Detecting PLC Program Malicious Behaviors Based on State Verification

Author(s):  
Tianyou Chang ◽  
Qiang Wei ◽  
Wenwen Liu ◽  
Yangyang Geng
2015 ◽  
Vol 9 (10) ◽  
pp. 165-176
Author(s):  
Jung-Uk Joo ◽  
Incheol Shin ◽  
Tong-Wook Hwang ◽  
Minsoo Kim

2014 ◽  
Vol 721 ◽  
pp. 265-268
Author(s):  
Mao Qi Huang ◽  
Jian Hong Ke ◽  
Xiao Long Wu

Greenhouse environment system is an often nonlinear, change and inertia complex system. It is very hard to build math model and control. Since moisture and temperature have a influence to crops grow, we select them to build the manner of control system, applying fuzzy control system to design moisture and temperature controller, and to write fuzzy control program based PLC, then we should observe the factual control effect. The result of system running show: when temperature is set to 25oC and moisture is 80%RH, the process of control is stable and the system is very stable, it can meet the greenhouse requirement.


2015 ◽  
Vol 713-715 ◽  
pp. 863-866
Author(s):  
Guang Yue Yang ◽  
San Peng Deng ◽  
Yu Ming Qi

With the continuous development of milling machine, the normal milling machine was not suitable with modern processing. In order to adapt to the requirements of modern production process and quality, the electrical control system of milling machine need be improved. The electrical control system and circuit of X62W milling machine is analyzed and designed. The PLC program is compiled. All of it is proved to be reasonably and feasibly based on the experimental results.


2019 ◽  
Vol 51 (02) ◽  
pp. 267-285 ◽  
Author(s):  
Jeff Luckstead ◽  
Stephen Devadoss

AbstractWe analyze the effects of Price Loss Coverage (PLC), Agriculture Risk Coverage (ARC), individual revenue protection insurance (RP), and Supplemental Coverage Option (SCO) on the RP coverage level, certainty equivalent, and program payments. The model is calibrated to a representative wheat farm in Mitchell County in Kansas to analyze the effects of various policies. The result highlights that when insurance is framed as an investment, cumulative prospect theory predicts farmers’ coverage decisions accurately at 70%. ARC or PLC program increases the RP coverage level to 75%, but PLC and SCO jointly decrease the RP coverage level to 70%.


Energies ◽  
2019 ◽  
Vol 12 (7) ◽  
pp. 1223 ◽  
Author(s):  
Jianlei Gao ◽  
Senchun Chai ◽  
Baihai Zhang ◽  
Yuanqing Xia

Recently, network attacks launched by malicious attackers have seriously affected modern life and enterprise production, and these network attack samples have the characteristic of type imbalance, which undoubtedly increases the difficulty of intrusion detection. In response to this problem, it would naturally be very meaningful to design an intrusion detection system (IDS) to effectively and quickly identify and detect malicious behaviors. In our work, we have proposed a method for an IDS-combined incremental extreme learning machine (I-ELM) with an adaptive principal component (A-PCA). In this method, the relevant features of network traffic are adaptively selected, where the best detection accuracy can then be obtained by I-ELM. We have used the NSL-KDD standard dataset and UNSW-NB15 standard dataset to evaluate the performance of our proposed method. Through analysis of the experimental results, we can see that our proposed method has better computation capacity, stronger generalization ability, and higher accuracy.


2015 ◽  
Vol 734 ◽  
pp. 194-197
Author(s):  
You De Ruan

This paper describes the construction of remote online access to PLC Laboratory based on Internet .The Laboratory apply industrial communication modules, relay on the powerful ommunications capabilities of Siemens PLC , transfer data by the Internet. The PLC of the Laboratory can be accessed by remote PC. The remote PC possible upload and download PLC program, online diagnosis, online monitoring, etc; and directly observed action of PLC by video, determine equipment movement is whether correct or error. The paper introduces the network topology, various functions and data security communication method of the system.


Sign in / Sign up

Export Citation Format

Share Document