×

Process control methods and apparatus for intrusion detection, protection and network hardening

  • US 7,761,923 B2
  • Filed: 03/01/2005
  • Issued: 07/20/2010
  • Est. Priority Date: 03/01/2004
  • Status: Active Grant
First Claim
Patent Images

1. A digital data network for use with process control systems, computer-based manufacturing/production control systems, environmental control systems, and/or industrial control system (collectively, “

  • control systems”

    ), the digital data network comprising;

    A. a plurality of digital data devices,B. network media that is coupled to digital data devices to support communications therewith,C. the digital data network comprising a first zone and a second zone, each zone including one or more of the digital data devices and the network media that is coupled thereto, the first zone comprising digital data devices executing business applications, the second zone comprising devices that monitor and control a control system,D. the network media of the first zone being coupled for at least selected communications to a network external to the digital data network by a first firewall and any of a first intrusion protection system (IPS) and a first intrusion detection system (IDS), andE. the network media of the second zone being coupled for selected communications to the first zone by a second firewall and any of a second intrusion protection system (IPS) and a second intrusion detection system (IDS),F. wherein any of the first IPS and first IDS implements security protocols tailored to connectivity requirements or traffic patterns of the first zone, and any of the second IPS and second IDS implements security protocols tailored to connectivity requirements or traffic patterns of the second zone, at least one of said security protocols implemented in the first or second zones utilizing signature-based detection, where signature-based detection utilized in the first zone, if any, comprises signatures specific to business networks and signature-based detection utilized in the second zone, if any, comprises signatures specific to control networks.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×