Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An industrial control network anomaly detection method and device

An industrial control network and anomaly detection technology, which is applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of not considering malformed packets, complicated application process, and no clear standard for the length of time to open the learning mode, etc., to reduce the Operational complexity, the effect of improving stability

Active Publication Date: 2019-05-10
BEIJING QIANXIN TECH
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, some methods belong to the detection method of the defect category, and cannot effectively predict or take active defense measures before the occurrence of network anomalies; some methods detect network anomalies from the dimensions of network speed, bandwidth, and corresponding time periods, and do not pay attention to The content of communication data and communication details in the network; some methods describe the judgment method of abnormal traffic from the perspective of algorithm, but in the application scenario of protecting industrial control network security, it is necessary to set the feature value and rule engine in advance before abnormal detection, extract The eigenvalues ​​and the set rule engine’s evaluation criteria for the results depend on certain experiences. The application process of the method is relatively complicated, requiring repeated debugging of the parameters, and the final result is limited by the traffic obtained during the debugging process; some methods capture, identify , Analyze industrial network data, and conduct data analysis according to industrial protocol behavior and industrial behavior model library, so as to determine whether there is anomaly in industrial traffic. The disadvantage of this method is that there is no clear standard for the construction of industrial behavior model library, only It is mentioned that the application of intelligent methods including association mining, sequence mining, classification, and clustering algorithms cannot deal with the gradual abnormal trend of protocol behavior or device response values ​​over time, and does not consider the malformed packets encountered during the protocol in-depth analysis process Some methods are industrial control network anomaly detection methods (network whitelist) that form a security baseline through traffic self-learning. Although this method has strong adaptability and flexibility, in actual use, the length of time to open the learning mode There is no clear standard, and the learning results have a strong dependence on the traffic captured during the learning period. The implementation process is complex and takes a long time. The adjustment of the security baseline depends to a certain extent on the operator's industrial control security experience
Some methods have efficient protection effects on the IEC60870-5-104 protocol in the power field, but have certain limitations and cannot protect more industrial application sites based on industrial protocols such as Modbus, S7COMM, and ENIP / CIP

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An industrial control network anomaly detection method and device
  • An industrial control network anomaly detection method and device
  • An industrial control network anomaly detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Apparently, the described embodiments are some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] figure 1 It is a schematic flow chart of an abnormal detection method for an industrial control network provided by an embodiment of the present invention, as shown in figure 1 As shown, the industrial control network anomaly detection method of this embodiment includes:

[0023] S1. Based on the unsupervised baseline learning method, a security b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an industrial control network abnormity detection method and device, and the method comprises the steps: automatically generating a security baseline in a certain time period based on an unsupervised baseline learning method, and carrying out the warning of an abnormal data frame or a data frame sequence; And when the security baseline is generated in the new time period, analyzing the change trend of the historical security baseline sequence in the preset time period, and predicting and alarming the potential security threat according to a trend analysis result. According to the embodiment, the abnormal detection of the industrial control network is realized; manual adjustment and confirmation after the network security baseline is generated basedon supervised learning in advance are not needed; the network security baseline is automatically generated according to the continuously obtained network traffic, the potential threat that the baseline sequence gradually deviates from the normal value can be found by analyzing the trend of the historical baseline sequence, and the method reduces the operation complexity of generating the industrial control security baseline and improves the stability of the security baseline.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of industrial network security, and in particular, to a method and device for detecting abnormality in an industrial control network. Background technique [0002] With the rapid development of information technology, industrial control network is facing more and more risks. [0003] Currently, some anomaly detection methods for industrial control networks are disclosed in the prior art. Among them, some methods belong to the detection method of the defect category, and cannot effectively predict or take active defense measures before the occurrence of network anomalies; some methods detect network anomalies from the dimensions of network speed, bandwidth, and corresponding time periods, and do not pay attention to The content of communication data and communication details in the network; some methods describe the judgment method of abnormal traffic from the perspective of algorithm, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/06
Inventor 张钊
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products