Industrial control operation system active defense method with self-learning characteristic

An operating system and active defense technology, applied in platform integrity maintenance, instruments, electrical digital data processing, etc., can solve problems such as difficulty in updating industrial control system patches, inapplicability to industrial control environments, and poor business adaptability, etc., to meet business needs, Good compatibility, the effect of resisting hacker attacks

Inactive Publication Date: 2017-12-19
NANJING NARI GROUP CORP +2
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the security requirements of industrial control operating systems, although SELinux is powerful, it is not suitable for industrial control environments, especially microkernel scenarios, due to its large overall architecture and large performance impact.
In addition, the security model is responsible and the business adaptability is poor
It is relatively difficult to update the patch of the industrial control system, and it is necessary to introduce active defense

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control operation system active defense method with self-learning characteristic
  • Industrial control operation system active defense method with self-learning characteristic
  • Industrial control operation system active defense method with self-learning characteristic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Such as figure 1 Shown, a kind of industrial control operating system active defense method with self-learning characteristic, this method is realized based on Linux LSM, comprises the following steps:

[0026] Step 1: Determine whether the program can be executed according to the trusted policy, monitor business behavior if it is executable, and complete deterministic security policy learning based on the detected subject-object access operations. The security policy library described here includes several rules, which define the access control rules of the subject to the object, and the trusted measurement value of the application.

[0027] For this type of event, in addition to its own access to the corresponding object, the main program will call other executable programs for resource access in most cases. The final resource access sequence forms a tree structure. The initial subject is the root node of the tree. Leaf nodes represent the objects that are actually...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an active defense method for an industrial control operating system with self-learning characteristics, which includes the following steps: step 1, judge whether the program can be executed according to the credible strategy, and if it is executable, monitor the business behavior, and access the program according to the detected subject and object Operation; step 2, according to step 1, monitor the logs generated by business calls, and realize non-deterministic security policy learning; step 3, monitor the behavior of system calls at the Linux kernel layer, collect corresponding system call information, according to steps 1 and 2 The generated security policy judges whether the system call is allowed or denied; Step 4, according to Step 1 and Step 2, based on the self-learning system mandatory access control, assisted by the application of trustworthiness measurement, to build the active defense system of the industrial control operating system. The present invention can realize that it can still be immune to attacks in the case of defects and loopholes, and has the characteristics of automatic learning, simple application, and small business impact.

Description

technical field [0001] The invention relates to the technical field of industrial control operating system security, in particular to an active defense method for an industrial control operating system with self-learning characteristics. Background technique [0002] Operating system security is the foundation of information security. Attacks and threats to computer systems often take the operating system as the main target. Security products, if not built on top of a security operating system, are like buildings built on sand. Although business applications often have their own security measures such as identity authentication and access control, due to the lack of strict formal design, the security mechanism cannot ensure security. If application security integrates the security mechanism of the operating system that has undergone certain formal verification on the basis of its own security guarantee, it will fundamentally solve the problem of information security to a ce...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/57
CPCG06F21/552G06F21/577
Inventor 郭建成刘苇许洪强陶洪铸周劼英祁龙云吕小亮魏兴慎宋子锋韩勇程长春杨维永朱世顺
Owner NANJING NARI GROUP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products