The required device statistics are harvested by creating a Modbus server on the test system and polling the server to retrieve data. This chapter discusses the development of an anomaly detection system for a SEL-3505 RTAC programmable logic controller using the recommended IEC 61131 programming tools. Host-based anomaly detection can be used in a defense-in-depth strategy to complement traditional network-based anomaly detection systems as well in systems for which network-based options are infeasible due to their operating environments. These devices along with collectable statistics can be leveraged as sensors for network-based and host-based anomaly detection. Schweitzer Engineering Laboratories, Inc.Cyber-physical systems incorporate powerful devices that are used to monitor and control physical processes.
Gain engineering access to station IEDs through a single serial port, external modem, or high-speed network connection. You can also normalize IED data into common data types, time-stamp formats, and time zones. Map and scale data points easily between protocols in small and large systems. These messages can be used for logic and control in the station or converted to DNP3 or other protocol for SCADA usage. Use the IEEE C37.118 client protocol to integrate synchrophasor messages from relays or PMUs in your system. The two rear Ethernet ports can optionally be copper or fiber-optic connectors. Each serial port can be used in software-selectable EIA-232 or EIA-485 mode. Apply any available client or server protocol on any serial or Ethernet port. Create innovative logic solutions directly in ACSELERATOR RTAC using any of the editor tools: Tag Processor, Structured Text, Ladder Logic, or Continuous Function Chart. Comply with NERC/CIP user authentication, logging, and port control requirements. Use Lightweight Directory Access Protocol (LDAP) for central user authentication. Assign individual user and role-based account authentication and strong passwords. Any tasks not approved by the whitelist are blocked from operation. Protect your RTAC system with exe-GUARD®, which uses advanced cryptographic algorithms to authorize the execution of any program or service on the system. Protection Against Malware and Other Cybersecurity Threats.
Because it is web-based, no special software is needed for viewing HMI displays. Build custom human-machine interface (HMI) displays quickly and easily without the need for mapping data tags. Poll and send data sets and reports from other IEDs with IEC 61850 MMS client/server. Integrate high-speed control schemes between the RTAC and relays with IEC 61850 GOOSE peerto-peer messaging. Depend on a rugged device designed and tested to meet or exceed protective relay standards for vibration, electrical surges, fast transients, and extreme temperatures, as well as meet or exceed IEEE 1613, Standard Environmental and Testing Requirements for Communications Networking Devices in Electric Power Substations. Use a single RTAC as a protocol gateway, RTU, logic processor, PAC, engineering port server, event processor, and system-wide SER logger/viewer. Multiple Device Functions in One Reliable Device. The Tag Processor provides methods to map data relationships between communications protocols visually. Build a system quickly using preconfigured device templates for SEL relays and other communications connections. Major Features and Benefits ➤ Simple Setup With ACSELERATOR RTAC® SEL-5033 Software. RTAC SEL-3530-4 Real-Time Automation Controller As a more compact version of the SEL-3530, the SEL-3530-4 Real-Time Automation Controller (RTAC) is also a powerful automation platform that combines the best features of the embedded microcomputer form factor, embedded real-time operating system, and secure communications framework with IEC 61131-3 PLC programmability.