Industrial control system-oriented intrusion detection rule matching optimization method

An industrial control system and intrusion detection technology, which is applied in the direction of instruments, calculations, and electrical digital data processing, etc., can solve problems such as low matching efficiency, insufficient discovery, unrealistic classification and sorting, etc., to shorten the alarm time and improve detection efficiency. Effect

Active Publication Date: 2021-08-06
XIAN THERMAL POWER RES INST CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For equipment using misuse detection technology, due to the lack of in-depth understanding of the actual industrial production environment, in order to ensure the completeness of the matching rules, a large number of detection rules are reserved in the rule base, and there are even many invalid rules. During the use of the system, the security operation and maintenance personnel will add a lot of detection rules to the device according to the on-site conditions. When the intrusion detection device uses the traversal method to detect the data packets, the matching efficiency is low, which leads to real damage to production. When the affected network is intruded, the detection is not timely enough
[0003]In actual industrial production sites, industrial control systems often face tentative and harassing attacks. Although intrusion detection detection also needs to detect such attacks, it can be inferred Finally, the detection rules corresponding to the attacks that can actually cause damage should be advanced. How to classify and sort the rules in the rule base according to the vulnerabilities of industrial control system assets and security configuration vulnerabilities is to improve the pertinence of detection. The key to timeliness; at the same time, because the number of rules is huge and constantly changing, it is not realistic to rely on manual classification and sorting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control system-oriented intrusion detection rule matching optimization method
  • Industrial control system-oriented intrusion detection rule matching optimization method
  • Industrial control system-oriented intrusion detection rule matching optimization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Below in conjunction with accompanying drawing and embodiment the present invention is described in further detail:

[0024] Such as figure 1 As shown, an intrusion detection rule matching optimization method for industrial control systems is illustrated by taking the open source intrusion detection system Snort as an example, including the following steps:

[0025] (1) According to the network topology of the industrial control system and the actual situation of the business system, organize the reasonable access list of the industrial control system business, including the internal access of the industrial control system and the interactive access between the internal and external, and sort out the protocol, source address, and source port corresponding to the access relationship , destination address, destination port and other information, the uncontrolled access list can be obtained from the reasonable access list of the industrial control system business; and then...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An industrial control system-oriented intrusion detection rule matching optimization method comprises the steps of arranging information such as IP, ports, vulnerabilities and security configuration of industrial control system assets, selecting a plurality of feature attributes from rule heads and rule options of matching rules, setting a clustering center to be 3, dividing rules in a rule base into three levels by adopting a mean value clustering algorithm, calculating threat values after rule matching succeeds according to the rule header feature data, the vulnerability score, the configuration vulnerability score and the threat score of the rule action, and sorting in the hierarchical cluster according to the threat values; and when intrusion detection is carried out on a data packet, after feature information of the data packet is extracted, matching the feature information with a rule according to grading and sorting. According to the method, the rules in the rule base can be graded and sorted according to real threats faced by the industrial control system, the rules corresponding to harassment attacks are matched and deduced, the problem of low detection efficiency caused by a large number of rules is solved, and the detection efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of industrial control security detection, in particular to an industrial control system-oriented intrusion detection rule matching optimization method. Background technique [0002] In order to ensure the security of industrial production networks, intrusion detection equipment is generally equipped in industrial control systems. The existing mainstream technologies include misuse detection and anomaly detection. For equipment using misuse detection technology, due to the lack of in-depth understanding of the actual industrial production environment, in order to ensure the completeness of the matching rules, a large number of detection rules are reserved in the rule base, and there are even many invalid rules. During the use of the system, the security operation and maintenance personnel will add a lot of detection rules to the device according to the on-site conditions. When the intrusion detection device u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/57
CPCG06F21/552G06F21/577
Inventor 刘超飞毕玉冰崔逸群曾荣汉胥冠军吕珍珍朱博迪邓楠轶
Owner XIAN THERMAL POWER RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products