Unlock instant, AI-driven research and patent intelligence for your innovation.

Abnormal behavior prediction method based on behavioral collaborative perception model

A technology of collaborative sensing and prediction method, applied in the field of network, can solve problems such as industrial control network damage

Inactive Publication Date: 2018-10-19
北京天地和兴科技有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there are mainly two methods for detecting abnormal behaviors of industrial control networks, whitelist and blacklist. These two methods have their own usage scenarios, and there are also great restrictions on their use.
In addition, these two techniques can only be detected when an attack occurs, at which point the industrial control network may have been compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal behavior prediction method based on behavioral collaborative perception model
  • Abnormal behavior prediction method based on behavioral collaborative perception model
  • Abnormal behavior prediction method based on behavioral collaborative perception model

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0032] refer to Figure 1-3 , a specific embodiment of the present invention comprises the following steps:

[0033] A. Collect device behavior information;

[0034] B. Judging the protocol type of the equipment behavior information, if it is the UDP protocol, then end the prediction, if it is the TCP protocol, then go to step C;

[0035] C. Determine whether the connection frequency or the transmission speed exceeds the threshold, if neither the connection frequency nor the transmission speed exceeds the threshold, then end the prediction, otherwise go to step D;

[0036] D. Match the abnormal behavior, if the matching fails, end the prediction, otherwise go to step E;

[0037] E. Output the abnormal behavior warning of the device.

[0038] In step C, the threshold calculation step of connection frequency and transmission speed includes,

[0039] C1. Extract the feature items of connection frequency and transmission speed;

[0040] C2. Calculate the connection frequency ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an abnormal behavior prediction method based on a behavioral collaborative perception model. The method comprises the following steps of (A) collecting device behavior information, (B) determining a protocol type of the device behavior information, ending prediction if the protocol is a UDP protocol, and going to step (C) if the protocol is a TCP protocol, (C) determining whether a connection frequency or a transmission speed exceeds a threshold, ending the prediction if the connection frequency and the transmission speed do not exceed the threshold, otherwise, going tostep (D), (D) matching an abnormal behavior, ending the prediction if a match fails, otherwise, going to step (E), and (E) outputting device abnormal behavior warning. According to the method, the deficiencies of the prior art can be improved, and timely warning is carried out before a malicious behavior breaks out.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method for predicting abnormal behavior based on a behavior cooperative perception model. Background technique [0002] With the development of information technology, industrial control systems are gradually becoming networked. Many industrial control protocols are gradually running on industrial Ethernet, and attacks against industrial control systems are more common. [0003] Once the malicious threat software in the industrial control network successfully infiltrates, a large part of it will not immediately cause damage to the industrial network (such as the Stuxnet virus in the Iranian nuclear power plant, the oil production information leakage incident in a domestic oil field, and the Havex virus), but will lie dormant. Detect and wait for the right time (such as Internet connection, receiving instructions), and then suddenly launch violent destruction. [0004] At pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/26
CPCH04L41/147H04L43/10H04L43/16H04L63/1416H04L63/1425
Inventor 王小东杨小帅
Owner 北京天地和兴科技有限公司