Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial control system attack clue discovery system based on knowledge graph

A technology of knowledge graph and industrial control system, applied in the field of industrial control system attack clue discovery system, which can solve problems such as only detecting attacks and alarming, security incidents, inability to provide methods and consequences of attacks and handling opinions, etc.

Active Publication Date: 2021-03-09
BEIJING UNIV OF TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the industrial control systems currently in use were designed and developed many years ago, lacking corresponding security considerations, and there are inevitably many loopholes that endanger system security. These loopholes are likely to be exploited by intruders and cause security incidents
With the continuous advancement of the integration of industrialization and industrialization, mature IT technology has broken the relative closure of industrial control systems, and the security problems and risks faced have become more prominent. Industrial control system network security accidents have seriously affected the safety of life and property in industrial production.
At present, intrusion detection technology is usually used to detect network attacks on industrial control systems, but intrusion detection technology can only detect attacks and give an alarm, and cannot provide relevant information such as the method used by the attack, the consequences caused, and handling opinions. This information can provide information for security personnel. Provide decision support, which plays an important role in the rapid recovery of the system after being attacked and the reduction of attack losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control system attack clue discovery system based on knowledge graph
  • Industrial control system attack clue discovery system based on knowledge graph
  • Industrial control system attack clue discovery system based on knowledge graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described in detail below in conjunction with specific embodiments shown in the accompanying drawings.

[0023] figure 1 is the overall structure diagram of the knowledge map construction of the present invention, such as figure 1 As shown, in order to obtain device information, vulnerability and manufacturer information, web crawlers are used to obtain and parse the web page information of each vulnerability database, and after merging and deduplication to form the knowledge graph of device, vulnerability and manufacturer entities, including vulnerability name, release date, threat level, Attributes such as CVE number, description, vulnerability patch, vulnerability type, and vulnerability reference. For unstructured vulnerability announcements and vulnerability descriptions, etc., use the named entity recognition extraction method and attack consequences based on linear chain conditional random fields. Entities extracted from multiple d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an industrial control system attack clue discovery system based on a knowledge graph. Most industrial control systems are designed and developed before many years, lack corresponding security consideration, and inevitably have a lot of vulnerabilities endangering system security, and these vulnerabilities are likely to be utilized by intruders. Aiming at the fact that an industrial control intrusion detection system can only discover attacks but cannot provide clues related to the attacks, and the clues play an important role in rapid recovery of the system after the attacks, the industrial control system vulnerability utilization knowledge graph is constructed, and the related clues of the attacks are given from the perspective of vulnerability utilization. In theprocess of constructing the knowledge graph, an attack information named entity identification method based on a conditional random field, an entity alignment framework based on rule and character similarity calculation and a knowledge reasoning algorithm based on type limitation and pre-training model negative triple potential correct probability are provided. According to the method, the knowledge graph is visually displayed in a force-oriented graph mode according to the attack clues obtained through user input, and the method is more accurate and visual.

Description

technical field [0001] The invention belongs to the field of network security of industrial control systems, and in particular relates to a system for discovering attack clues of industrial control systems based on knowledge graphs. Background technique [0002] The industrial control system is composed of various automation control components and process control components for real-time data collection and monitoring, and is used in a very wide range of industrial fields. Most of the industrial control systems currently in use were designed and developed many years ago, lacking corresponding security considerations, and there are inevitably many loopholes that endanger system security. These loopholes are likely to be exploited by intruders and cause security incidents. With the continuous advancement of the integration of industrialization and industrialization, mature IT technology has broken the relative closure of industrial control systems, and the security problems an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F40/284G06F40/295G06N3/04G06N3/08
CPCH04L63/1408H04L63/1416H04L63/1433H04L63/1425G06F40/284G06F40/295G06N3/08G06N3/048
Inventor 赖英旭周昆刘静
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products