Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial control system vulnerability trend analysis and early warning method and system

A technology of trend analysis and industrial control systems, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of lack of network security situation awareness and linkage early warning, failure to produce synergy, attack losses, etc., to achieve changeable attack methods Moreover, the effect of rich attack methods and reduced timeliness

Active Publication Date: 2019-05-28
江苏亨通工控安全研究院有限公司
View PDF7 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. These traditional security products can only resist security threats from certain aspects, forming "islands of security defense" one by one
[0004] 2. Lack of effective integration and correlation analysis of massive multi-dimensional information security data, unable to produce synergistic effects
[0005] 3. These safety monitoring data cannot be used as an effective resource for upper-level safety decision-making
[0006] Most of these traditional security defense facilities analyze and monitor the attacks that have occurred by analyzing the logs of security devices in the seventh layer of the network. They are basically passive defense ideas, lacking the ability of network security situation awareness and linkage early warning. It is often too late to take corresponding emergency measures after detecting a network attack event, because the network attack has already occurred and the attack has caused irreparable losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control system vulnerability trend analysis and early warning method and system
  • Industrial control system vulnerability trend analysis and early warning method and system
  • Industrial control system vulnerability trend analysis and early warning method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, so that those skilled in the art can better understand the present invention and implement it, but the examples given are not intended to limit the present invention.

[0036] refer to figure 1 As shown, an embodiment of the vulnerability trend analysis and early warning method of the industrial control system of the present invention simulates and establishes a number of probes with core protocols in the industrial control system, and deploys the probes on the public network or in an internal network with a high degree of completion of the industrial Internet. network; the simulated industrial control system probe collects attack information interactively; the simulated industrial control system probe sends the collected attack information to the data analysis module, which is responsible for data analysis and vulnerability mining; data analysis ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an industrial control system vulnerability trend analysis and early warning method and system, and the method comprises the steps: the simulation establishment of a plurality of probes is carried out with a core protocol in an industrial control system, and enabling the probes to be deployed in a public network and an intranet; The probe collects attack information in an interactive mode; The simulated industrial control system probe sends the collected attack information to a data analysis module, and the data analysis module is responsible for data analysis and vulnerability mining; The data analysis module generates an attack utilization rule base and a vulnerability base according to data analysis and vulnerability mining results; And the data analysis module analyzes the attack information sent back by the matching probe by using the generated attack utilization rule base and the vulnerability base, and reports the analysis result of the attack informationto the security equipment and the early warning display platform. According to the simulation industrial control system, the simulation industrial control system is induced to send an attack to the simulation industrial control system, an attack means is collected, vulnerabilities are analyzed, and serious vulnerability information existing in a production environment or to be utilized is early warned to a user.

Description

technical field [0001] The invention relates to the field of industrial control system security, in particular to a method and system for analyzing and warning the trend of loopholes in an industrial control system. Background technique [0002] The traditional information security defense system includes: firewall, UTM, IPS, IDS, vulnerability scanning system, anti-virus system, terminal management system, WAF, DB-AUDIT and security monitoring platform, etc. From the perspective of network structure layering, the product system has been improved However, in terms of actual functions, the shortcomings are also obvious, mainly in the following three aspects: [0003] 1. These traditional security products can only defend against security threats from certain aspects, forming "islands of security defense" one by one. [0004] 2. There is a lack of effective integration and correlation analysis of massive multi-dimensional information security data, which cannot produce synerg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26H04L12/24
Inventor 吴志华袁键董超施靖萱杨枭
Owner 江苏亨通工控安全研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products