Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Risk assessment method suitable for industrial control system

An industrial control system and risk assessment technology, applied in the field of industrial control, can solve problems such as production impact and system offline

Active Publication Date: 2017-05-24
INST OF INFORMATION ENG CAS
View PDF9 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it may be necessary to take the system offline before evaluating the implementation
However, if the online system goes offline, it will definitely have a great impact on production.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk assessment method suitable for industrial control system
  • Risk assessment method suitable for industrial control system
  • Risk assessment method suitable for industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described below through specific embodiments and accompanying drawings.

[0023] The risk assessment mechanism and tool suitable for industrial control proposed by the present invention, its business process is as follows figure 1 As shown, it mainly includes three parts: potential threat identification, risk estimation, and protection recommendations. Each part is described in detail as follows.

[0024] 1. Target network modeling and attacker modeling

[0025] Potential threat identification mainly uses attack graph and attack tree technology to identify security attack paths. First of all, the present invention adopts an attribute-based hierarchical target network modeling method, one of its characteristics is to use a security attribute-based modeling method to extract and summarize the security attributes inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a risk assessment method suitable for an industrial control system. According to the method, modeling is performed on a target network by using a hierarchical modeling method based on the security attribute, and modeling is performed on the capacity of an attacker in the attack process by using an attack mode knowledge base; then a hierarchical attack graph is constructed according to the security model of the target network and the attacker, and the attack graph is converted into an attack tree; and then a hierarchical risk evaluation index system is constructed by using a hierarchical index analysis method, and comprehensive judgment is performed by using a layer-by-layer weighing method so that the risk assessment result of the industrial control system can be obtained. The system or equipment does not need to be offline in the analysis method, and the method is a risk assessment and management tool based on combination of qualitative and quantitative analysis of the model so that the security hidden trouble in the industrial control system can be discovered, and the security assessment level of the industrial control system can be enhanced.

Description

technical field [0001] The invention relates to the technical field of industrial control, in particular to a risk assessment method suitable for industrial control systems. Background technique [0002] Security risks in industrial control often exist not only in industrial control equipment, but also in industrial control systems (or industrial control networks, which are replaced by "industrial control systems" below). Industrial control systems use various configuration functions and components to perform required tasks. This feature determines that it is difficult to comprehensively evaluate the information security capabilities of a system only by evaluating the security features of each individual function and component. Security threats are often invisible to industrial control systems. When all factors are considered together, some seemingly innocuous small hidden dangers can lead to irrecoverable catastrophic consequences, not just temporary economic losses. Ther...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/06
Inventor 石志强金永明胡晴孙利民王中杰
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products