The disclosure relates to a control device, an integrated industrial system, and a control method thereof.
Priority is claimed on Japanese Patent Application No. 2015-244048, filed Dec. 15, 2015, the contents of which are incorporated herein by reference.
In a plant and a factory (hereinafter, called simply “plant” as a generic name of them), an integrated industrial system is established, and an advanced automatic operation is implemented. In order to secure safety and perform advanced control, the integrated industrial system includes a control system such as a distributed control system (DCS) and a safety system such as a safety instrumented system (SIS). The distributed control system is a process control system which controls industrial process implemented in the plant.
In the distributed control system, field devices (for example, a measurement device and an actuation device) and a controller which controls these field devices are connected to each other through communication means. The controller collects measurement data measured by a field device, and operates (controls) a field device in accordance with the collected measurement data. Thereby, the distributed control system controls various kinds of state quantity in the industrial process. In an emergency, the safety instrumented system certainly shuts down the plant in a safe state. Thereby, the safety instrumented system prevents a physical injury and an environmental pollution, and protects expensive facilities. When an abnormal circumstance occurs in the plant, the safety instrumented system plays a role of “stronghold for securing safety”.
There is a possibility that the integrated industrial system receives cyber-attacks from outside. For this reason, in the integrated industrial system, countermeasures (security countermeasures) for a case that each of the distributed control system and the safety instrumented system receives cyber-attacks, or for a case that the whole integrated industrial system receives cyber-attacks, are prepared. For example, a firewall for preventing intrusion from outside to the integrated industrial system is prepared, or antivirus software (software which detects virus infection and removes virus) is installed in a computer. The controller which is a core of the distributed control system and the safety instrumented system has a high resistance against cyber-attacks by using an original operating system.
The integrated industrial system is sectioned into two or more zones, and the security countermeasures are basically applied to each zone. For example, an integrated industrial system established in conformity with hierarchical structures specified by International Standard ISA-95 (IEC/ISO 62264) is sectioned into two or more zones on the basis of hierarchy. The security countermeasures are applied to each hierarchy. For example, a conventional technology for maintaining security of a control network is disclosed in Japanese Unexamined Patent Application Publication No. 2000-267957 and Japanese Unexamined Patent Application Publication No. 2010-081610. A conventional technology for displaying a tree view in accordance with hierarchical structure of International Standard ISA-95 is disclosed in Japanese Unexamined Patent Application Publication No. 2013-161432.
By the way, as described above, since the security countermeasures against cyber-attacks from the outside are basically applied to each zone, the security countermeasures are individually performed in each zone when cyber-attacks are performed. For this reason, in the conventional integrated industrial system, if the security countermeasures of each zone are not enough with respect to cyber-attacks, the cyber-attacks reach the zone where the safety instrumented system belongs. For this reason, there is a problem that final defense countermeasures depend on security countermeasures applied to the zone where the safety instrumented system belongs.
The safety instrumented system does not usually communicate with a host system, but the safety instrumented system communicates with the distributed control system. On the other hand, the distributed control system is supposed to communicate with the host system. As a result, since the safety instrumented system is connected to the host system, there is a problem that cyber-attacks may reach the zone where the safety instrumented system belongs.
As described above, if the security countermeasures of each zone are not enough with respect to cyber-attacks, cyber-attacks reach the zone where the safety instrumented system belongs. For this reason, a control right of the safety instrumented system (or an engineering station which creates program to be used by the safety instrumented system) may be deprived. If cyber-attacks are performed from inside the integrated industrial system (for example, if a device which has been infected with a virus is arranged in the integrated industrial system), a situation in which the control right of the safety instrumented system may be also deprived. If such a situation occurs and programs of the controller which is a core of the safety instrumented system are rewritten, a role of “stronghold for securing safety” is lost. Therefore, it is necessary not to raise the above-described situation.
A control device of an integrated industrial system which is established in a plant, the control device may include a defender configured to perform a countermeasure of restricting at least a part of functions of a self-device, based on a detection result of a detector which detects a cyber-attack from at least one of inside and outside to the integrated industrial system.
Further features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments with reference to the attached drawings.
The embodiments of the present invention will be now described herein with reference to illustrative preferred embodiments. Those skilled in the art will recognize that many alternative preferred embodiments can be accomplished using the teaching of the present invention and that the present invention is not limited to the preferred embodiments illustrated herein for explanatory purposes.
An aspect of the present invention is to provide a control device, an integrated industrial system, and a control method thereof which can defend against cyber-attacks from at least one of inside and outside to a safety instrumented system beforehand, and can secure a normality of the safety instrumented system.
Hereinafter, a control device, an integrated industrial system, and a control method thereof of embodiments will be described in detail, with reference to drawings.
<Integrated Industrial System>
The integrated industrial system 1 is established in conformity with hierarchical structures specified by International Standard ISA-95 (IEC/ISO 62264). Specifically, in the integrated industrial system 1, the distributed control system 20 and the safety instrumented system 30 belong to a hierarchy of level 2, the manufacturing system 40 belongs to a hierarchy of level 3, and the managing system 50 belongs to a hierarchy of level 4. The distributed control system 20, the safety instrumented system 30, the manufacturing system 40, the managing system 50, and the detecting device 60 are connected to each other through a network N configured by network devices NE1 to NE3.
The integrated industrial system 1 is sectioned into two or more zones on the basis of hierarchy in order to prepare security countermeasures. Specifically, in the integrated industrial system 1, the distributed control system 20 and the safety instrumented system 30 are installed in a zone Z1, the manufacturing system 40 is installed in a zone Z2, and the managing system 50 is installed in a zone Z3.
The plant includes an industrial plant such as a chemical industrial plant, a plant managing and controlling a wellhead (for example, a gas field and an oil field), a plant managing and controlling a generation of electric power (for example, hydro power, thermal power, and nuclear power), a plant managing and controlling a power harvesting (for example, solar power and wind power), a plant managing and controlling water supply and sewerage systems, a dam, and so on.
The field device 10 is installed at a field of the plant, and the field device performs measurement and actuation required for control of industrial process under control of the distributed control system 20. Specifically, the field device 10 is such as a sensor device (for example, a pressure meter, a flowmeter, a temperature sensor, a gas sensor, and a vibration sensor), a valve device (for example, a flow control valve and an on-off valve), an actuator device (for example, a fan and a motor), an imaging device (for example, a camera and a video camera recording circumstances and objects in the plant), a sound device (for example, a microphone collecting abnormal noise in the plant, and a speaker generating alarm sound), a position detection device outputting position information of the each device, and other devices.
The field device 10 communicates with the distributed control system 20 or the safety instrumented system 30. For example, the field device 10 performs wired communication through a network or a communication bus (not shown), or wireless communication in conformity with industrial wireless communication standards, such as ISA100.11a and WirelessHART (registered trademark), with respect to the distributed control system 20 and the safety instrumented system 30.
The distributed control system 20 is equipped with a process controller 21, an operation monitoring terminal 22, and an engineering terminal 23. The distributed control system 20 collects measurement data measured by the field device 10, and operates (controls) the field device 10 in accordance with the collected measurement data, in order to control various kinds of state quantity. The state quantity controlled by the distributed control system 20 is various kinds of state quantity in the industrial process. For example, the state quantity is pressure, temperature, flow quantity, or the like.
The process controller 21 is a core of the distributed control system 20. The process controller 21 collects the measurement data from the field device 10, and operates (controls) the field device 10. For example, the operation monitoring terminal 22 is operated by a plant operator, and the operation monitoring terminal 22 is used for monitoring an operational status of the plant. The engineering terminal 23 is a terminal used for creating programs to be executed by the process controller 21 and the operation monitoring terminal 22. The engineering terminal 23 does not need to be always connected to the network. The engineering terminal 23 is used by the distributed control system 20 and the safety instrumented system 30.
The safety instrumented system 30 is equipped with safety controllers 31a and 31b (control device), and an engineering terminal 23. In an emergency, the safety instrumented system 30 certainly shuts down the plant in a safe state, in order to prevent a physical injury and an environmental pollution, and protect expensive facilities. When an abnormal circumstance occurs in the plant, the safety instrumented system plays a role of “stronghold for securing safety”.
Each of the safety controllers 31a and 31b is a core of the safety instrumented system 30. The safety controllers 31a and 31b communicate with the field device 10 or another safety controller (not shown) and obtains necessary data, in order to determine whether an abnormal circumstance occurs in the plant or not. If each of the safety controllers 31a and 31b determines that an abnormal circumstance occurs in the plant, each of the safety controllers 31a and 31b executes safety control logic for implementing a safety control. The engineering terminal 23 is also a terminal used for creating programs to be executed by the safety controllers 31a and 31b.
In the present embodiment, the engineering terminal 23 is used by the distributed control system 20 and the safety instrumented system 30, but a dedicated terminal corresponding to the engineering terminal 23 may be prepared in each of the distributed control system 20 and the safety instrumented system 30. In the present embodiment, an example in which the two safety controllers 31a and 31b are prepared in the safety instrumented system 30 will be described. However, a number of the safety controllers prepared in the safety instrumented system 30 may be one, and may be three or more. Details of the safety controllers 31a and 31b will be described later.
The manufacturing system 40 is a system established for manufacturing products in the plant efficiently. The manufacturing system 40 is such as a Manufacturing Execution System (MES), a Plant Information Management System (PIMS), and a Plant Asset Management System (PAM). As the manufacturing system 40, only one of the Manufacturing Execution System, the Plant Information Management System, and the Plant Asset Management System may be established, and two or more of them may be established.
The managing system 50 is a system established for business, such as management or sales and marketing in a company. For example, the managing system 50 is an Enterprise Resource Planning System (ERP).
The operation monitoring terminal 22, the engineering terminal 23, and the detecting device 60, which are installed in the zone Z1, are connected to the manufacturing system 40, which is installed in the zone Z2, via the network device NE1. The manufacturing system 40 installed in the zone Z2 is connected to the managing system 50, which is installed in the zone Z3, via the network device NE2. The managing system 50 installed in the zone Z3 is connected to another unillustrated network (for example, Internet) via the network device NE3.
That is, the network device NE1 is installed between the zone Z1 and the zone Z2. The network device NE2 is installed between the zone Z2 and the zone Z3. The network device NE3 is installed between the zone Z3 and the other unillustrated network (for example, Internet). The network devices NE1 to NE3 are such as a firewall, a router, a switch, and so on.
The detecting device 60 is installed in each of the zones Z1 to Z3. The detecting device 60 detects cyber-attacks from at least one of inside and outside to the self-zone. The cyber-attacks from outside to the self-zone are such as an unauthorized invasion to the integrated industrial system 1, an alteration of the program used by the integrated industrial system 1, a fraud and a destruction of data used by the integrated industrial system 1, an act for making the integrated industrial system 1 be in malfunction state, and other acts. The cyber-attacks from inside to the self-zone are such as an alteration of the program by using a USB (Universal Serial Bus) device which has been infected with a virus.
The detecting device 60 is prepared in accordance with a design concept of each of the zones Z1 to Z3. For example, the detecting device 60 can utilize commercial antivirus software (software which detects virus infection and removes virus), or utilize an intrusion detection system. In the present embodiment, in order to understand easily, an example that the detecting device 60 is prepared as “device” will be described, but the function of the detecting device 60 may be implemented by software.
The detecting device 60 installed in each of the zones Z1 to Z3 is connected to the network N. If the detecting device 60 installed in each of the zones Z1 to Z3 detects cyber-attacks, the detecting device 60 transmits the detection result to the safety controllers 31a and 31b through the network N. In the present embodiment, in order to explain easily, the detection result of the detecting device 60 is transmitted to the safety controllers 31a and 31b. However, the detection result of the detecting device 60 may be transmitted to the process controller 21, in addition to the safety controllers 31a and 31b.
<Control Device>
As shown in
The defense unit DF is equipped with a setter 71 and an executer 72. The defense unit DF performs security countermeasures for defending against cyber-attacks from at least one of outside and inside, based on the detection result obtained from the detecting device 60. Specifically, the defense unit DF controls the safety control unit SC to restrict a part of or all of the functions of the safety controller 31a. For example, the defense unit DF restricts a change of application programs used by the safety controller 31a, and restricts an execution of a control command input from outside.
The setter 71 specifies a target and a type of the cyber-attack based on the detection result of the detecting device 60, and the setter 71 sets security countermeasures in accordance with the specified contents. The setter 71 sets the security countermeasures by using a setting list LS in which an attack target list and a countermeasure list are associated with each other. The attack target list represents a list of the target and the type of the cyber-attack. The countermeasure list represents a list of security countermeasures which should be performed in accordance with the target and the type of the cyber-attack. The executor 72 executes security countermeasures which have been set by the setter 71. The function of the defense unit DF may be implemented by hardware, or may be implemented by software.
As shown in
The “device” is information for specifying a device to which the cyber-attack has been performed. The “device” is such as a personal computer (PC), a controller, a switch, a router, a firewall, and so on. The “level” is information for specifying which part of a device has been attacked with the cyber-attack. The “level” is such as an operating system (OS), a network, hardware, application, and so on. The “type” is information for specifying a type of the cyber-attack. The “type” is such as a virus, a DoS attack (Denial of Service attack), and so on.
As shown in
For example, in a first line to a fourth line of the setting list LS shown in
For example, in a fifth line to a seventh line of the setting list LS shown in
For example, in an eighth line and a tenth line to a twelfth line of the setting list LS shown in
For example, in an ninth line of the setting list LS shown in
For example, in a first line and a second line of the setting list LS shown in
For example, in a third line of the setting list LS shown in
For example, in a fourth line of the setting list LS shown in
Next, operations of the integrated industrial system 1 of the above-described configuration will be described. Although operations of the integrated industrial system 1 are various, operations mainly performed by the detecting device 60 and the safety controllers 31a and 31b (operations for detecting a cyber-attack and defending against it) will be described below.
If processing of the flow chart shown in
On the other hand, if the setter 71 has determined that there is a cyber-attack to the integrated industrial system 1 (Step S13: “YES”), the setter 71 specifies a target and a type of the cyber-attack based on the result of the analysis performed at Step S12 (Step S14). If the setter 71 has specified a target and a type of the cyber-attack, the setter 71 sets a security countermeasure in accordance with the specified contents by using the setting list LS (Step S15). If the security countermeasure has been set by the setter 71, the setter 71 outputs, to the executor 72, information which represents the security countermeasure which has been set. The executor 72 executes the security countermeasure which has been set by the setter 71 (Step S16).
For example, a cyber-attack is performed to a PC used by the managing system 50 which belongs to the zone Z3, and the PC is infected with a virus. In this case, the virus infection of the PC is detected by the detecting device 60 which belongs to the zone Z3. The setter 71 of the defense unit DF installed in the safety controllers 31a and 31b reads this detection result (Step S11), and the setter 71 analyzes it (Step S12). Then, the determination result of Step S13 shown in
If the target and the type of the cyber-attack have been specified, the setter 71 of the defense unit DF installed in the safety controllers 31a and 31b sets a security countermeasure of recording in the event log and notifying the system administrator, based on the countermeasure number “B1” associated with the attack target number “A4” of the fourth line of the setting list LS shown in
For example, a cyber-attack is performed to the engineering terminal 23 which belongs to the zone Z1. In this case, the cyber-attack to the engineering terminal 23 is detected by the detecting device 60 which belongs to the zone Z1. The setter 71 of the defense unit DF installed in the safety controllers 31a and 31b reads this detection result (Step S11), and the setter 71 analyzes it (Step S12). Then, the determination result of Step S13 shown in
If the target and the type of the cyber-attack have been specified, the setter 71 sets a security countermeasure of stopping all communication functions of the engineering terminal 23 and the safety controllers 31a and 31b, based on the countermeasure number “B6” and the target device “ENG 23, CNT31a, 31b” which are associated with the attack target number “A9” of the ninth line of the setting list LS shown in
By performing the above-described processing, for example, even if the engineering terminal 23 is infected with a virus by using a USB device which has been infected with a virus, all the communication functions of the engineering terminal 23 and the safety controllers 31a and 31b are stopped. Thereby, the cyber-attack to the safety controllers 31a and 31b can be prevented beforehand, and the normality of the safety controllers 31a and 31b can be secured. For this reason, the role of “stronghold for securing safety” is not lost.
As described above, in the present embodiment, the detecting device 60 which detects cyber-attacks from outside or inside is installed. Moreover, based on the detection result of the detecting device 60, the functions of the safety controllers 31a and 31b and the engineering terminal 23 are restricted. For this reason, the cyber-attack to the safety controllers 31a and 31b can be prevented beforehand, and the normality of the safety controllers 31a and 31b can be secured. Further, by setting countermeasures in accordance with threat of the cyber-attack, the cyber-attack can be prevented effectively without shutting down the plant carelessly.
For example, the communication line L1 is a transmission line for transmitting a contact signal, and a transmission line for transmitting an analog signal. The communication line L1 transmits the detection result detected by the detecting device 60 to the safety controllers 31a and 31b. The communication line L1 may connect the detecting device 60 and the safety controller 31a (or the safety controller 31b) by one-to-one, or may connect two or more detectors 60 and the safety controllers 31a and 31b in a form of network.
In this way, the detecting device 60 and the safety controllers 31a and 31b are connected by the communication line L1, in order to be able to prevent the cyber-attack from outside or inside more certainly. That is, if a cyber-attack is performed, there is a possibility that communication through the network N becomes impossible. Even if the communication through the network N becomes impossible, in a case that the communication through the communication line L1 is possible, the detection result of the detecting device 60 can be transmitted to the safety controllers 31a and 31b, and the security countermeasures in accordance with the detection result of the detecting device 60 can be performed. For this reason, the cyber-attack from outside or inside can be prevented more certainly.
The integrated industrial system 2 of the present embodiment is the same as the integrated industrial system 1 of the first embodiment, except that the detection result of the detecting device 60 is transmitted to the safety controllers 31a and 31b through the communication line L1. For this reason, since operations of the integrated industrial system 2 of the present embodiment are basically the same as those of the integrated industrial system 1 of the first embodiment, detail explanations will be omitted.
As described above, also in the present embodiment, similar to the first embodiment, the detecting device 60 which detects cyber-attacks from outside or inside is installed. Moreover, based on the detection result of the detecting device 60, the functions of the safety controllers 31a and 31b and the engineering terminal 23 are restricted. For this reason, the cyber-attack to the safety controllers 31a and 31b can be prevented beforehand, and the normality of the safety controllers 31a and 31b can be secured. Further, by setting countermeasures in accordance with threat of the cyber-attack, the cyber-attack can be prevented effectively without shutting down the plant carelessly.
In the integrated industrial system of the embodiment shown in
The integrated industrial system of the embodiment shown in
Although an integrated industrial system according to embodiments of the present invention has been described above, the present invention is not restricted to the above-described embodiments, and can be freely modified within the scope thereof. For example, the foregoing descriptions of the embodiments have been examples in which the integrated industrial system is sectioned to the zones Z1 to Z3 on a basis of hierarchy specified by International Standard ISA-95 (IEC/ISO 62264), in order to secure security. However, it is not necessary for the integrated industrial system to be configured in conformity with the standard. As shown in the examples of
In the embodiment described above, in order to understand easily, an example of defending the cyber-attack to the safety controllers 31a and 31b has been described. However, in addition to the safety instrumented system 30, security countermeasures may be performed in consideration of an influence on the distributed control system 20. In a case that such a countermeasure is performed, the same configuration as the defense unit DF, which has been installed in the safety controllers 31a and 31b of the safety instrumented system 30, is installed in the process controller 21 of the distributed control system 20. Moreover, the detection result of the detecting device 60 is also input to the process controller 21. If a cyber-attack is performed, the process controller 21 performs a countermeasure of restricting at least one of functions.
As described by using
As used herein, the following directional terms “front, back, above, downward, right, left, vertical, horizontal, below, transverse, row and column” as well as any other similar directional terms refer to those instructions of a device equipped with the present invention. Accordingly, these terms, as utilized to describe the present invention should be interpreted relative to a device equipped with the present invention.
The term “configured” is used to describe a component, unit or part of a device includes hardware and/or software that is constructed and/or programmed to carry out the desired function.
Moreover, terms that are expressed as “means-plus function” in the claims should include any structure that can be utilized to carry out the function of that part of the present invention.
The term “unit” is used to describe a component, unit or part of a hardware and/or software that is constructed and/or programmed to carry out the desired function. Typical examples of the hardware may include, but are not limited to, a device and a circuit.
While preferred embodiments of the present invention have been described and illustrated above, it should be understood that these are examples of the present invention and are not to be considered as limiting. Additions, omissions, substitutions, and other modifications can be made without departing from the scope of the present invention. Accordingly, the present invention is not to be considered as being limited by the foregoing description, and is only limited by the scope of the claims.
Number | Date | Country | Kind |
---|---|---|---|
JP2015-244048 | Dec 2015 | JP | national |
Number | Name | Date | Kind |
---|---|---|---|
7185366 | Mukai | Feb 2007 | B2 |
7467018 | Callaghan | Dec 2008 | B1 |
7966659 | Wilkinson | Jun 2011 | B1 |
8881288 | Levy | Nov 2014 | B1 |
9009084 | Brandt | Apr 2015 | B2 |
9648029 | Cheng | May 2017 | B2 |
9836990 | Nguyen | Dec 2017 | B2 |
9892261 | Joram | Feb 2018 | B2 |
10021125 | Talamanchi | Jul 2018 | B2 |
10026049 | Asenjo | Jul 2018 | B2 |
10078317 | Houmb | Sep 2018 | B2 |
10146936 | Khanduja | Dec 2018 | B1 |
20030188197 | Miyata et al. | Oct 2003 | A1 |
20050005017 | Ptacek | Jan 2005 | A1 |
20050050346 | Felactu | Mar 2005 | A1 |
20050273184 | Dauss | Dec 2005 | A1 |
20060026682 | Zakas | Feb 2006 | A1 |
20060031938 | Choi | Feb 2006 | A1 |
20060053491 | Khuti | Mar 2006 | A1 |
20060294579 | Khuti | Dec 2006 | A1 |
20080016339 | Shukla | Jan 2008 | A1 |
20080125887 | Case | May 2008 | A1 |
20080162085 | Clayton | Jul 2008 | A1 |
20090089325 | Bradford | Apr 2009 | A1 |
20100077471 | Schleiss | Mar 2010 | A1 |
20100287608 | Khuti | Nov 2010 | A1 |
20110023088 | Ko | Jan 2011 | A1 |
20110067107 | Weeks | Mar 2011 | A1 |
20110289588 | Sahai | Nov 2011 | A1 |
20120151593 | Kang | Jun 2012 | A1 |
20120180133 | Al-Harbi | Jul 2012 | A1 |
20120209411 | Ohkado | Aug 2012 | A1 |
20120284790 | Bhargava | Nov 2012 | A1 |
20120313755 | Gutierrez et al. | Dec 2012 | A1 |
20130031037 | Brandt | Jan 2013 | A1 |
20130081103 | Uner | Mar 2013 | A1 |
20130091539 | Khurana | Apr 2013 | A1 |
20130201192 | Kanda | Aug 2013 | A1 |
20130211555 | Lawson | Aug 2013 | A1 |
20130211558 | Mishina | Aug 2013 | A1 |
20130212214 | Lawson | Aug 2013 | A1 |
20130212669 | Wilson | Aug 2013 | A1 |
20130227689 | Pietrowicz | Aug 2013 | A1 |
20130245793 | Akiyama | Sep 2013 | A1 |
20130274898 | Thatikonda | Oct 2013 | A1 |
20130312092 | Parker | Nov 2013 | A1 |
20140237599 | Gertner | Aug 2014 | A1 |
20140237606 | Futoransky | Aug 2014 | A1 |
20140283047 | Dixit | Sep 2014 | A1 |
20140317737 | Shin | Oct 2014 | A1 |
20140337977 | Ward | Nov 2014 | A1 |
20150040228 | Lee | Feb 2015 | A1 |
20150244734 | Olson | Aug 2015 | A1 |
20150281278 | Gooding | Oct 2015 | A1 |
20150295944 | Yunoki et al. | Oct 2015 | A1 |
20150301515 | Houmb | Oct 2015 | A1 |
20150381642 | Kim | Dec 2015 | A1 |
20150381649 | Schultz | Dec 2015 | A1 |
20160036838 | Jain | Feb 2016 | A1 |
20160050225 | Carpenter | Feb 2016 | A1 |
20160078694 | Swift | Mar 2016 | A1 |
20160094578 | McQuillan | Mar 2016 | A1 |
20160112443 | Grossman | Apr 2016 | A1 |
20160112445 | Abramowitz | Apr 2016 | A1 |
20160234241 | Talamanchi | Aug 2016 | A1 |
20160261482 | Mixer | Sep 2016 | A1 |
20160330225 | Kroyzer | Nov 2016 | A1 |
20160337390 | Sridhara | Nov 2016 | A1 |
20160344754 | Rayapeta | Nov 2016 | A1 |
20160366174 | Chernin | Dec 2016 | A1 |
20170126727 | Beam | May 2017 | A1 |
20170353484 | Knapp et al. | Dec 2017 | A1 |
20180020014 | Kamiya | Jan 2018 | A1 |
20180063244 | Maturana | Mar 2018 | A1 |
20180096153 | Dewitte | Apr 2018 | A1 |
Number | Date | Country |
---|---|---|
10 2005 063052 | Jul 2007 | DE |
2775685 | Sep 2014 | EP |
2000-267957 | Sep 2000 | JP |
2003-288282 | Oct 2003 | JP |
2010-081610 | Apr 2010 | JP |
2013-161432 | Aug 2013 | JP |
2015001594 | Jan 2015 | WO |
WO-2015092817 | Jun 2015 | WO |
2015104691 | Jul 2015 | WO |
Entry |
---|
Karnouskos et al., Architecting the next generation of service-based Scadaidcs system of systems, IEEE (Year: 2006). |
Schuster et al., A Distributed Intrusion Detection System for Industrial Automation Networks, IEEE (Year: 2012). |
Briesemeister et al., Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems, IEEE (Year: 2010). |
Jiang et al., A Zone-Based Intrusion Detection System for Wireless Ad Hoc Distribution Power Communication Networks, IEEE (Year: 2005). |
McLaughlin et al., Multiattribute SCADA-Specific Intrusion Detection System for Power Networks, IEEE (Year: 2014). |
Zhu et al., SCADA-specific Intrusion Detection/Prevention Systems: A Survey and Taxonomy, University of California at Berkeley, Berkeley, CA (Year: 2010). |
Cheung et al, Using Model-based Intrusion Detection for SCADA Networks, SRI International (Year: 2006). |
An Office Action dated Dec. 31, 2018, which issued during the prosecution of U.S. Appl. No. 15/373,601. |
Akira Wakabayashi, “Safety Instrumented System for Process Industry”, Japan Industrial Publishing Co., Ltd., Oct. 1, 2013, vol. 41, pp. 46-51 (8 pages total). |
Masashi Murakami, “To Build a Control System that is Strong against Cyber Attacks”, Instrumentation Control Engineering, Japan, Kogyogijutsusha, Feb. 18, 2013, vol. 56, pp. 63-71 (13 pages total). |
Shoichi Doi, “The Optimal Security Design for a Production Control System”, Masahiro Miyauchi, Japan Technical Association of the Pulp and Paper Industry, Feb. 27, 2015, vol. 69, pp. 43-48 (9 pages total). |
Number | Date | Country | |
---|---|---|---|
20170169219 A1 | Jun 2017 | US |