Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sequence attack detection method and device

A detection method and sequence technology, applied in computer security devices, instruments, electrical digital data processing and other directions, can solve the problems affecting the high real-time performance of ICS, system abnormality, and failure to consider security, etc., so as to solve the problem that the operation sequence cannot be detected and expanded. Detection range and the effect of intrusion detection

Active Publication Date: 2019-02-15
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, most of the existing detection algorithms adopt the event-driven mode, which can only detect the system state at the moment of operation execution, and cannot identify the abnormal system state caused by operation delay
Sequence attacks can delay and block issued operating instructions, affect the high real-time performance of ICS, and cause system abnormalities
For example delaying the command to open a reservoir valve, causing the water level to overflow
Third, there are issues with data integrity
ICS did not consider security at the beginning of its design, and it is closely related to the Internet. Therefore, attackers can forge false operation sequences by injecting, blocking, and tampering with operation commands, which will cause false negatives in the detection algorithm and cause the detection algorithm to fail.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sequence attack detection method and device
  • Sequence attack detection method and device
  • Sequence attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0028] In order to overcome the shortcomings of the controller sequence attack detection method in the prior art, such as incomplete detection and great influence by data authenticity, the sequence attack cannot be effectively identified, causing serious service interruption and equipment damage, the embodiment of the present invention adopts The analysis of the controller shows that the controller not only receives the control flow data, but also receives the state flow data. The control flow data and the state flow data are bound by the business process of the system, and they are closely related. They can mutually verify the correctness of their respective data. The inv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a detecting party and a device of a sequence attack, wherein the method comprises the following steps of: acquiring data in an industrial control system in real time; Whether the observed quantity is abnormal or not is judged according to the observed quantity change information of the operation interval for the observed quantity obtained after the first operation instruction is obtained. For an operation instruction obtained after the first operation instruction is obtained, obtaining a history operation instruction sequence of a certain length, calculating a jump probability of jumping from the history operation instruction sequence to the current operation instruction according to the detection model, judging whether the operation instruction is abnormal accordingto the jump probability, and detecting whether the observation quantity change information when the operation instruction is executed is abnormal. The embodiment of the invention effectively solves the problems that the operation sequence cannot be detected and the detection failure is caused by the false control flow data, improves the accuracy of the sequence attack detection, and realizes theintrusion detection of the whole operation flow.

Description

technical field [0001] The present invention relates to the technical field of intrusion detection, and more specifically, to a method and device for detecting sequence attacks. Background technique [0002] Industrial control system (industrial control system, ICS) is a general term for a type of control system used in industrial production, which includes supervisory control and data acquisition system (supervisory control and data acquisition, SCADA), distributed control system and other common in industry Small control systems (such as programmable logic controllers) for departments and critical infrastructure, etc. ICS is widely used in all walks of life in society, including industrial production enterprises such as machinery manufacturing, petroleum and petrochemical, as well as infrastructure such as sewage treatment and nuclear power systems. At present, attackers such as internal malicious personnel, hostile enterprises, and state-level organizations are increasin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/55G06F21/552
Inventor 孙利民杨安石志强李红
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products