Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A prototype modeling method of network security attack based on industrial control

An industrial control network and industrial network technology, which is applied in the field of prototype modeling of network security attacks based on industrial control, can solve the problem of unclear boundaries between enterprise management network and industrial production control network, the fact that industrial control network security has not been widely used, small and medium-sized Enterprises lack awareness of industrial control safety and other issues, to achieve the effect of ensuring enterprise production management and information security, improving network operation efficiency, and ensuring safe operation

Inactive Publication Date: 2019-03-29
SUZHOU CHIEN SHIUNG INST OF TECH
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The problem of industrial control network security originated in 2010, which started relatively late. State-owned enterprises such as the State Grid Corporation of China have just begun to study the application of industrial control network security issues. However, small and medium-sized enterprises still lack awareness of industrial control security and lack relevant technologies and capabilities. With the advancement of the integration of informatization and industrialization, the production and management of these enterprises, especially the safety of production control, will become a common problem. However, due to the different scales of enterprise networks and the cost of information security management, industrial control network security has not been widely used. With the integration of industrialization and informatization, there is a big difference between the application level and management level of enterprise informatization, which leads to unclear boundaries between enterprise management network and industrial production control network, in a state of no isolation or limited isolation, and the risk of potential safety hazards is relatively large
[0003] Therefore, there is a need for a prototype modeling method for network security attacks based on industrial control, which is used to effectively solve the security problems of enterprise industrial control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A prototype modeling method of network security attack based on industrial control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the above technical solutions will be further described below in conjunction with the illustrations.

[0029] Such as figure 1 An industrial control network security approach based on prototyping modeling of industrial network attacks is shown, including

[0030] S1: Industrial network security modeling and algorithm design. Industrial network security modeling is to analyze and model network system vulnerabilities, evaluate the risk level of vulnerabilities, and realize the focus and effective defense of harmful vulnerabilities and attack paths;

[0031] S2: Generate a prototype of an industrial control network security attack. The conditions for an attacker to launch an attack are: first, the industrial control component is vulnerable; second, it has a certain connection relationship; third, it has a certain access control authority; if the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an industrial control network security method based on industrial network attack prototype modeling, which comprises the following steps: S1, industrial network security modeling and algorithm design; S2, designing an industrial control network security attack prototype; S3, taking an attack model of an attacker in an algorithm of the attack prototype in S1 as an attack source, and converting the network vulnerability information obtained in S4 into an attack set of an attacker according to attack rules to form an attack prototype; S4: Designing penetration test schemebased on attack prototype; 5, establishing a Sniffer network monitoring system; 6, optimizing and filtering that data through the external interface of the target industrial control network; 7, optimizing that topology structure of the intranet of the target industrial control network; S8: Establishing vulnerability risk assessment and modeling; S9: Forming an industrial network security defense solution. The network optimization and safety solution provided by the invention will effectively solve the safety problem of the industrial control of the enterprise, can timely carry out the risk assessment on the system, reduce the risk factors to the maximum extent, and improve the network operation efficiency and the safety reliability of the production management.

Description

technical field [0001] The invention relates to the fields of network security and information security, in particular to an industrial control-based network security attack prototype modeling method. Background technique [0002] The problem of industrial control network security originated in 2010, which started relatively late. State-owned enterprises such as the State Grid Corporation of China have just begun to study the application of industrial control network security issues, but small and medium-sized enterprises still lack awareness of industrial control security, and lack relevant technologies and capabilities. With the advancement of the integration of informatization and industrialization, the production and management of these enterprises, especially the safety of production control, will become a common problem. However, due to the different scales of enterprise networks and the cost of information security management, industrial control network security has no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/50H04L29/06
CPCG06F30/20H04L63/1433H04L63/1441
Inventor 杨正校刘坤
Owner SUZHOU CHIEN SHIUNG INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products