JP7026028B2 - 冗長デバイス及びスマートコントラクトを使用して、サイバーフィジカルシステムへの攻撃を検出するための方法及びシステム - Google Patents
冗長デバイス及びスマートコントラクトを使用して、サイバーフィジカルシステムへの攻撃を検出するための方法及びシステム Download PDFInfo
- Publication number
- JP7026028B2 JP7026028B2 JP2018160933A JP2018160933A JP7026028B2 JP 7026028 B2 JP7026028 B2 JP 7026028B2 JP 2018160933 A JP2018160933 A JP 2018160933A JP 2018160933 A JP2018160933 A JP 2018160933A JP 7026028 B2 JP7026028 B2 JP 7026028B2
- Authority
- JP
- Japan
- Prior art keywords
- sensors
- network
- indicated value
- physical
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/709,259 US10831890B2 (en) | 2017-09-19 | 2017-09-19 | Method and system for detecting attacks on cyber-physical systems using redundant devices and smart contracts |
| US15/709,259 | 2017-09-19 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2019057276A JP2019057276A (ja) | 2019-04-11 |
| JP2019057276A5 JP2019057276A5 (enExample) | 2021-10-07 |
| JP7026028B2 true JP7026028B2 (ja) | 2022-02-25 |
Family
ID=63787707
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2018160933A Expired - Fee Related JP7026028B2 (ja) | 2017-09-19 | 2018-08-30 | 冗長デバイス及びスマートコントラクトを使用して、サイバーフィジカルシステムへの攻撃を検出するための方法及びシステム |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US10831890B2 (enExample) |
| EP (1) | EP3457659B1 (enExample) |
| JP (1) | JP7026028B2 (enExample) |
| AU (1) | AU2018222991B2 (enExample) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11943236B2 (en) * | 2018-04-26 | 2024-03-26 | Hitachi Energy Ltd | Technologies for detecting cyber-attacks against electrical distribution devices |
| US10204236B1 (en) * | 2018-05-30 | 2019-02-12 | Drfirst.Com, Inc. | Self-consistent structures for secure transmission and temporary storage of sensitive data |
| EP3611587A1 (de) * | 2018-08-16 | 2020-02-19 | Siemens Aktiengesellschaft | System zur steuerung und überwachung von adaptiven cyber-physikalischen systemen |
| EP3726407A1 (en) * | 2019-04-15 | 2020-10-21 | Siemens Aktiengesellschaft | Validation of measurement data sets using oracle consensus |
| US11126425B2 (en) * | 2019-04-19 | 2021-09-21 | Sarcos Corp. | Version history management using a blockchain |
| EP3742304B1 (en) * | 2019-05-22 | 2024-10-02 | Siemens Aktiengesellschaft | Validation of measurement datasets in a distributed database |
| JP7297200B2 (ja) * | 2019-06-17 | 2023-06-26 | 株式会社野村総合研究所 | ブロックチェーンを利用するシステム |
| WO2020261359A1 (ja) * | 2019-06-25 | 2020-12-30 | 日本電気株式会社 | 電子取引システム、取引管理サーバ、電子取引方法及びプログラム |
| CN112070180B (zh) * | 2020-09-30 | 2024-01-19 | 南方电网科学研究院有限责任公司 | 基于信息物理双侧数据的电网设备状态判断方法及装置 |
| US20250023888A1 (en) * | 2023-07-12 | 2025-01-16 | Wells Fargo Bank, N.A. | Data devaluation through smart contracts |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120143981A1 (en) | 2010-12-02 | 2012-06-07 | Institute For Information Industry | Common server, adaptor, and data conforming method thereof |
| JP2014179074A (ja) | 2013-03-13 | 2014-09-25 | General Electric Co <Ge> | 産業用制御システムのためのインテリジェントサイバーフィジカル侵入検出および侵入防止システムならびに方法 |
| US20150096026A1 (en) | 2013-03-15 | 2015-04-02 | Cyberricade, Inc. | Cyber security |
Family Cites Families (36)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6047222A (en) * | 1996-10-04 | 2000-04-04 | Fisher Controls International, Inc. | Process control network with redundant field devices and buses |
| DE69732488T2 (de) | 1996-10-04 | 2006-03-30 | Fisher Controls International Llc | Prozesssteuerungsnetzwerk mit redundanten feldgeräten und bussen |
| US9027121B2 (en) * | 2000-10-10 | 2015-05-05 | International Business Machines Corporation | Method and system for creating a record for one or more computer security incidents |
| US8528086B1 (en) * | 2004-04-01 | 2013-09-03 | Fireeye, Inc. | System and method of detecting computer worms |
| US8850565B2 (en) * | 2005-01-10 | 2014-09-30 | Hewlett-Packard Development Company, L.P. | System and method for coordinating network incident response activities |
| US7930256B2 (en) * | 2006-05-23 | 2011-04-19 | Charles River Analytics, Inc. | Security system for and method of detecting and responding to cyber attacks on large network systems |
| WO2009128905A1 (en) * | 2008-04-17 | 2009-10-22 | Siemens Energy, Inc. | Method and system for cyber security management of industrial control systems |
| US9494933B1 (en) * | 2009-06-19 | 2016-11-15 | The Boeing Company | Processing packets in an aircraft network data processing system |
| US8839349B2 (en) * | 2011-10-18 | 2014-09-16 | Mcafee, Inc. | Integrating security policy and event management |
| US10291619B2 (en) * | 2012-04-06 | 2019-05-14 | Wayne Odom | System, method, and device for delivering communications and storing and delivering data |
| US9910969B2 (en) * | 2012-04-06 | 2018-03-06 | Wayne Odom | System, method, and device for delivering communications and storing and delivering data |
| HK1223709A1 (zh) * | 2013-06-18 | 2017-08-04 | Level 3 Communications, Llc | 网络中的数据中心冗余 |
| US8752178B2 (en) * | 2013-07-31 | 2014-06-10 | Splunk Inc. | Blacklisting and whitelisting of security-related events |
| WO2015051181A1 (en) * | 2013-10-03 | 2015-04-09 | Csg Cyber Solutions, Inc. | Dynamic adaptive defense for cyber-security threats |
| US9756062B2 (en) * | 2014-08-27 | 2017-09-05 | General Electric Company | Collaborative infrastructure supporting cyber-security analytics in industrial networks |
| US10592668B2 (en) * | 2014-11-26 | 2020-03-17 | Howard University | Computer system security with redundant diverse secondary control system with incompatible primary control system |
| RU2673842C1 (ru) * | 2015-03-20 | 2018-11-30 | Ривец Корп. | Автоматическая аттестация сохранности устройства с применением цепочки блоков |
| US10404748B2 (en) * | 2015-03-31 | 2019-09-03 | Guidewire Software, Inc. | Cyber risk analysis and remediation using network monitored sensors and methods of use |
| CA3128629A1 (en) * | 2015-06-05 | 2016-07-28 | C3.Ai, Inc. | Systems and methods for data processing and enterprise ai applications |
| US20170046689A1 (en) | 2015-07-14 | 2017-02-16 | Fmr Llc | Crypto Voting and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems |
| US10402792B2 (en) * | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
| EP3362965A4 (en) * | 2015-10-13 | 2019-08-07 | Transactive Grid Inc. | USE OF BLOCKCHAIN-BASED, DISTRIBUTED CONSENSUS CONTROL |
| US9894036B2 (en) * | 2015-11-17 | 2018-02-13 | Cyber Adapt, Inc. | Cyber threat attenuation using multi-source threat data analysis |
| US10063572B2 (en) * | 2016-03-28 | 2018-08-28 | Accenture Global Solutions Limited | Antivirus signature distribution with distributed ledger |
| US10372910B2 (en) * | 2016-06-20 | 2019-08-06 | Jask Labs Inc. | Method for predicting and characterizing cyber attacks |
| US11176519B2 (en) * | 2016-11-11 | 2021-11-16 | International Business Machines Corporation | Smart contract admission check and fault tolerance in a blockchain |
| US20180285996A1 (en) * | 2017-04-03 | 2018-10-04 | FutureLab Consulting Inc. | Methods and system for managing intellectual property using a blockchain |
| US11924322B2 (en) * | 2017-05-16 | 2024-03-05 | Arm Ltd. | Blockchain for securing and/or managing IoT network-type infrastructure |
| US10846664B2 (en) * | 2017-05-26 | 2020-11-24 | Aim Ip, Llc | Secure electronic system for managing digital currencies |
| US10581873B2 (en) * | 2017-07-11 | 2020-03-03 | Cisco Technology, Inc. | Securing micro-services |
| US10505955B2 (en) * | 2017-08-22 | 2019-12-10 | General Electric Company | Using virtual sensors to accommodate industrial asset control systems during cyber attacks |
| US10686799B2 (en) * | 2018-04-30 | 2020-06-16 | EMC IP Holding Company LLC | Blockchain-based method and system for providing tenant security and compliance in a cloud computing environment |
| US10542046B2 (en) * | 2018-06-07 | 2020-01-21 | Unifyvault LLC | Systems and methods for blockchain security data intelligence |
| US11386375B2 (en) * | 2018-09-20 | 2022-07-12 | Software Ag | Systems and/or methods for securing and automating process management systems using distributed sensors and distributed ledger of digital transactions |
| US10979452B2 (en) * | 2018-09-21 | 2021-04-13 | International Business Machines Corporation | Blockchain-based malware containment in a network resource |
| US11405182B2 (en) * | 2018-12-03 | 2022-08-02 | Ebay Inc. | Adaptive security for smart contracts using high granularity metrics |
-
2017
- 2017-09-19 US US15/709,259 patent/US10831890B2/en not_active Expired - Fee Related
-
2018
- 2018-08-30 AU AU2018222991A patent/AU2018222991B2/en active Active
- 2018-08-30 JP JP2018160933A patent/JP7026028B2/ja not_active Expired - Fee Related
- 2018-09-17 EP EP18194959.5A patent/EP3457659B1/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120143981A1 (en) | 2010-12-02 | 2012-06-07 | Institute For Information Industry | Common server, adaptor, and data conforming method thereof |
| JP2014179074A (ja) | 2013-03-13 | 2014-09-25 | General Electric Co <Ge> | 産業用制御システムのためのインテリジェントサイバーフィジカル侵入検出および侵入防止システムならびに方法 |
| US20150096026A1 (en) | 2013-03-15 | 2015-04-02 | Cyberricade, Inc. | Cyber security |
Also Published As
| Publication number | Publication date |
|---|---|
| EP3457659B1 (en) | 2022-05-11 |
| JP2019057276A (ja) | 2019-04-11 |
| US10831890B2 (en) | 2020-11-10 |
| US20190087571A1 (en) | 2019-03-21 |
| AU2018222991B2 (en) | 2023-04-20 |
| EP3457659A1 (en) | 2019-03-20 |
| AU2018222991A1 (en) | 2019-04-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7026028B2 (ja) | 冗長デバイス及びスマートコントラクトを使用して、サイバーフィジカルシステムへの攻撃を検出するための方法及びシステム | |
| Kesler | The vulnerability of nuclear facilities to cyber attack; strategic insights: Spring 2010 | |
| Lin et al. | Cyber attack and defense on industry control systems | |
| JP2017111532A (ja) | 制御装置及び統合生産システム | |
| Jin et al. | Snapshotter: Lightweight intrusion detection and prevention system for industrial control systems | |
| JP6385842B2 (ja) | 情報処理端末、情報処理方法、及び情報処理システム | |
| Volk | A safer future: Leveraging the AI power to improve the cybersecurity in critical infrastructures. | |
| CN105740710A (zh) | 一种基于bmc实现bios动态度量的方法 | |
| Zhang et al. | All your PLCs belong to me: ICS ransomware is realistic | |
| Yockey et al. | Cyber threat assessment of machine learning driven autonomous control systems of nuclear power plants | |
| Liebl et al. | Threat analysis of industrial internet of things devices | |
| Mughaid et al. | Simulation-based framework for authenticating SCADA systems and cyber threat security in edge-based autonomous environments | |
| CN105074833B (zh) | 用于识别对控制和调节单元的系统状态的未授权操控的装置以及具有该装置的核设施 | |
| CN114095227B (zh) | 一种数据通信网关可信认证方法、系统及电子设备 | |
| Szabó | Cybersecurity issues in industrial control systems | |
| US11886578B2 (en) | Systems and methods for embedded anomalies detector for cyber-physical systems | |
| CN109922056B (zh) | 数据安全处理方法及其终端、服务器 | |
| Schneider et al. | Cyber security maintenance for SCADA systems | |
| Cornelius et al. | Recommended practice: Creating cyber forensics plans for control systems | |
| Findrik et al. | Trustworthy computer security incident response for nuclear facilities | |
| Ibrahim et al. | Attack graph modeling for nuclear power plant | |
| CN119717749B (zh) | Dcs控制系统上位机应用可信保障方法、系统、设备及介质 | |
| Smith | Improving resilience in chemical plant under cyberattack by adversarial reinforcement learning | |
| CN117093404B (zh) | 可信动态度量过程中不可信进程自恢复方法、系统及设备 | |
| CN112395601B (zh) | 一种应用层内存访问的监控方法和装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| RD03 | Notification of appointment of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7423 Effective date: 20180914 |
|
| RD04 | Notification of resignation of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7424 Effective date: 20180920 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20210827 |
|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20210827 |
|
| A871 | Explanation of circumstances concerning accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A871 Effective date: 20210827 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20210927 |
|
| A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20211227 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20220113 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20220214 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 7026028 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| LAPS | Cancellation because of no payment of annual fees |