Check patentability & draft patents in minutes with Patsnap Eureka AI!

Intrusion detection device and intrusion detection method

An intrusion detection and agreement technology, applied in transmission systems, electrical components, etc., can solve problems such as loopholes in information security problems, industrial equipment intrusion, and industrial control systems that cannot be protected by information security.

Active Publication Date: 2021-03-30
INSTITUTE FOR INFORMATION INDUSTRY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] General industrial control systems often adopt a master-slave architecture (such as industrial-grade serial serial protocol (Modbus)), and the characteristics of the master-slave architecture lead to loopholes in the information security of the system
For example, as long as a hacker pretends to be a master device, he can successfully transmit a masquerading packet to a slave device, causing the slave device and multiple industrial devices connected to it to be compromised
[0003] However, the current enterprise-type intrusion detection system (intrusion detection system, IDS) only defines the detection rules for the protocol content of the third and fourth layers of the Open System Interconnection Reference Model (OSI), As a result, the industrial control system using the Modbus protocol cannot be protected by information security at all

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection device and intrusion detection method
  • Intrusion detection device and intrusion detection method
  • Intrusion detection device and intrusion detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following disclosure provides many different embodiments, or examples, for implementing the different features of the present disclosure. Specific examples of components and arrangements are described below to simplify the present case. Of course, these examples are merely exemplary and not intended to be limiting. For example, in the following description, forming a first feature over or on a second feature may include embodiments where the first and second features are formed in direct contact, and may also include embodiments where the first and second features may be formed in direct contact. Embodiments where additional features are formed between features such that the first feature and features may not be in direct contact. In addition, in this case, element symbols and / or letters may be repeated in each example. This repetition is for the purposes of brevity and clarity and does not in itself indicate a relationship between the various embodiments and / or c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an intrusion detection device and method. The intrusion detection device is suitable for an industrial-grade serial sequence agreement. The intrusion detection device comprisesa connection interface and a processor. The processor receives a plurality of first packets through the connection interface. The processor is used for obtaining network protocol data and industrial control data of each first packet, respectively marking a first operation role of a first internet protocol address and a second operation role of a second internet protocol address in the network protocol data; obtaining an association group of the first internet protocol address; and establishing a rule list, wherein the rule list comprises the first operation role, the first internet protocol address, the second internet protocol address and the content of the associated group. Therefore, according to the scheme, external hacker invasion and internal deliberate damage of internal ghost can be prevented at the same time, and the effect of more comprehensive information security protection is achieved.

Description

technical field [0001] This case relates to a detection device and a detection method, and in particular to a network packet intrusion detection device and an intrusion detection method. Background technique [0002] General industrial control systems often adopt a master-slave architecture (such as the industrial serial serial protocol (Modbus)), and the characteristics of the master-slave architecture lead to loopholes in the information security of the system. For example, as long as a hacker pretends to be a master device, a masquerading packet can be successfully transmitted to a slave device, causing the slave device and multiple industrial devices connected to it to be compromised. [0003] However, the current enterprise-type intrusion detection system (intrusion detection system, IDS) only defines the detection rules for the protocol content of the third and fourth layers of the Open System Interconnection Reference Model (OSI), As a result, the industrial control ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/30H04L63/0263H04L63/1416H04L63/0236
Inventor 林志达黄鼎傑李美玲邹育庭
Owner INSTITUTE FOR INFORMATION INDUSTRY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More