Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial internet equipment attack path restoration method, related equipment and system

An industrial Internet and attack path technology, which is applied to related equipment and systems, and the field of industrial Internet equipment attack path restoration methods, can solve problems such as poor traceability effect and difficulty in effectively finding attackers, and achieve the effect of improving traceability effects.

Active Publication Date: 2021-12-03
国家工业信息安全发展研究中心
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a method for restoring the attack path of industrial Internet equipment, related equipment and systems to solve the problem of poor traceability and difficulty in effectively finding information such as attackers and hidden attack paths between multiple devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial internet equipment attack path restoration method, related equipment and system
  • Industrial internet equipment attack path restoration method, related equipment and system
  • Industrial internet equipment attack path restoration method, related equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0062] The purpose of the present invention is to provide a method for restoring the attack path of industrial Internet equipment, related equipment and system, which can improve the traceability effect and effectively discover the hidden attack path between attackers and multiple devices.

[0063] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an industrial internet equipment attack path restoration method, related equipment and a system. The method comprises the following steps of: acquiring a malicious code in a to-be-tested sample, and evaluating the malicious code based on a multi-feature fusion method to generate a malicious code evaluation result; performing homologous association on attack loads of multiple attack events in the malicious code evaluation result based on a calling habit mode, and determining a hidden attack path; obtaining multi-dimensional data, constructing an attacker portrait for the multi-dimensional data based on a multi-feature fusion method, and determining an attack intention, the multi-dimensional data comprising application program interface calling record data, network behavior record data, process behavior record data, network quintuple data and network intrusion detection / defense system rule detection data; and tracing an attacker according to the hidden attack path and the attack intention. According to the method, the tracing effect can be improved, and hidden attack paths among attackers and multiple devices can be effectively found.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method for restoring an attack path of an industrial Internet device, related equipment and a system. Background technique [0002] With the integration and development of industrial Internet and automatic control technology, industrial control systems are widely used in important national infrastructures such as electric power, transportation, energy, water conservancy, metallurgy, and aerospace. With the emergence of a new generation of 5G communication technology and the arrival of the digital twin era, the security of the industrial Internet will face more severe challenges. In addition to its unique advantages and tenacious vitality in the prevention and control of the epidemic, the industrial Internet has made more industries and manufacturing companies realize the importance of implementing informatization and intelligent construction. Therefore, strengthening the con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/552G06F21/563
Inventor 王冲华周昊郝志强王墨李耀兵林晨樊佩茹张雪莹李俊余果
Owner 国家工业信息安全发展研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products