Unlock instant, AI-driven research and patent intelligence for your innovation.

Industrial control vulnerability mining method and device

A vulnerability mining and industrial control technology, applied in the field of network security, can solve problems such as poor mining effectiveness, and achieve the effect of improving effectiveness

Active Publication Date: 2021-02-23
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method and device for mining industrial control loopholes, which are used to solve the defect of poor mining effectiveness in existing industrial control loophole mining methods, and to achieve the purpose of effectively discovering security flaws in the Internet of Things and industrial control system equipment. Improving the Effectiveness of Vulnerability Discovery in Industrial Control System Equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control vulnerability mining method and device
  • Industrial control vulnerability mining method and device
  • Industrial control vulnerability mining method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0045] figure 1 It is a schematic flowchart of a method for mining industrial control loopholes provided by an embodiment of the present invention, as shown in figure 1 shown, including:

[0046] Obtain a typical message list based on the set of data packets to be analyzed;

[0047] Specifically, first obtain the network data packets of the tar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention provide an industrial control vulnerability mining method and device. The method comprises the steps of obtaining a typical message list based on a to-be-analyzed data packet set; acquiring a seed list based on the typical message list; obtaining an abnormal data packet based on the seed list; and performing vulnerability mining and verification on the target device based on the malformed data packet. Through similarity comparison of reply messages, high-quality seeds are selected for variation to generate a malformed data packet, and then remote fuzzy testing is performed, so that the purpose of effectively discovering security defects existing in the Internet of Things and industrial control system equipment is achieved, and the effectiveness of vulnerabilitymining in the industrial control system equipment is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for mining industrial control loopholes. Background technique [0002] In recent years, various network attacks against the Internet of Things and industrial control system equipment have been increasing, and the security problems in the Internet of Things and industrial control system equipment have become more and more serious. Pre-discovering and repairing security vulnerabilities in IoT embedded devices and industrial control systems can effectively prevent security threats and improve the security protection level of industrial control systems. [0003] Due to the characteristics of Internet of Things devices and industrial control system devices that are closed, difficult to debug, high real-time, and difficult to simulate, traditional vulnerability mining methods, such as reverse analysis, symbolic execution, and taint tracking, are difficult t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/57
CPCG06F21/577H04L63/1433H04L67/12
Inventor 孙利民白双朋宋站威孙玉砚朱红松
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More