Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Node vulnerability scanning method and device and computer equipment

A technology of vulnerability scanning and scanning method, applied in the field of security protection of smart grid industrial control system, can solve the problems of heavy scanning burden of smart grid industrial control system, lack of security protection of equipment, easy to suffer from public Internet, etc., achieve high security protection level, improve security sex, reduce the effect of scanning

Pending Publication Date: 2021-04-09
STATE GRID HEBEI ELECTRIC POWER RES INST +2
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a node vulnerability scanning method, device and computer equipment to solve the problem that the existing vulnerability scanning method adopts the same scanning strategy for each node in the power system, resulting in the scanning of the smart grid industrial control system. Overburdened and high-risk devices lack adequate levels of security protection and are more vulnerable to attacks from the public Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node vulnerability scanning method and device and computer equipment
  • Node vulnerability scanning method and device and computer equipment
  • Node vulnerability scanning method and device and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0031]The relevant research on the security of smart grid industrial control systems is still in its infancy, but as a typical industrial control system, the existing research on industrial control systems has reference significance for the security detection of power systems. In recent years, many industrial control system vulnerability scanning methods have...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a node vulnerability scanning method and device and computer equipment. The method comprises the steps: obtaining the vulnerability information of an industrial control system, the vulnerability scanning information of a target industrial control system, and the network topology information of the target industrial control system; according to the vulnerability information of the industrial control system, the vulnerability scanning information of the target industrial control system and the network topology information of the target industrial control system, generating a target attack graph, wherein the target attack graph is used for representing attack path information between nodes in the target industrial control system; according to the target attack graph, calculating a vulnerability risk level of each node in the target industrial control system; and determining a vulnerability scanning strategy of the target system according to the vulnerability risk level of each node. Through the implementation of the invention, a higher security protection level can be provided for nodes with high risk levels, and the overall security of the system is improved; scanning of low-risk-level nodes is reduced, system resources are saved, and influences on normal operation of the system are reduced.

Description

technical field [0001] The invention relates to the field of security protection of smart grid industrial control systems, in particular to a node vulnerability scanning method, device and computer equipment. Background technique [0002] The power industry is an important basic energy industry related to national economic development and social stability, and is the core of national infrastructure. The power industrial control system is a typical industrial control system (ICS), which is an automatic control system composed of computers and industrial control components. When applied to smart grid scenarios, the power industrial control system has high security requirements; The application of Internet technology in the power industrial control system breaks its original relative closure, and the connection with the public Internet is getting closer and closer, and it is also more vulnerable to attacks from the Internet. Therefore, there are many security loopholes in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 栗会峰李铁成栗维勋杨立波马斌孙广辉王强赵鹏贾鹏洲刘哲
Owner STATE GRID HEBEI ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products