A method, device, and related equipment for identifying network vulnerabilities in industrial control systems

An industrial control system and identification method technology, applied in the field of information security, can solve the problems of heavy industrial control system load, downtime, inability to accurately identify vulnerabilities, etc., to achieve the effect of vulnerability identification

Active Publication Date: 2022-03-25
XIAN THERMAL POWER RES INST CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the industrial control system network, there are not only traditional information systems, but also a large number of industrial control system equipment such as PLC. The industrial control system equipment is a real-time system, which requires high network quality. Concurrency and other characteristics often cause risks such as excessive load and downtime of industrial control systems
At the same time, the protocol of industrial control equipment is also different from that of traditional information systems, and the use of general vulnerability signature databases cannot accurately identify vulnerabilities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device, and related equipment for identifying network vulnerabilities in industrial control systems
  • A method, device, and related equipment for identifying network vulnerabilities in industrial control systems
  • A method, device, and related equipment for identifying network vulnerabilities in industrial control systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0030] The present application provides a method for identifying network vulnerabilities of an industrial control system. The method for detecting system vulnerabilities and attacks can effectively improve the accuracy of identification results of system vulnerabilities and attacks, and at the same time improve the identification efficiency.

[0031] figure 1 A schematic flow chart of a method for identifying network vulnerabilities in an industrial control system provided by the present invention, specifically including the following steps:

[0032] S100: Establish a basic information database: i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention disclosed a network vulnerability identification method, device and related equipment of the industrial control system. This method includes the establishment of a service fingerprint feature library, communication protocol feature library, and vulnerability feature library; static asset information acquisition; equipment information acquisition; traffic information acquisition; Asset identification; service identification; vulnerability identification; vulnerability confirmation; this device includes basic information management modules, information collection modules, asset identification modules, service identification modules and vulnerabilities recognition modules;During the identification process, the risks of the industrial control system are too large and downtime.

Description

technical field [0001] The invention relates to a network vulnerability identification method and device of an industrial control system and related equipment, belonging to the technical field of information security. Background technique [0002] With the development of computer technology, more and more information technology is used in industrial production, which brings more and more safety problems. Safety problems can cause production accidents, and serious ones can even cause personal injury. Vulnerabilities are defects in the specific implementation of hardware, software, protocols or system security policies, which can enable attackers to access or destroy the system without authorization, which is one of the important causes of security problems. Vulnerability identification and vulnerability repair are the main work steps to eliminate vulnerabilities. Vulnerability repair is mainly carried out by hardware and software product suppliers, while vulnerability identi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCG05B19/4185G05B2219/33139Y02P90/02
Inventor 邓楠轶曾荣汉杨东胥冠军王文庆崔逸群刘超飞毕玉冰董夏昕朱博迪介银娟
Owner XIAN THERMAL POWER RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products