Unlock instant, AI-driven research and patent intelligence for your innovation.

Industrial control network threat automatic isolation method and system

A technology of industrial control network and industrial control system, which is applied in the field of automatic threat isolation of industrial control network, and can solve the problem of slow update of threat signature database, false negative rate and accuracy rate of security protection system, inability to effectively update threat signature database, lack of local automatic Blocking mechanism and other issues to achieve the effect of improving the recall rate and precision rate, improving the detection accuracy rate, and reducing the false negative rate

Pending Publication Date: 2020-11-13
NARI INFORMATION & COMM TECH
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Looking at the current industrial control system network security protection solutions on the market, the focus is mostly on the security baseline verification and vulnerability scanning beforehand, the network security data monitoring and early warning during the incident, the attack source tracing and security reinforcement after the incident, and lack of in-process security protection solutions. In-situ automatic blocking mechanism or automatic blocking means. At the same time, most threat detection methods based on pattern matching cannot effectively update the threat signature database, and the slow update of the threat signature database has become a key factor affecting the false negative rate and accuracy of the security protection system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control network threat automatic isolation method and system
  • Industrial control network threat automatic isolation method and system
  • Industrial control network threat automatic isolation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0039] Such as figure 1 Shown, a kind of industrial control network threat automatic isolation method comprises the following steps;

[0040] Step 1, obtain the operation information of each device in the industrial control system, and extract the characteristics of the operation information.

[0041] Operation information includes industrial control system logs, network connection information and business operation information; among them, by installing probe programs on various devices, the acquisition of logs and network connection information is realized; real-time capture of network application layer messages through switch mirroring technology, Obtain the service operation information of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an industrial control network threat automatic isolation method, which comprises the following steps of: obtaining operation information of each piece of equipment in an industrial control system, and extracting operation information features; in response to a threat event matched with the operation information features existing in a preset threat decision table, obtainingan isolation strategy corresponding to the threat event, and isolating a threat source; in response to the situation that no threat event matched with the operation information features exists in a preset threat decision table, inputting the operation information features into a pre-trained decision model, and obtaining an event category corresponding to the operation information features; and inresponse to the event corresponding to the operation information features being a threat event, obtaining an isolation strategy corresponding to the threat event, isolating a threat source, and storing the operation information features in a preset threat decision table. The invention further discloses a corresponding system. According to the invention, the threat decision table and the decision model are combined and applied, threat source isolation in an event is effectively realized, the threat decision table is continuously perfected in a self-learning mode while the threat detection efficiency is ensured, and real-time updating is realized, so that the network security threat identification accuracy is improved.

Description

technical field [0001] The invention relates to a method and system for automatically isolating industrial control network threats, belonging to the technical field of information security. Background technique [0002] Compared with traditional information systems, industrial control systems have special requirements for high real-time performance, high reliability, and work continuity, but at the same time, they are relatively lacking in network security defense capabilities. Looking at the current industrial control system network security protection solutions on the market, the focus is mostly on the security baseline verification and vulnerability scanning beforehand, the network security data monitoring and early warning during the incident, the attack source tracing and security reinforcement after the incident, and lack of in-process security protection solutions. In-situ automatic blocking mechanism or automatic blocking means. At the same time, most threat detectio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0227H04L63/1425
Inventor 李牧野黄益彬朱世顺刘苇景娜陆英玮祁龙云金建龙张林霞王梓杨康乐
Owner NARI INFORMATION & COMM TECH