Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial control network access rule construction method and training system

A technology of industrial control network and construction method, which is applied in the field of construction of industrial control network access rules and training system, and can solve problems such as error-prone, time-consuming and labor-intensive

Active Publication Date: 2019-07-12
浙江国利网安科技有限公司
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the industrial control network, different manufacturers and different types of industrial control equipment coexist in the same network, and the instructions of different industrial control equipment are different. Facing the complex industrial control network environment, configuring security access rules for industrial firewalls and audit systems has become a task. It is a daunting task. The administrator not only needs to understand the configuration information (such as MAC address, IP address, and port) and network topology of each device, but also needs to understand the protocol format and command format of industrial control equipment from different manufacturers. It takes a lot of time to configure security access rules. Time-consuming and error-prone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control network access rule construction method and training system
  • Industrial control network access rule construction method and training system
  • Industrial control network access rule construction method and training system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0074] Such as figure 1 and 2 As shown, the present invention provides a method for constructing industrial control network access rules, including:

[0075] Step S1, capturing protocol messages transmitted in the industrial control network;

[0076] Step S2, extracting the characteristic value of the protocol message;

[0077] Step S3, generating a list of network equipment according to the characteristic value;

[0078] Step S4, constructing device access rules according to the network device list;

[0079] Step S5, comparing the feature value of the protocol message with a preset protocol feature library to obtain a comparison result;

[0080] Step S6, according to the comparison result, determine the message type of the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an industrial control network access rule construction method and a training system. The method comprises steps of by analyzing protocol message data in an industrial control network, constructing a network topological structure, and extracting protocol characteristics in the message data; determining the type of communication equipment, determining an access list between the equipment through the transmission direction of protocol messages, determining an access instruction through deep analysis of protocol message contents, associating the access instruction with an industrial control protocol instruction library to construct an access instruction list between the industrial control equipment, and finally constructing a complete security access rule through the access list and the instruction list.

Description

technical field [0001] The invention relates to a construction method and training system for industrial control network access rules. Background technique [0002] Industrial firewalls, auditing systems, and intrusion detection systems have become essential infrastructure for protecting network security in industrial control networks. However, in the industrial control network, different manufacturers and different types of industrial control equipment coexist in the same network, and the instructions of different industrial control equipment are different. Facing the complex industrial control network environment, configuring security access rules for industrial firewalls and audit systems has become a task. It is a daunting task. The administrator not only needs to understand the configuration information (such as MAC address, IP address, and port) and network topology of each device, but also needs to understand the protocol format and command format of industrial contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/205
Inventor 杨晓磊王迎许剑新薛金良陈建飞
Owner 浙江国利网安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products