Network security monitoring method for industrial control system

An industrial control system and network security technology, applied in the field of information security, can solve problems such as inability to limit malicious illegal operations, inadequate implementation of management measures, inconvenient daily operation and maintenance, and achieve the effect of solving security threats.

Active Publication Date: 2017-12-19
NANJING NARI GROUP CORP +2
View PDF3 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The application of these management measures has achieved good results, but there are also problems such as inconvenient daily operation and maintenance work, inadequate implementation of management measures, and inability to restrict malicious illegal operations by humans.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security monitoring method for industrial control system
  • Network security monitoring method for industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Such as figure 1 As shown, a network security monitoring method for industrial control systems includes the following steps:

[0032] Step 1, collecting relevant information of the internal monitoring object of the industrial control system;

[0033] Step 2, performing security analysis on the collected relevant information;

[0034] Step 3: When the analysis finds potential abnormal behaviors, relevant security control commands are generated and sent to relevant monitoring objects for execution to block abnormal behaviors.

[0035] In this embodiment, the monitoring objects include network equipment, security equipment, and host equipment. The network equipment refers to an industrial control switch, which actively obtains switch related information through snmp, such as network port status information, and obtains switch through snmptrap Security events that occur, such as access events such as network port up and network port down, illegal MAC access events, and us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security monitoring method for an industrial control system. The method comprises the following steps: collecting relevant information of an internal monitoring object of the industrial control system; performing security analysis on the collected relevant information; and when potential abnormal behavior is found through analysis, generating a relevant safety control order, and issuing the order to the relevant monitoring object for execution so as to block the abnormal behavior. According to the invention, real-time monitoring on major hidden security dangers of the industrial control system such as peripheral access, personnel operation, network external connection and the like is realized through abundant data acquisition of core networking equipment of the industrial control system. At the same time, through analysis processing on various behavior, the abnormal behavior is found and blocked timely, and thus real active defense of the industrial system is realized. For the current difficulty of effectively applying traditional security protection measures to the industrial control system, the major security threats to the industrial control system at present are well solved from the perspective of monitoring early warning.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a network security monitoring method for industrial control systems. Background technique [0002] Industrial control systems based on acquisition, monitoring and control are widely used in various industries such as electric power, petrochemical, transportation, metallurgy, etc., and realize the automation of industrial control. Typical industrial control systems include SCADA (Supervisory Control And Data Acquisition, supervisory control and data acquisition), DCS (Distributed Control System, distributed control system), PLC (Programmable Logic Controller, programmable logic controller), etc. With the increasing integration of my country's industrialization and informatization, computer technology and network communication technology are widely used in industrial control systems, and traditional industrial control systems have gradually broken the previous closedne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26H04L12/24
CPCH04L41/0213H04L43/08H04L43/16H04L63/02H04L63/1425H04L63/1466
Inventor 许洪强黄益彬郭建成陶洪铸周劼英韩勇程长春朱世顺杨维永陈功胜李牧野杨雨轩景娜
Owner NANJING NARI GROUP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products