Vulnerability detection method for industrial control system

An industrial control system and detection method technology, applied in transmission systems, electrical components, etc., can solve the problems of in-depth system detection, poor support for industrial control private protocols, and poor applicability of industrial Ethernet, achieving high protocol coverage, Improve applicability

Inactive Publication Date: 2018-11-02
NANJING UNIV +3
View PDF5 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] On the basis of the existing work, the purpose of the present invention is to: propose a kind of vulnerability detection method for industrial control system, solve the problem that

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method for industrial control system
  • Vulnerability detection method for industrial control system
  • Vulnerability detection method for industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in combination with relevant explanatory diagrams and embodiments. This example takes an industrial control network for data interaction based on the Modbus / TCP communication protocol as an example. figure 2 It is the target industrial Ethernet network topology map for vulnerability scanning. Quantum PLC is a programmable logic controller produced by Schneider, an industrial control manufacturer. The CPU module supports data exchange with the Modbus / TCP protocol with the engineering station. The Ethernet module can be configured according to user It is required to provide richer means of interaction, and the Modbus master-slave device emulator station is an ordinary PC running the corresponding Modbus service. The present invention aims to propose a vulnerability detection method for industrial control systems, which detects loopholes in industrial Ethernet to reduce potential safety hazards in industrial scenes and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a vulnerability detection method for an industrial control system. The method comprises the following steps: performing network detection on a target environment based on industrial Ethernet features, identifying an industrial control device, and capturing a session data packet; parsing the data packet according to the industrial control protocol specification and the private protocol reverse technology, and constructing a feature code data packet to perform further system detection to obtain specific fingerprint information; comparing the vulnerability information of amatching target based on the features of an industrial control dedicated vulnerability database, and performing related vulnerability detection based on strategy drive; and performing a fuzzy test based on the industrial control protocol vulnerability, and mining the security vulnerabilities of the industrial control system network, and detecting the security vulnerability. According to the vulnerability detection method provided by the invention, the vulnerability detection is performed on the industrial control target to detect the security vulnerabilities before the network attackers so asto improve the security and reliability of the industrial control system.

Description

technical field [0001] The invention belongs to the field of computer technology, especially the field of industrial control security. The invention provides an industrial control system-oriented vulnerability detection method for detecting the security vulnerability of the industrial control system. Background technique [0002] The industrial control system is an important part of the country's key infrastructure. It is widely used in petroleum and petrochemical, water conservancy, electric power, food processing and sewage treatment industries, mainly for data acquisition and production control. Early industrial control and industrial control systems were physically isolated from the Internet, and most of them used dedicated software and hardware. Therefore, even if there were security risks in the industrial control system, it was difficult for the outside world to access the industrial control system and to conduct research on the industrial control system. However, wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/14H04L63/1433H04L69/26
Inventor 周伟平黄益彬韩勇茅兵张磊卢朝晖郭健
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products