Unlock instant, AI-driven research and patent intelligence for your innovation.

Industrial control vulnerability mining method and device

A vulnerability mining and industrial control technology, applied in the field of network security, can solve the problems of poor mining effectiveness and achieve the effect of improving effectiveness

Active Publication Date: 2021-11-30
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method and device for mining industrial control loopholes, which are used to solve the defect of poor mining effectiveness in existing industrial control loophole mining methods, and to achieve the purpose of effectively discovering security flaws in the Internet of Things and industrial control system equipment. Improving the Effectiveness of Vulnerability Discovery in Industrial Control System Equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control vulnerability mining method and device
  • Industrial control vulnerability mining method and device
  • Industrial control vulnerability mining method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0045] figure 1 It is a schematic flowchart of a method for mining industrial control loopholes provided by an embodiment of the present invention, as shown in figure 1 shown, including:

[0046] Obtain a typical message list based on the set of data packets to be analyzed;

[0047] Specifically, first obtain the network data packets of the tar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present invention provides a method and device for mining industrial control vulnerabilities, the method comprising: obtaining a typical message list based on a set of data packets to be analyzed; obtaining a seed list based on the typical message list; obtaining a malformed data packet based on the seed list; Vulnerabilities mining and verification are performed on the target device based on the malformed data packets. Through the similarity comparison of the reply messages, high-quality seeds are selected to mutate and generate malformed data packets, and then remote fuzzy testing is carried out to achieve the purpose of effectively discovering security defects in the Internet of Things and industrial control system equipment, and improve the security of industrial control systems. Effectiveness of vulnerability mining in devices.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for mining industrial control loopholes. Background technique [0002] In recent years, various network attacks against the Internet of Things and industrial control system equipment have been increasing, and the security problems in the Internet of Things and industrial control system equipment have become more and more serious. Pre-discovering and repairing security vulnerabilities in IoT embedded devices and industrial control systems can effectively prevent security threats and improve the security protection level of industrial control systems. [0003] Due to the characteristics of Internet of Things devices and industrial control system devices that are closed, difficult to debug, high real-time, and difficult to simulate, traditional vulnerability mining methods, such as reverse analysis, symbolic execution, and taint tracking, are difficult t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/57
CPCG06F21/577H04L63/1433H04L67/12
Inventor 孙利民白双朋宋站威孙玉砚朱红松
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More