Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial control protocol honey pot with self-learning function oriented to industrial internet and application

An industrial Internet and industrial control protocol technology, applied in the field of network security, can solve the problems of complex attacks on industrial control systems, and achieve the effect of improving deception and enhancing capabilities

Inactive Publication Date: 2018-03-06
NORTHEASTERN UNIV
View PDF2 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although scholars at home and abroad use different honeynets to solve network security problems, the current honeynets are mainly used for network intrusion and malicious code detection, malicious code sample capture and botnet tracking, etc., and attacks against industrial control systems are more complicated. , there are few honeynets dedicated to industrial control networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control protocol honey pot with self-learning function oriented to industrial internet and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention provides a honeypot with a self-learning function oriented to the industrial Internet. In order to enable people in the relevant technical field to better understand the technical solution of the present invention, and to make the purpose and characteristics of the present invention more understandable, The present invention is explained as follows.

[0022] There are two deployment scenarios for the present invention. One solution is local deployment, where honeynet resources are deployed on a local computer to facilitate the testing and improvement of honeynet programs; Scanning and detection of industrial control environment for subsequent data analysis. After deploying the environment, simulate the communication of the industrial control protocol, construct a deceptive industrial control network environment, and put it in the honeynet host to attract intrusion and collect receipts. like figure 1 shown, including:

[0023] The interface modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of the network security, and provides an industrial control protocol honey pot with a self-learning function oriented to the industrial internet, and an application. The honey pot comprises an interface module, an access request processing module, a self-learning module, and a data storage module. A standard interface required by the industrial internetcorresponding to the current honey pot is realized through the interface module. When the malicious attack invades, the honey pot receives a malicious program according to different communication protocol, thereby trapping the malicious program to regard that the honey pot is the real industrial control equipment; an access request processing module receives and analyzes an access request so as to judge whether the honey pot can respond to the received access request at present, if the honey pot cannot respond, the access request is submitted to the self-learning module, and a corresponding response is acquired and stored through a self-learning method, thereby deeply simulating the scanned real industrial control equipment; at last, the data storage module is responsible for analyzing and processing the space address and the network data flow, thereby analyzing the malicious behavior therein.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to an industrial Internet-oriented industrial control protocol honeypot with a self-learning function and its application. Background technique [0002] In recent years, great changes have taken place in the field of cyberspace security, and industrial control systems have become one of the new main battlefields of cyberspace security. After the integration of industrialization and industrialization, the information security of IT systems has also been integrated into the security of industrial control systems. At present, the network security situation faced by my country's critical information infrastructure is severe and complex. [0003] There are a large number of industrial control systems exposed on the Internet in the world, and a large proportion of them include the power industry, petroleum and petrochemical industries, and advanced manufacturing indu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 姚羽钟旭翔盛川叶书凯杨巍刘思宇张恩蒙
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products