Power-grid industrial control protocol vulnerability mining system and method based on fuzzy test

A technology for fuzzing testing and industrial control protocols, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as loophole mining of power grid industrial control protocols, and achieve the effect of fast and effective identification, easy implementation, and simplified testing process.

Active Publication Date: 2016-01-13
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF2 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the above-mentioned deficiencies in the prior art, the present invention provides a fuzzy-test-based power grid industrial control protocol vulnerability mining system and method, which solves the problem of power grid industrial control proto

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power-grid industrial control protocol vulnerability mining system and method based on fuzzy test
  • Power-grid industrial control protocol vulnerability mining system and method based on fuzzy test
  • Power-grid industrial control protocol vulnerability mining system and method based on fuzzy test

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0047] The present invention provides a system for mining loopholes in power grid industrial control protocols based on fuzzy testing, such as figure 1 and figure 2 , the system includes a flow collection module, a message format recognition module, a fuzzy testing module and a server monitoring module; the flow collection module, the message format recognition module, the fuzzy testing module and the server monitoring module are connected in series in sequence.

[0048] The flow collection module collects data packet flow and filters the collected data packet flow, and then sends the filtered target process flow to the message format identification module.

[0049] The power grid industrial control LAN includes Ethernet, which includes shared Ethernet and switched Ethernet.

[0050] For shared Ethernet, the flow collection module collects data packet flow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a power-grid industrial control protocol vulnerability mining system and method based on fuzzy test. The system includes a traffic collection module, a message format identification module, a fuzzy test module and a server monitor module; the traffic collection module, the message format identification module, the fuzzy test module and the server monitor module are connected sequentially in series. The invention provides the power-grid industrial control protocol vulnerability mining system and method based on fuzzy test, which solve a power-grid industrial control protocol vulnerability mining problem. By the use of the system and method provided by the invention, a power-grid industrial control protocol can be flexibly selected according to a power-grid industrial control special circumstance, so that efficiency and accuracy of the fuzzy test can be effectively improved.

Description

technical field [0001] The invention relates to a leak mining technology, in particular to a fuzzy test-based power grid industrial control protocol leak mining system and method. Background technique [0002] With the application of computer technology and network communication technology to the industrial control system of the power grid, the security problem of the industrial control network of the power grid has been brought. In the power grid industrial control network, protocol security is the main link of the entire system security. Only when the protocol is safe and reliable can the system be safe and reliable. The loopholes in the protocol are the main target of illegal intruders. [0003] Vulnerability mining is of great significance to protocol security. It is an effective way to solve the security problems of current power grid industrial control protocols. It can detect potential security risks in the protocol when threats do not occur, thereby eliminating hidde...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L29/06
Inventor 黄秀丽张涛马媛媛华晔汪晨邵志鹏周诚李伟伟何高峰戴造建管小娟陈璐费稼轩
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products