Abnormality detecting method based on industrial control system network traffic

An industrial network and anomaly detection technology, which is applied in the field of information security, can solve problems such as no breakthrough progress, ineffective detection of industrial network traffic anomalies, and difficulty in meeting industrial network security needs.

Inactive Publication Date: 2014-03-26
BEIJING UNIV OF TECH
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the research on the security of industrial control systems has a history of more than 30 years, since the network security technology from the traditional Internet cannot be simply transplanted to the industrial control network, no breakthrough has been made so far. Anomaly detection is also still in the early stages of research
[0004] The existing industrial network anomaly detection methods at home and abroad mainly include anomaly detection based on autoregressive process, anomaly detection based on hidden Markov model, anomaly detection based on neural network, etc., but these methods basically follow the traditional Ethernet scheme , the effect of anomaly detection on industrial network traffic is not obvious
Industrial control systems are generally applicable to industries such as energy, electric power, chemical industry, transportation, and manufacturing. The characteristics of traffic in industrial control systems are different from those of traditional Ethernet. Therefore, it is difficult to directly apply traditional Ethernet solutions to meet the current requirements. Security Requirements for Industrial Networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormality detecting method based on industrial control system network traffic
  • Abnormality detecting method based on industrial control system network traffic
  • Abnormality detecting method based on industrial control system network traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Attached below figure 1 Introduce the steps of the realization method of the present invention in detail:

[0015] See attached figure 1 , The invention is an abnormal detection method of network traffic of an industrial control system. The detection method is divided into three modules: 1. The data preprocessing module is responsible for the processing of the data flow in the early stage; 2. The flow modeling module establishes a normal model and an abnormal model according to the low-frequency power and distribution of normal flow and abnormal flow, so as to calculate the low-frequency power and critical value; 3 anomaly detection module detects abnormality of unknown flow according to low frequency power and critical value. The specific process is as follows:

[0016] First, use the data preprocessing module to perform data preprocessing on the industrial control system network traffic.

[0017] The industrial control system experimental platform here adopts the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an abnormality detecting method based on industrial control system network traffic and belongs to the field of information security. The industrial control system network traffic is collected, by analyzing the traffic features, the fact that normal traffic and abnormal traffic samples are evidently different in terms of power spectral density is discovered when a digital signal processing method is used to convert traffic signals from a time domain to a frequency domain, a low-frequency power sum critical value is found by analyzing the difference features in a large amount of historical data, if the low-frequency power of a to-be-detected sample is larger than the critical value, the sample traffic is taken as the abnormal traffic. The method includes a data preprocessing module, a traffic modeling module and an abnormality detecting module, wherein the data preprocessing module is used for processing early data traffic, the traffic modeling module is used for building normal models and abnormal models according toe low-frequency power and distribution of normal traffic and abnormal traffic, and the low-frequency power sum critical valve can be calculated. The abnormality detecting module is used for detecting abnormality. The false alarm rate of the method is 6.1% and the alarm missing rate of the method is 9.3%.

Description

Technical field: [0001] The invention relates to an abnormal detection method of network flow of an industrial control system. It belongs to the field of information security. Background technique: [0002] With the rapid development and wide application of computer and Internet technology, the security of computer network systems has been seriously challenged, especially the security threats to industrial control systems are gradually increasing. The industrial control system is an important part of the national security strategy. About 90% of the critical infrastructure involving the people needs to rely on the industrial control system to realize the automation. The emergence of the "Stuxnet" virus in 2010 ushered in a new era for cyber attacks on industrial control systems. Although it exploits vulnerabilities in the Microsoft Windows operating system, it can spread widely on the Internet like traditional worms, but it is not for the purpose of obtaining user data or m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26
Inventor 赖英旭高春梅杨震李健
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products