US develops software algorithms to detect network attacks

Source: Internet
Author: User
Keywords Control system

Researchers at North Carolina State University 14th said they developed a software that could detect http://www.aliyun.com/zixun/aggregation/10370.html "> Cyber attacks against networked control systems, The device that is attacked by the network is isolated from the rest of the network control system.

The network control system is the basic path between the computer and the actual equipment (pathways), for example, the modern building connects the temperature sensor, the air conditioner and the user control system to be connected with the network control system usually. In the United States, networked control systems are widely used to coordinate traffic, power and other public infrastructure operations.

However, in a larger context, networked control systems are becoming increasingly important for national infrastructure, such as transportation and electricity. These networked control systems are vulnerable to network attacks because they rely on wireless or Internet connectivity. The "Flame (Flame)" Virus and the "Super factory" virus are undoubtedly representative of High-profile attacks on networked control systems in recent years and causing great damage.

As networked control systems grow larger and more complex, system designers have abandoned system devices (or proxies) by using a single central computer center (or brain) to coordinate the mode of operation of various devices instead of "distributed networked control systems" that allow all system devices (or agents) to work together. In distributed networked control systems, it is as if there are many small computing centers to coordinate the operation of the equipment. The distributed networked control system is not only more secure, but also allows the device to run more efficiently.

The researchers said when a device in a distributed networked control system suffers network attacks and is embezzled, the software developed by them can detect the situation and then isolate the "medium recruit" device from the rest of the system to protect the other parts so that the entire system continues to function properly.

For a single central control system, if a central computer is misused by hackers, it means the entire system will be out of control. The new software allows distributed control systems to be more competitive in terms of aggressiveness and security than a central computer-centric control system.

Zhou Meiuan, a professor of electronics and computer engineering at North Carolina State University, says the new software can be merged directly into the code used to manipulate existing distributed control systems with only minor changes. It does not require comprehensive modifications to existing systems.

Zengwente, a

PhD candidate, said their research shows that the new software can play a role in detecting network attacks and isolating devices, and it is now the task of further testing new software in a variety of network attack scenarios to optimize its success rate and system performance for detecting cyber attacks.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.