Industrial control information safety monitoring system adopting black and white lists for analysis

A technology of information security and monitoring system, applied in the direction of transmission system, electrical components, etc., can solve the problems of not considering the security of interconnection and communication, time-consuming and laborious, single blacklist or whitelist mechanism, etc.

Inactive Publication Date: 2020-03-06
上海三零卫士信息安全有限公司
View PDF8 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional industrial control system uses dedicated hardware, software and communication protocols, and basically does not consider the communication security issues of interconnection and intercommunication in the design.
[0003] In general industrial system security protection, a single blacklist or whitelist mechanism is used, and the combination of the two is not used as a defense system, and there are a lot of manual operations, which are time-consuming and laborious
In the industrial system security protection system using a single blacklist, because the blacklist itself is restricted by the rules, it cannot monitor and judge new attacks. In addition, there are many false positives in the blacklist mechanism, which can judge whether it is a real attack for the user. bring inconvenience
[0004] In the industrial system security protection system using a single whitelist, the whitelist mechanism cannot give specific details of the attack, so that it is impossible to conduct targeted investigation and removal of security risks in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] An industrial control information security monitoring system that uses black and white lists for analysis. The industrial control information security monitoring system consists of the following steps:

[0027] S1. Initial sample library collection: the monitoring device collects all data packets on the on-site monitoring network, and analyzes the data packets to obtain seven-tuple information. Whitelist rules and asset lists can be set according to the sample library;

[0028] S2. Blacklist rule formation and alarm generatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of industrial control system information safety, in particular to an industrial control information safety monitoring system adopting a black list and a white list for analysis, which comprises the following steps of: (1) collecting an initial sample library; (2) blacklist rule formation and alarm generation; (3) white list rule formation and alarm generation; (4) intelligently generating a communication white list; (5) protocol rule formation and alarm generation; and (6) performing visual alarm and report display. The beneficial effects of the invention arethat the system carries out the credible monitoring of assets in the industrial control network, carries out the credible monitoring of communication in the industrial control network, carries out the deep analysis of a plurality of industrial protocols, carries out the visual display of a topological structure of the industrial control network, and carries out the report statistics of a threat form in the industrial control network; the method is beneficial to realization of abnormal monitoring in the network, is beneficial to realization of quick positioning and troubleshooting of problem assets and problem communication behaviors, is beneficial to avoiding human operation errors, improves the accuracy of a white list, reduces missing reports and false reports, and constructs a monitoring system easy to operate and capable of quickly positioning problems.

Description

technical field [0001] The present invention relates to the field of information security of industrial control systems, in particular to an industrial control information security monitoring system that uses black and white lists for analysis. Background technique [0002] The control network composed of control systems such as DCS, PLC and SCADA has shown an overall open trend in the past few decades of development. With the application of information technology in enterprises, a large number of common TCP / IP and OPC protocol technologies are used in industrial control networks, and the connection between ICS network and enterprise management network is getting closer. The traditional industrial control system uses dedicated hardware, software and communication protocols, and basically does not consider the communication security issues of interconnection and intercommunication in the design. [0003] In general industrial system security protection, a single blacklist or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/101H04L63/1408H04L63/1416H04L67/12
Inventor 宋迟吴冲张毅仵大奎吴国雄刘江柳李绪国
Owner 上海三零卫士信息安全有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products