Sequence attack detection implementation method based on industrial firewall

A technology of industrial firewall and implementation method, which is applied in the direction of electrical components, transmission systems, etc., can solve the problem of not having the same instructions, and achieve the effect of eliminating hazards

Inactive Publication Date: 2020-06-05
北京威努特技术有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current industrial firewall command sequence attack detection technology supports configuration rules without sequence rules of the same command, and even without repeated commands in the same rule

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sequence attack detection implementation method based on industrial firewall
  • Sequence attack detection implementation method based on industrial firewall
  • Sequence attack detection implementation method based on industrial firewall

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] The method of the present invention comprises the following steps:

[0031] Step 1, the first instruction arrives, and the instruction sequence list is established:

[0032] Step 1.1, traversing all instruction sequence ru...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sequence attack detection implementation method based on an industrial firewall. The method comprises: a first instruction arrives, establishing an instruction sequence table, a next instruction arriving, checking the instruction sequence table, refreshing the instruction sequence table according to the hit situation, and subsequent instructions arriving until the instruction sequence table is empty or one instruction sequence remains. The method has the advantages that increasingly accurate targeted attacks can be dealt with, the attack cost is remarkably improved, and shutdown of an industrial control system is reduced. The sequence attack detection method is realized, and any sequence of illegal instructions are intercepted and warned, so that all instructionswith a sequence relationship in the industrial control system are normally operated in an ordered and legal state, and the possible harm of the industrial control system due to sequence attack or misoperation of a user is eliminated.

Description

technical field [0001] The invention belongs to the technical field of industrial control security, and in particular relates to a method for realizing serial attack detection based on an industrial firewall. Background technique [0002] At present, industrial firewalls mainly use security protection technologies such as traffic analysis, signature database matching, and in-depth analysis of industrial control protocols to ensure industrial network security. The patent with the application number 201310453267.1 discloses a method and device for automatically defending against distributed denial-of-service attacks by firewalls, including: performing FLOW analysis on the data traffic passing through and arriving at the firewall device; according to the results of FLOW analysis, if a certain According to the attack characteristics of a distributed denial-of-service DDOS attack type, the data traffic conforming to the attack characteristics is DDOS attack traffic. policy, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1416H04L63/1466
Inventor 刘锋冯全宝
Owner 北京威努特技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products