×

Method for controlling transmission security of industrial communications flow based on SDN architecture

  • US 10,447,655 B2
  • Filed: 12/25/2015
  • Issued: 10/15/2019
  • Est. Priority Date: 07/29/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling transmission security of an industrial communication data flow based on a software defined network (SDN) architecture, which comprises the following steps:

  • Step 1;

    after receiving an industrial communication data flow sent by an industrial control terminal, an SDN switch parses a data packet, checks for a matching data packet in a flow table stored therein entry by entry, and;

    when the data packet is matched with a certain entry of the flow table, proceeds to step 2; and

    when the data packet is not matched with any entry of the flow table, proceeds to step 3;

    Step 2;

    the SDN switch checks a security control identifier of the corresponding matched entry of the flow table, and;

    when the security control identifier is a first identifier, sends a request to detect communication content, with a flow ID, an industrial communication protocol type, and application layer information in the data packet, to a management controller and proceeds to step 4; and

    when the security control identifier is a Second identifier, the SDN switch executes corresponding operations according to actions in the flow table;

    Step 3;

    the SDN switch sends the data packet to the management controller, the management controller parses the data packet, establishes a flow transmission path, computes forwarded flow table information, allocates a flow ID for the data packet using an internal basic service function, and judges whether the industrial communication data flow needs security control through a flow security control module, and;

    when it is determined that security control is needed, sets the security control identifier in the flow table information to the first identifier; and

    when it is determined that security control is not needed, sets the security control identifier to the second identifier, and the management controller then sends the flow table information to all SDN switches on the flow transmission path;

    Step 4;

    the flow security control module performs in-depth parsing on the application layer information in the data packet according to different industrial communication protocols, checks for matches of the parsing result with each industrial rule policy in an industrial rule policy database, and;

    when matching is successful, sends a detection result to the SDN switch, and proceeds to step 5; and

    when matching is not successful, informs the SDN switch to drop the overall industrial communication data flow; and

    Step 5;

    the SDN switch further processes the industrial communication data flow according to the detection result.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×