Industrial environment vulnerability discovering device and method

A vulnerability mining and industrial environment technology, which is applied in the direction of instruments, computer control, simulators, etc., can solve problems that do not have function libraries and custom function blocks, single and simple functions, and do not have rich function libraries and custom function blocks, etc. problem, to achieve the effect of enriching the function library

Active Publication Date: 2016-03-16
CHINA ELECTRONICS CORP 6TH RES INST
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] To sum up, the traditional existing technologies all have the shortcomings of single and simple functions, lack of rich function libraries and custom function blocks
To sum up, the traditional existing technologies all have the shortcomings of single and simple functions, lack of rich function libraries and custom function blocks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial environment vulnerability discovering device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. Such as figure 1 As shown, the industrial environment vulnerability mining device of the present invention includes: a main board composed of a central processing unit and a network port control chip, a programmable input controller, and a programmable display terminal. The industrial environment loophole mining device of the present invention can be connected with an external control platform through the network port of the main board of the network port control chip. The central processing unit of the main board is respectively connected with the programmable input controller and the programmable display terminal, and the central processing unit is connected with the network port control chip. The mainboard network port is led out by the network port control chip, and is used for service access and software platform management. The programmable input...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial environment vulnerability discovering device and method. The industrial environment vulnerability discovering device comprises a mainboard composed of a central processor and an internet access control chip, a programmable input controller and a programmable display terminal. The industrial environment vulnerability discovering is a method of discovering faults of a detected device through providing unexpected input for an application and monitoring abnormities in output of an external device, and the method realizes vulnerability discovery and security early-warning by discovering security vulnerabilities of an industrial control system through a fuzzy test. The device and method have the following advantages: 1, a professional protocol resource database is arranged; 2, a powerful flexible graphical customized framework is arranged; 3, a rich library of functions is arranged; 4, a customization function module is arranged; 5, a communication process design function is exhibited; 6, multiple test modes are exhibited; 7, an analysis report and a report template can be customized; and 8, a report content format can be customized.

Description

technical field [0001] The invention relates to a device and method for mining loopholes in an industrial environment, belonging to the technical field of industrial control. Background technique [0002] At present, internationally, since the outbreak of the "Stuxnet" virus incident and the United States issued the "National Cyberspace Security Strategy" policy, the security of industrial control systems has attracted great attention from Western countries, and the security of industrial control systems has been mentioned in the national security strategy. the point. At the same time, China is also plagued by information security issues in industrial control systems. These information security vulnerabilities are mainly concentrated in the fields of energy, key manufacturing, transportation, communications, water conservancy, and nuclear energy, and more than half of the security accidents in the energy industry. Therefore, the information security construction of the futu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G05B19/042
Inventor 李航朱广宇董伟霍朝宾柯皓仁秦媛媛靳方略董敏
Owner CHINA ELECTRONICS CORP 6TH RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products