An industrial control system vulnerability trend analysis and early warning method and system

A trend analysis, industrial control system technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as inability to produce synergies, attack losses, lack of network security situational awareness and linkage early warning, etc. The effect of changing and reducing the timeliness and avoiding production accidents

Active Publication Date: 2021-06-22
江苏亨通工控安全研究院有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. These traditional security products can only resist security threats from certain aspects, forming "islands of security defense" one by one
[0004] 2. Lack of effective integration and correlation analysis of massive multi-dimensional information security data, unable to produce synergistic effects
[0005] 3. These safety monitoring data cannot be used as an effective resource for upper-level safety decision-making
[0006] Most of these traditional security defense facilities analyze and monitor the attacks that have occurred by analyzing the logs of security devices in the seventh layer of the network. They are basically passive defense ideas, lacking the ability of network security situation awareness and linkage early warning. It is often too late to take corresponding emergency measures after detecting a network attack event, because the network attack has already occurred and the attack has caused irreparable losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An industrial control system vulnerability trend analysis and early warning method and system
  • An industrial control system vulnerability trend analysis and early warning method and system
  • An industrial control system vulnerability trend analysis and early warning method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, so that those skilled in the art can better understand the present invention and implement it, but the examples given are not intended to limit the present invention.

[0036] refer to figure 1 As shown, an embodiment of the vulnerability trend analysis and early warning method of the industrial control system of the present invention simulates and establishes a number of probes with core protocols in the industrial control system, and deploys the probes on the public network or in an internal network with a high degree of completion of the industrial Internet. network; the simulated industrial control system probe collects attack information interactively; the simulated industrial control system probe sends the collected attack information to the data analysis module, which is responsible for data analysis and vulnerability mining; data analysis ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability trend analysis and early warning method and system of an industrial control system, including: simulating and establishing a number of probes with core protocols in the industrial control system, and deploying the probes in a public network and an intranet; The simulated industrial control system probe sends the collected attack information to the data analysis module, which is responsible for data analysis and vulnerability mining; the data analysis module generates attack exploits based on the results of data analysis and vulnerability mining. Rule base and vulnerability library; the data analysis module utilizes the generated attack exploit rule base and vulnerability library, analyzes the attack information sent back by the matching probe, and reports the attack information analysis result to the security device and the warning display platform. The invention simulates an industrial control system, induces it to attack the simulated industrial control system, collects its attack means, analyzes loopholes, and warns users in advance of serious loopholes existing or to be used in the production environment.

Description

technical field [0001] The invention relates to the field of industrial control system security, in particular to a method and system for analyzing and warning the trend of loopholes in an industrial control system. Background technique [0002] The traditional information security defense system includes: firewall, UTM, IPS, IDS, vulnerability scanning system, anti-virus system, terminal management system, WAF, DB-AUDIT and security monitoring platform, etc. From the perspective of network structure layering, the product system has been improved However, in terms of actual functions, the shortcomings are also obvious, mainly in the following three aspects: [0003] 1. These traditional security products can only defend against security threats from certain aspects, forming "islands of security defense" one by one. [0004] 2. There is a lack of effective integration and correlation analysis of massive multi-dimensional information security data, which cannot produce synerg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26H04L12/24
Inventor 吴志华袁键董超施靖萱杨枭
Owner 江苏亨通工控安全研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products