JP6693114B2 - 制御装置及び統合生産システム - Google Patents
制御装置及び統合生産システム Download PDFInfo
- Publication number
- JP6693114B2 JP6693114B2 JP2015244048A JP2015244048A JP6693114B2 JP 6693114 B2 JP6693114 B2 JP 6693114B2 JP 2015244048 A JP2015244048 A JP 2015244048A JP 2015244048 A JP2015244048 A JP 2015244048A JP 6693114 B2 JP6693114 B2 JP 6693114B2
- Authority
- JP
- Japan
- Prior art keywords
- integrated production
- production system
- safety
- cyber attack
- zone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004519 manufacturing process Methods 0.000 title claims description 94
- 238000001514 detection method Methods 0.000 claims description 75
- 238000004891 communication Methods 0.000 claims description 23
- 230000007123 defense Effects 0.000 claims description 13
- 230000005856 abnormality Effects 0.000 claims description 3
- 238000007726 management method Methods 0.000 description 17
- 238000010586 diagram Methods 0.000 description 16
- 238000000034 method Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 10
- 241000700605 Viruses Species 0.000 description 9
- 238000012544 monitoring process Methods 0.000 description 7
- 238000005259 measurement Methods 0.000 description 6
- 230000002159 abnormal effect Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 5
- 230000006378 damage Effects 0.000 description 3
- 230000009385 viral infection Effects 0.000 description 3
- 208000027418 Wounds and injury Diseases 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 230000002155 anti-virotic effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 2
- 208000014674 injury Diseases 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 208000011380 COVID-19–associated multisystem inflammatory syndrome in children Diseases 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000003912 environmental pollution Methods 0.000 description 1
- 238000003306 harvesting Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 238000002319 photoionisation mass spectrometry Methods 0.000 description 1
- 238000010248 power generation Methods 0.000 description 1
- 238000004886 process control Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000010865 sewage Substances 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
- G05B19/0428—Safety, monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/4185—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/30—Nc systems
- G05B2219/31—From computer integrated manufacturing till monitoring
- G05B2219/31304—Identification of workpiece and data for control, inspection, safety, calibration
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/30—Nc systems
- G05B2219/45—Nc applications
- G05B2219/45103—Security, surveillance applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Automation & Control Theory (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Manufacturing & Machinery (AREA)
- Quality & Reliability (AREA)
- Computer And Data Communications (AREA)
- Safety Devices In Control Systems (AREA)
- Testing And Monitoring For Control Systems (AREA)
Description
また、本発明の制御装置は、前記防御手段が、前記検知手段の検知結果に基づいて前記サイバー攻撃の対象及び種別を特定し、特定した前記サイバー攻撃の対象及び種別に応じた前記対策を設定する設定手段(71)と、前記設定手段で設定された前記対策を実行する実行手段(72)と、を備える。
また、本発明の制御装置は、前記設定手段が、前記サイバー攻撃の対象及び種別と、前記サイバー攻撃の対象及び種別に応じて行うべき対策とが対応付けられた設定リスト(LS)を用いて前記対策を設定する。
また、本発明の制御装置は、前記制御装置が、前記統合生産システムに異常が生じた場合に、前記統合生産システムを安全な状態に停止させる安全計装システム(30)の制御装置である。
本発明の統合生産システムは、ネットワーク(N)に接続された安全計装システム(30)を備える統合生産システム(1、2)において、前記統合生産システムに対する内部及び外部の少なくとも一方からのサイバー攻撃を検知する検知手段(60)と、前記安全計装システムの一部をなす上記の何れかに記載の制御装置(31a、31b)と、を備える。
また、本発明の統合生産システムは、複数のゾーン(Z1〜Z3)に区分けされており、前記検知手段が、前記ゾーン毎に設けられていて、自ゾーンに対する内部及び外部の少なくとも一方からのサイバー攻撃を検知する。
また、本発明の統合生産システムは、前記制御装置の防御手段が、前記ネットワークを介して前記検知手段の検知結果を得る。
また、本発明の統合生産システムは、前記制御装置の防御手段が、前記ネットワークとは異なる通信線(L1)を介して前記検知手段の検知結果を得る。
〈統合生産システム〉
図1は、本発明の第1実施形態による統合生産システムの全体構成を示すブロック図である。図1に示す通り、本実施形態の統合生産システム1は、フィールド機器10、分散制御システム(DCS)20、安全計装システム(SIS)30、製造システム40、経営システム50、及び検知装置60(検知手段)を備えており、プラントの自動操業を行うとともにプラントの維持管理等を行う。
図2は、本発明の第1実施形態による制御装置の要部構成を示すブロック図である。尚、本実施形態による制御装置としての安全コントローラ31a,31bは、同様の構成である。このため、ここでは安全コントローラ31aについて説明し、安全コントローラ31bについての説明は省略する。
図8は、本発明の第2実施形態による統合生産システムの全体構成を示すブロック図である。尚、図8においては、図1に示す構成と同じ構成(或いは、図1に示す構成に相当する構成)には同一の符号を付してある。図8に示す通り、本実施形態の統合生産システム2は、図1に示す統合生産システム1と概ね同様の構成である。但し、本実施形態の統合生産システム2は、検知装置60と安全コントローラ31a,31bとが、ネットワークNとは異なる通信線L1(通信線)を介して接続されている点が、図1に示す統合生産システム1とは異なる。
図9は、本発明のその他の実施形態による統合生産システムを示すブロック図である。図9においては、図1,図8に示す構成と同じ構成(或いは、図1,図8に示す構成に相当する構成)には同一の符号を付してある。また、図9においては、フィールド機器10及びネットワーク機器NE1〜NE3等を省略して図示を簡略化している。
30 安全計装システム
31a,31b 安全コントローラ
60 検知装置
71 設定部
72 実行部
DF 防御部
L1 通信線
LS 設定リスト
N ネットワーク
Z1〜Z3 ゾーン
Claims (7)
- プラントに構築された統合生産システムの制御装置において、
前記統合生産システムに対する内部及び外部の少なくとも一方からのサイバー攻撃を検知する検知手段の検知結果に基づいて、自装置の少なくとも一部の機能を制限する対策を行う防御手段を備え、
前記防御手段は、前記検知手段の検知結果に基づいて前記サイバー攻撃の対象及び種別を特定し、特定した前記サイバー攻撃の対象及び種別に応じた前記対策を設定する設定手段と、
前記設定手段で設定された前記対策を実行する実行手段と、
を備える制御装置。 - 前記設定手段は、前記サイバー攻撃の対象及び種別と、前記サイバー攻撃の対象及び種別に応じて行うべき対策とが対応付けられた設定リストを用いて前記対策を設定する、請求項1記載の制御装置。
- 前記制御装置は、前記統合生産システムに異常が生じた場合に、前記統合生産システムを安全な状態に停止させる安全計装システムの制御装置である、請求項1又は請求項2記載の制御装置。
- ネットワークに接続された安全計装システムを備える統合生産システムにおいて、
前記統合生産システムに対する内部及び外部の少なくとも一方からのサイバー攻撃を検知する検知手段と、
前記安全計装システムの一部をなす請求項1又は請求項2記載の制御装置と、
を備える統合生産システム。 - 前記統合生産システムは、複数のゾーンに区分けされており、
前記検知手段は、前記ゾーン毎に設けられていて、自ゾーンに対する内部及び外部の少なくとも一方からのサイバー攻撃を検知する
請求項4記載の統合生産システム。 - 前記制御装置の防御手段は、前記ネットワークを介して前記検知手段の検知結果を得る、請求項4又は請求項5記載の統合生産システム。
- 前記制御装置の防御手段は、前記ネットワークとは異なる通信線を介して前記検知手段の検知結果を得る、請求項4又は請求項5記載の統合生産システム。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2015244048A JP6693114B2 (ja) | 2015-12-15 | 2015-12-15 | 制御装置及び統合生産システム |
EP16201203.3A EP3182234B1 (en) | 2015-12-15 | 2016-11-29 | Control device, integrated industrial system, and control method thereof |
US15/373,638 US10956567B2 (en) | 2015-12-15 | 2016-12-09 | Control device, integrated industrial system, and control method thereof |
CN201611144708.XA CN106886202B (zh) | 2015-12-15 | 2016-12-13 | 控制装置、综合生产系统及其控制方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2015244048A JP6693114B2 (ja) | 2015-12-15 | 2015-12-15 | 制御装置及び統合生産システム |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2017111532A JP2017111532A (ja) | 2017-06-22 |
JP6693114B2 true JP6693114B2 (ja) | 2020-05-13 |
Family
ID=57799432
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2015244048A Active JP6693114B2 (ja) | 2015-12-15 | 2015-12-15 | 制御装置及び統合生産システム |
Country Status (4)
Country | Link |
---|---|
US (1) | US10956567B2 (ja) |
EP (1) | EP3182234B1 (ja) |
JP (1) | JP6693114B2 (ja) |
CN (1) | CN106886202B (ja) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10887349B2 (en) | 2018-01-05 | 2021-01-05 | Byton Limited | System and method for enforcing security with a vehicle gateway |
US10663929B2 (en) * | 2018-03-20 | 2020-05-26 | Fisher-Rosemount Systems, Inc. | Long-haul safety system trips |
US11627151B2 (en) * | 2018-10-31 | 2023-04-11 | General Electric Company | Industrial asset cyber-attack detection algorithm verification using secure, distributed ledger |
JP7138043B2 (ja) | 2018-12-28 | 2022-09-15 | 日立Astemo株式会社 | 情報処理装置 |
JP7243326B2 (ja) | 2019-03-15 | 2023-03-22 | オムロン株式会社 | コントローラシステム |
WO2021019638A1 (ja) * | 2019-07-29 | 2021-02-04 | オムロン株式会社 | セキュリティ装置、設定変更方法、プログラム、及び記憶媒体 |
WO2021102223A1 (en) * | 2019-11-20 | 2021-05-27 | Nanotronics Imaging, Inc. | Securing industrial production from sophisticated attacks |
US11969882B2 (en) * | 2019-11-21 | 2024-04-30 | The Raymond Corporation | Material handling vehicle behavior modification based on task classification |
JP7462550B2 (ja) | 2020-12-24 | 2024-04-05 | 株式会社日立製作所 | 通信監視対処装置、通信監視対処方法、及び通信監視対処システム |
Family Cites Families (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000267957A (ja) | 1999-03-16 | 2000-09-29 | Hitachi Ltd | 制御系用ファイアウォール |
JP2002330177A (ja) * | 2001-03-02 | 2002-11-15 | Seer Insight Security Inc | セキュリティ管理サーバおよびこれと連携して動作するホストサーバ |
JP2003288282A (ja) | 2002-03-28 | 2003-10-10 | Fujitsu Ltd | 不正アクセス防止プログラム |
US9565275B2 (en) * | 2012-02-09 | 2017-02-07 | Rockwell Automation Technologies, Inc. | Transformation of industrial data into useful cloud information |
DE10235794A1 (de) * | 2002-08-05 | 2004-03-04 | Siemens Ag | System und Verfahren zur zustandsorientierten Instandhaltung |
US9009084B2 (en) * | 2002-10-21 | 2015-04-14 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
US20040107345A1 (en) * | 2002-10-21 | 2004-06-03 | Brandt David D. | System and methodology providing automation security protocols and intrusion detection in an industrial controller environment |
JP2006504178A (ja) * | 2002-10-22 | 2006-02-02 | ウンホ チェ | Itインフラにおける総合侵害事故対応システムおよびその動作方法 |
US7467018B1 (en) * | 2002-11-18 | 2008-12-16 | Rockwell Automation Technologies, Inc. | Embedded database systems and methods in an industrial controller environment |
US9503470B2 (en) * | 2002-12-24 | 2016-11-22 | Fred Herz Patents, LLC | Distributed agent based model for security monitoring and response |
US7596807B2 (en) * | 2003-07-03 | 2009-09-29 | Arbor Networks, Inc. | Method and system for reducing scope of self-propagating attack code in network |
US20050050346A1 (en) * | 2003-08-28 | 2005-03-03 | Felactu Odessa John | Dynamic comprehensive global enterprise defensive security system |
US7761923B2 (en) * | 2004-03-01 | 2010-07-20 | Invensys Systems, Inc. | Process control methods and apparatus for intrusion detection, protection and network hardening |
US20060026680A1 (en) * | 2004-07-29 | 2006-02-02 | Zakas Phillip H | System and method of characterizing and managing electronic traffic |
CN101258470B (zh) * | 2005-09-07 | 2011-08-03 | 国际商业机器公司 | 将保护代理自动部署到连接至分布式计算机网络的设备 |
DE102005063052A1 (de) * | 2005-12-29 | 2007-07-05 | Endress + Hauser Process Solutions Ag | Verfahren zum Schutz von Feldgeräten der Prozessautomatisierungstechnik |
US7966659B1 (en) * | 2006-04-18 | 2011-06-21 | Rockwell Automation Technologies, Inc. | Distributed learn mode for configuring a firewall, security authority, intrusion detection/prevention devices, and the like |
US20080016339A1 (en) * | 2006-06-29 | 2008-01-17 | Jayant Shukla | Application Sandbox to Detect, Remove, and Prevent Malware |
US20120284790A1 (en) * | 2006-09-11 | 2012-11-08 | Decision-Zone Inc. | Live service anomaly detection system for providing cyber protection for the electric grid |
US20080125887A1 (en) * | 2006-09-27 | 2008-05-29 | Rockwell Automation Technologies, Inc. | Event context data and aggregation for industrial control systems |
US7881869B2 (en) * | 2006-12-29 | 2011-02-01 | Schlumberger Technology Corporation | Method and apparatus for evaluating data associated with an offshore energy platform |
US20090089325A1 (en) * | 2007-09-28 | 2009-04-02 | Rockwell Automation Technologies, Inc. | Targeted resource allocation |
US8590033B2 (en) * | 2008-09-25 | 2013-11-19 | Fisher-Rosemount Systems, Inc. | One button security lockdown of a process control network |
US8881288B1 (en) * | 2008-10-28 | 2014-11-04 | Intelligent Automation, Inc. | Graphical models for cyber security analysis in enterprise networks |
US20110023088A1 (en) * | 2009-07-23 | 2011-01-27 | Electronics And Telecommunications Research Institute | Flow-based dynamic access control system and method |
US8413241B2 (en) * | 2009-09-17 | 2013-04-02 | Oracle America, Inc. | Integrated intrusion deflection, detection and introspection |
US20110289588A1 (en) * | 2010-05-20 | 2011-11-24 | Anupam Sahai | Unification of security monitoring and IT-GRC |
KR101519623B1 (ko) * | 2010-12-13 | 2015-05-12 | 한국전자통신연구원 | 오탐률을 줄이기 위한 분산 서비스 거부 공격 탐지 장치 및 방법, 분산 서비스 거부 공격 탐지 및 방어 장치 |
US8621637B2 (en) * | 2011-01-10 | 2013-12-31 | Saudi Arabian Oil Company | Systems, program product and methods for performing a risk assessment workflow process for plant networks and systems |
JP5689333B2 (ja) * | 2011-02-15 | 2015-03-25 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | 異常検知システム、異常検知装置、異常検知方法、プログラムおよび記録媒体 |
CN103443727B (zh) * | 2011-03-28 | 2016-04-13 | 国际商业机器公司 | 异常检测系统以及异常检测方法 |
JP5754704B2 (ja) * | 2011-04-19 | 2015-07-29 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | 複数の産業制御システム間の通信を制御するシステム |
EP2718814B1 (en) * | 2011-06-05 | 2021-02-17 | Help/Systems, LLC | System and method for providing automated computer security compromise as a service |
US8970349B2 (en) | 2011-06-13 | 2015-03-03 | Tyco Integrated Security, LLC | System to provide a security technology and management portal |
US9298917B2 (en) * | 2011-09-27 | 2016-03-29 | Redwall Technologies, Llc | Enhanced security SCADA systems and methods |
US8793790B2 (en) * | 2011-10-11 | 2014-07-29 | Honeywell International Inc. | System and method for insider threat detection |
JP5505873B2 (ja) | 2012-02-08 | 2014-05-28 | 横河電機株式会社 | プラント情報の表示方法および表示装置 |
US9477936B2 (en) * | 2012-02-09 | 2016-10-25 | Rockwell Automation Technologies, Inc. | Cloud-based operator interface for industrial automation |
US8812466B2 (en) * | 2012-02-10 | 2014-08-19 | International Business Machines Corporation | Detecting and combating attack in protection system of an industrial control system |
US20130212668A1 (en) * | 2012-02-13 | 2013-08-15 | International Business Machines Corporation | Suspension of Processes in Industrial Control System When an Anomaly Occurs |
JP6277137B2 (ja) * | 2012-02-17 | 2018-02-07 | ヴェンコア ラブズ、インク.Vencore Labs, Inc. | フィールド・エリア・ネットワークにおけるパケット取得、解析及び侵入検出の方法及びシステム |
US9360864B2 (en) * | 2012-04-11 | 2016-06-07 | General Electric Company | Turbine fault prediction |
US9661003B2 (en) * | 2012-05-11 | 2017-05-23 | Thomas W. Parker | System and method for forensic cyber adversary profiling, attribution and attack identification |
US9648029B2 (en) * | 2012-07-30 | 2017-05-09 | Newegg Inc. | System and method of active remediation and passive protection against cyber attacks |
EP2943843A4 (en) * | 2013-01-08 | 2016-10-26 | Secure Nok As | METHOD, DEVICE AND COMPUTER PROGRAM FOR MONITORING AN INDUSTRIAL CONTROL SYSTEM |
EP2775685A1 (en) | 2013-03-06 | 2014-09-10 | ABB Research Ltd. | Security zones in industrial control systems |
US9405900B2 (en) * | 2013-03-13 | 2016-08-02 | General Electric Company | Intelligent cyberphysical intrusion detection and prevention systems and methods for industrial control systems |
KR101394424B1 (ko) * | 2013-04-22 | 2014-05-13 | 한국인터넷진흥원 | 하이퍼바이저 기반 침입 방지 플랫폼 및 가상화 네트워크 침입 방지 시스템 |
US10026049B2 (en) * | 2013-05-09 | 2018-07-17 | Rockwell Automation Technologies, Inc. | Risk assessment for industrial systems using big data |
US20150295944A1 (en) | 2013-07-01 | 2015-10-15 | Hitachi, Ltd. | Control system, control method, and controller |
US9160761B2 (en) * | 2013-07-31 | 2015-10-13 | Hewlett-Packard Development Company, L.P. | Selection of a countermeasure |
IN2013CH05962A (ja) * | 2013-12-20 | 2015-06-26 | Infotech Entpr Ltd | |
US20160330225A1 (en) * | 2014-01-13 | 2016-11-10 | Brightsource Industries (Israel) Ltd. | Systems, Methods, and Devices for Detecting Anomalies in an Industrial Control System |
WO2015114791A1 (ja) * | 2014-01-31 | 2015-08-06 | 株式会社日立製作所 | セキュリティ管理装置 |
US9886581B2 (en) * | 2014-02-25 | 2018-02-06 | Accenture Global Solutions Limited | Automated intelligence graph construction and countermeasure deployment |
US9838476B2 (en) * | 2014-03-26 | 2017-12-05 | Rockwell Automation Technologies, Inc. | On-premise data collection and ingestion using industrial cloud agents |
US20150281278A1 (en) * | 2014-03-28 | 2015-10-01 | Southern California Edison | System For Securing Electric Power Grid Operations From Cyber-Attack |
US9680855B2 (en) * | 2014-06-30 | 2017-06-13 | Neo Prime, LLC | Probabilistic model for cyber risk forecasting |
KR20160002058A (ko) * | 2014-06-30 | 2016-01-07 | 한국전자통신연구원 | 모드버스 통신 패턴 학습에 기반한 비정상 트래픽 탐지 장치 및 방법 |
US9800592B2 (en) * | 2014-08-04 | 2017-10-24 | Microsoft Technology Licensing, Llc | Data center architecture that supports attack detection and mitigation |
US9930058B2 (en) * | 2014-08-13 | 2018-03-27 | Honeywell International Inc. | Analyzing cyber-security risks in an industrial control environment |
WO2016040928A1 (en) * | 2014-09-14 | 2016-03-17 | Crown Equipment Corporation | Dynamic industrial vehicle measure |
US9660994B2 (en) * | 2014-09-30 | 2017-05-23 | Schneider Electric USA, Inc. | SCADA intrusion detection systems |
WO2016064919A1 (en) * | 2014-10-21 | 2016-04-28 | Abramowitz Marc Lauren | Dynamic security rating for cyber insurance products |
JP6196397B2 (ja) * | 2014-10-21 | 2017-09-13 | アイアンネット・サイバーセキュリティ・インコーポレイテッドIronNet Cybersecurity, Inc. | サイバーセキュリティシステム |
US9836990B2 (en) * | 2014-12-15 | 2017-12-05 | The Boeing Company | System and method for evaluating cyber-attacks on aircraft |
CN107209834B (zh) * | 2015-02-04 | 2020-07-07 | 日本电信电话株式会社 | 恶意通信模式提取装置及其系统和方法、记录介质 |
US10021125B2 (en) * | 2015-02-06 | 2018-07-10 | Honeywell International Inc. | Infrastructure monitoring tool for collecting industrial process control and automation system risk data |
EP3065076A1 (en) * | 2015-03-04 | 2016-09-07 | Secure-Nok AS | System and method for responding to a cyber-attack-related incident against an industrial control system |
US10291506B2 (en) * | 2015-03-04 | 2019-05-14 | Fisher-Rosemount Systems, Inc. | Anomaly detection in industrial communications networks |
WO2016168452A1 (en) * | 2015-04-17 | 2016-10-20 | Soltra Solutions, Llc | Computerized system and method for securely distributing and exchanging cyber-threat information in a standardized format |
US9892261B2 (en) * | 2015-04-28 | 2018-02-13 | Fireeye, Inc. | Computer imposed countermeasures driven by malware lineage |
US10104107B2 (en) * | 2015-05-11 | 2018-10-16 | Qualcomm Incorporated | Methods and systems for behavior-specific actuation for real-time whitelisting |
US11363035B2 (en) * | 2015-05-22 | 2022-06-14 | Fisher-Rosemount Systems, Inc. | Configurable robustness agent in a plant security system |
US10021115B2 (en) * | 2015-11-03 | 2018-07-10 | Juniper Networks, Inc. | Integrated security system having rule optimization |
US10146936B1 (en) * | 2015-11-12 | 2018-12-04 | EMC IP Holding Company LLC | Intrusion detection for storage resources provisioned to containers in multi-tenant environments |
US10812517B2 (en) | 2016-06-03 | 2020-10-20 | Honeywell International Inc. | System and method for bridging cyber-security threat intelligence into a protected system using secure media |
-
2015
- 2015-12-15 JP JP2015244048A patent/JP6693114B2/ja active Active
-
2016
- 2016-11-29 EP EP16201203.3A patent/EP3182234B1/en active Active
- 2016-12-09 US US15/373,638 patent/US10956567B2/en active Active
- 2016-12-13 CN CN201611144708.XA patent/CN106886202B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
JP2017111532A (ja) | 2017-06-22 |
US10956567B2 (en) | 2021-03-23 |
EP3182234A1 (en) | 2017-06-21 |
CN106886202A (zh) | 2017-06-23 |
EP3182234B1 (en) | 2020-03-11 |
US20170169219A1 (en) | 2017-06-15 |
CN106886202B (zh) | 2020-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6693114B2 (ja) | 制御装置及び統合生産システム | |
JP6759572B2 (ja) | 統合生産システム | |
US20160330225A1 (en) | Systems, Methods, and Devices for Detecting Anomalies in an Industrial Control System | |
US9075410B2 (en) | Abnormality detection for isolating a control system | |
CN104570822A (zh) | 自动化流程控制系统的保护系统、方法及安全复合装置 | |
CN107864675B (zh) | 使用iot传感器融合的关键工业解决方案的认知保护 | |
JP7123541B2 (ja) | 物理的資産を脅威に対して保護するためのシステム | |
EP3320661B1 (en) | Automation system with self-defending smart field devices | |
Ferencz et al. | Review of industry 4.0 security challenges | |
Johnson | Barriers to the use of intrusion detection systems in safety-critical applications | |
Al Farooq et al. | Detecting safety and security faults in plc systems with data provenance | |
WO2021117665A1 (ja) | 電子機器および電子機器の攻撃検知方法 | |
Emake et al. | Industrial Control Systems (ICS): Cyber attacks & Security Optimization | |
Maynard et al. | Using Application Layer Metrics to Detect Advanced SCADA Attacks. | |
Lau et al. | Securing supervisory control and data acquisition control systems | |
Falk et al. | Enhancing the resilience of cyber-physical systems by protecting the physical-world interface | |
Watson et al. | Designing trustworthy monitoring systems: Forensic readiness for safety and security | |
KR20140077077A (ko) | 모바일 비정상 패킷 데이터 탐지를 위한 모바일 네트워크 보안관제 시스템 | |
Yılmaz et al. | ICS Cyber attack analysis and a new diagnosis approach | |
Nabiyev | Investigation of computer incidents for cyber-physical infrastructures in industrial control systems | |
Li et al. | The Approaches of Prevention, Detection, and Response for Cybersecurity of I&C Systems in NPPs | |
Reeves et al. | Solving the grid defender's dilemma: Tamper protection for distributed cyber-physical systems | |
CN114265389A (zh) | 一种水电厂合规性安全检测方法 | |
Staggs | Meeting NERC-CIP requirements: cyber security rules are forcing big changes in networking and computing infrastructure. | |
Vaddiraj et al. | Model to quantify digital risks for power grids integrating electrical system and cyber data models |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20181018 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20190724 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20190903 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20191025 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20200317 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20200330 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6693114 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |