Fuzz testing-based industrial control system vulnerability mining method and apparatus, and vulnerability restoration method

An industrial control system and fuzzy testing technology, applied in computer security devices, instruments, electrical digital data processing, etc.

Inactive Publication Date: 2018-09-07
福州恒奥信息科技有限公司
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to provide a method, device and repair method for exploiting vulnerabilities in industrial control systems based on fuzzy testing, so as to solve the technical problem in the prior art that loopholes can only be found when there is a problem in the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fuzz testing-based industrial control system vulnerability mining method and apparatus, and vulnerability restoration method
  • Fuzz testing-based industrial control system vulnerability mining method and apparatus, and vulnerability restoration method
  • Fuzz testing-based industrial control system vulnerability mining method and apparatus, and vulnerability restoration method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. It should be noted here that the descriptions of these embodiments are used to help understand the present invention, but are not intended to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below may be combined with each other as long as they do not constitute a conflict with each other.

[0029] As the first embodiment of the present invention, a method for mining vulnerabilities in industrial control systems based on fuzz testing is proposed, such as figure 1 As shown, including: first after the industrial control system runs stably, the detection device is connected to the industrial control system (step S1). In this embodiment, a detection device with a data transmission interface is used, such as a PC host with detection software; the detection device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fuzz testing-based industrial control system vulnerability mining method and apparatus, and a vulnerability restoration method, and relates to the technical field of vulnerability detection. The vulnerability mining method comprises the steps of firstly connecting a detection apparatus to an industrial control system; obtaining data of the industrial control system by thedetection apparatus after the detection apparatus is connected to the industrial control system; generating a standard state form and standard running data by the detection apparatus; storing the standard state form and the standard running data after the standard state form and the standard running data are generated; and starting vulnerability detection by the detection apparatus wherein the vulnerability detection is performed through fuzz testing. By adopting the technical scheme, during delivery, the vulnerability detection is firstly performed, and original passive vulnerability detection and restoration become active vulnerability detection, so that the error probability of the industrial control system after delivery is reduced and the user experience is improved; and the fuzz testing is performed through the state form and the running data, so that the vulnerability discovery probability is higher and the accuracy is higher.

Description

technical field [0001] The invention relates to the technical field of loophole detection, in particular to a method, device and repair method for exploiting loopholes in industrial control systems based on fuzzy testing. Background technique [0002] The industrial control system, referred to as the industrial control system, is a system that controls machine tools or sensors through a computer or a bus. Because the industrial control system often needs to be installed on the industrial site, its overall sealing is better. However, due to the lower computing power requirements of industrial control, the version of the industrial control system at the factory is lower than that of the home system, which directly causes loopholes in the use of the industrial control system. Vulnerabilities can only be discovered when there is a problem in the system, that is, when a loophole occurs. There is no good method and device for actively exploiting loopholes in industrial control sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 高静峰王秒郎唐鹏
Owner 福州恒奥信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products