{"title":"基于IEC 61499控制软件的远程监控基础设施","authors":"M. Wenger, Alois Zoitl, J. Blech, I. Peake","doi":"10.1109/ICUMT.2016.7765387","DOIUrl":null,"url":null,"abstract":"In this paper, we present our work on monitoring of control software behavior for PLCs. In particular, we are looking at IEC 61499-based software specifications. Monitoring is done remotely, i.e., the interface behavior of function blocks is streamed to a cloud-based service. Specifications are realized using formal languages such as 1) regular expressions, 2) timed automata, 3) temporal logic. Monitors can be automatically generated from these languages. Using our specifications, we are able to detect abnormal behavior in control software such as timing changes that can, e.g., show the presence of memory leaks or a virus. We demonstrate our ideas using an example.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Remote monitoring infrastructure for IEC 61499 based control software\",\"authors\":\"M. Wenger, Alois Zoitl, J. Blech, I. Peake\",\"doi\":\"10.1109/ICUMT.2016.7765387\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present our work on monitoring of control software behavior for PLCs. In particular, we are looking at IEC 61499-based software specifications. Monitoring is done remotely, i.e., the interface behavior of function blocks is streamed to a cloud-based service. Specifications are realized using formal languages such as 1) regular expressions, 2) timed automata, 3) temporal logic. Monitors can be automatically generated from these languages. Using our specifications, we are able to detect abnormal behavior in control software such as timing changes that can, e.g., show the presence of memory leaks or a virus. We demonstrate our ideas using an example.\",\"PeriodicalId\":174688,\"journal\":{\"name\":\"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICUMT.2016.7765387\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICUMT.2016.7765387","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Remote monitoring infrastructure for IEC 61499 based control software
In this paper, we present our work on monitoring of control software behavior for PLCs. In particular, we are looking at IEC 61499-based software specifications. Monitoring is done remotely, i.e., the interface behavior of function blocks is streamed to a cloud-based service. Specifications are realized using formal languages such as 1) regular expressions, 2) timed automata, 3) temporal logic. Monitors can be automatically generated from these languages. Using our specifications, we are able to detect abnormal behavior in control software such as timing changes that can, e.g., show the presence of memory leaks or a virus. We demonstrate our ideas using an example.