CN210016485U - Industrial information security network attacking and defending practical training box for intelligent manufacturing system - Google Patents

Industrial information security network attacking and defending practical training box for intelligent manufacturing system Download PDF

Info

Publication number
CN210016485U
CN210016485U CN201920243795.7U CN201920243795U CN210016485U CN 210016485 U CN210016485 U CN 210016485U CN 201920243795 U CN201920243795 U CN 201920243795U CN 210016485 U CN210016485 U CN 210016485U
Authority
CN
China
Prior art keywords
firewall
machine
training box
intelligent manufacturing
practical training
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201920243795.7U
Other languages
Chinese (zh)
Inventor
祁邗
贾仁超
王一凡
李光旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Jianxin Network Technology Co Ltd
Original Assignee
Henan Jianxin Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Jianxin Network Technology Co Ltd filed Critical Henan Jianxin Network Technology Co Ltd
Priority to CN201920243795.7U priority Critical patent/CN210016485U/en
Application granted granted Critical
Publication of CN210016485U publication Critical patent/CN210016485U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The utility model provides a real case of instructing is attacked and defended to industrial information security network for intelligent manufacturing system, include: the system comprises a firewall, a PLC, an HMI, an RTU, a firewall configuration machine, an auditing machine, a switch, an attack machine and a practical training box panel; the number of the firewalls is 3; the switch is simultaneously in circuit connection with the firewall, the firewall configuration machine, the auditing machine and the attack machine, the other ends of the 3 firewalls are respectively connected with the HMI, the RTU and the PLC, and the practical training box panel is connected with the firewall configuration machine, the auditing machine, the switch and the attack machine. The experimental device is used for independently completing the experiment of the intelligent manufacturing assembly line system and meeting the requirements of learning and operation demonstration of the principle of the intelligent manufacturing assembly line system.

Description

Industrial information security network attacking and defending practical training box for intelligent manufacturing system
Technical Field
The utility model relates to an industry control network security field especially relates to a real case of instructing is attacked and defended to industrial information security network for intelligent manufacturing system.
Background
With the continuous development of information technology, the integration between informatization and industrialization is deepened, more convenience is brought to industrial intelligent manufacturing, but meanwhile, more and more network security problems also occur in an intelligent manufacturing assembly line system, at present, with the proposal of the strategy of 'Chinese manufacturing 2025', the cultivation work of network security professionals is widely regarded due to the urgency of the country and the industry on the network security talent requirement of the intelligent manufacturing system, and as a cross discipline in the fields of computers, information security, automation and the like, the cultivation of the network security talents of the intelligent manufacturing assembly line system is still in the exploration stage, and the cultivation of the professionals is delayed. The problems of weak accumulation, single thinking mode, excessive theory, too little practice and the like generally exist in the training and teaching process developed at present.
The problem of development of intelligent manufacturing assembly line system network security industry and shortage of professional network security talents is solved, an intelligent manufacturing assembly line system network security training system needs to be completed aiming at intelligent manufacturing deep cooperation, and a teaching training system combining theory and practice is formed. However, at present, the network safety practical training box on the market can meet the requirements of too few attack and defense experiments, too large in size, inconvenient to transport and assemble, and incapable of well meeting the training requirements.
Therefore, there is a need to provide an improved solution to the above-mentioned deficiencies of the prior art.
SUMMERY OF THE UTILITY MODEL
An object of the utility model is to provide an industry information security network attacks and defends real case of instructing for intelligent manufacturing system to at least, solve current network security real case of instructing and attack and defend the experiment too few, the too big transportation equipment of volume is inconvenient, the problem of satisfying the training demand that can not be fine.
In order to achieve the above object, the present invention provides the following technical solutions:
an industrial information security network attacking and defending practical training box for an intelligent manufacturing system is preferred, and comprises a firewall, a PLC, an HMI, an RTU, a firewall configuration machine, an auditing machine, a switch, an attacking machine and a practical training box panel; the number of the firewalls is 3; the switch is simultaneously in circuit connection with the firewall, the firewall configuration machine, the auditing machine and the attacking machine, the other ends of the 3 firewalls are respectively connected with the HMI, the RTU and the PLC, and the practical training box panel is connected with the firewall configuration machine, the auditing machine, the switch and the attacking machine; the PLC is a programmable logic controller, the HMI is a human-machine interface, and the RTU is a remote terminal control system.
Preferably, the practical training box panel comprises 4 microcomputers, and the 4 microcomputers are respectively used for operating the HMI, the attacker, the auditing machine and the firewall configurator.
Preferably, the practical training box panel further comprises a keyboard selection identifier, and the keyboard selection identifier is used for displaying the number of the currently operated micro computer.
Preferably, the practical training box panel further comprises a single-screen wheel display key and a four-screen simultaneous display key, and the single-screen wheel display key is used for switching the display screen; the four-screen simultaneous display key is used for simultaneously displaying the states of the four microcomputers on the display screen.
Preferably, the HMI is configured to be connected to an external display screen and send a request to the PLC so that the external display screen displays internal data and a switching state of the PLC in the form of an image; the firewall configurator is used for configuring each firewall; the attack machine is used for carrying out attack activities.
Preferably, the practical training box panel further comprises a motor rotating speed display screen, a transmission speed display screen, an input start/stop button, an output start/stop button and a firewall state button.
Preferably, the number of the firewall state buttons is 3, and 3 firewall state buttons are respectively connected with 3 firewalls.
Compared with the closest prior art, the utility model provides a technical scheme has following excellent effect:
the embodiment of the utility model adopts the main stream HMI human-computer interaction interface and PLC, and depends on the expandable and detachable structural design to display the topology and the system characteristics of the intelligent manufacturing assembly line system; the experiment of the intelligent manufacturing assembly line system can be independently completed, and the requirements of learning and operation demonstration of the principle of the intelligent manufacturing assembly line system are met. The HMI can simulate an engineer station and an operator station to control the PLC and the RTU, and can arbitrarily expand various ladder diagrams and configurations to simulate real scenes.
The structure of the practical training box of the embodiment is in a portable practical training box or an experimental exhibition frame form, and main equipment can be placed in the practical training box or dragged and transported; a mainstream simplified miniaturized control system (PLC + HMI) which is basically consistent in the actual industrial environment is adopted, and the selection and matching can be carried out according to the industry; the system has expandable and detachable structural design of industrial control experimental environment demonstration and industrial control safety attack and defense environment demonstration; by adopting an open replaceable architecture design and an innovative portable practical training box structure, an experimental platform support is provided for deep learning of the network security of the industrial control system.
Drawings
The accompanying drawings, which form a part of the present application, are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention.
Wherein:
fig. 1 is a topological structure diagram of a network safety attack and defense training box for an intelligent manufacturing assembly line system according to an embodiment of the present invention;
fig. 2 is a panel diagram of a network security attack and defense training box for an intelligent manufacturing assembly line system according to an embodiment of the present invention;
fig. 3 is an internal structure diagram of the network safety attacking and defending practical training box for the intelligent manufacturing assembly line system according to the embodiment of the present invention;
fig. 4 is the utility model discloses network security attacks and defends the defense platform interface schematic diagram of real standard case of intelligent manufacturing assembly line system's intelligent manufacturing assembly line system network security based on intelligent manufacturing assembly line system's network security.
In the figure: 1. a USB interface; 2.1 # computer; 3. KVM; 4. a switch; 5. a 2# computer; 6. 3# computer; 7. 4# computer; 8. RTU; 9. a communication manager; 10. 3# firewall; 11. a # 2 firewall; 12. 1# firewall; 13. schneider PLC; 14. siemens PLC; 15. a power source; 16. a synchronizer.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below by referring to the drawings are exemplary only for explaining the present invention, and should not be construed as limiting the present invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or coupled. As used herein, the term "and/or" includes any and all combinations of 1 or more of the associated listed items.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
According to the embodiment of the present invention, as shown in fig. 1 to 4, the utility model provides a practical training box for industrial information security network attack and defense of intelligent manufacturing system, the practical training box includes firewall, PLC (Programmable Logic Controller), HMI (Human Machine Interface), RTU8(Remote Terminal control system), firewall configuration Machine, auditing Machine, switch 4, attack Machine and practical training box panel; 3 firewalls are arranged; respectively a firewall # 1 12, a firewall # 2 11 and a firewall # 3 10. The switch 4 is simultaneously in circuit connection with the firewall, the firewall configuration machine, the auditing machine and the attack machine, the other ends of the 1# firewall 12, the 2# firewall 11 and the 3# firewall 10 are respectively connected with the human-computer interface HMI, the remote terminal control system RTU8 and the programmable logic controller PLC, and the training box panel is connected with the firewall configuration machine, the auditing machine, the switch 4 and the attack machine.
The training box panel comprises 4 microcomputers, a keyboard selection identifier, a single-screen wheel display key and a four-screen simultaneous display key, wherein the 4 microcomputers are a # 1 computer 2, a # 2 computer 5, a # 3 computer 6 and a # 4 computer 7 respectively; the 1# computer 2, the 2# computer 5, the 3# computer 6 and the 4# computer 7 are respectively used for operating an HMI (human machine interface), an attack machine, an audit machine and a firewall configuration machine; the keyboard selects the mark to display the micro computer number of the current operation; the single-screen wheel display key is used for switching the display screen; the four-screen simultaneous display key is used for simultaneously displaying the states of the four microcomputers on the display screen.
The practical training box panel further comprises a motor rotating speed display screen, a transmission speed display screen, an input start-stop button, an output start-stop button and a firewall state button. The number of the firewall state keys is 3, and the 3 firewall state keys are respectively connected with the 1# firewall 12, the 2# firewall 11 and the 3# firewall 10.
Furthermore, the HMI is used for being connected with an external display screen, so that the external display screen displays the internal data and the on-off state of the PLC in the form of images, and sends a reading request to the PLC in a timing manner to obtain the on-off and data conditions of the configuration diagram; the firewall configuration machine is used for configuring each firewall so as to communicate the links at the two ends of the firewall; the attack machine is used for carrying out attack activities.
As shown in fig. 1, it is a topology structure diagram of a network security attack and defense training box for an intelligent manufacturing assembly line system according to an embodiment of the present invention; in this training box, be provided with 3 firewalls (1 # firewall 12,2 # firewall 11 and 3# firewall 10), 1 PLC (can be Siemens PLC14 or Schneider PLC13), 1 HMI, 1 RTU8, 1 firewall configuration machine, 1 audit machine, 1 switch 4 to and 1 attacker. HMI connects 1# and prevents the one end of wall 12, prevents that the other end of wall 1 connects switch 4, and switch 4 still connects 2# in addition simultaneously and prevents that wall 11 and 3# prevent that wall 10, prevent that wall configuration machine, audit machine, attack the machine, and PLC is connected to the other end that 2# prevented wall 11, and RTU8 is connected to the other end that 3# prevented wall 10.
Each part of the practical training box topological graph has corresponding IP addresses, wherein the IP addresses of the 1# firewall 12, the 2# firewall 11 and the 3# firewall 10 are 192.168.0.151, 192.168.0.153 and 192.168.0.154 respectively, and the IP address of the PLC is 192.168.0.103; the IP of the end of the firewall 1# 12, the firewall 2# 11 and the firewall 3# 10 connected with the switch 4 are 192.168.1.11, 192.168.1.13 and 192.168.1.14 respectively, the IP address of HMI is 192.168.0.100, the IP of the firewall configurator is 192.168.1.5, the IP of the auditing machine is 192.168.1.220, and the IP address of the attacking machine is 192.168.1.8.
As shown in fig. 2, it is the panel diagram of the network security attack and defense training box for the intelligent manufacturing assembly line system according to the embodiment of the present invention. The panel diagram comprises a motor rotating speed and transmission speed identifier, a keyboard selection identifier, an input start-stop and output start-stop key, and a firewall state key, wherein the firewall state key comprises buttons of a 1# firewall 12, a 2# firewall 11 and a 3# firewall 10, and a single-screen wheel display key and a four-screen simultaneous display key are arranged at the bottom. The motor rotating speed display screen is used for indicating the rotating speed of the motor in the current state; the conveying speed display screen is used for indicating the speed of the conveying belt in the current state; the 1#, 2#, 3#, 4# marks are arranged beside the keyboard selection mark, and the specific computer operated at present can be displayed; the input start-stop and output start-stop keys can be used for controlling the opening and closing states of the input end and the output end; the firewall state key can control the opening and closing of the firewall 1# 12, the firewall 2# 11 and the firewall 3# 10; the single-screen wheel display can switch the display screen to operate different parts; the four-screen simultaneous display can simultaneously display 4 microcomputers on the display screen so as to observe the attack process.
Fig. 3 shows that the utility model discloses a network security attacks and defends real inside structure chart of instructing case for intelligent manufacturing assembly line system. The internal structure diagram comprises 1 RTU8, 1 communication manager 9, three firewalls, 1 Schneider PLC13, 1 Siemens PLC14, 1 power supply 15 module, 1 synchronizer 16, three USB interfaces 1, four microcomputers, 1 KUM and 1 switch 4.
The HMI is used for displaying the internal data and the switch state of the PLC in the form of images and sending a reading request to the PLC at regular time to obtain the switch and data conditions of the configuration diagram; the firewall configuration machine can be used for configuring each firewall so that links at two ends of the firewall can be communicated; the attack machine is used for carrying out a series of attack activities, such as ARP spoofing, DOS attack, instruction injection, data tampering and the like. The HMI in the training box can be operated on a No. 1 computer 2 of a display screen; the attack machine operates on the 2# computer 5 of the display screen; the auditing machine operates on a No. 3 computer 6 of a display screen; the firewall configurator operates at # 4 computer 7 on the display screen.
1) Based on the experimental items of the attack drilling experiment of the network security attack and defense training box for the intelligent manufacturing assembly line system, the experimental items comprise:
(1) and (4) network vulnerability scanning. And detecting the monitoring host by using a vulnerability scanning tool, finding available network security vulnerabilities, objectively displaying the actual existence of the network risk of the intelligent manufacturing assembly line system, and providing a basis for subsequent network attack drilling.
(2) HMI spoofing attack experiments. And cheating the host, interrupting communication and demonstrating that the usability of the intelligent manufacturing assembly line system is damaged.
(3) And (4) rejecting service attack experiments. Supporting the attacks of Ping of death, TCP SYN Flood, UDP Flood, ICMP Flood, ARP storm and the like, and demonstrating that the system is paralyzed due to the blocking of the data communication between the monitoring host and the PLC.
(4) And (5) instruction injection attack experiment. And communicating with the PLC by using a testing tool and remotely operating the PLC to demonstrate that an attacker sneaks into the intelligent manufacturing assembly line system and sends an illegal instruction.
(5) And (5) data tampering attack experiment. Tampering with data sent by PLC to HMI
(6) And (5) carrying out a U disk attack experiment. Illegal USB disk analog access
(7) Wireless attack experiments (non-standard) utilize wireless channel access for attacks.
(8) GPS clock attack experiments (non-standard). And attacking the clock reference of the intelligent manufacturing assembly line to cause errors such as phase sequence and the like.
2) Audit platform for network security of intelligent manufacturing assembly line system
The experimental items of the auditing platform of the network safety of the intelligent manufacturing assembly line system based on the network safety attacking and defending practical training box for the intelligent manufacturing assembly line system are as follows:
(1) threat detection and early warning experiments. The risk monitoring device is deployed in the interior, network risks can be perceived, attack early warning is achieved, a protection strategy can be provided more clearly and accurately, and the transformation progress is made.
(2) And (5) performing emergency response mechanism experiments. The method has the advantages that the capacities of the organization system of the enterprise emergency response mechanism, early warning prevention, emergency response, post treatment, guarantee preparation and the like are verified.
(3) And (5) safety protection deployment effect experiment. After the appointed node deploys the related information safety protection equipment, the capability of resisting network attacks (including network boundary attacks and regional internal attacks) and the protection effect after protection measures are added can be demonstrated.
(4) And (3) carrying out network test analysis experiment on the intelligent manufacturing assembly line system. And analyzing the flow of the network, the attack behavior and the source tracing mode.
(5) And network security audit of the intelligent manufacturing assembly line system. And performing protocol analysis, network security audit, abnormal flow alarm and the like on the intelligent manufacturing assembly line system network attack, such as S7, IEC60870-5-104/, Modbus-TCP/, DNP3.0 and the like.
3) Defense platform for network security of intelligent manufacturing assembly line system
Fig. 4 shows, does the utility model discloses defense platform interface schematic diagram of intelligent manufacturing assembly line system network security of real case of instructing is attacked and defended to network security based on intelligent manufacturing assembly line system. The experiment of the defense platform comprises protocol analysis such as S7, IEC60870-5-104, Modbus-TCP, DNP3.0 and the like, network security audit, abnormal flow alarm, defense strategy selection and firewall configuration experiment aiming at network attack of an intelligent manufacturing assembly line system. Network attack is blocked, and safe and reliable operation of the system is realized. The method comprises defense experiments aiming at ARP spoofing attack, instruction injection attack, DOS attack, data tampering attack and USB flash disk attack.
To sum up, the embodiment of the utility model adopts the main stream HMI human-machine interaction interface and PLC, and shows the topology and system characteristics of the intelligent manufacturing assembly line system by means of the expandable and detachable structural design; the experiment of the intelligent manufacturing assembly line system can be independently completed, and the requirements of learning and operation demonstration of the principle of the intelligent manufacturing assembly line system are met. The HMI can simulate an engineer station and an operator station to control the PLC and the RTU, and can arbitrarily expand various ladder diagrams and configurations to simulate real scenes. The structure of the training box is in a portable training box or experimental exhibition frame form, and main equipment can be placed in the training box or dragged and transported; a mainstream simplified miniaturized control system (PLC + HMI) which is basically consistent in the actual industrial environment is adopted, and the selection and matching can be carried out according to the industry; the system has expandable and detachable structural design of industrial control experimental environment demonstration and industrial control safety attack and defense environment demonstration; by adopting an open replaceable architecture design and an innovative portable practical training box structure, an experimental platform support is provided for deep learning of the network security of the industrial control system.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (7)

1. An industrial information security network attacking and defending practical training box for an intelligent manufacturing system is characterized by comprising a firewall, a PLC, an HMI, an RTU, a firewall configuration machine, an auditing machine, a switch, an attacking machine and a practical training box panel; the number of the firewalls is 3; the switch is simultaneously in circuit connection with the firewall, the firewall configuration machine, the auditing machine and the attacking machine, the other ends of the 3 firewalls are respectively connected with the HMI, the RTU and the PLC, and the practical training box panel is connected with the firewall configuration machine, the auditing machine, the switch and the attacking machine; the PLC is a programmable logic controller, the HMI is a human-machine interface, and the RTU is a remote terminal control system.
2. The industrial information security network attacking and defending practical training box for the intelligent manufacturing system according to claim 1, wherein the practical training box panel comprises 4 microcomputers, wherein the 4 microcomputers are respectively used for operating the HMI, the attacker, the auditor and the firewall configurator.
3. The industrial information security network defense and attack training box for the intelligent manufacturing system according to claim 2, wherein the training box panel further comprises a keyboard selection indicator for displaying the microcomputer number currently operating.
4. The industrial information security network attacking and defending practical training box for the intelligent manufacturing system according to claim 3, wherein the practical training box panel further comprises a single-screen wheel display key and a four-screen simultaneous display key, wherein the single-screen wheel display key is used for switching display screens; the four-screen simultaneous display key is used for simultaneously displaying the states of the four microcomputers on the display screen.
5. The industrial information security network attack and defense training box for the intelligent manufacturing system according to claim 1, wherein the HMI is used for connecting with an external display screen and sending a request to the PLC to make the external display screen display PLC internal data and on-off state in the form of an image; the firewall configurator is used for configuring each firewall; the attack machine is used for carrying out attack activities.
6. The industrial information security network attacking and defending practical training box for the intelligent manufacturing system according to claim 1, wherein the practical training box panel further comprises a motor speed display screen, a transmission speed display screen, an input start-stop button, an output start-stop button and a firewall state button.
7. The industrial information security network attack and defense training box for the intelligent manufacturing system according to claim 6, wherein the number of the firewall state keys is 3, and 3 firewall state keys are respectively connected with 3 firewalls.
CN201920243795.7U 2019-02-27 2019-02-27 Industrial information security network attacking and defending practical training box for intelligent manufacturing system Active CN210016485U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201920243795.7U CN210016485U (en) 2019-02-27 2019-02-27 Industrial information security network attacking and defending practical training box for intelligent manufacturing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201920243795.7U CN210016485U (en) 2019-02-27 2019-02-27 Industrial information security network attacking and defending practical training box for intelligent manufacturing system

Publications (1)

Publication Number Publication Date
CN210016485U true CN210016485U (en) 2020-02-04

Family

ID=69313065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201920243795.7U Active CN210016485U (en) 2019-02-27 2019-02-27 Industrial information security network attacking and defending practical training box for intelligent manufacturing system

Country Status (1)

Country Link
CN (1) CN210016485U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531292A (en) * 2022-02-22 2022-05-24 北京华电云博科技有限公司 Simulation display platform for detecting power network attack

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531292A (en) * 2022-02-22 2022-05-24 北京华电云博科技有限公司 Simulation display platform for detecting power network attack

Similar Documents

Publication Publication Date Title
US9680867B2 (en) Network stimulation engine
Radoglou-Grammatikis et al. Attacking iec-60870-5-104 scada systems
CN101729309A (en) Automatically connecting remote network equipment through a graphical user interface
CN108521423A (en) HWIL simulation industry control network target range system
Hussain et al. Vulnerabilities and countermeasures in electrical substations
KR20150139303A (en) Apparatus for displaying network security and method thereof
CN210016485U (en) Industrial information security network attacking and defending practical training box for intelligent manufacturing system
CN107483481A (en) A kind of industrial control system attacking and defending analog platform and its implementation
CN106254178B (en) network test platform NFVNTP based on NFV and test method thereof
CN108279636A (en) Industrial machine room security protection system
CN107645472A (en) A kind of virtual machine traffic detecting system based on OpenFlow
CN104022905A (en) Node network monitoring method and device
Lupton et al. Analysis and prevention of security vulnerabilities in a smart city
CN104122877A (en) Remote monitoring system and remote monitoring method for boilers
US11716221B2 (en) Switchboard management system using ring network
Sanchez-Navarro et al. New immersive interface for zero-touch management in 5G networks
Waagsnes et al. Intrusion Detection System Test Framework for SCADA Systems.
CN114296406A (en) Network attack and defense display system, method and device and computer readable storage medium
Pfrang et al. Design and architecture of an industrial it security lab
JP2010258865A (en) Field apparatus
CN111107177A (en) Method for modifying HMI self IP and PLC IP through HMI
Puys et al. SCADA cybersecurity awareness and teaching with Hardware-In-The-Loop platforms
CN110084037A (en) A kind of network information security monitoring device
CN109147306A (en) Management method, equipment and the management system of the network equipment
KR101741566B1 (en) A method for awaring attack situation in cyber training environments and a system of the same

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant