US20150067844A1 - System and methodology providing automation security analysis, validation, and learning in an industrial controller environment - Google Patents

System and methodology providing automation security analysis, validation, and learning in an industrial controller environment Download PDF

Info

Publication number
US20150067844A1
US20150067844A1 US14/535,291 US201414535291A US2015067844A1 US 20150067844 A1 US20150067844 A1 US 20150067844A1 US 201414535291 A US201414535291 A US 201414535291A US 2015067844 A1 US2015067844 A1 US 2015067844A1
Authority
US
United States
Prior art keywords
security
network
industrial
data
industrial controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/535,291
Inventor
David D. Brandt
Kenwood Hall
Mark Burton Anderson
Craig D. Anderson
George Bradford Collins
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rockwell Automation Technologies Inc
Original Assignee
Rockwell Automation Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rockwell Automation Technologies Inc filed Critical Rockwell Automation Technologies Inc
Priority to US14/535,291 priority Critical patent/US20150067844A1/en
Assigned to ROCKWELL AUTOMATION TECHNOLOGIES, INC. reassignment ROCKWELL AUTOMATION TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HALL, KENWOOD, BRANDT, DAVID D., ANDERSON, CRAIG D., ANDERSON, MARK BURTON, COLLINS, GEORGE BRADFORD
Publication of US20150067844A1 publication Critical patent/US20150067844A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B15/00Systems controlled by a computer
    • G05B15/02Systems controlled by a computer electric
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • G06N99/005
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]

Definitions

  • the present invention relates generally to industrial control systems, and more particularly to a system and methodology to facilitate electronic and network security in an industrial automation system.
  • Industrial controllers are special-purpose computers utilized for controlling industrial processes, manufacturing equipment, and other factory automation, such as data collection or networked systems.
  • the industrial controller having an associated processor (or processors), measures one or more process variables or inputs reflecting the status of a controlled system, and changes outputs effecting control of such system.
  • the inputs and outputs may be binary, (e.g., on or off), as well as analog inputs and outputs assuming a continuous range of values.
  • I/O input/output
  • I/O modules serve as an electrical interface to the controller and may be located proximate or remote from the controller including remote network interfaces to associated systems.
  • Inputs and outputs may be recorded in an I/O table in processor memory, wherein input values may be asynchronously read from one or more input modules and output values written to the I/O table for subsequent communication to the control system by specialized communications circuitry (e.g., back plane interface, communications module).
  • Output modules may interface directly with one or more control elements, by receiving an output from the I/O table to control a device such as a motor, valve, solenoid, amplifier, and the like.
  • a logic processor such as a Programmable Logic Controller (PLC) or PC-based controller.
  • PLC Programmable Logic Controller
  • Programmable Logic Controllers are programmed by systems designers to operate manufacturing processes via user-designed logic programs or user programs.
  • the user programs are stored in memory and generally executed by the PLC in a sequential manner although instruction jumping, looping and interrupt routines, for example, are also common.
  • Associated with the user program are a plurality of memory elements or variables that provide dynamics to PLC operations and programs. These variables can be user-defined and can be defined as bits, bytes, words, integers, floating point numbers, timers, counters and/or other data types to name but a few examples.
  • One attempt at providing security in industrial control systems relates to simple password protection to limit access to the systems. This can take the form of a plant or controls Engineer or Administrator entering an alpha-numeric string that is typed by an operator each time access is attempted, wherein the controller grants access based on a successful typing of the password.
  • These type passwords are highly prone to attack or discovery, however.
  • users employ passwords that are relatively easy to determine (e.g., person's name or birthday).
  • users exchange passwords with other users, whereby the password is overheard or simply, a user with improper authorization comes in contact with the password.
  • parties employing sophisticated hacking techniques can often penetrate sensitive control systems, whereby access should be limited to authorized users and/or systems in order to mitigate potentially harmful consequences.
  • a Security Analysis Methodology (SAM) and tool provides an automated process, component, and tool that generates a set (or subset) of security guidelines, security data, and/or security components.
  • An input to the tool can be in the form of an abstract description or model of a factory, wherein the factory description includes one or more assets to be protected and associated pathways to access the assets.
  • Security data generated by the tool includes a set of recommended security components, related interconnection topology, connection configurations, application procedures, security policies, rules, user procedures, and/or user practices, for example.
  • SAM can be modeled on a risk-based/cost-based approach, if desired.
  • a suitable level of protection can be determined to facilitate integrity, privacy, and/or availability of assets based on risk and/or cost.
  • descriptions of shop floor access, Intranet access, Internet access, and/or wireless access can also be processed by the tool. Since multiparty involvement can be accommodated (IT, Manufacturing, Engineering, etc.), the tool can be adapted for partitioned security specification entry and sign-off.
  • the security data of the SAM tool can be generated in a structured security data format (e.g., XML, SQL) that facilitates further validation and compliance checking of the security data, if desired.
  • a security Validation Methodology and associated tools can be provided.
  • the validation tools perform initial and periodic live security assessment of a physical system. This enables security flaws or weaknesses to be identified.
  • One aspect of the tools is to check a system prior to security modifications in order to assess current security levels.
  • Another aspect is to check a system for conformance—either to recommendations of a security analysis, and/or against standards such as ISO, for example.
  • the validation tools can be executed on end devices (host based), and/or executed as an independent device that is operatively coupled to a network (network based) at selected points.
  • One function of host-validation tools is to perform vulnerability scanning and/or auditing on devices. This includes revision checks, improper configuration check, file system/registry/database permissions check, user privilege/password and/or account policy checks, for example.
  • One function of the network validation tools is to perform vulnerability scanning and auditing on the networks. This includes checking for susceptibility to common network-based attacks, searching for open TCP/UDP ports, and scanning for vulnerable network services. The tools can also attempt to gain key identity information about end devices that may enable hacker entry. Another function of the network validation tools is to perform vulnerability scanning and auditing on firewalls, routers, and/or other network/security devices.
  • a complementary tool can be provided to assess CIP-based factory automation systems for security. This will typically be a network-based tool, since factory automation devices often are not as capable as general purpose computing devices.
  • the tool can also be operable in an assessment mode to discover system flaws with little or no configuration, and the tool can operate in a validation mode to check system security against security analysis methodology determinations described above. Still yet other functions can include non-destructively mapping a topology of IT and automation devices, checking revisions and configurations, checking user attributes, and/or checking access control lists.
  • the validation tools described herein can also be adapted to automatically correct security problems (e.g., automatically adjust security parameters/rules/policies, install new security components, remove suspicious components, and so forth).
  • a Security Learning system can include network-based aspects and/or host-based aspects and similar to some of the security aspects described above with respect to the Validation tools.
  • a network-based security learning system (also referred to as learning component) is provided that monitors an automation network during a predetermined training period (e.g., monitor network activities for 1 week).
  • the learning component monitors and learns activities or patterns such as: the number of network requests to and from one or more assets; the type of requests (e.g., read/write, role/identity of person/system requesting access, time of requests); status or counter data (e.g., network access counters, error codes) which can be provided or queried from a learning or status component within the asset; and/or monitor and learn about substantially any data type or pattern that may be retrieved from the network and/or the asset.
  • the type of requests e.g., read/write, role/identity of person/system requesting access, time of requests
  • status or counter data e.g., network access counters, error codes
  • the learning component monitors the automation network and/or assets for detected deviations from data patterns learned during the training period.
  • a user interface can be provided, wherein one or more pattern thresholds can be adjusted (also can provide options for the type of data patterns to monitor/learn). For example, if the number of network requests to the asset has been monitored and learned to be about 1000 requests per hour during the past month, then a threshold can be set via the user interface that triggers an alarm or causes an automated event to occur if a deviation is detected outside of the threshold (e.g., automatically disable all network requests from the other networks if the number of network requests to the asset exceeds 10% of the average daily network requests detected during the training period).
  • Various learning functions and/or processes can be provided to facilitate automated learning within the learning components. This can include mathematical processes, statistical processes, functions, and/or algorithms and include more elaborate systems such as a neural network, for example.
  • artificial intelligence functions, components and/or processes can be provided.
  • Such components can include automated classifiers for monitoring and learning data patterns, wherein such classifiers include inference models, Hidden Markov Models (HMM), Bayesian models, Support Vector Machines (SVM), vector-based models, decision trees, and the like.
  • HMM Hidden Markov Models
  • SVM Support Vector Machines
  • FIG. 1 is a schematic block diagram illustrating automation security tools in accordance with an aspect of the present invention.
  • FIG. 2 is a schematic block diagram illustrating a security analysis tool in accordance with an aspect of the present invention.
  • FIG. 3 is a diagram illustrating an example security analyzer in accordance with an aspect of the present invention.
  • FIG. 4 is a diagram illustrating an example security analysis schema in accordance with an aspect of the present invention.
  • FIG. 5 is a diagram illustrating a validation system, methodology, and security validation tools in accordance with an aspect of the present invention.
  • FIG. 6 is a schematic block diagram illustrating a validation analyzer in accordance with an aspect of the present invention.
  • FIG. 7 is a schematic block diagram illustrating a security learning system in accordance with an aspect of the present invention.
  • FIG. 8 is a diagram illustrating a learning component in accordance with an aspect of the present invention.
  • FIG. 9 is a schematic block diagram illustrating a learning analyzer in accordance with an aspect of the present invention.
  • FIG. 10 is a flow diagram illustrating security analysis processing in accordance with an aspect of the present invention.
  • FIG. 11 is a flow diagram illustrating security validation processing in accordance with an aspect of the present invention.
  • FIG. 12 is a flow diagram illustrating security learning and detection processing in accordance with an aspect of the present invention.
  • the present invention relates to a system and methodology facilitating automation security in a networked-based industrial controller environment.
  • Various components, systems and methodologies are provided to facilitate varying levels of automation security in accordance with security analysis tools, security validation tools and/or security learning systems.
  • the security analysis tool receives abstract factory models or descriptions for input and generates an output that can include security guidelines, components, topologies, procedures, rules, policies, and the like for deployment in an automation security network.
  • the validation tools are operative in the automation security network, wherein the tools perform security checking and/or auditing functions, for example, to determine if security components are in place and/or in suitable working order.
  • the security learning system monitors/learns network traffic patterns during a learning phase, fires alarms or events based upon detected deviations from the learned patterns, and/or causes other automated actions to occur.
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program and a computer.
  • an application running on a server and the server can be components.
  • One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers, industrial controllers, and/or modules communicating therewith.
  • a system 100 illustrates various automation security tools in accordance with an aspect of the present invention.
  • One or more automation assets 120 communicate and cooperate with various network devices 124 across a network 130 .
  • the automation assets 120 include substantially any type of control, communications module, computer, I/O device, Human Machine Interface (HMI)) that communicate via the network 130 which includes control, automation, and/or public networks.
  • the automation assets 120 include Programmable Logic Controllers (PLC) that can also communicate to and control various other assets such as Input/Output modules including Analog, Digital, Programmed/Intelligent I/O modules, other programmable controllers, communications modules, and the like.
  • PLC Programmable Logic Controllers
  • the network 130 includes public networks such as the Internet, Intranets, and automation networks such as Control and Information Protocol (CIP) networks including DeviceNet and ControlNet.
  • Other networks 130 include Ethernet, DH/DH+, Remote I/O, Fieldbus, Modbus, Profibus, wireless networks, serial protocols, and so forth.
  • the network devices 124 include various possibilities (hardware and/or software components). These include components such as switches with virtual local area network (VLAN) capability, LANs, WANs, proxies, gateways, routers, firewalls, virtual private network (VPN) devices, intrusion detection systems, servers, clients, computers, configuration tools, monitoring tools, and/or other devices.
  • VLAN virtual local area network
  • WANs wide area network
  • proxies proxies
  • gateways gateways
  • routers firewalls
  • VPN virtual private network
  • various security tools can be provided with the system 100 . Although three tools are illustrated, it is to be appreciated that more or less than three tools can be employed with the present invention and in a plurality of similar or different combinations.
  • a security analysis tool 140 is provided that receives factory input data 144 describing or modeling various aspects of the automation assets 120 , network devices 124 , network 130 , and/or system 100 . The security analysis tool 140 processes the factory input data 144 and generates security output data 150 which is then deployed to machines and/or users in order to facilitate suitable network security measures and practices in the system 100 .
  • such measures can include security recommendations, configuration guidelines or adjustments, procedures, rules, policies, and security parameters, for example, that are utilized to mitigate unwanted intrusions or attacks from the network 130 that may affect the automation assets 120 and/or network devices 124 .
  • one or more validation tools 160 can be provided (can be host and/or networked based) that perform automated security auditing and checking functions on the network 130 , the automation assets 120 , and/or network devices 124 to determine if suitable security standards have been implemented.
  • the validation tools also perform periodic or monitored assessments within the system 100 to determine if potential network threats or attacks are at hand. As will be described in more detail below, this can include automated and/or healing operations to mitigate network security threats.
  • one or more learning tools 170 can be provided (can also be host and/or networked based) that learn system activities or patterns during a training or configuration period, then perform automated actions in response to detected deviations from the learned activities or patterns. Such automated actions can include altering network activity (e.g., preventing further network attempts to automation assets or network devices) and firing an alarm such as an e-mail or pager to notify an entity (user and/or machine) of a potential or detected problem.
  • the security tools 140 , 150 and/or 160 can share or exchange information between tools.
  • the security analysis tool 140 can receive input from the validation tool 160 (e.g., three new network devices detected in topology), wherein the security analysis tool generates new or adjusted security output data 150 in response thereto.
  • the automation assets 120 may directly access the network 130 and/or may employ the network devices 124 to achieve network access.
  • the security analysis tool 200 operates on a computer or workstation and receives one or more factory inputs 210 that can be generated from a plurality of sources. Such sources can include user input, model input (e.g., asset models, network models), schemas, formulas, equations, maps, and codes, for example.
  • the factory inputs 210 are then processed by the security analysis tool 200 to generate one or more security outputs 220 which can also be provided in various forms such as manuals, documents, schemas, executables, codes, e-mails, and/or other electronic data that is described in more detail below.
  • GUI Graphical User Interface 230
  • interface application can be provided to interact with the security analysis tool 200 , factory inputs 210 , and/or security outputs 220 .
  • This can include substantially any type of application that sends, retrieves, processes, and/or manipulates factory input data 210 , receives, displays, formats, and/or communicates security output data 220 , and/or facilitates operation of the security analysis tool 200 .
  • interfaces 230 can also be associated with an engine, editor tool or web browser although other type applications can be utilized.
  • the GUI 230 includes a display 234 having one or more display objects (not shown) including such aspects as configurable icons, buttons, sliders, input boxes, selection options, menus, tabs and so forth having multiple configurable dimensions, shapes, colors, text, data and sounds to facilitate operations with the security analysis tool 200 .
  • the GUI 230 can also include a plurality of other inputs 240 or controls for adjusting and configuring one or more aspects of the present invention. This can include receiving user commands from a mouse, keyboard, speech input, web site, remote web service and/or other device such as a camera or video input to affect or modify operations of the GUI 230 .
  • the security analyzer 300 can be an automated process, application, component, and/or tool that generates a set of security guidelines or security data 310 and executes a Security Analysis Method (SAM) in accordance with the present invention.
  • SAM Security Analysis Method
  • An input to the security analyzer 300 is an abstract description of a factory depicted as factory data 320 .
  • the factory data 320 can describe or model one or more automation assets to be protected and associated network pathways to access the assets.
  • Other factory data 320 can include risk data, cost data, security feedback from other security tools, network access patterns, and partitioning data, for example.
  • Security data 310 generated by the security analyzer 300 includes a set of recommended security components, related interconnection topology, connection configurations, application procedures, security policies, rules, user procedures, and/or user practices, for example, that is employed to guide users and adapt systems with various security measures.
  • security analyzer 300 can also be modeled on a risk-based/cost-based approach, if desired.
  • a suitable level of protection can be determined to facilitate integrity, privacy, and/or availability of assets based on risk and/or cost.
  • security parameters, policies, and procedures for example, can be increased if lower security risks and associated costs are desired, whereas security measures can be decreased if higher risks and/or costs associated with network attacks or intrusions are deemed acceptable.
  • descriptions of shop floor access, Intranet access, Internet access, wireless access and/or other network access patterns can also be described as factory data 320 and processed by the security analyzer 300 .
  • the security analyzer 300 can be adapted for partitioned security specification entry and sign-off.
  • the security data 310 can be generated in a structured security data format (e.g., XML, SQL) that facilitates further validation and compliance checking of the security data, if desired.
  • a security analysis schema 330 which is described in more detail below, can be derived from the security data 310 and can be provided to other entities such as users or machines for further security processing/implementations.
  • FIG. 4 illustrates an exemplary schema that may be employed for security deployments, communications, and configurations in accordance with the present invention.
  • the schema represents one possible manner in which to transfer data to and from an entity such as a user, interface, file, an automation component and associated network devices, it is to be appreciated that other possible data transfer mechanisms may be employed.
  • data can be transmitted in the form of binary or other type data packets that convey information in accordance with the present invention.
  • the security analysis schema 400 includes one or more XML elements 410 through 440 (defined by starting and ending tags with ( ⁇ /> symbols), arranged in substantially any order) that relate to one or more security items or data and provide information to facilitate security guidelines and configurations.
  • the security analysis schema 400 can then be deployed to various systems and/or components to control/adapt network access based upon the security contents specified therein.
  • a recommendations element can be provided having associated recommendations data. This can include suggestions as to how to adapt automation components and network devices for suitable security measures (e.g., in view of risk and cost criteria).
  • a suggestion can be in the form of a statement “All real time control devices and networks should only be connected to public networks via front-end server having virus detection, intrusion detection, and virtual private network capabilities.”
  • “Remote factory network devices must be identified, authorized, and authenticated before achieving access to control network, otherwise, local factory network devices should communicate with low-end encryption technologies.”
  • a plurality of such recommendations can be provided.
  • a topologies element can be provided.
  • topology data 414 can be in the form of symbols or codes that are employed to construct topology or network maps/displays via a visual or other type application.
  • configuration data can be provided.
  • This type of data can include settings or parameters for adapting network components with suitable security measures (e.g., communications module word three should be set to value 03AA Hex for extended security checking, set dip switch two on gateway to cause authentication and authorization procedures with outside network devices, install virus detection software on network server . . . ).
  • the configuration data can be sent or deployed to devices via the schema 400 and loaded to cause automatic configurations.
  • an applications procedure element can be provided having associated procedure data.
  • Such data can include the types of security applications to load, any security adjustments or settings relating to the applications, application status information to verify, and procedures for correctly operating respective security applications to mitigate potential attacks or threats.
  • policy data can be provided.
  • the policy can be general and/or specific, applied system wide and/or to a device or subset of devices. For example location-based policies can be initiated (e.g., all network requests from listed URL's are to be denied, network requests from Pittsburgh server limited to 100 per day). Time-based policies can also be defined (e.g., no outside network requests allowed between 10:00 AM and 2:00 PM). Process-based policies can be defined such as for example, “Limit outside network requests to below 50 during real time batch operations.” Other policies include load-based policies, whereby network requests that are responded to are regulated in accordance with an amount of desired network traffic (e.g., regulated according to requests/hour).
  • location-based policies can be initiated (e.g., all network requests from listed URL's are to be denied, network requests from Pittsburgh server limited to 100 per day). Time-based policies can also be defined (e.g., no outside network requests allowed between 10:00 AM and 2:00 PM). Process-based policies can be defined such as for example, “Limit outside
  • policies may be related to the type of requests (e.g., all requests to write data to the PLC are to be denied, outside devices cannot update analog module configuration data, communications module to provide status data only).
  • substantially any policy that defines, regulates, and/or limits network activities in view of security considerations can be employed with the present invention.
  • one or more security rules can be provided that have similar effects as the policies described above.
  • rules can be provided in an If/Then construct (can include else, else if, Boolean expressions and the like), wherein if a defined condition or conditions occur, then one or more listed actions result (can included nested constructs) (e.g., If more than 3 network access attempts are negotiated unsuccessfully, then deny further communications with node or address).
  • user procedure data can be provided. This can include actual procedure data and/or links to databases or websites to acquire the data. Such data can instruct users on suitable security procedures, security precautions, training, configurations, examples, wizards, manuals, trouble shooting, emergency contacts, contact information, maintenance, and the like which are designed to mitigate system security problems.
  • FIG. 5 illustrates a validation system 500 , methodology, and validation tools 550 , 560 in accordance with an aspect of the present invention.
  • the validation tools 550 and 560 perform initial and periodic live security assessment of a physical system. This enables security flaws or weaknesses to be identified.
  • One aspect of the tools is to check the system 500 prior to proposed or attempted security modifications in order to assess current security levels.
  • Another aspect is to check the system 500 for conformance—to the recommendations of a security analysis tool described above, and/or against standards such as ISO, for example.
  • the validation tools 550 and 560 can be executed on end devices 570 (host based), and/or executed as an independent device 580 that is attached to a network 590 (network based) at selected points.
  • One function of the host-validation tool 550 is to perform vulnerability scanning and/or auditing on devices. This includes revision checks, improper configuration check, file system/registry/database permissions check, user privilege/password and/or account policy checks, for example.
  • One function of the network validation tool 560 is to perform vulnerability scanning and auditing on the networks 590 . This includes checking for susceptibility to common network-based attacks, searching for open TCP/UDP ports, and scanning for vulnerable network services.
  • the tools 550 and 560 can also attempt to gain key identity information about end devices that may enable hacker entry.
  • Another function of the network validation tool 560 is to perform vulnerability scanning and auditing on firewalls, routers, and/or other security devices.
  • a complementary tool can be provided to assess CIP-based factory automation systems for security (includes substantially any factory protocol). This will typically be a network-based tool, since factory automation devices often are not as capable as general purpose computing devices.
  • the network validation tool 560 can also be operable in an assessment mode to discover system flaws with little or no configuration, and the tool can operate in a validation mode to check system security against security analysis methodology determinations described above. Still yet other functions can include non-destructively mapping a topology of IT and automation devices, checking revisions and configurations, checking user attributes, and/or checking access control lists.
  • the validation tools described herein can also be adapted to automatically correct security problems (e.g., automatically adjust security parameters, install new security components, remove suspicious components, and so forth). It is to be appreciated that one or more of the functions described herein for the host validation tool 550 may be shared/interchanged with the network validation tool 560 , and visa versa.
  • the validation analyzer 600 can be a hardware device, computer, processor, application, and/or combination thereof that process one or more security data inputs 610 such as can be received or communicated from a network (not shown).
  • the security data inputs 610 include current security data, network data, audit data, device data, security analysis data, and/or other data that can be derived from scanning or querying a network and associated devices via the validation analyzer 600 for information regarding current network security conditions.
  • Various components can be provided with the validation analyzer 600 to facilitate security monitoring and processing.
  • an assessment component 620 can be provided.
  • the assessment component 620 performs initial and/or periodic security determinations on network systems to identify security deficiencies or problems therein. For example, the assessment component 620 may compare a stored security configuration with a network configuration received from the security data inputs 610 , flag such conditions, and/or institute further actions if differences are detected.
  • a standards component 624 can be provided to perform security compliance checking. This can include automated checking prior to proposed or attempted network security modifications in order to assess current security levels. Compliance checking can also include determining conformance to other automated security analysis recommendations, conformance to applicable device/network security standards, and/or in accordance with predetermined or factory-specific standards, for example. Such checking can be in accordance with stored standards or procedures within the validation analyzer 600 , or can include remote checking to such resources as network databases, web sites, web services (e.g., databases linked to Internet Protocol Security Standard, IEEE database). It is noted that the assessment component 620 and/or standards component 624 can initiate vulnerability scanning and/or auditing on devices/networks/systems.
  • such checking can include comparisons to local/remote databases or sites as noted above.
  • a learning/analyzer component 628 can optionally be provided within the validation analyzer 600 .
  • This component can be adapted to learn network, device, and/or system patterns, scan current network data, and process the current network data in accordance with the learned patterns to possibly initiate other automated actions.
  • the learning/analyzer component 628 will be described in more detail below with respect to FIGS. 7-9 .
  • a flag or event can be fired that triggers an automated action component 650 , wherein one or more automated security actions can be initiated.
  • the automated security actions can include automatically correcting security problems at 654 such as automatically adjusting security parameters, altering network traffic patterns at 658 (e.g., increasing/decreasing communications with a node), installing new security components and/or removing/disabling suspicious components at 662 , firing alarms, and/or automatically notifying entities about detected problems and/or concerns at 670 , and/or generating security data at 674 such as generating an error or log file, generating a schema, generating data to re-configure or re-route network connections, updating a database or remote site, for example.
  • the validation analyzer 600 can be configured and interacted with via a user interface 680 having similar input and output functionality as described above with respect to the user interface depicted in FIG. 2 .
  • FIG. 7 illustrates a security learning system 700 in accordance with an aspect of the present invention.
  • the security learning system 700 that can include network-based aspects and/or host-based aspects and similar to some of the security aspects described above with respect to FIG. 5 .
  • a network-based security learning system 710 (also referred to as learning component 710 ) is provided that monitors an automation network 714 during a predetermined training period (e.g., monitor network activities for 1 month).
  • the learning component 710 monitors and learns activities or patterns such as:
  • Network activities can also include network requests that are received from outside networks 730 that may be routed through a security gateway or server 734 before reaching the automation network 714 .
  • the learning component 710 monitors the automation network 714 and/or assets 720 for detected deviations from data patterns learned during the training period. If desired, a user interface (not shown) can be provided, wherein one or more pattern thresholds can be adjusted (also can provide options for the type of data patterns to monitor/learn).
  • a threshold can be set via the user interface that triggers an alarm or causes an automated event to occur if a deviation is detected outside of the threshold (e.g., automatically disable all network requests from the other networks 730 if the number of network requests to the asset 720 exceeds a set or determined percentage of the average daily network requests detected during the training period).
  • the learning component 710 and associated detection parameters or thresholds can be provided as a network-based tool or tools that can reside at various portions of the automation network 714 .
  • the learning component can be provided as a host-based component as illustrated at 724 —depending on the resources available for the asset 720 .
  • Various learning functions and/or processes can be provided to facilitate automated learning within the learning components 710 and 724 .
  • This can include mathematical processes, statistical processes, functions, and/or algorithms and include more elaborate systems such as a neural network, for example.
  • artificial intelligence functions, components and/or processes can be provided.
  • Such components can include automated classifiers for monitoring and learning data patterns, wherein such classifiers include inference models, Hidden Markov Models (HMM), Bayesian models, Support Vector Machines (SVM), vector-based models, decision trees, and the like.
  • HMM Hidden Markov Models
  • SVM Support Vector Machines
  • FIG. 8 illustrates a learning component 800 in accordance with an aspect of the present invention.
  • the learning component 800 can be configured with various data types, circuits, algorithms, applications, and so forth that are adapted to learn from data or events generated from a training data set 810 .
  • the training data set 810 is derived by monitoring network or device activities over a predetermined timeframe. Such activities include network events, network data, network device activities, automations asset activities, and monitoring status information, for example.
  • the activities can also include network access patterns, network attempts, network sources, data transfer and exchange activities, network/device load considerations, time considerations, and location considerations, for example (e.g., what time does heaviest network traffic occur, where do most network requests originate, what regions do most hacking attempts originate).
  • the learning component 800 includes one or more learning models 820 and/or learning variables 830 .
  • the learning models 820 can include such aspects as neural network functions, inference models, mathematical models, statistical models, probabilistic models, classifiers, and so forth that learn network patterns or occurrences from the training data 810 .
  • the learning models can be adapted similarly (e.g., all models configured as Hidden Markov Models) or adapted in various combinations (e.g., 40 models configured as a neural network, 3 models adapted in a Bayesian configuration, 1 model configured as a vector-based classifier).
  • the learning variables 830 can be focused on selected events or circumstances.
  • a network load variable may record the average number of outside network requests per hour.
  • a PLC variable may record the average number of network retries that an associated PLC experiences in a given timeframe, whereas another PLC variable records the maximum number of network retries that the PLC experienced during the same timeframe.
  • the learning variables 820 may be employed as counters to record amounts for various events (e.g., record the number of PLC network transfers to I/O device over the last hour). As can be appreciated, a plurality of such variables can be defined and updated to log various network events during a selected training period. After training, the learning component 810 stores learned patterns or events that are then employed by a learning analyzer component described below to monitor and detect network security problems or identify potential security issues.
  • FIG. 9 illustrates a learning analyzer 900 in accordance with an aspect of the present invention.
  • the learning analyzer 900 monitors current network and/or device data 910 , determines whether the current data is within tolerance of historical data patterns that were previously learned/recorded, and initiates one or more automated actions 920 if current data 910 including trends derived therefrom are determined outside of the tolerance. These determinations can be achieved via a comparison analyzer 930 that compares learned data patterns with current data patterns 944 in accordance with threshold and/or range data illustrated at 950 . For example, a learned pattern 940 could be that between 11:00 and 12:00, network load between four network devices is about ten million data packet transfers.
  • the comparison analyzer 930 would detect this overload (e.g., via subtraction of current and learned data, then comparing to threshold data) and initiate the automated actions 920 .
  • the automated actions 920 can include automatically correcting security problems such as automatically adjusting security parameters, altering network traffic patterns, installing new security components, removing/disabling suspicious components, firing alarms, and/or automatically notifying entities about detected problems and/or concerns among other actions, for example.
  • security problems such as automatically adjusting security parameters, altering network traffic patterns, installing new security components, removing/disabling suspicious components, firing alarms, and/or automatically notifying entities about detected problems and/or concerns among other actions, for example.
  • the threshold data 950 can include range data thus providing upper and lower thresholds for given patterns.
  • a range can be specified to detect events that occur within or outside the selected range.
  • a range may have been specified as plus and minus one million transfers (do not have to be equidistant ranges), thus if current data patterns were detected to be above eleven million or below nine million transfers, then an automated action 920 would be initiated by the comparison analyzer 930 if current data patterns were outside the selected range of 10 million, +/ ⁇ 1 million transfers.
  • a plurality of thresholds and/or ranges 950 can be specified.
  • threshold and range data 950 can be specified in various formats (e.g., in accordance with standard deviation), and can include dynamically adjustable thresholds or ranges (e.g., set threshold high in the morning and lower in the afternoon, change threshold according to real time processing requirements).
  • the comparison analyzer 930 can also monitor, analyze, and detect deviations of stored variables 960 and current variables 964 in view of the threshold and range data 950 .
  • a user interface 970 having similar display/input functionality as previously described, can be provided to specify/adjust the threshold and/or range data 950 .
  • the user interface 970 can also interact with and control the learning analyzer 900 (e.g., set threshold or ranges, add, remove, adjust learning models, view analyzer status, configure automated actions, monitor variables, adjust variables, generate security reports and the like).
  • FIGS. 10-12 illustrate security methodologies in accordance with an aspect the present invention. While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated that the present invention is not limited by the order of acts, as some acts may, in accordance with the present invention, occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with the present invention.
  • FIG. 10 illustrates a security analysis process 1000 in accordance with an aspect of the present invention.
  • factory descriptions of automation assets, network devices, network topologies, and/or other factory data are generated.
  • Such data can include an abstract description of a factory, models, equations, maps, and network pathways to access the automation assets.
  • the descriptions can also include risk data, cost data, security data from other security tools, and partitioning or user data, for example.
  • the factory descriptions are processed such as via an object, application, security engine, ASIC, computer, web service, and so forth.
  • security output data is determined in accordance with the factory descriptions and processing described above.
  • the security output data can include a set or subset of recommended security components, codes, parameters, settings, related interconnection topology, connection configurations, application procedures, security policies, rules, user procedures, and/or user practices, for example, as noted above.
  • security output data is generated that can be automatically deployed to one or more entities such as users or devices in order to implement various security measures within an automation environment (e.g., data file or schema generated to automatically configure devices, provide user training and precautions, provide security configurations and topologies).
  • entities employ the security data to mitigate network security issues such as unwanted network access and/or network attack.
  • FIG. 11 illustrates a security validation process 1100 in accordance with an aspect of the present invention and includes host-based and/or network based processing as noted above.
  • security assessments are performed. This can include initial and/or periodic live security assessment of a physical system to identify security flaws or weaknesses.
  • security compliance tests are performed. This can include automated checking prior to proposed or attempted network security modifications in order to assess current security levels. Compliance checking can also include determining conformance to other automated security analysis recommendations, conformance to applicable device/network security standards, and/or in accordance with predetermined or factory-specific guidelines, for example.
  • vulnerability scanning and/or auditing on devices/networks is performed. This includes revision checks, improper configuration checks, file system/registry/database permissions checks, user privilege/password and/or account policy checks, checking for susceptibility to common network-based attacks, searching for open network ports, scanning for vulnerable network services, learning identity information about end devices/users that may enable hacker entry, performing vulnerability scanning and auditing on firewalls, routers, and/or other security devices, non-destructively mapping a topology of IT and automation devices, checking revisions and configurations, checking user attributes, and/or checking access control lists.
  • a determination is made as to whether security issues have been detected such as in accordance with the assessments, compliance testing, and scanning/auditing described above.
  • the process proceeds back to 1110 . If security issues are detected at 1124 , the process proceeds to 1134 .
  • one or more automated security actions are performed to mitigate security threats. This can include automatically correcting security problems such as automatically adjusting security parameters, altering network traffic patterns, installing new security components, removing suspicious components, firing alarms, and/or automatically notifying entities about detected problems and/or suspicions. After automated processing at 1134 , the process proceeds back to 1110 for further security processing, analysis, scanning, and detection.
  • FIG. 12 illustrates a security learning and detection process 1200 in accordance with an aspect of the present invention and can also include network-based aspects and/or host-based aspects as noted above.
  • one or more learning components such as learning models, learning systems, parameters, and/or variables are defined that describe various network and/or system properties. Such components can be adapted to determine statistical or pattern information regarding network and system activities.
  • This information can include the number, quantity or average of network requests to and from one or more assets or network devices, the type of requests (e.g., read/write, role/identity of person/system requesting access, time of requests, location of requests), status or counter data (e.g., network access counters, error codes), and/or substantially any data type or pattern that may be retrieved from a network, automation asset, or network device.
  • system learning is performed. This includes monitoring an automation network during a predetermined training period, wherein the learning components described above acquire information about network, system, user, and/or device activities during the training period. For example, a counter variable may learn the average number of network requests that are sent to an automation asset in a given time period (can also be other statistical measures than average).
  • an intelligent component such as a Bayesian inference model, probability determination, or neural network learns patterns such as “During heaviest network loads, the PLC responds to 25% fewer requests, and during real time processing operations, 35% fewer requests for a maximum of 23 requests per minute processed during such periods, +/ ⁇ 1 standard deviation.”
  • learned patterns are compared to current data patterns in view of predetermined threshold or range settings at 1218 .
  • the mean number of factory network packets transmitted is learned to be about 20,000 bytes per/second, +/ ⁇ 5000 bytes, and a range is set up so that if network traffic goes above 26,000 bytes per second or below 10,000 bytes per second, then system security performance is considered acceptable as long as network traffic remains in the selected range.
  • thresholds/ranges can be set according to user desires, automated determinations, and/or according to the amount of risk and/or costs that are deemed acceptable (e.g., for lesser amount of security risk, set thresholds closer to learned patterns).
  • security problems such as automatically adjusting security parameters, altering network traffic patterns, installing new security components, removing suspicious components, firing alarms, and/or automatically notifying entities about detected problems and/or suspicions (e.g., sending an e

Abstract

The present invention relates to a system and methodology facilitating automation security in a networked-based industrial controller environment. Various components, systems and methodologies are provided to facilitate varying levels of automation security in accordance with security analysis tools, security validation tools and/or security learning systems. The security analysis tool receives abstract factory models or descriptions for input and generates an output that can include security guidelines, components, topologies, procedures, rules, policies, and the like for deployment in an automation security network. The validation tools are operative in the automation security network, wherein the tools perform security checking and/or auditing functions, for example, to determine if security components are in place and/or in suitable working order. The security learning system monitors/learns network traffic patterns during a learning phase, fires alarms or events based upon detected deviations from the learned patterns, and/or causes other automated actions to occur.

Description

    REFERENCE TO RELATED APPLICATION(S)
  • This application is a continuation of, and claims priority to, U.S. patent application Ser. No. 10/661,696, filed on Sep. 12, 2003, and entitled “SYSTEM AND METHODOLOGY PROVIDING AUTOMATION SECURITY ANALYSIS, VALIDATION, AND LEARNING IN AN INDUSTRIAL CONTROLLER ENVIRONMENT,” which claims the benefit of U.S. Provisional Patent Application Ser. No. 60/420,006, filed Oct. 21, 2002, and entitled “SYSTEM AND METHODOLOGY PROVIDING AUTOMATION SECURITY IN AN INDUSTRIAL CONTROLLER ENVIRONMENT.” The entireties of these related applications are incorporated herein by reference.
  • TECHNICAL FIELD
  • The present invention relates generally to industrial control systems, and more particularly to a system and methodology to facilitate electronic and network security in an industrial automation system.
  • BACKGROUND OF THE INVENTION
  • Industrial controllers are special-purpose computers utilized for controlling industrial processes, manufacturing equipment, and other factory automation, such as data collection or networked systems. In accordance with a control program, the industrial controller, having an associated processor (or processors), measures one or more process variables or inputs reflecting the status of a controlled system, and changes outputs effecting control of such system. The inputs and outputs may be binary, (e.g., on or off), as well as analog inputs and outputs assuming a continuous range of values.
  • Measured inputs received from such systems and the outputs transmitted by the systems generally pass through one or more input/output (I/O) modules. These I/O modules serve as an electrical interface to the controller and may be located proximate or remote from the controller including remote network interfaces to associated systems. Inputs and outputs may be recorded in an I/O table in processor memory, wherein input values may be asynchronously read from one or more input modules and output values written to the I/O table for subsequent communication to the control system by specialized communications circuitry (e.g., back plane interface, communications module). Output modules may interface directly with one or more control elements, by receiving an output from the I/O table to control a device such as a motor, valve, solenoid, amplifier, and the like.
  • At the core of the industrial control system, is a logic processor such as a Programmable Logic Controller (PLC) or PC-based controller. Programmable Logic Controllers for instance, are programmed by systems designers to operate manufacturing processes via user-designed logic programs or user programs. The user programs are stored in memory and generally executed by the PLC in a sequential manner although instruction jumping, looping and interrupt routines, for example, are also common. Associated with the user program are a plurality of memory elements or variables that provide dynamics to PLC operations and programs. These variables can be user-defined and can be defined as bits, bytes, words, integers, floating point numbers, timers, counters and/or other data types to name but a few examples.
  • Various remote applications or systems often attempt to update and/or acquire PLC information or related device information via a plurality of different, competing and often incompatible or insecure network technologies. A major concern with this type of access to PLC's and control systems in general, relates to the amount of security that is provided when sending or receiving data to and from the PLC and/or associated equipment. In most factories or industrial environments, complex and sometimes dangerous operations are performed in a given manufacturing setting. Thus, if a network-connected controller were inadvertently accessed, or even worse, intentional sabotage were to occur by a rogue machine or individual, potentially harmful results can occur.
  • One attempt at providing security in industrial control systems relates to simple password protection to limit access to the systems. This can take the form of a plant or controls Engineer or Administrator entering an alpha-numeric string that is typed by an operator each time access is attempted, wherein the controller grants access based on a successful typing of the password. These type passwords are highly prone to attack or discovery, however. Often times, users employ passwords that are relatively easy to determine (e.g., person's name or birthday). Sometimes, users exchange passwords with other users, whereby the password is overheard or simply, a user with improper authorization comes in contact with the password. Even if a somewhat higher level of security is provided, parties employing sophisticated hacking techniques can often penetrate sensitive control systems, whereby access should be limited to authorized users and/or systems in order to mitigate potentially harmful consequences.
  • SUMMARY OF THE INVENTION
  • The following presents a simplified summary of the invention in order to provide a basic understanding of some aspects of the invention. This summary is not an extensive overview of the invention. It is intended to neither identify key or critical elements of the invention nor delineate the scope of the invention. Its sole purpose is to present some concepts of the invention in a simplified form as a prelude to the more detailed description that is presented later.
  • The present invention relates to a system and methodology to facilitate network and/or automation device security in an industrial automation environment. Various systems and methodologies are provided to promote security across and/or within networks and in accordance with different automation device capabilities. In one aspect of the present invention, a Security Analysis Methodology (SAM) and tool provides an automated process, component, and tool that generates a set (or subset) of security guidelines, security data, and/or security components. An input to the tool can be in the form of an abstract description or model of a factory, wherein the factory description includes one or more assets to be protected and associated pathways to access the assets. Security data generated by the tool includes a set of recommended security components, related interconnection topology, connection configurations, application procedures, security policies, rules, user procedures, and/or user practices, for example.
  • SAM can be modeled on a risk-based/cost-based approach, if desired. A suitable level of protection can be determined to facilitate integrity, privacy, and/or availability of assets based on risk and/or cost. In addition, descriptions of shop floor access, Intranet access, Internet access, and/or wireless access can also be processed by the tool. Since multiparty involvement can be accommodated (IT, Manufacturing, Engineering, etc.), the tool can be adapted for partitioned security specification entry and sign-off. The security data of the SAM tool can be generated in a structured security data format (e.g., XML, SQL) that facilitates further validation and compliance checking of the security data, if desired.
  • In another aspect of the present invention, a security Validation Methodology and associated tools can be provided. The validation tools perform initial and periodic live security assessment of a physical system. This enables security flaws or weaknesses to be identified. One aspect of the tools is to check a system prior to security modifications in order to assess current security levels. Another aspect is to check a system for conformance—either to recommendations of a security analysis, and/or against standards such as ISO, for example. The validation tools can be executed on end devices (host based), and/or executed as an independent device that is operatively coupled to a network (network based) at selected points. One function of host-validation tools is to perform vulnerability scanning and/or auditing on devices. This includes revision checks, improper configuration check, file system/registry/database permissions check, user privilege/password and/or account policy checks, for example.
  • One function of the network validation tools is to perform vulnerability scanning and auditing on the networks. This includes checking for susceptibility to common network-based attacks, searching for open TCP/UDP ports, and scanning for vulnerable network services. The tools can also attempt to gain key identity information about end devices that may enable hacker entry. Another function of the network validation tools is to perform vulnerability scanning and auditing on firewalls, routers, and/or other network/security devices. In addition, a complementary tool can be provided to assess CIP-based factory automation systems for security. This will typically be a network-based tool, since factory automation devices often are not as capable as general purpose computing devices. The tool can also be operable in an assessment mode to discover system flaws with little or no configuration, and the tool can operate in a validation mode to check system security against security analysis methodology determinations described above. Still yet other functions can include non-destructively mapping a topology of IT and automation devices, checking revisions and configurations, checking user attributes, and/or checking access control lists. The validation tools described herein can also be adapted to automatically correct security problems (e.g., automatically adjust security parameters/rules/policies, install new security components, remove suspicious components, and so forth).
  • According to another aspect of the present invention, a Security Learning system is provided that can include network-based aspects and/or host-based aspects and similar to some of the security aspects described above with respect to the Validation tools. A network-based security learning system (also referred to as learning component) is provided that monitors an automation network during a predetermined training period (e.g., monitor network activities for 1 week). During the training period, the learning component monitors and learns activities or patterns such as: the number of network requests to and from one or more assets; the type of requests (e.g., read/write, role/identity of person/system requesting access, time of requests); status or counter data (e.g., network access counters, error codes) which can be provided or queried from a learning or status component within the asset; and/or monitor and learn about substantially any data type or pattern that may be retrieved from the network and/or the asset.
  • After the training period, the learning component monitors the automation network and/or assets for detected deviations from data patterns learned during the training period. If desired, a user interface can be provided, wherein one or more pattern thresholds can be adjusted (also can provide options for the type of data patterns to monitor/learn). For example, if the number of network requests to the asset has been monitored and learned to be about 1000 requests per hour during the past month, then a threshold can be set via the user interface that triggers an alarm or causes an automated event to occur if a deviation is detected outside of the threshold (e.g., automatically disable all network requests from the other networks if the number of network requests to the asset exceeds 10% of the average daily network requests detected during the training period).
  • Various learning functions and/or processes can be provided to facilitate automated learning within the learning components. This can include mathematical processes, statistical processes, functions, and/or algorithms and include more elaborate systems such as a neural network, for example. In addition, artificial intelligence functions, components and/or processes can be provided. Such components can include automated classifiers for monitoring and learning data patterns, wherein such classifiers include inference models, Hidden Markov Models (HMM), Bayesian models, Support Vector Machines (SVM), vector-based models, decision trees, and the like.
  • The following description and the annexed drawings set forth in detail certain illustrative aspects of the invention. These aspects are indicative, however, of but a few of the various ways in which the principles of the invention may be employed and the present invention is intended to include all such aspects and their equivalents. Other advantages and novel features of the invention will become apparent from the following detailed description of the invention when considered in conjunction with the drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic block diagram illustrating automation security tools in accordance with an aspect of the present invention.
  • FIG. 2 is a schematic block diagram illustrating a security analysis tool in accordance with an aspect of the present invention.
  • FIG. 3 is a diagram illustrating an example security analyzer in accordance with an aspect of the present invention.
  • FIG. 4 is a diagram illustrating an example security analysis schema in accordance with an aspect of the present invention.
  • FIG. 5 is a diagram illustrating a validation system, methodology, and security validation tools in accordance with an aspect of the present invention.
  • FIG. 6 is a schematic block diagram illustrating a validation analyzer in accordance with an aspect of the present invention.
  • FIG. 7 is a schematic block diagram illustrating a security learning system in accordance with an aspect of the present invention.
  • FIG. 8 is a diagram illustrating a learning component in accordance with an aspect of the present invention.
  • FIG. 9 is a schematic block diagram illustrating a learning analyzer in accordance with an aspect of the present invention.
  • FIG. 10 is a flow diagram illustrating security analysis processing in accordance with an aspect of the present invention.
  • FIG. 11 is a flow diagram illustrating security validation processing in accordance with an aspect of the present invention.
  • FIG. 12 is a flow diagram illustrating security learning and detection processing in accordance with an aspect of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention relates to a system and methodology facilitating automation security in a networked-based industrial controller environment. Various components, systems and methodologies are provided to facilitate varying levels of automation security in accordance with security analysis tools, security validation tools and/or security learning systems. The security analysis tool receives abstract factory models or descriptions for input and generates an output that can include security guidelines, components, topologies, procedures, rules, policies, and the like for deployment in an automation security network. The validation tools are operative in the automation security network, wherein the tools perform security checking and/or auditing functions, for example, to determine if security components are in place and/or in suitable working order. The security learning system monitors/learns network traffic patterns during a learning phase, fires alarms or events based upon detected deviations from the learned patterns, and/or causes other automated actions to occur.
  • It is noted that as used in this application, terms such as “component,” “tool,” “analyzer, ” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution as applied to an automation system for industrial control. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program and a computer. By way of illustration, both an application running on a server and the server can be components. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers, industrial controllers, and/or modules communicating therewith.
  • Referring initially to FIG. 1, a system 100 illustrates various automation security tools in accordance with an aspect of the present invention. One or more automation assets 120 communicate and cooperate with various network devices 124 across a network 130. The automation assets 120 include substantially any type of control, communications module, computer, I/O device, Human Machine Interface (HMI)) that communicate via the network 130 which includes control, automation, and/or public networks. In one example, the automation assets 120 include Programmable Logic Controllers (PLC) that can also communicate to and control various other assets such as Input/Output modules including Analog, Digital, Programmed/Intelligent I/O modules, other programmable controllers, communications modules, and the like. The network 130 includes public networks such as the Internet, Intranets, and automation networks such as Control and Information Protocol (CIP) networks including DeviceNet and ControlNet. Other networks 130 include Ethernet, DH/DH+, Remote I/O, Fieldbus, Modbus, Profibus, wireless networks, serial protocols, and so forth. In addition to the automation assets 120, the network devices 124 include various possibilities (hardware and/or software components). These include components such as switches with virtual local area network (VLAN) capability, LANs, WANs, proxies, gateways, routers, firewalls, virtual private network (VPN) devices, intrusion detection systems, servers, clients, computers, configuration tools, monitoring tools, and/or other devices.
  • According to one aspect of the present invention, various security tools can be provided with the system 100. Although three tools are illustrated, it is to be appreciated that more or less than three tools can be employed with the present invention and in a plurality of similar or different combinations. In one aspect, a security analysis tool 140 is provided that receives factory input data 144 describing or modeling various aspects of the automation assets 120, network devices 124, network 130, and/or system 100. The security analysis tool 140 processes the factory input data 144 and generates security output data 150 which is then deployed to machines and/or users in order to facilitate suitable network security measures and practices in the system 100. As will be described in more detail below, such measures can include security recommendations, configuration guidelines or adjustments, procedures, rules, policies, and security parameters, for example, that are utilized to mitigate unwanted intrusions or attacks from the network 130 that may affect the automation assets 120 and/or network devices 124.
  • In another aspect of the present invention, one or more validation tools 160 can be provided (can be host and/or networked based) that perform automated security auditing and checking functions on the network 130, the automation assets 120, and/or network devices 124 to determine if suitable security standards have been implemented. The validation tools also perform periodic or monitored assessments within the system 100 to determine if potential network threats or attacks are at hand. As will be described in more detail below, this can include automated and/or healing operations to mitigate network security threats. In another aspect of the present invention, one or more learning tools 170 can be provided (can also be host and/or networked based) that learn system activities or patterns during a training or configuration period, then perform automated actions in response to detected deviations from the learned activities or patterns. Such automated actions can include altering network activity (e.g., preventing further network attempts to automation assets or network devices) and firing an alarm such as an e-mail or pager to notify an entity (user and/or machine) of a potential or detected problem.
  • It is noted that the security tools 140, 150 and/or 160 can share or exchange information between tools. For example, the security analysis tool 140 can receive input from the validation tool 160 (e.g., three new network devices detected in topology), wherein the security analysis tool generates new or adjusted security output data 150 in response thereto. It is further noted that one or more of the automation assets 120 may directly access the network 130 and/or may employ the network devices 124 to achieve network access.
  • Turning to FIG. 2, a security analysis tool 200 is illustrated in accordance with an aspect of the present invention. The security analysis tool 200 operates on a computer or workstation and receives one or more factory inputs 210 that can be generated from a plurality of sources. Such sources can include user input, model input (e.g., asset models, network models), schemas, formulas, equations, maps, and codes, for example. The factory inputs 210 are then processed by the security analysis tool 200 to generate one or more security outputs 220 which can also be provided in various forms such as manuals, documents, schemas, executables, codes, e-mails, and/or other electronic data that is described in more detail below. As illustrated, a Graphical User Interface 230 (GUI) or interface application can be provided to interact with the security analysis tool 200, factory inputs 210, and/or security outputs 220. This can include substantially any type of application that sends, retrieves, processes, and/or manipulates factory input data 210, receives, displays, formats, and/or communicates security output data 220, and/or facilitates operation of the security analysis tool 200. For example, such interfaces 230 can also be associated with an engine, editor tool or web browser although other type applications can be utilized. The GUI 230 includes a display 234 having one or more display objects (not shown) including such aspects as configurable icons, buttons, sliders, input boxes, selection options, menus, tabs and so forth having multiple configurable dimensions, shapes, colors, text, data and sounds to facilitate operations with the security analysis tool 200. In addition, the GUI 230 can also include a plurality of other inputs 240 or controls for adjusting and configuring one or more aspects of the present invention. This can include receiving user commands from a mouse, keyboard, speech input, web site, remote web service and/or other device such as a camera or video input to affect or modify operations of the GUI 230.
  • Referring now to FIG. 3, an example security analyzer 300 is illustrated in accordance with an aspect of the present invention. The security analyzer 300 can be an automated process, application, component, and/or tool that generates a set of security guidelines or security data 310 and executes a Security Analysis Method (SAM) in accordance with the present invention. An input to the security analyzer 300 is an abstract description of a factory depicted as factory data 320. The factory data 320 can describe or model one or more automation assets to be protected and associated network pathways to access the assets. Other factory data 320 can include risk data, cost data, security feedback from other security tools, network access patterns, and partitioning data, for example. Security data 310 generated by the security analyzer 300 includes a set of recommended security components, related interconnection topology, connection configurations, application procedures, security policies, rules, user procedures, and/or user practices, for example, that is employed to guide users and adapt systems with various security measures.
  • The Security Analysis Method noted above, and security analyzer 300 can also be modeled on a risk-based/cost-based approach, if desired. A suitable level of protection can be determined to facilitate integrity, privacy, and/or availability of assets based on risk and/or cost. Thus, security parameters, policies, and procedures, for example, can be increased if lower security risks and associated costs are desired, whereas security measures can be decreased if higher risks and/or costs associated with network attacks or intrusions are deemed acceptable. In addition, descriptions of shop floor access, Intranet access, Internet access, wireless access and/or other network access patterns can also be described as factory data 320 and processed by the security analyzer 300. Since multiple party involvement can be accommodated (e.g., IT, Manufacturing, Engineering, etc.), the security analyzer 300 can be adapted for partitioned security specification entry and sign-off. The security data 310 can be generated in a structured security data format (e.g., XML, SQL) that facilitates further validation and compliance checking of the security data, if desired. As illustrated, a security analysis schema 330 which is described in more detail below, can be derived from the security data 310 and can be provided to other entities such as users or machines for further security processing/implementations.
  • FIG. 4 illustrates an exemplary schema that may be employed for security deployments, communications, and configurations in accordance with the present invention. Although the schema represents one possible manner in which to transfer data to and from an entity such as a user, interface, file, an automation component and associated network devices, it is to be appreciated that other possible data transfer mechanisms may be employed. For example, data can be transmitted in the form of binary or other type data packets that convey information in accordance with the present invention.
  • Referring to FIG. 4, an example security analysis schema 400 is illustrated in accordance with an aspect of the present invention. The security analysis schema 400 includes one or more XML elements 410 through 440 (defined by starting and ending tags with (</> symbols), arranged in substantially any order) that relate to one or more security items or data and provide information to facilitate security guidelines and configurations. Although not shown, the XML elements and associated tags can also include attribute information if desired, wherein an attribute is a name-value pair associated with an element start tag (e.g., <topology=“PLC connected to gateway device having firewall protection”>). The security analysis schema 400 can then be deployed to various systems and/or components to control/adapt network access based upon the security contents specified therein.
  • Proceeding to 410, a recommendations element can be provided having associated recommendations data. This can include suggestions as to how to adapt automation components and network devices for suitable security measures (e.g., in view of risk and cost criteria). In one example, a suggestion can be in the form of a statement “All real time control devices and networks should only be connected to public networks via front-end server having virus detection, intrusion detection, and virtual private network capabilities.” In another example, “Remote factory network devices must be identified, authorized, and authenticated before achieving access to control network, otherwise, local factory network devices should communicate with low-end encryption technologies.” As can be appreciated, a plurality of such recommendations can be provided. At 414, a topologies element can be provided. This can include information on how to interconnect various devices and networks to achieve desired security goals (e.g., PLC connects to router, router connects to factory server and protected gateway . . . ). In another aspect, the topology data 414 can be in the form of symbols or codes that are employed to construct topology or network maps/displays via a visual or other type application.
  • At 420, configuration data can be provided. This type of data can include settings or parameters for adapting network components with suitable security measures (e.g., communications module word three should be set to value 03AA Hex for extended security checking, set dip switch two on gateway to cause authentication and authorization procedures with outside network devices, install virus detection software on network server . . . ). In another aspect, the configuration data can be sent or deployed to devices via the schema 400 and loaded to cause automatic configurations. At 424, an applications procedure element can be provided having associated procedure data. Such data can include the types of security applications to load, any security adjustments or settings relating to the applications, application status information to verify, and procedures for correctly operating respective security applications to mitigate potential attacks or threats.
  • At 430, policy data can be provided. The policy can be general and/or specific, applied system wide and/or to a device or subset of devices. For example location-based policies can be initiated (e.g., all network requests from listed URL's are to be denied, network requests from Pittsburgh server limited to 100 per day). Time-based policies can also be defined (e.g., no outside network requests allowed between 10:00 AM and 2:00 PM). Process-based policies can be defined such as for example, “Limit outside network requests to below 50 during real time batch operations.” Other policies include load-based policies, whereby network requests that are responded to are regulated in accordance with an amount of desired network traffic (e.g., regulated according to requests/hour). Other policies may be related to the type of requests (e.g., all requests to write data to the PLC are to be denied, outside devices cannot update analog module configuration data, communications module to provide status data only). In general, substantially any policy that defines, regulates, and/or limits network activities in view of security considerations can be employed with the present invention.
  • At 434, one or more security rules can be provided that have similar effects as the policies described above. For example, rules can be provided in an If/Then construct (can include else, else if, Boolean expressions and the like), wherein if a defined condition or conditions occur, then one or more listed actions result (can included nested constructs) (e.g., If more than 3 network access attempts are negotiated unsuccessfully, then deny further communications with node or address). At 440, user procedure data can be provided. This can include actual procedure data and/or links to databases or websites to acquire the data. Such data can instruct users on suitable security procedures, security precautions, training, configurations, examples, wizards, manuals, trouble shooting, emergency contacts, contact information, maintenance, and the like which are designed to mitigate system security problems.
  • FIG. 5 illustrates a validation system 500, methodology, and validation tools 550, 560 in accordance with an aspect of the present invention. The validation tools 550 and 560 perform initial and periodic live security assessment of a physical system. This enables security flaws or weaknesses to be identified. One aspect of the tools is to check the system 500 prior to proposed or attempted security modifications in order to assess current security levels. Another aspect is to check the system 500 for conformance—to the recommendations of a security analysis tool described above, and/or against standards such as ISO, for example.
  • The validation tools 550 and 560 can be executed on end devices 570 (host based), and/or executed as an independent device 580 that is attached to a network 590 (network based) at selected points. One function of the host-validation tool 550 is to perform vulnerability scanning and/or auditing on devices. This includes revision checks, improper configuration check, file system/registry/database permissions check, user privilege/password and/or account policy checks, for example.
  • One function of the network validation tool 560 is to perform vulnerability scanning and auditing on the networks 590. This includes checking for susceptibility to common network-based attacks, searching for open TCP/UDP ports, and scanning for vulnerable network services. The tools 550 and 560 can also attempt to gain key identity information about end devices that may enable hacker entry.
  • Another function of the network validation tool 560 is to perform vulnerability scanning and auditing on firewalls, routers, and/or other security devices. In addition, a complementary tool can be provided to assess CIP-based factory automation systems for security (includes substantially any factory protocol). This will typically be a network-based tool, since factory automation devices often are not as capable as general purpose computing devices. The network validation tool 560 can also be operable in an assessment mode to discover system flaws with little or no configuration, and the tool can operate in a validation mode to check system security against security analysis methodology determinations described above. Still yet other functions can include non-destructively mapping a topology of IT and automation devices, checking revisions and configurations, checking user attributes, and/or checking access control lists. The validation tools described herein can also be adapted to automatically correct security problems (e.g., automatically adjust security parameters, install new security components, remove suspicious components, and so forth). It is to be appreciated that one or more of the functions described herein for the host validation tool 550 may be shared/interchanged with the network validation tool 560, and visa versa.
  • Referring now to FIG. 6, a validation analyzer 600 is illustrated in accordance with an aspect of the present invention. The validation analyzer 600 can be a hardware device, computer, processor, application, and/or combination thereof that process one or more security data inputs 610 such as can be received or communicated from a network (not shown). The security data inputs 610 include current security data, network data, audit data, device data, security analysis data, and/or other data that can be derived from scanning or querying a network and associated devices via the validation analyzer 600 for information regarding current network security conditions. Various components can be provided with the validation analyzer 600 to facilitate security monitoring and processing. In one aspect, an assessment component 620 can be provided. The assessment component 620 performs initial and/or periodic security determinations on network systems to identify security deficiencies or problems therein. For example, the assessment component 620 may compare a stored security configuration with a network configuration received from the security data inputs 610, flag such conditions, and/or institute further actions if differences are detected.
  • In another aspect, a standards component 624 can be provided to perform security compliance checking. This can include automated checking prior to proposed or attempted network security modifications in order to assess current security levels. Compliance checking can also include determining conformance to other automated security analysis recommendations, conformance to applicable device/network security standards, and/or in accordance with predetermined or factory-specific standards, for example. Such checking can be in accordance with stored standards or procedures within the validation analyzer 600, or can include remote checking to such resources as network databases, web sites, web services (e.g., databases linked to Internet Protocol Security Standard, IEEE database). It is noted that the assessment component 620 and/or standards component 624 can initiate vulnerability scanning and/or auditing on devices/networks/systems. This can include revision checks, improper configuration checks, file system/registry/database permissions checks, user privilege/password and/or account policy checks, checking for susceptibility to network-based attacks, searching for open network ports, scanning for vulnerable network services, learning identity information about end devices/users that may enable attack entry, performing vulnerability scanning and auditing on firewalls, routers, and/or other security devices or components, non-destructively mapping a topology of network devices, checking revisions and configurations, checking user attributes, and/or checking network/device access control lists. As can be appreciated, such checking can include comparisons to local/remote databases or sites as noted above.
  • In yet another aspect of the present invention, a learning/analyzer component 628 can optionally be provided within the validation analyzer 600. This component can be adapted to learn network, device, and/or system patterns, scan current network data, and process the current network data in accordance with the learned patterns to possibly initiate other automated actions. The learning/analyzer component 628 will be described in more detail below with respect to FIGS. 7-9.
  • If a security issue or problem is detected by the assessment component 620, standards component 624, and/or learning/analyzer component 628, a flag or event can be fired that triggers an automated action component 650, wherein one or more automated security actions can be initiated. The automated security actions can include automatically correcting security problems at 654 such as automatically adjusting security parameters, altering network traffic patterns at 658 (e.g., increasing/decreasing communications with a node), installing new security components and/or removing/disabling suspicious components at 662, firing alarms, and/or automatically notifying entities about detected problems and/or concerns at 670, and/or generating security data at 674 such as generating an error or log file, generating a schema, generating data to re-configure or re-route network connections, updating a database or remote site, for example. As illustrated, the validation analyzer 600 can be configured and interacted with via a user interface 680 having similar input and output functionality as described above with respect to the user interface depicted in FIG. 2.
  • FIG. 7 illustrates a security learning system 700 in accordance with an aspect of the present invention. The security learning system 700 that can include network-based aspects and/or host-based aspects and similar to some of the security aspects described above with respect to FIG. 5. A network-based security learning system 710 (also referred to as learning component 710) is provided that monitors an automation network 714 during a predetermined training period (e.g., monitor network activities for 1 month).
  • During the training period, the learning component 710 monitors and learns activities or patterns such as:
      • The number of network requests to and from one or more assets 720;
      • the type of requests (e.g., read/write, role/identity of person/system requesting access, time of requests);
      • status or counter data (e.g., network access counters, error codes) which can be provided or queried from a learning or status component 724 within the asset 720;
        and/or
      • monitor and learn about substantially any data type or pattern that may be retrieved from the network 714 and/or the asset 720.
  • Network activities can also include network requests that are received from outside networks 730 that may be routed through a security gateway or server 734 before reaching the automation network 714.
  • After the training period, the learning component 710 monitors the automation network 714 and/or assets 720 for detected deviations from data patterns learned during the training period. If desired, a user interface (not shown) can be provided, wherein one or more pattern thresholds can be adjusted (also can provide options for the type of data patterns to monitor/learn). For example, if the number of network requests to the asset 720 has been monitored and learned to be about 1000 requests per hour during the past month, then a threshold can be set via the user interface that triggers an alarm or causes an automated event to occur if a deviation is detected outside of the threshold (e.g., automatically disable all network requests from the other networks 730 if the number of network requests to the asset 720 exceeds a set or determined percentage of the average daily network requests detected during the training period).
  • In one aspect, the learning component 710 and associated detection parameters or thresholds can be provided as a network-based tool or tools that can reside at various portions of the automation network 714. In another aspect, the learning component can be provided as a host-based component as illustrated at 724—depending on the resources available for the asset 720.
  • Various learning functions and/or processes can be provided to facilitate automated learning within the learning components 710 and 724. This can include mathematical processes, statistical processes, functions, and/or algorithms and include more elaborate systems such as a neural network, for example. In addition, artificial intelligence functions, components and/or processes can be provided. Such components can include automated classifiers for monitoring and learning data patterns, wherein such classifiers include inference models, Hidden Markov Models (HMM), Bayesian models, Support Vector Machines (SVM), vector-based models, decision trees, and the like.
  • FIG. 8 illustrates a learning component 800 in accordance with an aspect of the present invention. The learning component 800 can be configured with various data types, circuits, algorithms, applications, and so forth that are adapted to learn from data or events generated from a training data set 810. The training data set 810 is derived by monitoring network or device activities over a predetermined timeframe. Such activities include network events, network data, network device activities, automations asset activities, and monitoring status information, for example. The activities can also include network access patterns, network attempts, network sources, data transfer and exchange activities, network/device load considerations, time considerations, and location considerations, for example (e.g., what time does heaviest network traffic occur, where do most network requests originate, what regions do most hacking attempts originate).
  • In order to process the training data 810, the learning component 800 includes one or more learning models 820 and/or learning variables 830. As noted above, the learning models 820 can include such aspects as neural network functions, inference models, mathematical models, statistical models, probabilistic models, classifiers, and so forth that learn network patterns or occurrences from the training data 810. It is also noted that the learning models can be adapted similarly (e.g., all models configured as Hidden Markov Models) or adapted in various combinations (e.g., 40 models configured as a neural network, 3 models adapted in a Bayesian configuration, 1 model configured as a vector-based classifier). The learning variables 830 can be focused on selected events or circumstances. For example, a network load variable may record the average number of outside network requests per hour. In another example, a PLC variable may record the average number of network retries that an associated PLC experiences in a given timeframe, whereas another PLC variable records the maximum number of network retries that the PLC experienced during the same timeframe. In another aspect, the learning variables 820 may be employed as counters to record amounts for various events (e.g., record the number of PLC network transfers to I/O device over the last hour). As can be appreciated, a plurality of such variables can be defined and updated to log various network events during a selected training period. After training, the learning component 810 stores learned patterns or events that are then employed by a learning analyzer component described below to monitor and detect network security problems or identify potential security issues.
  • FIG. 9 illustrates a learning analyzer 900 in accordance with an aspect of the present invention. The learning analyzer 900 monitors current network and/or device data 910, determines whether the current data is within tolerance of historical data patterns that were previously learned/recorded, and initiates one or more automated actions 920 if current data 910 including trends derived therefrom are determined outside of the tolerance. These determinations can be achieved via a comparison analyzer 930 that compares learned data patterns with current data patterns 944 in accordance with threshold and/or range data illustrated at 950. For example, a learned pattern 940 could be that between 11:00 and 12:00, network load between four network devices is about ten million data packet transfers. Thus, if a threshold 950 were set for one million transfers, and if current data patterns 944 exceeded more than one million transfers above the learned data patterns 940 (ten million transfers during the selected period), then the comparison analyzer 930 would detect this overload (e.g., via subtraction of current and learned data, then comparing to threshold data) and initiate the automated actions 920.
  • Similar to the validation components described above, the automated actions 920 can include automatically correcting security problems such as automatically adjusting security parameters, altering network traffic patterns, installing new security components, removing/disabling suspicious components, firing alarms, and/or automatically notifying entities about detected problems and/or concerns among other actions, for example.
  • In another aspect, the threshold data 950 can include range data thus providing upper and lower thresholds for given patterns. For example, a range can be specified to detect events that occur within or outside the selected range. In the example above, a range may have been specified as plus and minus one million transfers (do not have to be equidistant ranges), thus if current data patterns were detected to be above eleven million or below nine million transfers, then an automated action 920 would be initiated by the comparison analyzer 930 if current data patterns were outside the selected range of 10 million, +/−1 million transfers. As can be appreciated, a plurality of thresholds and/or ranges 950 can be specified. In addition, the threshold and range data 950 can be specified in various formats (e.g., in accordance with standard deviation), and can include dynamically adjustable thresholds or ranges (e.g., set threshold high in the morning and lower in the afternoon, change threshold according to real time processing requirements).
  • As illustrated, the comparison analyzer 930 can also monitor, analyze, and detect deviations of stored variables 960 and current variables 964 in view of the threshold and range data 950. A user interface 970, having similar display/input functionality as previously described, can be provided to specify/adjust the threshold and/or range data 950. The user interface 970 can also interact with and control the learning analyzer 900 (e.g., set threshold or ranges, add, remove, adjust learning models, view analyzer status, configure automated actions, monitor variables, adjust variables, generate security reports and the like).
  • FIGS. 10-12 illustrate security methodologies in accordance with an aspect the present invention. While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated that the present invention is not limited by the order of acts, as some acts may, in accordance with the present invention, occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with the present invention.
  • FIG. 10 illustrates a security analysis process 1000 in accordance with an aspect of the present invention. Proceeding to 1010, factory descriptions of automation assets, network devices, network topologies, and/or other factory data are generated. Such data can include an abstract description of a factory, models, equations, maps, and network pathways to access the automation assets. The descriptions can also include risk data, cost data, security data from other security tools, and partitioning or user data, for example. At 1018, the factory descriptions are processed such as via an object, application, security engine, ASIC, computer, web service, and so forth.
  • At 1022, security output data is determined in accordance with the factory descriptions and processing described above. The security output data can include a set or subset of recommended security components, codes, parameters, settings, related interconnection topology, connection configurations, application procedures, security policies, rules, user procedures, and/or user practices, for example, as noted above. At 1026, security output data is generated that can be automatically deployed to one or more entities such as users or devices in order to implement various security measures within an automation environment (e.g., data file or schema generated to automatically configure devices, provide user training and precautions, provide security configurations and topologies). At 1030, when the security output data has been disseminated, entities employ the security data to mitigate network security issues such as unwanted network access and/or network attack.
  • FIG. 11 illustrates a security validation process 1100 in accordance with an aspect of the present invention and includes host-based and/or network based processing as noted above. Proceeding to 1110, security assessments are performed. This can include initial and/or periodic live security assessment of a physical system to identify security flaws or weaknesses. At 1122, security compliance tests are performed. This can include automated checking prior to proposed or attempted network security modifications in order to assess current security levels. Compliance checking can also include determining conformance to other automated security analysis recommendations, conformance to applicable device/network security standards, and/or in accordance with predetermined or factory-specific guidelines, for example.
  • At 1126, vulnerability scanning and/or auditing on devices/networks is performed. This includes revision checks, improper configuration checks, file system/registry/database permissions checks, user privilege/password and/or account policy checks, checking for susceptibility to common network-based attacks, searching for open network ports, scanning for vulnerable network services, learning identity information about end devices/users that may enable hacker entry, performing vulnerability scanning and auditing on firewalls, routers, and/or other security devices, non-destructively mapping a topology of IT and automation devices, checking revisions and configurations, checking user attributes, and/or checking access control lists. At 1124, a determination is made as to whether security issues have been detected such as in accordance with the assessments, compliance testing, and scanning/auditing described above. If no security issues are detected at 1124, the process proceeds back to 1110. If security issues are detected at 1130, the process proceeds to 1134. At 1134, one or more automated security actions are performed to mitigate security threats. This can include automatically correcting security problems such as automatically adjusting security parameters, altering network traffic patterns, installing new security components, removing suspicious components, firing alarms, and/or automatically notifying entities about detected problems and/or suspicions. After automated processing at 1134, the process proceeds back to 1110 for further security processing, analysis, scanning, and detection.
  • FIG. 12 illustrates a security learning and detection process 1200 in accordance with an aspect of the present invention and can also include network-based aspects and/or host-based aspects as noted above. At 1210, one or more learning components such as learning models, learning systems, parameters, and/or variables are defined that describe various network and/or system properties. Such components can be adapted to determine statistical or pattern information regarding network and system activities. This information can include the number, quantity or average of network requests to and from one or more assets or network devices, the type of requests (e.g., read/write, role/identity of person/system requesting access, time of requests, location of requests), status or counter data (e.g., network access counters, error codes), and/or substantially any data type or pattern that may be retrieved from a network, automation asset, or network device. At 1214, system learning is performed. This includes monitoring an automation network during a predetermined training period, wherein the learning components described above acquire information about network, system, user, and/or device activities during the training period. For example, a counter variable may learn the average number of network requests that are sent to an automation asset in a given time period (can also be other statistical measures than average). In another example, an intelligent component such as a Bayesian inference model, probability determination, or neural network learns patterns such as “During heaviest network loads, the PLC responds to 25% fewer requests, and during real time processing operations, 35% fewer requests for a maximum of 23 requests per minute processed during such periods, +/−1 standard deviation.”
  • After the training period at 1214, learned patterns are compared to current data patterns in view of predetermined threshold or range settings at 1218. For example, if the mean number of factory network packets transmitted is learned to be about 20,000 bytes per/second, +/−5000 bytes, and a range is set up so that if network traffic goes above 26,000 bytes per second or below 10,000 bytes per second, then system security performance is considered acceptable as long as network traffic remains in the selected range. It is noted that thresholds/ranges can be set according to user desires, automated determinations, and/or according to the amount of risk and/or costs that are deemed acceptable (e.g., for lesser amount of security risk, set thresholds closer to learned patterns).
  • At 1224, a determination is made as to whether or not deviations were detected from learned data patterns at 1218. If no deviations are detected, the process proceeds back to 1218 for further comparison processing. If deviations are detected at 1224, then one or more automated actions may be performed. Similar to the process described above, this can include automatically correcting security problems such as automatically adjusting security parameters, altering network traffic patterns, installing new security components, removing suspicious components, firing alarms, and/or automatically notifying entities about detected problems and/or suspicions (e.g., sending an e-mail, alerting a pager, calling a number, generating a file, sounding an alarm, interrupting a web session, opening an instant messaging service, and so forth). After automated processing at 1228, the process proceeds back to 1224 for further security processing, comparison, and detection.
  • What has been described above are preferred aspects of the present invention. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the present invention, but one of ordinary skill in the art will recognize that many further combinations and permutations of the present invention are possible. Accordingly, the present invention is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims.

Claims (20)

What is claimed is:
1. A system for providing security on an industrial network, comprising:
a memory that stores computer-executable components; and
a processor, operatively coupled to the memory, that executes the computer-executable components, the computer-executable components comprising:
a learning component configured to determine a first pattern of data communication between an industrial controller and an industrial asset device based on monitoring of data exchanged between the industrial controller and the industrial asset device via an automation network during a training period; and
an analyzer component configured to determine a second pattern of data communication based on monitoring of the data exchanged between the industrial controller and the industrial asset device subsequent to the training period, and to generate a security output in response to a determination that the second pattern of data communication deviates from the first pattern of data communication in excess of a defined deviation threshold,
wherein the security output is configured to alter a network traffic pattern between the industrial controller and the industrial asset device.
2. The system of claim 1, further comprising an interface component configured to receive input that modifies the defined deviation threshold.
3. The system of claim 1, wherein the security output is configured to disable network requests to access the industrial controller from another network that is different than the automation network.
4. The system of claim 1, wherein the data comprises at least one of input data received by the industrial controller from the industrial asset device and stored in an I/O memory space of the industrial controller or output data written to the I/O memory space by the industrial controller and sent to the industrial asset device.
5. The system of claim 1, wherein
the learning component is further configured to determine a first average number of network retries performed by the industrial controller during the training period, and
the analyzer component is further configured to generate another security output in response to determining that a second average number of network retries performed by the industrial controller subsequent to the training period exceeds the first average number of network retries in excess of a tolerance.
6. The system of claim 1, wherein the first pattern of data communication comprises an average number of data packet transfers between the industrial controller and the industrial asset device during a daily range of time.
7. The system of claim 1, wherein the security output is further configured to adjust a security parameter on at least one of the industrial controller, the industrial asset device, or a network device on the automation network.
8. The system of claim 1, wherein the analyzer component is further configured to set the security output based on model data that models the industrial controller, the industrial asset device, and one or more network pathways to at least one of the industrial controller or the industrial asset device.
9. The system of claim 8, wherein the analyzer is further configured to generate, based on analysis of the model, a recommendation output specifying a recommendation for implementing a security countermeasure for an industrial system comprising the industrial controller and the industrial asset device.
10. The system of claim 9, wherein the recommendation output specifies at least one of a recommended network architecture, a recommendation to connect an identified device of the industrial system to a router, or a recommended security component to be installed on an identified device of the industrial system.
11. A method for implementing industrial network security, comprising:
monitoring, by a system comprising a processor, first data exchange activity between an industrial controller and an industrial asset via a plant network during a training period;
determining, by the system based on the monitoring of the first data exchange activity, a first pattern of data communication between an industrial controller and an industrial asset device;
monitoring, by the system, second data exchange activity between the industrial controller and the industrial asset via the plant network subsequent to the training period;
determining, by the system based on the monitoring of the second data exchange activity, a second pattern of data communication between the industrial controller and the industrial asset device; and
in response to determining that the second pattern of data communication deviates from the first pattern of data communication in excess of a defined tolerance, generating a security output configured to alter a network traffic pattern between the industrial controller and the industrial asset device.
12. The method of claim 11, wherein the generating the security output comprises configuring the security output to disable network requests for access to the industrial controller originating from another network that is different than the plant network.
13. The method of claim 11, wherein the monitoring the first data exchange activity comprises monitoring at least one of input data received by the industrial controller from the industrial asset device and stored in an I/O memory space of the industrial controller or output data written to the I/O memory space by the industrial controller and sent to the industrial asset device.
14. The method of claim 11, further comprising:
determining, based on monitoring of a data register stored on the industrial controller, a first average number of network retries performed by the industrial controller during the training period; and
generating another security output in response to determining that a second average number of network retries performed by the industrial controller subsequent to the training period exceeds the first average number of network retries in excess of the defined tolerance.
15. The method of claim 11, wherein the determining the first pattern of data communication comprises determining an average number of data packet transfers between the industrial controller and the industrial asset device during a daily range of time.
16. The method of claim 11, wherein the generating the security output comprises configuring the security output to adjust a security parameter of at least one of the industrial controller, the industrial asset device, or a network device on the plant network.
17. The method of claim 11, wherein the generating the security output comprises configuring the security output based on model information that models the industrial controller, the industrial asset device, and one or more network pathways to at least one of the industrial controller or the industrial asset device.
18. A non-transitory computer-readable medium having stored thereon instructions that, in response to execution, cause a security analysis system comprising a processor to perform operations, the operations comprising:
determining a first pattern of data communication between an industrial controller and an industrial asset based on monitoring of first data exchanged between the industrial controller and the industrial asset device via an industrial network during a training period;
determining a second pattern of data communication based on monitoring of second data exchanged between the industrial controller and the industrial asset device after the training period; and
generating a security output in response to a determination that the second pattern of data communication deviates from the first pattern of data communication in excess of a defined tolerance, wherein the security output is configured to alter a network traffic pattern between the industrial controller and the industrial asset device.
19. The non-transitory computer-readable medium of claim 18, wherein the generating comprises configuring the security output to disable network requests for access to the industrial controller originating from another network that is different than the automation network.
20. The -transitory computer-readable medium of claim 18, wherein the generating comprises configuring the security output to adjust a security parameter on at least one of the industrial controller, the industrial asset device, or a network device on the industrial network.
US14/535,291 2002-10-21 2014-11-06 System and methodology providing automation security analysis, validation, and learning in an industrial controller environment Abandoned US20150067844A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/535,291 US20150067844A1 (en) 2002-10-21 2014-11-06 System and methodology providing automation security analysis, validation, and learning in an industrial controller environment

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US42000602P 2002-10-21 2002-10-21
US10/661,696 US8909926B2 (en) 2002-10-21 2003-09-12 System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US14/535,291 US20150067844A1 (en) 2002-10-21 2014-11-06 System and methodology providing automation security analysis, validation, and learning in an industrial controller environment

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/661,696 Continuation US8909926B2 (en) 2002-10-21 2003-09-12 System and methodology providing automation security analysis, validation, and learning in an industrial controller environment

Publications (1)

Publication Number Publication Date
US20150067844A1 true US20150067844A1 (en) 2015-03-05

Family

ID=32511422

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/661,696 Active 2029-12-06 US8909926B2 (en) 2002-10-21 2003-09-12 System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US14/535,291 Abandoned US20150067844A1 (en) 2002-10-21 2014-11-06 System and methodology providing automation security analysis, validation, and learning in an industrial controller environment

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/661,696 Active 2029-12-06 US8909926B2 (en) 2002-10-21 2003-09-12 System and methodology providing automation security analysis, validation, and learning in an industrial controller environment

Country Status (2)

Country Link
US (2) US8909926B2 (en)
EP (1) EP1420317B1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150058961A1 (en) * 2012-06-05 2015-02-26 Broadcom Corporation Authenticating users based upon an identity footprint
US10318903B2 (en) 2016-05-06 2019-06-11 General Electric Company Constrained cash computing system to optimally schedule aircraft repair capacity with closed loop dynamic physical state and asset utilization attainment control
US20190379702A1 (en) * 2018-06-06 2019-12-12 Reliaquest Holdings, Llc Threat mitigation system and method
US10841322B2 (en) 2018-01-18 2020-11-17 General Electric Company Decision system and method for separating faults from attacks
USD926200S1 (en) 2019-06-06 2021-07-27 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926809S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926782S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926811S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926810S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
US11086988B1 (en) 2020-02-28 2021-08-10 Nanotronics Imaging, Inc. Method, systems and apparatus for intelligently emulating factory control systems and simulating response data
US11100221B2 (en) 2019-10-08 2021-08-24 Nanotronics Imaging, Inc. Dynamic monitoring and securing of factory processes, equipment and automated systems
US11163890B2 (en) 2019-10-09 2021-11-02 United States Of America As Represented By The Secretary Of The Navy Self-targeting method of automated cybersecurity analysis on an operating system
US11706235B2 (en) * 2020-08-06 2023-07-18 Robert Bosch Gmbh Method and device for processing data of a technical system
US11709946B2 (en) 2018-06-06 2023-07-25 Reliaquest Holdings, Llc Threat mitigation system and method

Families Citing this family (342)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070112512A1 (en) * 1987-09-28 2007-05-17 Verizon Corporate Services Group Inc. Methods and systems for locating source of computer-originated attack based on GPS equipped computing device
US7708189B1 (en) 2002-05-17 2010-05-04 Cipriano Joseph J Identification verification system and method
US9009084B2 (en) 2002-10-21 2015-04-14 Rockwell Automation Technologies, Inc. System and methodology providing automation security analysis and network intrusion protection in an industrial environment
US7467018B1 (en) 2002-11-18 2008-12-16 Rockwell Automation Technologies, Inc. Embedded database systems and methods in an industrial controller environment
US7143095B2 (en) * 2002-12-31 2006-11-28 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security
US20110202565A1 (en) * 2002-12-31 2011-08-18 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
CA2513498C (en) * 2003-01-22 2011-10-11 Nimcat Networks Inc. Call transfer system, method and network devices
US7185015B2 (en) * 2003-03-14 2007-02-27 Websense, Inc. System and method of monitoring and controlling application files
US7529754B2 (en) * 2003-03-14 2009-05-05 Websense, Inc. System and method of monitoring and controlling application files
US20040210773A1 (en) * 2003-04-16 2004-10-21 Charles Markosi System and method for network security
US9124584B2 (en) * 2003-05-09 2015-09-01 Arvato Digital Services Llc Location-specific or range-based licensing system
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US9118711B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US20070113272A2 (en) 2003-07-01 2007-05-17 Securityprofiling, Inc. Real-time vulnerability monitoring
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
US9118709B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US7068161B2 (en) * 2003-07-31 2006-06-27 Ch2M Hill, Inc. Method and system for analyzing the security of a facility
US7194446B1 (en) * 2003-09-25 2007-03-20 Rockwell Automation Technologies, Inc. Location-based execution of software/HMI
US7483986B2 (en) * 2003-12-03 2009-01-27 International Business Machines Corporation Dynamically tuning networks of relationships in self-organizing multi-agent systems
US8190723B2 (en) * 2003-12-14 2012-05-29 Cisco Technology, Inc. Method and system for automatically determining commands for a network element
US8983966B2 (en) * 2004-02-27 2015-03-17 Ebay Inc. Method and system to monitor a diverse heterogeneous application environment
US8584239B2 (en) 2004-04-01 2013-11-12 Fireeye, Inc. Virtual machine with dynamic data flow analysis
US8566946B1 (en) 2006-04-20 2013-10-22 Fireeye, Inc. Malware containment on connection
US9106694B2 (en) 2004-04-01 2015-08-11 Fireeye, Inc. Electronic message analysis for malware detection
US8171553B2 (en) 2004-04-01 2012-05-01 Fireeye, Inc. Heuristic based capture with replay to virtual machine
US7587537B1 (en) 2007-11-30 2009-09-08 Altera Corporation Serializer-deserializer circuits formed from input-output circuit registers
US8793787B2 (en) 2004-04-01 2014-07-29 Fireeye, Inc. Detecting malicious network content using virtual environment components
US8898788B1 (en) 2004-04-01 2014-11-25 Fireeye, Inc. Systems and methods for malware attack prevention
US8549638B2 (en) 2004-06-14 2013-10-01 Fireeye, Inc. System and method of containing computer worms
US8881282B1 (en) 2004-04-01 2014-11-04 Fireeye, Inc. Systems and methods for malware attack detection and identification
US8528086B1 (en) 2004-04-01 2013-09-03 Fireeye, Inc. System and method of detecting computer worms
US7860874B2 (en) * 2004-06-08 2010-12-28 Siemens Industry, Inc. Method for searching across a PLC network
US7735140B2 (en) * 2004-06-08 2010-06-08 Cisco Technology, Inc. Method and apparatus providing unified compliant network audit
US20060015591A1 (en) * 2004-06-08 2006-01-19 Datla Krishnam R Apparatus and method for intelligent configuration editor
US8010952B2 (en) * 2004-06-08 2011-08-30 Cisco Technology, Inc. Method and apparatus for configuration syntax and semantic validation
US7721304B2 (en) 2004-06-08 2010-05-18 Cisco Technology, Inc. Method and apparatus providing programmable network intelligence
EP1612639A1 (en) * 2004-06-30 2006-01-04 ST Incard S.r.l. Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card
US7607166B2 (en) * 2004-07-12 2009-10-20 Cisco Technology, Inc. Secure manufacturing devices in a switched Ethernet network
US8091130B1 (en) * 2004-08-12 2012-01-03 Verizon Corporate Services Group Inc. Geographical intrusion response prioritization mapping system
US8631493B2 (en) * 2004-08-12 2014-01-14 Verizon Patent And Licensing Inc. Geographical intrusion mapping system using telecommunication billing and inventory systems
US8082506B1 (en) * 2004-08-12 2011-12-20 Verizon Corporate Services Group Inc. Geographical vulnerability mitigation response mapping system
US8418246B2 (en) * 2004-08-12 2013-04-09 Verizon Patent And Licensing Inc. Geographical threat response prioritization mapping system and methods of use
US8572734B2 (en) 2004-08-12 2013-10-29 Verizon Patent And Licensing Inc. Geographical intrusion response prioritization mapping through authentication and flight data correlation
US20060034305A1 (en) * 2004-08-13 2006-02-16 Honeywell International Inc. Anomaly-based intrusion detection
US7950044B2 (en) * 2004-09-28 2011-05-24 Rockwell Automation Technologies, Inc. Centrally managed proxy-based security for legacy automation systems
US8031913B1 (en) 2004-09-29 2011-10-04 Rockwell Automation Technologies, Inc. Preemptive change verification via electronic signatures in industrial automation systems
US7979706B1 (en) * 2004-09-29 2011-07-12 Rockwell Automation Technologies, Inc. Systems and methods for queuing an action in industrial automation systems
US7861085B1 (en) * 2004-09-29 2010-12-28 Rockwell Automation Technologies, Inc. Systems and methods providing distributed management of electronic signatures in industrial automation systems
US8132225B2 (en) * 2004-09-30 2012-03-06 Rockwell Automation Technologies, Inc. Scalable and flexible information security for industrial automation
US8756521B1 (en) 2004-09-30 2014-06-17 Rockwell Automation Technologies, Inc. Systems and methods for automatic visualization configuration
EP1655647A1 (en) * 2004-11-04 2006-05-10 Prüftechnik Dieter Busch Ag Secured connectivity system for Internet-based CM systems
US7860318B2 (en) 2004-11-09 2010-12-28 Intelli-Check, Inc System and method for comparing documents
US8078881B1 (en) 2004-11-12 2011-12-13 Liu Gary G Password resetting method
US7832005B1 (en) * 2004-11-29 2010-11-09 Symantec Corporation Behavioral learning based security
US7310669B2 (en) * 2005-01-19 2007-12-18 Lockdown Networks, Inc. Network appliance for vulnerability assessment auditing over multiple networks
US20060164199A1 (en) * 2005-01-26 2006-07-27 Lockdown Networks, Inc. Network appliance for securely quarantining a node on a network
US7810138B2 (en) 2005-01-26 2010-10-05 Mcafee, Inc. Enabling dynamic authentication with different protocols on the same port for a switch
US8520512B2 (en) 2005-01-26 2013-08-27 Mcafee, Inc. Network appliance for customizable quarantining of a node on a network
AT502241B1 (en) * 2005-02-24 2007-04-15 Arc Seibersdorf Res Gmbh PROCEDURE AND ARRANGEMENT FOR DETERMINING THE DEVIATION OF IDENTIFIED VALUES
US8590011B1 (en) * 2005-02-24 2013-11-19 Versata Development Group, Inc. Variable domain resource data security for data processing systems
US7706895B2 (en) 2005-02-25 2010-04-27 Rockwell Automation Technologies, Inc. Reliable messaging instruction
US7565351B1 (en) * 2005-03-14 2009-07-21 Rockwell Automation Technologies, Inc. Automation device data interface
US8799800B2 (en) * 2005-05-13 2014-08-05 Rockwell Automation Technologies, Inc. Automatic user interface generation
US7676281B2 (en) * 2005-05-13 2010-03-09 Rockwell Automation Technologies, Inc. Distributed database in an industrial automation environment
US7672737B2 (en) * 2005-05-13 2010-03-02 Rockwell Automation Technologies, Inc. Hierarchically structured data model for utilization in industrial automation environments
US7650405B2 (en) * 2005-05-13 2010-01-19 Rockwell Automation Technologies, Inc. Tracking and tracing across process boundaries in an industrial automation environment
US7809683B2 (en) 2005-05-13 2010-10-05 Rockwell Automation Technologies, Inc. Library that includes modifiable industrial automation objects
US8800042B2 (en) * 2005-05-16 2014-08-05 Hewlett-Packard Development Company, L.P. Secure web application development and execution environment
US7233830B1 (en) * 2005-05-31 2007-06-19 Rockwell Automation Technologies, Inc. Application and service management for industrial control devices
GB0512744D0 (en) * 2005-06-22 2005-07-27 Blackspider Technologies Method and system for filtering electronic messages
US20070019641A1 (en) * 2005-07-22 2007-01-25 Rockwell Automation Technologies, Inc. Execution of industrial automation applications on communication infrastructure devices
US8955032B2 (en) * 2005-08-20 2015-02-10 Riverbed Technology, Inc. Assessing network and device compliance with security policies
US7433741B2 (en) 2005-09-30 2008-10-07 Rockwell Automation Technologies, Inc. Hybrid user interface having base presentation information with variably prominent supplemental information
US7882560B2 (en) * 2005-12-16 2011-02-01 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US9286469B2 (en) * 2005-12-16 2016-03-15 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US8495743B2 (en) * 2005-12-16 2013-07-23 Cisco Technology, Inc. Methods and apparatus providing automatic signature generation and enforcement
US8413245B2 (en) * 2005-12-16 2013-04-02 Cisco Technology, Inc. Methods and apparatus providing computer and network security for polymorphic attacks
US8453243B2 (en) 2005-12-28 2013-05-28 Websense, Inc. Real time lockdown
US7774363B2 (en) * 2005-12-29 2010-08-10 Nextlabs, Inc. Detecting behavioral patterns and anomalies using information usage data
US7787390B1 (en) * 2006-01-30 2010-08-31 Marvell International Ltd. Custom automatic remote monitoring for network devices
US7860990B2 (en) * 2006-01-31 2010-12-28 Genband Us Llc Session data records and related alarming within a session over internet protocol (SOIP) network
US7861003B2 (en) * 2006-01-31 2010-12-28 Genband Us Llc Adaptive feedback for session over internet protocol
US7865612B2 (en) 2006-01-31 2011-01-04 Genband Us Llc Method and apparatus for partitioning resources within a session-over-internet-protocol (SoIP) session controller
US20070204323A1 (en) * 2006-02-24 2007-08-30 Rockwell Automation Technologies, Inc. Auto-detection capabilities for out of the box experience
US8509218B2 (en) * 2006-02-28 2013-08-13 Genband Us Llc Prioritization within a session over internet protocol (SOIP) network
US8259706B2 (en) * 2006-02-28 2012-09-04 Genband Us Llc Multistage prioritization of packets within a session over internet protocol (SOIP) network
US7814069B2 (en) * 2006-03-30 2010-10-12 Oracle International Corporation Wrapper for use with global standards compliance checkers
US8185618B2 (en) 2006-06-06 2012-05-22 Cisco Technology, Inc. Dynamically responding to non-network events at a network device in a computer network
US7950056B1 (en) * 2006-06-30 2011-05-24 Symantec Corporation Behavior based processing of a new version or variant of a previously characterized program
PL1881388T3 (en) * 2006-07-07 2014-04-30 Ansaldo Energia Spa Industrial plant security apparatus and monitoring method of security of an industrial plant
US8359248B2 (en) * 2006-08-24 2013-01-22 Blue Pillar, Inc. Systems, methods, and devices for managing emergency power supply systems
US20080137266A1 (en) * 2006-09-29 2008-06-12 Rockwell Automation Technologies, Inc. Motor control center with power and data distribution bus
FR2907930B1 (en) * 2006-10-27 2009-02-13 Viaccess Sa METHOD FOR DETECTING ABNORMAL USE OF A SECURITY PROCESSOR
US9654495B2 (en) * 2006-12-01 2017-05-16 Websense, Llc System and method of analyzing web addresses
US9008617B2 (en) * 2006-12-28 2015-04-14 Verizon Patent And Licensing Inc. Layered graphical event mapping
GB2458094A (en) 2007-01-09 2009-09-09 Surfcontrol On Demand Ltd URL interception and categorization in firewalls
GB2445764A (en) 2007-01-22 2008-07-23 Surfcontrol Plc Resource access filtering system and database structure for use therewith
CA2676106A1 (en) * 2007-02-02 2008-08-14 Websense, Inc. System and method for adding context to prevent data leakage over a computer network
US9148437B1 (en) 2007-03-27 2015-09-29 Amazon Technologies, Inc. Detecting adverse network conditions for a third-party network site
US8533841B2 (en) * 2007-04-02 2013-09-10 Microsoft Corporation Deriving remediations from security compliance rules
GB0709527D0 (en) 2007-05-18 2007-06-27 Surfcontrol Plc Electronic messaging system, message processing apparatus and message processing method
US7912062B2 (en) * 2007-09-28 2011-03-22 Genband Us Llc Methods and apparatus for managing addresses related to virtual partitions of a session exchange device
WO2009061855A2 (en) * 2007-11-05 2009-05-14 Intelli-Check--Mobilisa, Inc. Dynamic access control in response to flexible rules
US8122510B2 (en) * 2007-11-14 2012-02-21 Bank Of America Corporation Method for analyzing and managing unstructured data
US20090144545A1 (en) * 2007-11-29 2009-06-04 International Business Machines Corporation Computer system security using file system access pattern heuristics
US8086582B1 (en) 2007-12-18 2011-12-27 Mcafee, Inc. System, method and computer program product for scanning and indexing data for different purposes
US8655822B2 (en) 2008-03-12 2014-02-18 Aptima, Inc. Probabilistic decision making system and methods of use
US9130986B2 (en) * 2008-03-19 2015-09-08 Websense, Inc. Method and system for protection against information stealing software
US8370948B2 (en) * 2008-03-19 2013-02-05 Websense, Inc. System and method for analysis of electronic information dissemination events
US8407784B2 (en) * 2008-03-19 2013-03-26 Websense, Inc. Method and system for protection against information stealing software
US9015842B2 (en) 2008-03-19 2015-04-21 Websense, Inc. Method and system for protection against information stealing software
US20090319531A1 (en) * 2008-06-20 2009-12-24 Bong Jun Ko Method and Apparatus for Detecting Devices Having Implementation Characteristics Different from Documented Characteristics
CN102077201A (en) 2008-06-30 2011-05-25 网圣公司 System and method for dynamic and real-time categorization of webpages
US20100064297A1 (en) * 2008-09-05 2010-03-11 Invensys Systems, Inc. Configuring And Providing Enhanced Access To Profibus Device Diagnostic Data
US8997219B2 (en) 2008-11-03 2015-03-31 Fireeye, Inc. Systems and methods for detecting malicious PDF network content
EP2200249A1 (en) * 2008-12-17 2010-06-23 Abb Research Ltd. Network analysis
US8341748B2 (en) * 2008-12-18 2012-12-25 Caterpillar Inc. Method and system to detect breaks in a border of a computer network
US9130972B2 (en) 2009-05-26 2015-09-08 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information
US9489651B2 (en) 2009-07-29 2016-11-08 International Business Machines Corporation Autonomic manufacturing operator authorization adjustment
DE102010045256B4 (en) 2009-09-14 2022-06-23 Hirschmann Automation And Control Gmbh Method for operating a firewall device in automation networks
US8832829B2 (en) 2009-09-30 2014-09-09 Fireeye, Inc. Network-based binary file extraction and analysis for malware detection
US8984533B2 (en) 2010-04-15 2015-03-17 Rockwell Automation Technologies, Inc. Systems and methods for conducting communications among components of multidomain industrial automation system
US8484401B2 (en) 2010-04-15 2013-07-09 Rockwell Automation Technologies, Inc. Systems and methods for conducting communications among components of multidomain industrial automation system
US9392072B2 (en) 2010-04-15 2016-07-12 Rockwell Automation Technologies, Inc. Systems and methods for conducting communications among components of multidomain industrial automation system
EP2577938A1 (en) 2010-06-01 2013-04-10 Radiflow Ltd. Plant communication network
US20120117656A1 (en) * 2010-11-10 2012-05-10 Sap Ag Security Validation of Business Processes
US8775607B2 (en) * 2010-12-10 2014-07-08 International Business Machines Corporation Identifying stray assets in a computing enviroment and responsively taking resolution actions
US20120159624A1 (en) * 2010-12-21 2012-06-21 Fujitsu Technology Solutions Intellectual Property Gmbh Computer security method, system and model
JP5739182B2 (en) 2011-02-04 2015-06-24 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Control system, method and program
JP5731223B2 (en) 2011-02-14 2015-06-10 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Abnormality detection device, monitoring control system, abnormality detection method, program, and recording medium
JP5689333B2 (en) 2011-02-15 2015-03-25 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Abnormality detection system, abnormality detection device, abnormality detection method, program, and recording medium
US8893216B2 (en) * 2011-06-15 2014-11-18 Cisco Technology, Inc. Security measures for the smart grid
DE102011078309A1 (en) * 2011-06-29 2013-01-03 Siemens Aktiengesellschaft Method and device for monitoring a VPN tunnel
US8839349B2 (en) * 2011-10-18 2014-09-16 Mcafee, Inc. Integrating security policy and event management
US9594367B2 (en) * 2011-10-31 2017-03-14 Rockwell Automation Technologies, Inc. Systems and methods for process control including process-initiated workflow
EP2624083A1 (en) * 2012-02-01 2013-08-07 ABB Research Ltd. Dynamic configuration of an industrial control system
US9032520B2 (en) * 2012-02-22 2015-05-12 iScanOnline, Inc. Remote security self-assessment framework
EP2640110B1 (en) 2012-03-12 2017-05-03 Securitas Direct AB Method and apparatus for controlling a home wireless system
US8726393B2 (en) 2012-04-23 2014-05-13 Abb Technology Ag Cyber security analyzer
US10552764B1 (en) 2012-04-27 2020-02-04 Aptima, Inc. Machine learning system for a training model of an adaptive trainer
US10290221B2 (en) * 2012-04-27 2019-05-14 Aptima, Inc. Systems and methods to customize student instruction
US8972526B2 (en) * 2012-10-17 2015-03-03 Wal-Mart Stores, Inc. HTTP parallel processing router
CN104813622B (en) 2012-11-22 2016-10-19 三菱电机株式会社 Data collection-retransmission unit
US10572665B2 (en) 2012-12-28 2020-02-25 Fireeye, Inc. System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
US9177139B2 (en) * 2012-12-30 2015-11-03 Honeywell International Inc. Control system cyber security
US9176843B1 (en) 2013-02-23 2015-11-03 Fireeye, Inc. Framework for efficient security coverage of mobile software applications
US9195829B1 (en) 2013-02-23 2015-11-24 Fireeye, Inc. User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US9367681B1 (en) 2013-02-23 2016-06-14 Fireeye, Inc. Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
US10438156B2 (en) 2013-03-13 2019-10-08 Aptima, Inc. Systems and methods to provide training guidance
US9104867B1 (en) 2013-03-13 2015-08-11 Fireeye, Inc. Malicious content analysis using simulated user interaction without user involvement
US9355247B1 (en) 2013-03-13 2016-05-31 Fireeye, Inc. File extraction from memory dump for malicious content analysis
US9626509B1 (en) 2013-03-13 2017-04-18 Fireeye, Inc. Malicious content analysis with multi-version application support within single operating environment
US20140277612A1 (en) * 2013-03-14 2014-09-18 General Electric Company Automatic generation of a dynamic pre-start checklist
US9311479B1 (en) 2013-03-14 2016-04-12 Fireeye, Inc. Correlation and consolidation of analytic data for holistic view of a malware attack
US9430646B1 (en) 2013-03-14 2016-08-30 Fireeye, Inc. Distributed systems and methods for automatically detecting unknown bots and botnets
US9413781B2 (en) 2013-03-15 2016-08-09 Fireeye, Inc. System and method employing structured intelligence to verify and contain threats at endpoints
US10713358B2 (en) 2013-03-15 2020-07-14 Fireeye, Inc. System and method to extract and utilize disassembly features to classify software intent
EP2981893B1 (en) * 2013-03-31 2023-06-07 Schneider Electric USA, Inc. Analyzing scada systems
EP2981886A4 (en) 2013-03-31 2016-10-26 Schneider Electric Usa Inc Analyzing scada systems
US9495180B2 (en) 2013-05-10 2016-11-15 Fireeye, Inc. Optimized resource allocation for virtual machines within a malware content detection system
US9635039B1 (en) 2013-05-13 2017-04-25 Fireeye, Inc. Classifying sets of malicious indicators for detecting command and control communications associated with malware
US10133863B2 (en) 2013-06-24 2018-11-20 Fireeye, Inc. Zero-day discovery system
US9300686B2 (en) 2013-06-28 2016-03-29 Fireeye, Inc. System and method for detecting malicious links in electronic messages
US9992230B1 (en) * 2013-09-27 2018-06-05 Tripwire, Inc. Assessing security control quality and state in an information technology infrastructure
US10515214B1 (en) 2013-09-30 2019-12-24 Fireeye, Inc. System and method for classifying malware within content created during analysis of a specimen
US9628507B2 (en) 2013-09-30 2017-04-18 Fireeye, Inc. Advanced persistent threat (APT) detection center
US9171160B2 (en) 2013-09-30 2015-10-27 Fireeye, Inc. Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US9690936B1 (en) 2013-09-30 2017-06-27 Fireeye, Inc. Multistage system and method for analyzing obfuscated content for malware
US9736179B2 (en) 2013-09-30 2017-08-15 Fireeye, Inc. System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
US9294501B2 (en) 2013-09-30 2016-03-22 Fireeye, Inc. Fuzzy hash of behavioral results
US9774448B2 (en) 2013-10-30 2017-09-26 Duo Security, Inc. System and methods for opportunistic cryptographic key management on an electronic device
US9921978B1 (en) 2013-11-08 2018-03-20 Fireeye, Inc. System and method for enhanced security of storage devices
US9747446B1 (en) 2013-12-26 2017-08-29 Fireeye, Inc. System and method for run-time object classification
US9756074B2 (en) 2013-12-26 2017-09-05 Fireeye, Inc. System and method for IPS and VM-based detection of suspicious objects
US9507935B2 (en) 2014-01-16 2016-11-29 Fireeye, Inc. Exploit detection system with threat-aware microvisor
WO2015117052A1 (en) 2014-01-31 2015-08-06 Putman Matthew C Apparatus and method for manipulating objects with gesture controls
US9262635B2 (en) 2014-02-05 2016-02-16 Fireeye, Inc. Detection efficacy of virtual machine-based analysis with application specific events
US9369478B2 (en) * 2014-02-06 2016-06-14 Nicira, Inc. OWL-based intelligent security audit
US9241010B1 (en) 2014-03-20 2016-01-19 Fireeye, Inc. System and method for network behavior detection
US10242185B1 (en) 2014-03-21 2019-03-26 Fireeye, Inc. Dynamic guest image creation and rollback
US20150281008A1 (en) * 2014-03-25 2015-10-01 Emulex Corporation Automatic derivation of system performance metric thresholds
US9591015B1 (en) 2014-03-28 2017-03-07 Fireeye, Inc. System and method for offloading packet processing and static analysis operations
US9223972B1 (en) 2014-03-31 2015-12-29 Fireeye, Inc. Dynamically remote tuning of a malware content detection system
US9432389B1 (en) 2014-03-31 2016-08-30 Fireeye, Inc. System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US9438623B1 (en) 2014-06-06 2016-09-06 Fireeye, Inc. Computer exploit detection using heap spray pattern matching
US9594912B1 (en) 2014-06-06 2017-03-14 Fireeye, Inc. Return-oriented programming detection
US9973531B1 (en) 2014-06-06 2018-05-15 Fireeye, Inc. Shellcode detection
US10084813B2 (en) 2014-06-24 2018-09-25 Fireeye, Inc. Intrusion prevention and remedy system
US10805340B1 (en) 2014-06-26 2020-10-13 Fireeye, Inc. Infection vector and malware tracking with an interactive user display
US9398028B1 (en) 2014-06-26 2016-07-19 Fireeye, Inc. System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
KR20160002058A (en) * 2014-06-30 2016-01-07 한국전자통신연구원 Modbus Communication Pattern Learning Based Abnormal Traffic Detection Apparatus and Method
US10002252B2 (en) 2014-07-01 2018-06-19 Fireeye, Inc. Verification of trusted threat-aware microvisor
US9363280B1 (en) 2014-08-22 2016-06-07 Fireeye, Inc. System and method of detecting delivery of malware using cross-customer data
US10671726B1 (en) 2014-09-22 2020-06-02 Fireeye Inc. System and method for malware analysis using thread-level event monitoring
US10027689B1 (en) 2014-09-29 2018-07-17 Fireeye, Inc. Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
US9773112B1 (en) 2014-09-29 2017-09-26 Fireeye, Inc. Exploit detection of malware and malware families
US9787572B2 (en) * 2014-10-07 2017-10-10 Cisco Technology, Inc. Conflict avoidant traffic routing in a network environment
US10373409B2 (en) 2014-10-31 2019-08-06 Intellicheck, Inc. Identification scan in compliance with jurisdictional or other rules
US9690933B1 (en) 2014-12-22 2017-06-27 Fireeye, Inc. Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US10075455B2 (en) 2014-12-26 2018-09-11 Fireeye, Inc. Zero-day rotating guest image profile
US9934376B1 (en) 2014-12-29 2018-04-03 Fireeye, Inc. Malware detection appliance architecture
US9838417B1 (en) 2014-12-30 2017-12-05 Fireeye, Inc. Intelligent context aware user interaction for malware detection
US9913201B1 (en) 2015-01-29 2018-03-06 Symantec Corporation Systems and methods for detecting potentially illegitimate wireless access points
US10075475B2 (en) * 2015-02-06 2018-09-11 Honeywell International Inc. Apparatus and method for dynamic customization of cyber-security risk item rules
US9781604B1 (en) * 2015-02-09 2017-10-03 Symantec Corporation Systems and methods for detecting illegitimate devices on wireless networks
US10148688B1 (en) 2015-02-09 2018-12-04 Symantec Corporation Systems and methods for detecting illegitimate devices on wireless networks
US9730075B1 (en) 2015-02-09 2017-08-08 Symantec Corporation Systems and methods for detecting illegitimate devices on wireless networks
US10944764B2 (en) * 2015-02-13 2021-03-09 Fisher-Rosemount Systems, Inc. Security event detection through virtual machine introspection
US9882931B1 (en) 2015-02-18 2018-01-30 Symantec Corporation Systems and methods for detecting potentially illegitimate wireless access points
US9690606B1 (en) 2015-03-25 2017-06-27 Fireeye, Inc. Selective system call monitoring
US10148693B2 (en) 2015-03-25 2018-12-04 Fireeye, Inc. Exploit detection system
US9438613B1 (en) 2015-03-30 2016-09-06 Fireeye, Inc. Dynamic content activation for automated analysis of embedded objects
US9483644B1 (en) 2015-03-31 2016-11-01 Fireeye, Inc. Methods for detecting file altering malware in VM based analysis
US9641341B2 (en) 2015-03-31 2017-05-02 Duo Security, Inc. Method for distributed trust authentication
US10417031B2 (en) 2015-03-31 2019-09-17 Fireeye, Inc. Selective virtualization for security threat detection
US10474813B1 (en) 2015-03-31 2019-11-12 Fireeye, Inc. Code injection technique for remediation at an endpoint of a network
US9654485B1 (en) 2015-04-13 2017-05-16 Fireeye, Inc. Analytics-based security monitoring system and method
US9594904B1 (en) 2015-04-23 2017-03-14 Fireeye, Inc. Detecting malware based on reflection
US9781601B1 (en) 2015-06-08 2017-10-03 Symantec Corporation Systems and methods for detecting potentially illegitimate wireless access points
US11113086B1 (en) 2015-06-30 2021-09-07 Fireeye, Inc. Virtual system and method for securing external network connectivity
US10454950B1 (en) 2015-06-30 2019-10-22 Fireeye, Inc. Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US10523690B2 (en) * 2015-06-30 2019-12-31 K4Connect Inc. Home automation system including device controller for terminating communication with abnormally operating addressable devices and related methods
US10630649B2 (en) 2015-06-30 2020-04-21 K4Connect Inc. Home automation system including encrypted device connection based upon publicly accessible connection file and related methods
US10726127B1 (en) 2015-06-30 2020-07-28 Fireeye, Inc. System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US10642753B1 (en) 2015-06-30 2020-05-05 Fireeye, Inc. System and method for protecting a software component running in virtual machine using a virtualization layer
US10715542B1 (en) 2015-08-14 2020-07-14 Fireeye, Inc. Mobile application risk analysis
US10019572B1 (en) 2015-08-27 2018-07-10 Amazon Technologies, Inc. Detecting malicious activities by imported software packages
US10032031B1 (en) 2015-08-27 2018-07-24 Amazon Technologies, Inc. Detecting unknown software vulnerabilities and system compromises
US10176321B2 (en) 2015-09-22 2019-01-08 Fireeye, Inc. Leveraging behavior-based rules for malware family classification
US10033747B1 (en) 2015-09-29 2018-07-24 Fireeye, Inc. System and method for detecting interpreter-based exploit attacks
US10706149B1 (en) 2015-09-30 2020-07-07 Fireeye, Inc. Detecting delayed activation malware using a primary controller and plural time controllers
US9825976B1 (en) 2015-09-30 2017-11-21 Fireeye, Inc. Detection and classification of exploit kits
US9825989B1 (en) 2015-09-30 2017-11-21 Fireeye, Inc. Cyber attack early warning system
US10210329B1 (en) 2015-09-30 2019-02-19 Fireeye, Inc. Method to detect application execution hijacking using memory protection
US10601865B1 (en) 2015-09-30 2020-03-24 Fireeye, Inc. Detection of credential spearphishing attacks using email analysis
US10817606B1 (en) 2015-09-30 2020-10-27 Fireeye, Inc. Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
US10284575B2 (en) 2015-11-10 2019-05-07 Fireeye, Inc. Launcher for setting analysis environment variations for malware detection
US10645167B2 (en) * 2015-11-23 2020-05-05 Cybirical, LLC Distributed setting of network security devices from power system IED settings files
US9918224B1 (en) 2015-11-24 2018-03-13 Symantec Corporation Systems and methods for preventing computing devices from sending wireless probe packets
US10447728B1 (en) 2015-12-10 2019-10-15 Fireeye, Inc. Technique for protecting guest processes using a layered virtualization architecture
US10846117B1 (en) 2015-12-10 2020-11-24 Fireeye, Inc. Technique for establishing secure communication between host and guest processes of a virtualization architecture
US10108446B1 (en) 2015-12-11 2018-10-23 Fireeye, Inc. Late load technique for deploying a virtualization layer underneath a running operating system
US10511481B1 (en) * 2015-12-15 2019-12-17 Amazon Technologies, Inc. Optimizing application configurations in a provider network
US9652962B1 (en) * 2015-12-21 2017-05-16 General Electric Company Systems and methods for safety and proximity sensing in industrial environments
US10565378B1 (en) 2015-12-30 2020-02-18 Fireeye, Inc. Exploit of privilege detection framework
US10133866B1 (en) 2015-12-30 2018-11-20 Fireeye, Inc. System and method for triggering analysis of an object for malware in response to modification of that object
US10621338B1 (en) 2015-12-30 2020-04-14 Fireeye, Inc. Method to detect forgery and exploits using last branch recording registers
US10050998B1 (en) 2015-12-30 2018-08-14 Fireeye, Inc. Malicious message analysis system
US10581874B1 (en) 2015-12-31 2020-03-03 Fireeye, Inc. Malware detection system with contextual analysis
US11552986B1 (en) 2015-12-31 2023-01-10 Fireeye Security Holdings Us Llc Cyber-security framework for application of virtual features
US9824216B1 (en) 2015-12-31 2017-11-21 Fireeye, Inc. Susceptible environment detection system
US10671721B1 (en) 2016-03-25 2020-06-02 Fireeye, Inc. Timeout management services
US10785255B1 (en) 2016-03-25 2020-09-22 Fireeye, Inc. Cluster configuration within a scalable malware detection system
US10601863B1 (en) 2016-03-25 2020-03-24 Fireeye, Inc. System and method for managing sensor enrollment
US10476906B1 (en) 2016-03-25 2019-11-12 Fireeye, Inc. System and method for managing formation and modification of a cluster within a malware detection system
US10893059B1 (en) 2016-03-31 2021-01-12 Fireeye, Inc. Verification and enhancement using detection systems located at the network periphery and endpoint devices
US10447540B2 (en) * 2016-04-08 2019-10-15 Cisco Technology, Inc. Deriving a network policy for an industrial automation network
US9935852B2 (en) * 2016-06-06 2018-04-03 General Electric Company Methods and systems for network monitoring
EP3258661B1 (en) * 2016-06-16 2020-11-18 ABB Schweiz AG Detection of abnormal configuration changes
US10169585B1 (en) 2016-06-22 2019-01-01 Fireeye, Inc. System and methods for advanced malware detection through placement of transition events
US10348755B1 (en) 2016-06-30 2019-07-09 Symantec Corporation Systems and methods for detecting network security deficiencies on endpoint devices
US10462173B1 (en) 2016-06-30 2019-10-29 Fireeye, Inc. Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US11042506B2 (en) * 2016-07-20 2021-06-22 Microsoft Technology Licensing, Llc Compliance violation detection
US10592678B1 (en) 2016-09-09 2020-03-17 Fireeye, Inc. Secure communications between peers using a verified virtual trusted platform module
US10491627B1 (en) 2016-09-29 2019-11-26 Fireeye, Inc. Advanced malware detection using similarity analysis
GB201617620D0 (en) * 2016-10-18 2016-11-30 Cybernetica As Composite digital signatures
US10795991B1 (en) 2016-11-08 2020-10-06 Fireeye, Inc. Enterprise search
DE102016222741A1 (en) 2016-11-18 2018-05-24 Continental Automotive Gmbh Method for a communication network and electronic control unit
US10587647B1 (en) 2016-11-22 2020-03-10 Fireeye, Inc. Technique for malware detection capability comparison of network security devices
US10552610B1 (en) 2016-12-22 2020-02-04 Fireeye, Inc. Adaptive virtual machine snapshot update framework for malware behavioral analysis
US10581879B1 (en) 2016-12-22 2020-03-03 Fireeye, Inc. Enhanced malware detection for generated objects
US10523609B1 (en) 2016-12-27 2019-12-31 Fireeye, Inc. Multi-vector malware detection and analysis
US10268170B2 (en) 2017-01-03 2019-04-23 General Electric Company Validation of control command in substantially real time for industrial asset control system threat detection
DE102017202002A1 (en) 2017-02-08 2018-08-09 Siemens Aktiengesellschaft Method and computer for cryptographically protecting control communication in and / or service access to IT systems, in particular in connection with the diagnosis and configuration in an automation, control or monitoring system
EP3373544A1 (en) * 2017-03-07 2018-09-12 ABB Schweiz AG Automatic communication network system hardening
US10904286B1 (en) 2017-03-24 2021-01-26 Fireeye, Inc. Detection of phishing attacks using similarity analysis
US10798112B2 (en) 2017-03-30 2020-10-06 Fireeye, Inc. Attribute-controlled malware detection
US10554507B1 (en) 2017-03-30 2020-02-04 Fireeye, Inc. Multi-level control for enhanced resource and object evaluation management of malware detection system
US10791138B1 (en) 2017-03-30 2020-09-29 Fireeye, Inc. Subscription-based malware detection
US10902119B1 (en) 2017-03-30 2021-01-26 Fireeye, Inc. Data extraction system for malware analysis
US10432647B2 (en) * 2017-06-27 2019-10-01 Honeywell International Inc. Malicious industrial internet of things node activity detection for connected plants
US10855700B1 (en) 2017-06-29 2020-12-01 Fireeye, Inc. Post-intrusion detection of cyber-attacks during lateral movement within networks
US10601848B1 (en) 2017-06-29 2020-03-24 Fireeye, Inc. Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
US10503904B1 (en) 2017-06-29 2019-12-10 Fireeye, Inc. Ransomware detection and mitigation
US10893068B1 (en) 2017-06-30 2021-01-12 Fireeye, Inc. Ransomware file modification prevention technique
EP3457286B1 (en) * 2017-09-14 2022-07-13 ABB Schweiz AG Method and computing device for commissioning an industrial automation control system
US10948883B2 (en) * 2017-09-20 2021-03-16 Rockwell Automation Technologies, Inc. Machine logic characterization, modeling, and code generation
US10747872B1 (en) 2017-09-27 2020-08-18 Fireeye, Inc. System and method for preventing malware evasion
US10805346B2 (en) 2017-10-01 2020-10-13 Fireeye, Inc. Phishing attack detection
EP3474509B1 (en) * 2017-10-18 2021-10-06 ABB Schweiz AG Methods for controlling a device and control system
US11108809B2 (en) 2017-10-27 2021-08-31 Fireeye, Inc. System and method for analyzing binary code for malware classification using artificial neural network techniques
US10416661B2 (en) * 2017-11-30 2019-09-17 Abb Schweiz Ag Apparatuses, systems and methods of secure cloud-based monitoring of industrial plants
US10645121B1 (en) * 2017-12-11 2020-05-05 Juniper Networks, Inc. Network traffic management based on network entity attributes
US11005860B1 (en) 2017-12-28 2021-05-11 Fireeye, Inc. Method and system for efficient cybersecurity analysis of endpoint events
US11240275B1 (en) 2017-12-28 2022-02-01 Fireeye Security Holdings Us Llc Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
US11271955B2 (en) 2017-12-28 2022-03-08 Fireeye Security Holdings Us Llc Platform and method for retroactive reclassification employing a cybersecurity-based global data store
US10908940B1 (en) 2018-02-26 2021-02-02 Amazon Technologies, Inc. Dynamically managed virtual server system
EP3544262A1 (en) * 2018-03-22 2019-09-25 Mitsubishi Electric R&D Centre Europe B.V. Method of improving security in a factory automation network
US10826931B1 (en) 2018-03-29 2020-11-03 Fireeye, Inc. System and method for predicting and mitigating cybersecurity system misconfigurations
US11003773B1 (en) 2018-03-30 2021-05-11 Fireeye, Inc. System and method for automatically generating malware detection rule recommendations
US11558401B1 (en) 2018-03-30 2023-01-17 Fireeye Security Holdings Us Llc Multi-vector malware detection data sharing system for improved detection
US10956477B1 (en) 2018-03-30 2021-03-23 Fireeye, Inc. System and method for detecting malicious scripts through natural language processing modeling
US11084225B2 (en) 2018-04-02 2021-08-10 Nanotronics Imaging, Inc. Systems, methods, and media for artificial intelligence process control in additive manufacturing
CN108521423A (en) * 2018-04-10 2018-09-11 江苏亨通工控安全研究院有限公司 HWIL simulation industry control network target range system
US10867044B2 (en) * 2018-05-30 2020-12-15 AppOmni, Inc. Automatic computer system change monitoring and security gap detection system
US11314859B1 (en) 2018-06-27 2022-04-26 FireEye Security Holdings, Inc. Cyber-security system and method for detecting escalation of privileges within an access token
US11075930B1 (en) 2018-06-27 2021-07-27 Fireeye, Inc. System and method for detecting repetitive cybersecurity attacks constituting an email campaign
US11228491B1 (en) 2018-06-28 2022-01-18 Fireeye Security Holdings Us Llc System and method for distributed cluster configuration monitoring and management
US11316900B1 (en) 2018-06-29 2022-04-26 FireEye Security Holdings Inc. System and method for automatically prioritizing rules for cyber-threat detection and mitigation
US11182473B1 (en) 2018-09-13 2021-11-23 Fireeye Security Holdings Us Llc System and method for mitigating cyberattacks against processor operability by a guest process
US11763004B1 (en) 2018-09-27 2023-09-19 Fireeye Security Holdings Us Llc System and method for bootkit detection
US11153152B2 (en) 2018-11-21 2021-10-19 Cisco Technology, Inc. System and methods to validate issue detection and classification in a network assurance system
US11252046B2 (en) * 2018-12-14 2022-02-15 Juniper Networks, Inc. System for identifying and assisting in the creation and implementation of a network service configuration using Hidden Markov Models (HMMs)
US11176251B1 (en) 2018-12-21 2021-11-16 Fireeye, Inc. Determining malware via symbolic function hash analysis
US11368475B1 (en) 2018-12-21 2022-06-21 Fireeye Security Holdings Us Llc System and method for scanning remote services to locate stored objects with malware
US11743290B2 (en) 2018-12-21 2023-08-29 Fireeye Security Holdings Us Llc System and method for detecting cyberattacks impersonating legitimate sources
US11601444B1 (en) 2018-12-31 2023-03-07 Fireeye Security Holdings Us Llc Automated system for triage of customer issues
US11310238B1 (en) 2019-03-26 2022-04-19 FireEye Security Holdings, Inc. System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources
US11677786B1 (en) 2019-03-29 2023-06-13 Fireeye Security Holdings Us Llc System and method for detecting and protecting against cybersecurity attacks on servers
US11636198B1 (en) 2019-03-30 2023-04-25 Fireeye Security Holdings Us Llc System and method for cybersecurity analyzer update and concurrent management system
EP3731203B1 (en) 2019-04-24 2023-05-31 Carrier Corporation Alarm system
US11005822B2 (en) * 2019-05-03 2021-05-11 Cisco Technology, Inc. Securing substation communications using security groups based on substation configurations
US11083919B2 (en) 2019-05-29 2021-08-10 Honeywell International Inc. Operating a fire control system
US11258806B1 (en) 2019-06-24 2022-02-22 Mandiant, Inc. System and method for automatically associating cybersecurity intelligence to cyberthreat actors
US11156991B2 (en) 2019-06-24 2021-10-26 Nanotronics Imaging, Inc. Predictive process control for a manufacturing process
US11556640B1 (en) 2019-06-27 2023-01-17 Mandiant, Inc. Systems and methods for automated cybersecurity analysis of extracted binary string sets
US11392700B1 (en) 2019-06-28 2022-07-19 Fireeye Security Holdings Us Llc System and method for supporting cross-platform data verification
KR20220054673A (en) 2019-09-10 2022-05-03 나노트로닉스 이미징, 인코포레이티드 Systems, methods and media for manufacturing processes
US11886585B1 (en) 2019-09-27 2024-01-30 Musarubra Us Llc System and method for identifying and mitigating cyberattacks through malicious position-independent code execution
US11637862B1 (en) 2019-09-30 2023-04-25 Mandiant, Inc. System and method for surfacing cyber-security threats with a self-learning recommendation engine
US11218360B2 (en) 2019-12-09 2022-01-04 Quest Automated Services, LLC Automation system with edge computing
US11838300B1 (en) 2019-12-24 2023-12-05 Musarubra Us Llc Run-time configurable cybersecurity system
US11522884B1 (en) 2019-12-24 2022-12-06 Fireeye Security Holdings Us Llc Subscription and key management system
US11436327B1 (en) 2019-12-24 2022-09-06 Fireeye Security Holdings Us Llc System and method for circumventing evasive code for cyberthreat detection
DE102020111450A1 (en) * 2020-04-27 2021-10-28 Bayerische Motoren Werke Aktiengesellschaft Detecting errors in a computer network
EP4047898A1 (en) * 2021-02-17 2022-08-24 ABB Schweiz AG Defending industrial automation systems against attack
CN113098892B (en) * 2021-04-19 2023-04-18 恒安嘉新(北京)科技股份公司 Data leakage prevention system and method based on industrial Internet
CN113673966B (en) * 2021-09-03 2024-03-08 卡奥斯数字科技(青岛)有限公司 Information security construction scheme generation method and device, electronic equipment and storage medium
CN116760716B (en) * 2023-08-18 2023-11-03 南京天谷电气科技有限公司 Intelligent network topology management system and method for new energy station

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4831582A (en) * 1986-11-07 1989-05-16 Allen-Bradley Company, Inc. Database access machine for factory automation network
US5583928A (en) * 1992-06-19 1996-12-10 British Telecommunications Public Limited Company Detecting local exchange failure and resultant control of a communications network
US5774357A (en) * 1991-12-23 1998-06-30 Hoffberg; Steven M. Human factored interface incorporating adaptive pattern recognition based controller apparatus
US5796721A (en) * 1996-06-21 1998-08-18 National Instruments Corporation Method and system for monitoring fieldbus network with dynamically alterable packet filter
US6023456A (en) * 1996-12-23 2000-02-08 Nortel Networks Corporation Dynamic traffic conditioning
US6035240A (en) * 1998-11-12 2000-03-07 Moorehead; Jack Flexible distributed processing system for sensor data acquisition and control
US6169981B1 (en) * 1996-06-04 2001-01-02 Paul J. Werbos 3-brain architecture for an intelligent decision and control system
US6259705B1 (en) * 1997-09-22 2001-07-10 Fujitsu Limited Network service server load balancing device, network service server load balancing method and computer-readable storage medium recorded with network service server load balancing program
US6321272B1 (en) * 1997-09-10 2001-11-20 Schneider Automation, Inc. Apparatus for controlling internetwork communications
US6321338B1 (en) * 1998-11-09 2001-11-20 Sri International Network surveillance
US20020032871A1 (en) * 2000-09-08 2002-03-14 The Regents Of The University Of Michigan Method and system for detecting, tracking and blocking denial of service attacks over a computer network
US20020046290A1 (en) * 2000-10-12 2002-04-18 Johann Andersson Computer system
US20020108077A1 (en) * 2001-02-05 2002-08-08 Havekost Robert B. Hierarchical failure management for process control systems
US20020131366A1 (en) * 2000-05-17 2002-09-19 Sharp Clifford F. System and method for traffic management control in a data transmission network
US20030014500A1 (en) * 2001-07-10 2003-01-16 Schleiss Trevor D. Transactional data communications for process control systems
US6636721B2 (en) * 1995-11-30 2003-10-21 Mobile Satellite Ventures, Lp Network engineering/systems system for mobile satellite communication system
US6732191B1 (en) * 1997-09-10 2004-05-04 Schneider Automation Inc. Web interface to an input/output device
US6788980B1 (en) * 1999-06-11 2004-09-07 Invensys Systems, Inc. Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP network
US7047423B1 (en) * 1998-07-21 2006-05-16 Computer Associates Think, Inc. Information security analysis system
US7272815B1 (en) * 1999-05-17 2007-09-18 Invensys Systems, Inc. Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects

Family Cites Families (93)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4200770A (en) 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
GB8524455D0 (en) 1985-10-03 1985-11-06 Isolation Systems Ltd Monitoring activity of peripheral devices
US4882752A (en) 1986-06-25 1989-11-21 Lindman Richard S Computer security system
US5051837A (en) 1990-06-06 1991-09-24 Mcjunkin Thomas N Home entertainment equipment control apparatus
JP2658633B2 (en) 1991-07-10 1997-09-30 三菱電機株式会社 Communication device
US5917840A (en) 1992-03-13 1999-06-29 Foxboro Company Protection against communications crosstalk in a factory process control system
US5446903A (en) 1993-05-04 1995-08-29 International Business Machines Corporation Method and apparatus for controlling access to data elements in a data processing system based on status of an industrial process by mapping user's security categories and industrial process steps
US5371794A (en) 1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks
US5535276A (en) 1994-11-09 1996-07-09 Bell Atlantic Network Services, Inc. Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
US7139843B1 (en) 1995-05-30 2006-11-21 Roy-G-Biv Corporation System and methods for generating and communicating motion data through a distributed network
US6571141B1 (en) 1995-05-30 2003-05-27 Roy-G-Biv Corporation Application programs for motion control devices including access limitations
DE69736278T2 (en) 1996-02-22 2007-06-06 Kvaser Consultant Ab Device for influencing messages in a CAN system
US5923756A (en) 1997-02-12 1999-07-13 Gte Laboratories Incorporated Method for providing secure remote command execution over an insecure computer network
US6108785A (en) 1997-03-31 2000-08-22 Intel Corporation Method and apparatus for preventing unauthorized usage of a computer system
US6418533B2 (en) 1997-08-29 2002-07-09 Compaq Information Technologies Group, L.P. “J” system for securing a portable computer which optionally requires an entry of an invalid power on password (POP), by forcing an entry of a valid POP
US20020152289A1 (en) 1997-09-10 2002-10-17 Schneider Automation Inc. System and method for accessing devices in a factory automation network
US7035898B1 (en) 1997-09-10 2006-04-25 Schneider Automation Inc. System for programming a factory automation device using a web browser
US6470386B1 (en) 1997-09-26 2002-10-22 Worldcom, Inc. Integrated proxy interface for web based telecommunications management tools
US6088679A (en) 1997-12-01 2000-07-11 The United States Of America As Represented By The Secretary Of Commerce Workflow management employing role-based access control
US6088804A (en) * 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US6754820B1 (en) 2001-01-30 2004-06-22 Tecsec, Inc. Multiple level access system
US6298445B1 (en) 1998-04-30 2001-10-02 Netect, Ltd. Computer security
US6374358B1 (en) * 1998-08-05 2002-04-16 Sun Microsystems, Inc. Adaptive countermeasure selection method and apparatus
DE19848618A1 (en) 1998-10-21 2000-06-29 Siemens Ag System and method for remote maintenance and / or remote diagnosis of an automation system via email
EP1024239B1 (en) * 1999-01-28 2005-03-23 International Business Machines Corporation Electronic access control system and method
US6542993B1 (en) * 1999-03-12 2003-04-01 Lucent Technologies Inc. Security management system and method
US6842860B1 (en) 1999-07-23 2005-01-11 Networks Associates Technology, Inc. System and method for selectively authenticating data
US6609198B1 (en) 1999-08-05 2003-08-19 Sun Microsystems, Inc. Log-on service providing credential level change without loss of session continuity
US7010590B1 (en) 1999-09-15 2006-03-07 Datawire Communications Networks, Inc. System and method for secure transactions over a network
WO2001026335A2 (en) 1999-10-06 2001-04-12 Sensoria Corporation Distributed signal processing in a network
US7020701B1 (en) 1999-10-06 2006-03-28 Sensoria Corporation Method for collecting and processing data using internetworked wireless integrated network sensors (WINS)
US6957348B1 (en) 2000-01-10 2005-10-18 Ncircle Network Security, Inc. Interoperability of vulnerability and intrusion detection systems
US6883101B1 (en) * 2000-02-08 2005-04-19 Harris Corporation System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules
US6421571B1 (en) 2000-02-29 2002-07-16 Bently Nevada Corporation Industrial plant asset management system: apparatus and method
US7127526B1 (en) 2000-03-20 2006-10-24 Nortel Networks Limited Method and apparatus for dynamically loading and managing software services on a network device
AU2001249287A1 (en) 2000-03-21 2001-10-03 Charles M. Leedom Jr. A tiered wireless, multi-modal access system and method
US7089303B2 (en) * 2000-05-31 2006-08-08 Invicta Networks, Inc. Systems and methods for distributed network protection
US7069580B1 (en) 2000-06-16 2006-06-27 Fisher-Rosemount Systems, Inc. Function-based process control verification and security in a process control system
WO2002010887A2 (en) 2000-07-28 2002-02-07 Jan Pathuel Method and system of securing data and systems
US6760782B1 (en) 2000-08-04 2004-07-06 Schneider Automation Inc. Apparatus for controlling internetwork communications
US7058154B1 (en) 2000-08-08 2006-06-06 General Electric Company Systems and methods for managing assets using an interactive database
US9027121B2 (en) 2000-10-10 2015-05-05 International Business Machines Corporation Method and system for creating a record for one or more computer security incidents
US20020078153A1 (en) 2000-11-02 2002-06-20 Chit Chung Providing secure, instantaneous, directory-integrated, multiparty, communications services
US7349987B2 (en) 2000-11-13 2008-03-25 Digital Doors, Inc. Data security system and method with parsing and dispersion techniques
US7146644B2 (en) 2000-11-13 2006-12-05 Digital Doors, Inc. Data security system and method responsive to electronic attacks
US20020120728A1 (en) * 2000-12-22 2002-08-29 Jason Braatz Method and apparatus for network-enablement of devices using device intelligence and network architecture
US6735601B1 (en) 2000-12-29 2004-05-11 Vmware, Inc. System and method for remote file access by computer
US7360075B2 (en) 2001-02-12 2008-04-15 Aventail Corporation, A Wholly Owned Subsidiary Of Sonicwall, Inc. Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
US7013395B1 (en) * 2001-03-13 2006-03-14 Sandra Corporation Method and tool for network vulnerability analysis
US6920558B2 (en) 2001-03-20 2005-07-19 Networks Associates Technology, Inc. Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system
US20020147820A1 (en) 2001-04-06 2002-10-10 Docomo Communications Laboratories Usa, Inc. Method for implementing IP security in mobile IP networks
FI110464B (en) 2001-04-26 2003-01-31 Nokia Corp IP security and mobile network connections
US7061899B2 (en) 2001-05-01 2006-06-13 Hewlett-Packard Development Company, L.P. Method and apparatus for providing network security
FR2824936B1 (en) 2001-05-16 2005-09-02 Schneider Automation PREDICTIVE DIAGNOSTIC SYSTEM IN A PROGRAMMABLE AUTOMATE
US7076801B2 (en) 2001-06-11 2006-07-11 Research Triangle Institute Intrusion tolerant server system
US20020199122A1 (en) 2001-06-22 2002-12-26 Davis Lauren B. Computer security vulnerability analysis methodology
US7243374B2 (en) * 2001-08-08 2007-07-10 Microsoft Corporation Rapid application security threat analysis
EP1298506A1 (en) 2001-09-27 2003-04-02 Siemens Aktiengesellschaft Dynamic access to automation resources
US20030105535A1 (en) 2001-11-05 2003-06-05 Roman Rammler Unit controller with integral full-featured human-machine interface
US7200613B2 (en) 2001-11-09 2007-04-03 Xerox Corporation Asset management system for network-based and non-network-based assets and information
US7254601B2 (en) 2001-12-20 2007-08-07 Questra Corporation Method and apparatus for managing intelligent assets in a distributed environment
AU2002360844A1 (en) 2001-12-31 2003-07-24 Citadel Security Software Inc. Automated computer vulnerability resolution system
US7093121B2 (en) 2002-01-10 2006-08-15 Mcafee, Inc. Transferring data via a secure network connection
US7734716B2 (en) 2002-01-24 2010-06-08 Ge Fanuc Automation North America, Inc. Methods and systems for management and control of an automation control module
DE60308251T2 (en) 2002-04-17 2007-08-30 Canon K.K. Device for the provision of public key certificates
IL165288A0 (en) 2002-05-22 2005-12-18 Lucid Security Corp Adaptive intrusion detection system
US7193993B2 (en) 2002-05-23 2007-03-20 Intel Corporation Integrated medium access control device and physical layer device
US7448077B2 (en) 2002-05-23 2008-11-04 International Business Machines Corporation File level security for a metadata controller in a storage area network
US7536548B1 (en) * 2002-06-04 2009-05-19 Rockwell Automation Technologies, Inc. System and methodology providing multi-tier-security for network data exchange with industrial control components
US20030229812A1 (en) 2002-06-05 2003-12-11 Cristina Buchholz Authorization mechanism
US20030233573A1 (en) 2002-06-18 2003-12-18 Phinney Thomas L. System and method for securing network communications
US7370350B1 (en) 2002-06-27 2008-05-06 Cisco Technology, Inc. Method and apparatus for re-authenticating computing devices
US20040015619A1 (en) 2002-07-18 2004-01-22 International Business Machines Corporation Method and system for monitoring the status and operation of devices from a central location
US7770212B2 (en) 2002-08-15 2010-08-03 Activcard System and method for privilege delegation and control
US7441114B2 (en) 2002-09-10 2008-10-21 Ge Fanuc Automation North America, Inc. Methods and systems for management and control of an automation control module
DE10242917A1 (en) 2002-09-16 2004-03-25 Siemens Ag System for recording and displaying a secure status of devices
US20040059920A1 (en) * 2002-09-19 2004-03-25 International Business Machines Corporation Security health checking tool
US20040075590A1 (en) 2002-09-25 2004-04-22 Pearson Esther Mae E-learning biometric identification information system
US20040107345A1 (en) 2002-10-21 2004-06-03 Brandt David D. System and methodology providing automation security protocols and intrusion detection in an industrial controller environment
US20040139353A1 (en) 2002-11-19 2004-07-15 Forcade Jonathan Brett Methodology and system for real time information system application intrusion detection
US20040260954A1 (en) 2003-06-19 2004-12-23 Schneider Automation Inc. Biometrics PLC access and control system and method
US20050021839A1 (en) 2003-06-23 2005-01-27 Russell Thomas C. Method and apparatus for providing a selectively isolated equipment area network for machine elements with data communication therebetween and with remote sites
US8190893B2 (en) 2003-10-27 2012-05-29 Jp Morgan Chase Bank Portable security transaction protocol
US7761460B1 (en) 2004-02-04 2010-07-20 Rockwell Automation Technologies, Inc. Systems and methods that utilize a standard database interface to access data within an industrial device
US7437551B2 (en) 2004-04-02 2008-10-14 Microsoft Corporation Public key infrastructure scalability certificate revocation status validation
US7950044B2 (en) 2004-09-28 2011-05-24 Rockwell Automation Technologies, Inc. Centrally managed proxy-based security for legacy automation systems
US7716489B1 (en) 2004-09-29 2010-05-11 Rockwell Automation Technologies, Inc. Access control method for disconnected automation systems
US8429393B1 (en) 2004-09-30 2013-04-23 Rockwell Automation Technologies, Inc. Method for obscuring a control device's network presence by dynamically changing the device's network addresses using a cryptography-based pattern
US7370202B2 (en) 2004-11-02 2008-05-06 Voltage Security, Inc. Security device for cryptographic communications
US7990967B2 (en) 2005-01-06 2011-08-02 Rockwell Automation Technologies, Inc. Firewall method and apparatus for industrial systems
US7900247B2 (en) 2005-03-14 2011-03-01 Microsoft Corporation Trusted third party authentication for web services
US8732658B2 (en) 2006-09-29 2014-05-20 Rockwell Automation Technologies, Inc. Layered interface in an industrial environment
US8776092B2 (en) 2006-09-29 2014-07-08 Rockwell Automation Technologies, Inc. Multiple interface support

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4831582A (en) * 1986-11-07 1989-05-16 Allen-Bradley Company, Inc. Database access machine for factory automation network
US5774357A (en) * 1991-12-23 1998-06-30 Hoffberg; Steven M. Human factored interface incorporating adaptive pattern recognition based controller apparatus
US5583928A (en) * 1992-06-19 1996-12-10 British Telecommunications Public Limited Company Detecting local exchange failure and resultant control of a communications network
US6636721B2 (en) * 1995-11-30 2003-10-21 Mobile Satellite Ventures, Lp Network engineering/systems system for mobile satellite communication system
US6169981B1 (en) * 1996-06-04 2001-01-02 Paul J. Werbos 3-brain architecture for an intelligent decision and control system
US5796721A (en) * 1996-06-21 1998-08-18 National Instruments Corporation Method and system for monitoring fieldbus network with dynamically alterable packet filter
US6023456A (en) * 1996-12-23 2000-02-08 Nortel Networks Corporation Dynamic traffic conditioning
US6321272B1 (en) * 1997-09-10 2001-11-20 Schneider Automation, Inc. Apparatus for controlling internetwork communications
US6732191B1 (en) * 1997-09-10 2004-05-04 Schneider Automation Inc. Web interface to an input/output device
US6259705B1 (en) * 1997-09-22 2001-07-10 Fujitsu Limited Network service server load balancing device, network service server load balancing method and computer-readable storage medium recorded with network service server load balancing program
US7047423B1 (en) * 1998-07-21 2006-05-16 Computer Associates Think, Inc. Information security analysis system
US6321338B1 (en) * 1998-11-09 2001-11-20 Sri International Network surveillance
US6035240A (en) * 1998-11-12 2000-03-07 Moorehead; Jack Flexible distributed processing system for sensor data acquisition and control
US7272815B1 (en) * 1999-05-17 2007-09-18 Invensys Systems, Inc. Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects
US6788980B1 (en) * 1999-06-11 2004-09-07 Invensys Systems, Inc. Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP network
US20020131366A1 (en) * 2000-05-17 2002-09-19 Sharp Clifford F. System and method for traffic management control in a data transmission network
US20020032871A1 (en) * 2000-09-08 2002-03-14 The Regents Of The University Of Michigan Method and system for detecting, tracking and blocking denial of service attacks over a computer network
US20020046290A1 (en) * 2000-10-12 2002-04-18 Johann Andersson Computer system
US20020108077A1 (en) * 2001-02-05 2002-08-08 Havekost Robert B. Hierarchical failure management for process control systems
US20030014500A1 (en) * 2001-07-10 2003-01-16 Schleiss Trevor D. Transactional data communications for process control systems

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9160546B2 (en) * 2012-06-05 2015-10-13 Broadcom Corporation Authenticating users based upon an identity footprint
US20150058961A1 (en) * 2012-06-05 2015-02-26 Broadcom Corporation Authenticating users based upon an identity footprint
US10318903B2 (en) 2016-05-06 2019-06-11 General Electric Company Constrained cash computing system to optimally schedule aircraft repair capacity with closed loop dynamic physical state and asset utilization attainment control
US10318904B2 (en) 2016-05-06 2019-06-11 General Electric Company Computing system to control the use of physical state attainment of assets to meet temporal performance criteria
US10841322B2 (en) 2018-01-18 2020-11-17 General Electric Company Decision system and method for separating faults from attacks
US11363043B2 (en) 2018-06-06 2022-06-14 Reliaquest Holdings, Llc Threat mitigation system and method
US11108798B2 (en) 2018-06-06 2021-08-31 Reliaquest Holdings, Llc Threat mitigation system and method
US10721252B2 (en) * 2018-06-06 2020-07-21 Reliaquest Holdings, Llc Threat mitigation system and method
US10735443B2 (en) * 2018-06-06 2020-08-04 Reliaquest Holdings, Llc Threat mitigation system and method
US10735444B2 (en) 2018-06-06 2020-08-04 Reliaquest Holdings, Llc Threat mitigation system and method
WO2019236805A1 (en) 2018-06-06 2019-12-12 Reliaquest Holdings, Llc Threat mitigation system and method
US10848512B2 (en) 2018-06-06 2020-11-24 Reliaquest Holdings, Llc Threat mitigation system and method
US10848506B2 (en) 2018-06-06 2020-11-24 Reliaquest Holdings, Llc Threat mitigation system and method
US10848513B2 (en) 2018-06-06 2020-11-24 Reliaquest Holdings, Llc Threat mitigation system and method
US10855711B2 (en) 2018-06-06 2020-12-01 Reliaquest Holdings, Llc Threat mitigation system and method
US10855702B2 (en) 2018-06-06 2020-12-01 Reliaquest Holdings, Llc Threat mitigation system and method
US10951641B2 (en) 2018-06-06 2021-03-16 Reliaquest Holdings, Llc Threat mitigation system and method
US10965703B2 (en) 2018-06-06 2021-03-30 Reliaquest Holdings, Llc Threat mitigation system and method
US11921864B2 (en) 2018-06-06 2024-03-05 Reliaquest Holdings, Llc Threat mitigation system and method
US11709946B2 (en) 2018-06-06 2023-07-25 Reliaquest Holdings, Llc Threat mitigation system and method
US11687659B2 (en) * 2018-06-06 2023-06-27 Reliaquest Holdings, Llc Threat mitigation system and method
US11637847B2 (en) 2018-06-06 2023-04-25 Reliaquest Holdings, Llc Threat mitigation system and method
US11611577B2 (en) 2018-06-06 2023-03-21 Reliaquest Holdings, Llc Threat mitigation system and method
US11588838B2 (en) * 2018-06-06 2023-02-21 Reliaquest Holdings, Llc Threat mitigation system and method
US11095673B2 (en) 2018-06-06 2021-08-17 Reliaquest Holdings, Llc Threat mitigation system and method
US11528287B2 (en) 2018-06-06 2022-12-13 Reliaquest Holdings, Llc Threat mitigation system and method
US20190379703A1 (en) * 2018-06-06 2019-12-12 Reliaquest Holdings, Llc Threat mitigation system and method
US20220337614A1 (en) * 2018-06-06 2022-10-20 Reliaquest Holdings, Llc Threat mitigation system and method
US11265338B2 (en) 2018-06-06 2022-03-01 Reliaquest Holdings, Llc Threat mitigation system and method
EP3803658A4 (en) * 2018-06-06 2022-03-23 Reliaquest Holdings, LLC Threat mitigation system and method
EP3803656A4 (en) * 2018-06-06 2022-03-23 Reliaquest Holdings, LLC Threat mitigation system and method
US11297080B2 (en) 2018-06-06 2022-04-05 Reliaquest Holdings, Llc Threat mitigation system and method
US11323462B2 (en) 2018-06-06 2022-05-03 Reliaquest Holdings, Llc Threat mitigation system and method
US20190379702A1 (en) * 2018-06-06 2019-12-12 Reliaquest Holdings, Llc Threat mitigation system and method
US11374951B2 (en) 2018-06-06 2022-06-28 Reliaquest Holdings, Llc Threat mitigation system and method
USD926810S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926809S1 (en) 2019-06-05 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926811S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926782S1 (en) 2019-06-06 2021-08-03 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
USD926200S1 (en) 2019-06-06 2021-07-27 Reliaquest Holdings, Llc Display screen or portion thereof with a graphical user interface
US11100221B2 (en) 2019-10-08 2021-08-24 Nanotronics Imaging, Inc. Dynamic monitoring and securing of factory processes, equipment and automated systems
US11693956B2 (en) 2019-10-08 2023-07-04 Nanotronics Imaging, Inc. Dynamic monitoring and securing of factory processes, equipment and automated systems
US11163890B2 (en) 2019-10-09 2021-11-02 United States Of America As Represented By The Secretary Of The Navy Self-targeting method of automated cybersecurity analysis on an operating system
US11086988B1 (en) 2020-02-28 2021-08-10 Nanotronics Imaging, Inc. Method, systems and apparatus for intelligently emulating factory control systems and simulating response data
US11663327B2 (en) 2020-02-28 2023-05-30 Nanotronics Imaging, Inc. Method, systems and apparatus for intelligently emulating factory control systems and simulating response data
US11706235B2 (en) * 2020-08-06 2023-07-18 Robert Bosch Gmbh Method and device for processing data of a technical system

Also Published As

Publication number Publication date
US20040117624A1 (en) 2004-06-17
EP1420317A3 (en) 2005-12-21
US8909926B2 (en) 2014-12-09
EP1420317A2 (en) 2004-05-19
EP1420317B1 (en) 2016-12-14

Similar Documents

Publication Publication Date Title
US8909926B2 (en) System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US10862902B2 (en) System and methodology providing automation security analysis and network intrusion protection in an industrial environment
US20240073242A1 (en) Cyber security appliance for an operational technology network
US9961099B2 (en) Systems and methods for detecting and tracking adversary trajectory
US11595396B2 (en) Enhanced smart process control switch port lockdown
US9853999B2 (en) Context-aware knowledge system and methods for deploying deception mechanisms
US11153277B2 (en) Security system, device, and method for internet of things networks
Rubio et al. Analysis of Intrusion Detection Systems in Industrial Ecosystems.
US20060236374A1 (en) Industrial dynamic anomaly detection method and apparatus
US10530749B1 (en) Security system, device, and method for operational technology networks
Flaus Cybersecurity of industrial systems
Settanni et al. Protecting cyber physical production systems using anomaly detection to enable self-adaptation
Ulltveit-Moe et al. Secure information sharing in an industrial Internet of Things
US20180309724A1 (en) Control plane network security
Hilal et al. Network security analysis SCADA system automation on industrial process
Settanni et al. Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems.
CN115981274A (en) Safety protection system of industrial control system
McNeil Secure IoT deployment in the cement industry
Wei et al. On protecting industrial automation and control systems against electronic attacks
Rehan Cybersecurity with AWS IoT
Shikhaliyev Cybersecurity analysis of industrial control systems
Tedeschi A systematic design approach to IOT security for legacy production machinery
Jeong et al. CBSS: Cloud-Based Security System with Interface to Network Security Functions
Krimmling et al. 18 Intrusion Detection Systems for (Wireless) Automation Systems
Sapkota Security evaluation of substation network architectures

Legal Events

Date Code Title Description
AS Assignment

Owner name: ROCKWELL AUTOMATION TECHNOLOGIES, INC., OHIO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRANDT, DAVID D.;HALL, KENWOOD;ANDERSON, MARK BURTON;AND OTHERS;SIGNING DATES FROM 20030904 TO 20031217;REEL/FRAME:034122/0426

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION