Security detection method based on Ethernet IP industrial control protocol

A security detection and industrial control protocol technology, applied in electrical components, transmission systems, etc., can solve the problems of running system damage, lack of decoding and understanding, and inability to distinguish, avoiding spatial sparsity, in-depth processing, and saving memory usage Effect

Inactive Publication Date: 2020-06-19
南京聚铭网络科技有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. Generally speaking, industrial control protocols are transmitted in plain text, and encryption algorithms are seldom or hardly used, so it is very easy to forge. Attackers can usually use the "middleman" method to send data packets, thereby destroying the operating system;
[0004] 2. There is a lack of necessary monitoring means for industrial control protocol data. Although most industrial control protocols have been made public, mainstream security devices generally do not provide support for relevant industrial control protocols. Therefore, when encountering related industrial control attacks, It is impossible to distinguish, let alone respond to threats;
[0005] 3. For industrial control protocols, especially complex industrial control protocols, such as Ethernet IP, there is a lack of in-depth decoding and understanding. When threats occur and trace back, most of them seem powerless, so they cannot provide strong support for enterprise users. Not to mention security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security detection method based on Ethernet IP industrial control protocol
  • Security detection method based on Ethernet IP industrial control protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Embodiment 1: see figure 1 , figure 2 , a kind of security detection method based on Ethernet IP industrial control agreement, described method comprises the following steps: Step 1, set up network data capture module, module is mainly carried out for Ethernet network; Data link in the general Ethernet frame is carried out in the module The decoding is compatible with the VLAN format to meet the general requirements of the industrial control network; then, the module decodes the three layers of the network, namely the network layer, and parses out the IP address, etc., and then the module decodes the transport layer of the data packet, that is The source port and destination port can be analyzed. The communication port of the general Ethernet IP protocol is 44818. After analyzing the relevant information of the transport layer, the application layer information will be obtained. This application layer is the main content of the industrial control protocol; for In the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security detection method based on an Ethernet IP industrial control protocol. The detection method comprises the following steps: 1, establishing a network data packet capture module; 2, establishing a data analysis module; 3, establishing a data learning module; 4, establishing a behavior legality judgment module; 5, establishing a behavior abnormality response module.According to the technical scheme, related commands and function calls are deeply analyzed according to protocol characteristics of Ethernet IP, and analysis results can be directly processed by somevisual tools, so that a user can have intuitive feeling on circulating content in an industrial control network.

Description

technical field [0001] The invention relates to a detection method, in particular to a safety detection method based on the Ethernet IP industrial control protocol, and belongs to the technical field of general network safety detection. Background technique [0002] With the advent of the era of Industry 4.0, the use of general network technology for industrial control commands and industrial data transmission, especially the use of Ethernet for communication, is becoming more and more widespread in industrial production, and related industrial equipment also supports this Class transmission, and due to the needs of industrial automation, industrial enterprises (such as energy, electricity, etc.) also rely heavily on general network technology for remote control, which brings the following problems: [0003] 1. Generally speaking, industrial control protocols are transmitted in plain text, and encryption algorithms are seldom or hardly used, so it is very easy to forge. Atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L69/22H04L69/26
Inventor 陈虎唐开达
Owner 南京聚铭网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products