Intrusion attack and clue discovery method of industrial control system based on deep learning

A technology of deep learning and industrial control systems, applied in general control systems, control/adjustment systems, test/monitoring control systems, etc., can solve the problem of shortening the time required to deal with intrusions, the security system cannot guarantee correct detection and correct response, and simple And other issues

Active Publication Date: 2021-06-18
BEIJING UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional industrial control networks have been used in internal LANs for a long time, and the operating environment is relatively single, so security issues are rarely considered in protocol formulation and actual deployment, resulting in many loopholes not being discovered in time and not being taken seriously
At the same time, due to the development of industry, the equipment of the industrial control network began to widely use the common software, hardware and network interfaces of the Internet. Generated data exchange, resulting in an increasingly open industrial control network
That is to say, the relative closedness of the previous industrial control network in the physical environment and the specificity of the software and hardware of the industrial control network will be broken, and it will be possible to obtain more detailed information about the relevant industrial control network through the Internet or the intranet of the enterprise. In addition, the security awareness of industrial control network operators who have been working in a secure environment for a long time is generally poor, and the industrial control network system is facing some traditional Internet security threats, such as worms, hackers, network attacks, viruses, etc.
Once the industrial control network is attacked, it will bring huge disasters to industrial production and even national interests.
At present, there are many highly automated and intelligent security systems that can automatically detect and prevent intrusions. However, the importance and particularity of industrial control networks prevent these systems from being successfully applied to industrial control network environments, because each The impact of intrusion on the industrial control system is fatal. Similarly, the impact of every false alarm or wrong response plan is also fatal, and the existing security system cannot guarantee 100% correct detection and correct response , so in practical applications, the last link in the security system of the industrial control system is always the security management experts, who ensure the normal operation of the industrial control system through human professional judgment, and correctly detect and eliminate threats
As the first link in the security system, the intrusion detection system is responsible for discovering intrusion behavior and issuing alarms. However, in actual scenarios, the alarm information of the intrusion detection system is often too simple, which makes it impossible for professionals to quickly locate the key information of the intrusion. , delaying the time to deal with the intrusion, if the intrusion detection system can provide more information about the intrusion, it will be of great help to shorten the time required to deal with the intrusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion attack and clue discovery method of industrial control system based on deep learning
  • Intrusion attack and clue discovery method of industrial control system based on deep learning
  • Intrusion attack and clue discovery method of industrial control system based on deep learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in detail below in conjunction with specific embodiments shown in the accompanying drawings.

[0021] The overall framework diagram of the industrial control network intrusion attack and clue discovery method based on deep learning in the present invention is as follows figure 1 shown, including:

[0022] In the training phase, the data from the industrial control network of the data set is dedimensionalized by splitting and normalizing the method, and the data is used to train the deep learning classification model as the intrusion detection model. After the model training is completed, the cluster analysis method can be used to obtain each category of MDH.

[0023] The steps of the cluster analysis method are as follows:

[0024] Step 1.1 clusters the output of the hidden layer of the deep learning model to obtain a clustering model;

[0025] Step 1.2 tries to form a new classification model through each hidden layer output +...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Intrusion attack and clue discovery method of industrial control system based on deep learning. Intrusion detection is part of the initial phase of an industrial control system security system. Due to the importance of industrial control systems, the decisions of safety system professionals remain paramount. Therefore, the role of simple intrusion alarms in security systems is very limited, and intrusion detection models based on deep learning are difficult to provide more information due to their inexplicability, which limits the application of deep learning methods in the field of intrusion detection in industrial control networks . In response to this limitation, this paper analyzes the distribution of classification-related information and irrelevant information in each layer of deep learning models from the perspective of information, and finds the possibility that the hidden layers of deep learning classification models can be analyzed. Finally, the hierarchical propagation method can map relevant information from the hidden layer to the input layer, transforming difficult information into understandable information, helping professionals to locate and deal with intrusion threats faster.

Description

technical field [0001] The invention relates to the technical field of industrial control networks, in particular to an industrial control anomaly detection and attack classification method based on deep learning. Background technique [0002] Industrial Control Systems (ICS) is an automatic control system composed of computer equipment and industrial process control components, which plays an important role in key infrastructure fields such as railways, petrochemicals and electric power. Industrial control network is an important carrier of message transmission in industrial control system. With the continuous improvement of industrial production technology and the continuous development of information technology, industrial development and information development interact and integrate with each other, and more and more information technology has been applied to the industrial field. At present, industrial control networks have been widely used in petrochemical, water pow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G05B23/02
CPCG05B23/0243G05B2219/24065
Inventor 赖英旭王志东刘静高慧娟冯文倩
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products