4185—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication
- G05B19/41855—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication by local area network [LAN], network structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Manufacturing & Machinery (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of industrial control system core networks to prevent outer invade and security evaluation device safely, it is related to technical field of network security, including live execution level, field control layer, produce control layer, operator's management level and strategic decision layer, the scene execution level includes sensor and brake, the sensor includes temperature sensor and pressure sensor, live execution level further includes I/O network, I/O network is electrically connected with temperature sensor and pressure sensor, I/O network is electrically connected with HAT, I/O network is electrically connected with electromagnetic valve, I/O network has also been electrically connected motor, motor, switch and soft strater.The present invention causes enterprise's industrial control unit (ICU) network security to be paid attention to, control system can be allowed safe and reliable, it can prevent Migrant women from invading control device, Enterprise information system can be optimized, it can maximize and ensure enterprise assets safety, business administration can be promoted and enterprise staff Knowledge Capability can be improved.
Description
Technical field
The present invention relates to technical field of network security, specially a kind of industrial control system core network prevents safely outer invade
With security evaluation device.
Background technology
Industrial control system refer to various automation control components and real time data is acquired, monitor it is excessively program-controlled
Component processed collectively forms, and realizes to industrial equipment automatic operating, process control and the business process management system of monitoring.
Industrial control system Component units are set comprising human-computer interaction interface, the network equipment, controller equiment unit, scene
Standby, with scientific technological advance, industrial information is also that burst pushes ahead vigorously to develop, and industrial control system network is to entire Industry Control
Systemic effect is increasing.Industrial system network directly influence whole system reliable for operation, real-time, use, analysis, extension,
It is advanced, the functions such as can safeguard;
For industrial system network security concerning entire industrial production lifeblood, the safe final purpose of industrial system is to ensure enterprise's production peace
Entirely;Industrial system network security threats come from personal hacker, non-government organization, national government, employee's maloperation at present, and feature is to attack
It hits and defines, attack in a organized way;Attack means are various, have a large amount of 0day;Attack process is complicated, while inside and outside attack
So doing security evaluation to industrial control system network in advance and protecting, this paper most important to entire industrial production system
Only discuss to the security protection of system centre layer network and assessment;Central core network structure refers to monitoring system in industrial control system
The network of system, operator station to production management system and its periphery carries out security evaluation to enterprise or factory system;To passing through
Safety estimation system enterprise more confident could allow system operation, not over security evaluation, need to add safety protection equipment
Central core network security can effectively be protected, prevent Industry Control active station, engineer station, system server, database by
To exotic invasive, ensures system safe and reliable operation, do not allow enterprise to incur loss.
Invention content
(One)The technical issues of solution
The problem of prior art is primarily present, be to current enterprise to industrial control system network security recognize it is not deep enough,
Think that network security is not important enough, reason is the puzzlement that their enterprises are not yet brought by exotic invasive, pays little attention at present;
Industrial control system security evaluation system is not well established, causes many enterprises that can not judge their itself enterprise's industrial control system
Whether network needs safety protection equipment;Industrial production enterprise not yet payes attention to this block at present.
(Two)Technical solution
In order to achieve the above object, the present invention is achieved by the following technical programs:A kind of industrial control system core network peace
It is complete prevent it is outer invade with security evaluation device, including live execution level, field control layer, production control layer, operator's management level and
Strategic decision layer, the scene execution level include sensor and brake, and the sensor includes that temperature sensor and pressure pass
Sensor, the scene execution level further includes I/O network, and the I/O network is electrically connected with temperature sensor and pressure sensor, described
I/O network is electrically connected with HAT, and the I/O network is electrically connected with electromagnetic valve, and the I/O network has also been electrically connected motor, horse
It reaches, switch and soft strater, network security assessment is carried out in industrial control system network center layer or core layer and hang outside
Include controller for exotic invasive system, the field control layer is prevented, the controller is connected separately with by fieldbus
RTU, DC, PLC and local IO, the production control layer include monitoring network, monitoring system, engineer station, real-time data base and
Communication processing module, the monitoring network are connected with monitoring system, engineer station, real-time data base and Communication processing module respectively
It connects, it includes on-line analysis, industrial control system assets assessment, threat assessment, safety point to carry out security evaluation to system centre layer network
Area's reasonable evaluation, node correspondence, security boundary, security of system are verified, and operator's management level include local
Net, redundant database, historical data base, server and long-range intervention and engineering access modules, the server include ICCP clothes
Be engaged in device, opc server, information data can and application server, the LAN respectively with redundant database, historical data base,
Server and long-range intervention and the electrical connection of engineering access modules, data are collected by assets investigation, threat analysis, vulnerability analysis
It requires, carry out rationally and arranges, demand analysis, safety recommendation, Security Construction implementation plan according to Risk Calculation, industry is controlled
System security assessment processed has stage, each stage that can be divided into planning construction stage, Construction Acceptance stage, operation and maintenance rank
Section, abandonment stage, assessment is mainly around fundamentals such as production business, control system, fragility, threat, risk, safety measures
It carries out, evaluation process fully considers business its complexity, importance, availability, security incident, residual risk, demand for security etc.
With fundamental association attributes, the strategic decision layer include corporate office network, industrial control system WEB application client,
Company's host and commercial server, the corporate office network respectively with industrial control system WEB application client, company's host
It is connected with commercial server, benign operation is carried out to network, carries out whether analysis and assessment need safeguard, passes through these works
Have more industrial control system core layer networks to be analyzed, to obtain assessment table, then have by being carried out after ruggedized equipment
Analysis assessment table is reported enterprise by comparative analysis, allows enterprise being capable of accurate judgement current industrial Control System NetWork state.
Preferably, benign operation is carried out to network, carries out whether analysis and assessment need safeguard, tool is needed to have:Work
Control drain sweep tool, industry control application scanning tool, industry control validating vulnerability tool, industry control configuration inspection script, industry control flow analysis work
Tool, industry control standard close rule assessment tool, own Product evaluation tool, investigation table.
Preferably, the I/O network of the live execution level is electrically connected with the controller of field control layer.
Preferably, the controller of the field control layer is electrically connected with the monitoring network of production control layer.
Preferably, the LAN for monitoring network and operator's management level, the wide area network or non-military of the production control layer
Area is electrically connected.
Preferably, LAN, wide area network or the demilitarized zone of operator's management level and the company of strategic decision layer do
Public network network is electrically connected.
(Three)Advantageous effect
The present invention provides a kind of industrial control system core network prevent safely it is outer invade with security evaluation device, having following has
Beneficial effect:
The industrial control system core network prevent safely it is outer invade with security evaluation device, cause enterprise's industrial control unit (ICU) network to be pacified
Full weight regards, and control system can be allowed safe and reliable, can prevent Migrant women from invading control device, can optimize enterprise
Industry information network can maximize and ensure enterprise assets safety, can promote business administration and can improve enterprise staff knowledge
Ability.
Description of the drawings
Fig. 1 is industrial control system schematic network structure of the present invention.
In figure:Level 4, company information central decision layer, Level 3, Enterprise information system centre management layer, Level
2, enterprise's industrial production control/monitoring layer, Level 1, industrial control system controller and its IO drive layer, Leve0, equipment
Layer.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig. 1, the present invention provides a kind of technical solution:A kind of industrial control system core network prevents safely outer invade
With security evaluation device, including live execution level, field control layer, production control layer, operator's management level and strategic decision layer,
Live execution level includes sensor and brake, and sensor includes temperature sensor and pressure sensor, and live execution level also wraps
I/O network is included, I/O network is electrically connected with temperature sensor and pressure sensor, and I/O network is electrically connected with HAT, I/O network electrical connection
There are electromagnetic valve, I/O network to be also electrically connected motor, motor, switch and soft strater, in industrial control system network
Central layer or core layer carry out network security assessment and plug-in device prevents exotic invasive system, field control layer from including control
Device, the I/O network of live execution level are electrically connected with the controller of field control layer, and controller is connected separately with by fieldbus
RTU, DC, PLC and local IO, production control layer include monitoring network, monitoring system, engineer station, real-time data base and communication
The controller of processing module, field control layer is electrically connected with the monitoring network of production control layer, and monitoring network is respectively with monitoring
System, engineer station, real-time data base are connected with Communication processing module, and carrying out security evaluation to system centre layer network is included in
Line analysis, industrial control system assets assessment, threat assessment, security partitioning reasonable evaluation, node correspondence, security boundary,
Security of system is verified, and operator's management level include LAN, redundant database, historical data base, server and long-range intervention
With engineering access modules, the monitoring network of control layer and LAN, wide area network or the demilitarized zone electricity of operator's management level are produced
Connection, server include ICCP servers, opc server, information data can and application server, LAN respectively with redundant digit
According to library, historical data base, server and long-range intervention and the electrical connection of engineering access modules, by assets investigation, threat analysis, fragility
Property analysis collect data and required according to Risk Calculation, carry out rationally and arrange, demand analysis, safety recommendation, Security Construction are real
It plays tricks and draws, have stage, each stage that can be divided into planning construction stage, Construction Acceptance industrial control system security evaluation
Stage, operation and maintenance stage, abandonment stage, assessment is mainly around production business, control system, fragility, threat, risk, peace
The fundamentals such as full measure carry out, and evaluation process fully considers business its complexity, importance, availability, security incident, remnants
Risk, demand for security etc. and fundamental association attributes, strategic decision layer include corporate office network, industrial control system WEB
Applications client, company's host and commercial server, LAN, wide area network or the demilitarized zone of operator's management level and strategy are determined
The corporate office network of plan layer is electrically connected, corporate office network respectively with industrial control system WEB application client, company's host
It is connected with commercial server, benign operation is carried out to network, carries out whether analysis and assessment need safeguard, passes through these works
Have more industrial control system core layer networks to be analyzed, to obtain assessment table, then have by being carried out after ruggedized equipment
Analysis assessment table is reported enterprise by comparative analysis, allow enterprise can accurate judgement current industrial Control System NetWork state, to net
Network carries out benign operation, carries out whether analysis and assessment need safeguard, and tool is needed to have:Industry control drain sweep tool, industry control application
Scanning tools, industry control validating vulnerability tool, industry control configuration inspection script, industry control traffic analysis tool, industry control standard close rule assessment
Tool, own Product evaluation tool, investigation table, additional information:Equipment is not analyzed, acquiescence field controller all meets
Industry security certification, woth no need to verify.
Present device is to carry out network security assessment and plug-in in industrial control system network center layer or core layer
Equipment prevents exotic invasive system;Steps are as follows:It includes on-line analysis to carry out security evaluation to system centre layer network(Industry control system
System assets assessment, threat assessment, security partitioning reasonable evaluation, node correspondence, security boundary, security of system core
It looks into);Preliminary analysis(Assets investigation, threat analysis, vulnerability analysis are collected data and required according to Risk Calculation, is closed
Reason and arrangement);Interpretation of result(Demand analysis, safety recommendation, Security Construction implementation plan);For industrial control system safety
Assessment has stage, each stage that can be divided into planning construction stage, Construction Acceptance stage, operation and maintenance stage, abandonment stage,
Assessment is carried out mainly around fundamentals such as production business, control system, fragility, threat, risk, safety measures, is assessed
Journey fully considers business:Complexity, importance, availability, security incident, residual risk, demand for security etc. and fundamental phase
Close attribute.
At Level 4,3,2, benign operation is carried out to network, carries out whether analysis and assessment need safeguard, is needed
Tool has:Industry control drain sweep tool, industry control application scanning tool, industry control validating vulnerability tool, industry control configuration inspection script, industry control stream
Analysis tool, industry control standard conjunction rule assessment tool, own Product evaluation tool, investigation table are measured, these tool multiplexing industry controls are passed through
System core layer network processed is analyzed, and to obtain assessment table, then is had by being compared and analyzed after ruggedized equipment,
Analysis assessment table report enterprise, allow enterprise can accurate judgement current industrial Control System NetWork state, additional information:It is not right
Equipment is analyzed, and acquiescence field controller all meets industry security certification, woth no need to verify.
The electric elements occurred in this article are electrically connected with extraneous main controller and 220V alternating currents, and main controller can be meter
Calculation machine etc. plays the conventionally known equipment of control, involved in this article to correlation module be hardware system module or be existing
The function module that technology Computer Software program or agreement are combined with hardware, the computer involved by the function module are soft
The technology of part program or agreement being well known to those skilled in the art in itself is not the improvements of this system;This system
Be improved to the interaction relationship between each module or connection relation, as the whole construction of system is improved, with
Solve the problems, such as this system relevant art to be solved.
In conclusion the industrial control system core network prevent safely it is outer invade with security evaluation device, cause enterprise's work
Industry controller network is paid attention to safely, and control system can be allowed safe and reliable, Migrant women can be prevented to control device
Invasion, can optimize Enterprise information system, can maximize and ensure enterprise assets safety, can promote business administration and can carry
High enterprise staff Knowledge Capability.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (6)
1. a kind of industrial control system core network prevents safely outer invade and security evaluation device, it is characterised in that:Including scene
Execution level, field control layer, production control layer, operator's management level and strategic decision layer, the scene execution level includes sensing
Device and brake, the sensor include temperature sensor and pressure sensor;
The scene execution level further includes I/O network, and the I/O network is electrically connected with temperature sensor and pressure sensor, described
I/O network is electrically connected with HAT, and the I/O network is electrically connected with electromagnetic valve, and the I/O network has also been electrically connected motor, horse
It reaches, switch and soft strater, network security assessment is carried out in industrial control system network center layer or core layer and hang outside
It is standby to prevent exotic invasive system;
The field control layer includes controller, and the controller is connected separately with RTU, DC, PLC and local by fieldbus
IO, the production control layer includes monitoring network, monitoring system, engineer station, real-time data base and Communication processing module, described
Monitoring network is connected with monitoring system, engineer station, real-time data base and Communication processing module respectively, to system centre layer net
It includes on-line analysis, industrial control system assets assessment, threat assessment, security partitioning reasonable evaluation, node that network, which carries out security evaluation,
Correspondence, security boundary, security of system are verified;
Operator's management level include that LAN, redundant database, historical data base, server and long-range intervention and engineering are visited
Ask module, the server include ICCP servers, opc server, information data can and application server, the LAN point
It is not electrically connected with redundant database, historical data base, server and long-range intervention and engineering access modules, by assets investigation, prestige
The side of body analysis, vulnerability analysis collect data and required according to Risk Calculation, carry out rationally and arrange, demand analysis, safety recommendation,
Security Construction implementation plan has stage, each stage that can be divided into planning construction rank industrial control system security evaluation
Section, Construction Acceptance stage, operation and maintenance stage, abandonment stage, assessment is mainly around production business, control system, fragility, prestige
The fundamentals such as the side of body, risk, safety measure carry out, and evaluation process fully considers business its complexity, importance, availability, peace
Total event, residual risk, demand for security etc. and fundamental association attributes;
The strategic decision layer includes corporate office network, industrial control system WEB application client, company's host and commercial clothes
Business device, the corporate office network connect with industrial control system WEB application client, company's host and commercial server respectively
It connects, benign operation is carried out to network, carries out whether analysis and assessment need safeguard, passes through the more industrial control systems of these tools
Core layer network is analyzed, and to obtain assessment table, then has by being compared and analyzed after ruggedized equipment, analysis is commented
Estimate table and report enterprise, allows enterprise being capable of accurate judgement current industrial Control System NetWork state.
2. a kind of industrial control system core network according to claim 1 prevent safely it is outer invade with security evaluation device,
It is characterized in that:Benign operation is carried out to network, carries out whether analysis and assessment need safeguard, tool is needed to have:Industry control is leaked
Sweep tool, industry control application scanning tool, industry control validating vulnerability tool, industry control configuration inspection script, industry control traffic analysis tool, work
Control standard closes rule assessment tool, own Product evaluation tool, investigation table.
3. a kind of industrial control system core network according to claim 1 prevent safely it is outer invade with security evaluation device,
It is characterized in that:The I/O network of the scene execution level is electrically connected with the controller of field control layer.
4. a kind of industrial control system core network according to claim 1 prevent safely it is outer invade with security evaluation device,
It is characterized in that:The controller of the field control layer is electrically connected with the monitoring network of production control layer.
5. a kind of industrial control system core network according to claim 1 prevent safely it is outer invade with security evaluation device,
It is characterized in that:The monitoring network of the production control layer and LAN, wide area network or the demilitarized zone electricity of operator's management level
Connection.
6. a kind of industrial control system core network according to claim 1 prevent safely it is outer invade with security evaluation device,
It is characterized in that:LAN, wide area network or the demilitarized zone of operator's management level and the corporate office net of strategic decision layer
Network is electrically connected.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810189644.8A CN108594769A (en) | 2018-03-08 | 2018-03-08 | A kind of industrial control system core network prevents safely outer invade and security evaluation device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810189644.8A CN108594769A (en) | 2018-03-08 | 2018-03-08 | A kind of industrial control system core network prevents safely outer invade and security evaluation device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108594769A true CN108594769A (en) | 2018-09-28 |
Family
ID=63625772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810189644.8A Pending CN108594769A (en) | 2018-03-08 | 2018-03-08 | A kind of industrial control system core network prevents safely outer invade and security evaluation device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108594769A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109639670A (en) * | 2018-12-10 | 2019-04-16 | 北京威努特技术有限公司 | A kind of industry control network security postures quantitative estimation method of knowledge based map |
CN110262420A (en) * | 2019-06-18 | 2019-09-20 | 国家计算机网络与信息安全管理中心 | A kind of distributed industrial control network security detection system |
CN114465800A (en) * | 2022-02-10 | 2022-05-10 | 北京神州慧安科技有限公司 | Industrial control network security protection architecture and network security protection method for tobacco industry |
-
2018
- 2018-03-08 CN CN201810189644.8A patent/CN108594769A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109639670A (en) * | 2018-12-10 | 2019-04-16 | 北京威努特技术有限公司 | A kind of industry control network security postures quantitative estimation method of knowledge based map |
CN109639670B (en) * | 2018-12-10 | 2021-04-16 | 北京威努特技术有限公司 | Knowledge graph-based industrial control network security situation quantitative evaluation method |
CN110262420A (en) * | 2019-06-18 | 2019-09-20 | 国家计算机网络与信息安全管理中心 | A kind of distributed industrial control network security detection system |
CN114465800A (en) * | 2022-02-10 | 2022-05-10 | 北京神州慧安科技有限公司 | Industrial control network security protection architecture and network security protection method for tobacco industry |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5921531B2 (en) | Malicious attack detection and analysis | |
EP2651098B1 (en) | Event processing system for an electrical power system | |
CN108594769A (en) | A kind of industrial control system core network prevents safely outer invade and security evaluation device | |
CN111143308A (en) | Federal learning-based high-low voltage motor data processing method, system and device | |
CN105471656A (en) | Abstraction method specific to operation and maintenance information model of intelligent substation automation system | |
CN101674285A (en) | Single sign-on system and method thereof | |
CN110311802A (en) | Network operation method, device, electronic equipment and storage medium | |
Falco et al. | IT security for industrial control systems | |
CN202363972U (en) | Remote operation and maintenance platform of substation secondary system | |
KR20110081113A (en) | Method and apparatus for providing controlled access to a computer system/facility resource for remote equipment monitoring and diagnostics | |
CN104978634A (en) | Data processing system | |
CN108600155A (en) | A kind of convergence-level network security prevents the industrial control system invaded outside | |
Zhang et al. | Investigating the impact of cyber attacks on power system reliability | |
CN108900328A (en) | A kind of electricity grid network data safety test macro and method | |
CN111031050B (en) | Monitoring method and device for electricity consumption information acquisition system | |
EP3821303B1 (en) | Cogen-mom integration using tabulated information recognition | |
CN110262313B (en) | Electric power material key point remote monitoring system based on internet of things technology | |
CN110493200B (en) | Industrial control system risk quantitative analysis method based on threat map | |
Kolosok et al. | Cyber resilience of SCADA at the level of energy facilities | |
CN113411409B (en) | Remote operation and maintenance traceability system of intelligent internet of things gateway | |
Kolosok et al. | Problems of Cyber Security of Digital Substations | |
Wang et al. | Intrusion detection model of SCADA using graphical features | |
CN105306489B (en) | Method for detecting safety of electrical equipment | |
CN104854820B (en) | Monitor control device and monitoring control method | |
Kiuchi et al. | Security technologies, usage and guidelines in SCADA system networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180928 |