Industrial control vulnerability scanning system based on active and passive lossless scanning technology

A scanning technology and vulnerability scanning technology, applied in the direction of transmission system, instrument, platform integrity maintenance, etc., can solve problems such as affecting normal public services, downtime, and leakage of important data.

Pending Publication Date: 2021-09-10
北京凌云信安科技有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Once the industrial control system is compromised, it may not only cause downtime, but also lead to the leakage of important data, and even affect normal public services, endangering national security and people's lives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control vulnerability scanning system based on active and passive lossless scanning technology
  • Industrial control vulnerability scanning system based on active and passive lossless scanning technology
  • Industrial control vulnerability scanning system based on active and passive lossless scanning technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0027] Considering that once the industrial control system is compromised, it may not only cause downtime, but also lead to the leakage of important data, and even affect normal public services, endangering national security and people's lives. This application provides a nondestructive scanning based on active and passive The technical industrial control vuln...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an industrial control vulnerability scanning system based on an active and passive lossless scanning technology, and the system comprises: an active lossless scanning module which is used for actively obtaining a fingerprint of a target industrial control system through remote lossless scanning; a passive lossless scanning module which is used for passively obtaining fingerprints of the target industrial control system through online flow analysis and offline flow analysis; and a user-defined fingerprint module which is used for a user to customize a fingerprint rule of a processing control system and perform accurate fingerprint identification on a target industrial control system in a network space. According to the invention, economic risks caused by industrial control vulnerabilities can be reduced.

Description

technical field [0001] This application relates to the field of information security, in particular to an industrial control vulnerability scanning system based on active and passive nondestructive scanning technologies. Background technique [0002] With the advancement of the industrial Internet, the industrial control system is gradually moving from the traditional closed mode to the open. At present, most of the domestic industrial control systems still use foreign industrial control products, which are controlled by others. At the same time, the high-risk vulnerabilities of industrial control systems are increasing day by day, and the number of industrial control security incidents is also increasing. The security situation of industrial control systems is becoming more and more severe. On March 7, 2019, the computer system control center of the Guri Hydropower Station, the largest power facility in Venezuela, was attacked by a network, causing a nationwide power outag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577H04L63/1408H04L63/1433G06F2221/033
Inventor 董丽萍余睿渊
Owner 北京凌云信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products