CPC H04L 63/1425 (2013.01) [G05B 19/4183 (2013.01); G05B 19/41885 (2013.01); G06F 21/50 (2013.01); G06F 21/53 (2013.01); H04L 63/1408 (2013.01)] | 12 Claims |
1. A computer-implemented method for detecting a cyber-attack on a machine controller controlling a machine, the method comprising:
a) running a concurrent simulation of the machine on a computer in a secured access domain;
b) transmitting, from the machine controller, actual control data to the machine and resulting monitoring data to a monitoring device;
c) transmitting sensor data of the machine to the concurrent simulation on a first secured transmission path;
d) simulating, by the concurrent simulation, an operational behavior of the machine based on the sensor data, thus inferring simulated monitoring data;
e) comparing the simulated monitoring data with the resulting monitoring data; and
f) triggering an alarm signal depending on the comparing.
|