Unlock instant, AI-driven research and patent intelligence for your innovation.

Host security state management method, device and terminal equipment

A technology of security status and management methods, applied in computer security devices, electrical digital data processing, instruments, etc., can solve the problems of large workload and high labor cost of the host, and achieve the effect of reducing labor costs and workload.

Active Publication Date: 2021-03-23
烽台科技(北京)有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiments of the present invention provide a host security state management method, device, terminal equipment, and computer-readable storage medium to solve the problem of the heavy workload of maintenance personnel maintaining the host in the industrial control system in the prior art, resulting in industrial The problem of excessive labor costs paid by enterprises

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Host security state management method, device and terminal equipment
  • Host security state management method, device and terminal equipment
  • Host security state management method, device and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] figure 1 It shows a schematic flowchart of the first host security state management method provided by the embodiment of the present application, and the details are as follows:

[0029] Step S11 , acquiring operation data of the host computer in the industrial control system, the operation data including: SCADA software operation information or / and protocol open information of the host computer or / and log information of the host computer.

[0030] The host of the industrial control system includes: a host running data acquisition and supervisory control (Supervisory ControlAnd Data Acquisition, SCADA) software, or / and a conventional host, or / and a programmable logic controller (Programmable Logic Controller, PLC) proxy host , the regular host means a host that neither runs SCADA software nor is a PLC proxy host in the industrial control system.

[0031] Optionally, the running data further includes: host resource usage information of the host, and the host resource us...

Embodiment 2

[0055] figure 2 It shows a schematic flowchart of the second host security state management method provided by the embodiment of the present application. Step S22 of this embodiment is the same as step S11 of Embodiment 1, and will not be repeated here:

[0056] Step S21 , acquiring operation data of hosts within the security baseline in the industrial control system, where the hosts within the security baseline include hosts in the industrial control system that implement specified functions.

[0057] Optionally, before the step S21, the entire industrial control system is scanned to determine the surviving hosts in the industrial control system; the security baseline is determined according to the function of the surviving hosts; and the security baseline is determined according to the security baseline. Hosts within the baseline.

[0058] Optionally, the scanning the entire industrial control system, and determining the surviving hosts in the industrial control system inc...

Embodiment 3

[0068] Corresponding to Embodiment 1 and Embodiment 2 above, image 3 A schematic structural diagram of an apparatus for managing a host security state provided by an embodiment of the present application is shown, and for convenience of description, only parts related to the embodiment of the present application are shown.

[0069] The host security state management device includes: an operation data acquisition unit 31 and a security state evaluation data acquisition unit 32 .

[0070] The running data obtaining unit 31 is used to obtain the running data of the host computer in the industrial control system, and the running data includes: SCADA software running information or / and protocol opening information of the host computer or / and log information of the host computer.

[0071] Optionally, the running data further includes: host resource usage information of the host, and the host resource usage information includes: central processing unit (Central Processing Unit, CPU)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method is suitable for the technical field of industrial control, and provides a host security state management method and device, a terminal device and a computer readable storage medium, and themethod comprises the steps: obtaining the operation data of a host in an industrial control system, the operation data comprising SCADA software operation information or / and the protocol opening information of the host or / and the log information of the host; and obtaining the safety state evaluation data of the host according to the operation data and a preset operation data analysis rule. Through the method, the workload of operation and maintenance personnel can be effectively reduced, and the labor cost of industrial enterprises is reduced.

Description

technical field [0001] The invention belongs to the technical field of industrial control, and in particular relates to a host security state management method, device, terminal equipment and computer-readable storage medium. Background technique [0002] As the country pays more and more attention to information security, under the premise that "without network security, there will be no national security", industrial enterprises have gradually realized the importance of information security in industrial control systems. A general industrial control system includes many hosts. In the existing technology, the operation and maintenance personnel need to determine the hosts that need to be maintained according to the importance of each host in the industrial control system, and collect the security information of the hosts that need to be maintained, so as to artificially determine the host. The security status of the system has resulted in a huge workload of operation and ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 龚亮华刘文跃陈温蒙
Owner 烽台科技(北京)有限公司