Check patentability & draft patents in minutes with Patsnap Eureka AI!

Static and dynamic vulnerability analysis and mining method for power industrial control system

A technology for industrial control systems and vulnerability analysis, applied in transmission systems, electrical components, etc., can solve the problems of control systems threatening national security, casualties, damage to social order and public interests, etc.

Inactive Publication Date: 2019-11-29
HUBEI UNIV OF TECH
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The openness, complexity and loopholes of the power industrial control system make the security of the industrial control system face greater threats and challenges. The core issue of information security in the power industrial control system is the loopholes in the power industrial control system. Once the vulnerability is exploited, it will directly cause economic losses, explosions and even casualties. In addition, when the important control system of power generation enterprises is damaged, it will threaten national security and seriously damage social order and public interests. For this reason, we propose a power industrial control system Static and Dynamic Vulnerability Analysis and Mining Methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Static and dynamic vulnerability analysis and mining method for power industrial control system
  • Static and dynamic vulnerability analysis and mining method for power industrial control system
  • Static and dynamic vulnerability analysis and mining method for power industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0061] refer to Figure 1-5 , a static and dynamic vulnerability analysis and mining method for an electric power industrial control system, comprising the following steps:

[0062] S1: Analysis of typical vulnerabilities in power industrial control systems combined with the characteristics of information security events;

[0063] S2: Analyze the vulnerability mining technology.

[0064] In said S1, the typical vulnerability analysis of the power industrial control system of information security event characteristics includes the typical event vulnerability analysis, and the typical event vulnerability analysis includes:

[0065] (1) Forgery of digital certificates...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of power grid protection, and particularly relates to a static and dynamic vulnerability analysis and mining method for a power industrial control system.Aiming at the technical problems of openness and complexity of the electric power industrial control system and loopholes of the system, the invention provides the following scheme that the method comprises the following steps: analyzing typical loopholes of the electric power industrial control system by combining information security event characteristics; and analyzing to the vulnerability mining technology,wherein typical vulnerability analysis of the electric power industrial control system of the information security event characteristics comprises typical event vulnerability analysis, and typical event vulnerability analysis comprises digital certificate counterfeiting. According to the invention, typical vulnerabilities existing in the event are analyzed; analysis and research arecarried out on typical vulnerabilities possibly existing in a domestic electric power industrial control system by combining vulnerability classification from the mechanism of vulnerabilities; the test case generation rule in the dynamic fuzzy test containing the typical vulnerability characteristics of the power industrial control system is formed, and different generation rules are matched according to different protocol analysis results, so that the effectiveness of the test case is improved.

Description

technical field [0001] The invention relates to the technical field of power grid protection, in particular to a static and dynamic loophole analysis and mining method for an electric power industrial control system. Background technique [0002] According to its different functions, the power industrial control system is mainly applied in power plants, dispatching, transformation, power distribution and power transmission in the power industry. [0003] The openness, complexity and loopholes of the power industrial control system make the security of the industrial control system face greater threats and challenges. The core issue of information security in the power industrial control system is the loopholes in the power industrial control system. Once the vulnerability is exploited, it will directly cause economic losses, explosions and even casualties. In addition, when the important control system of power generation enterprises is damaged, it will threaten national sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433
Inventor 汪繁荣宋强周子槊彭禄向堃
Owner HUBEI UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More