Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Semi-passive industrial control network security analysis tool and method based on Bayesian attack graph

A Bayesian attack graph, industrial control network technology, applied in the field of network security, can solve problems such as hidden danger prevention and control, poor security analysis effect, etc., to achieve the effect of improving compatibility, protecting important nodes, and reducing occupation

Active Publication Date: 2021-04-13
SHANGHAI JIAO TONG UNIV
View PDF10 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above-mentioned existing technologies, the existing industrial control network security analysis tools currently have problems such as lack of compatible design for industrial control networks, poor security analysis effect, and failure to prevent and control hidden dangers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semi-passive industrial control network security analysis tool and method based on Bayesian attack graph
  • Semi-passive industrial control network security analysis tool and method based on Bayesian attack graph
  • Semi-passive industrial control network security analysis tool and method based on Bayesian attack graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073]The present invention will be described in detail below with reference to the specific embodiments. The following examples will help to further understand the present invention in any form of technicrat, it will be further understood by those skilled in the art. It should be noted that several variations and improvements can be made without departing from the concept of the present invention without departing from the present invention. These are all of the scope of protection of the present invention.

[0074]The embodiment of the present invention provides a semi-dynamic industrial control network security analysis tool and method based on Bayesian attack map.figure 1 As shown, the network security analysis tool is divided into half passive information acquisition modules, establishing an asset list module, attribute attack graph generation module, and Bayes attack graph generation module four modules.

[0075]Referfigure 2 As shown, the half-passive information acquisition method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Bayesian attack graph-based semi-passive industrial control network security analysis tool and a Bayesian attack graph-based semi-passive industrial control network security analysis method, which relate to the technical field of network security, and comprise a semi-passive information acquisition module for acquiring a combination of an active scanning report, network message data and administrator correction suggestions and taking the combination as an input file; an asset list establishing module: establishing an asset list, and generating. P files as input files of the attribute attack graph generation module and the Bayesian attack graph generation module; an attribute attack graph generation module which is used for inputting template network topology information and node information and generating an attack path; and a Bayesian attack graph generation module which is used for comprehensively analyzing the information of the whole network based on the network information and logic rules recorded by the Datalog statement, and finally generating all possible attack graphs. The method has high compatibility for an industrial control network, comprehensively utilizes multiple charts to visually assist network security analysis, and can achieve dynamic analysis and hidden danger prevention and control.

Description

Technical field[0001]The present invention relates to the field of network security, and in particular, to a half-dynamic industrial control network security analysis tool and method based on a Bayesian attack map.Background technique[0002]The industrial control system is a process control component that collects and monitors and monitors real-time data, and the business process control system for ensuring industrial facility automation, process control and monitoring, and its core components include data acquisition and Monitoring System (SCADA), Distributed Control System (DCS), Programmable Logic Controller (PLC), Remote Terminal (RTU), Intelligent Electronic Device (IED). Related terms: ICS (Industrial Controlsystem): Industrial Control System; AG (Attack Graph): Attack Diagram; BAG (Bayesian Attack Graphs): Bayes Attack Diagram; CVSS (Common Vulnerability Scoring System): General Vulnerability Score System.[0003]The industrial control system is widely used in power, petroleum p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/12H04L41/145H04L63/1416H04L63/20
Inventor 郭建铭刘功申陈子昂刘浩文刘子涵
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products