Industrial internet equipment attack path restoration method, related equipment and system

An industrial Internet and attack path technology, which is applied to related equipment and systems, and the field of industrial Internet equipment attack path restoration methods, can solve problems such as poor traceability effect and difficulty in effectively finding attackers, and achieve the effect of improving traceability effects.

Active Publication Date: 2021-12-03
国家工业信息安全发展研究中心
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a method for restoring the attack path of industrial Internet equipment, related equipment and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial internet equipment attack path restoration method, related equipment and system
  • Industrial internet equipment attack path restoration method, related equipment and system
  • Industrial internet equipment attack path restoration method, related equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0061] Next, the technical solutions in the embodiments of the present invention will be described in connection with the drawings of the embodiments of the present invention, and it is understood that the described embodiments are merely the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art are in the range of the present invention without making creative labor premise.

[0062] Object of the present invention is to provide an industrial apparatus Internet attacks path restoration methods, systems and related equipment, the effect can be improved traceability, effective detection path between covert attack the attacker, multiple devices.

[0063] In order to make the above objects, features, and advantages of the present invention, the present invention will be further described in detail below with reference to the accompanying drawings and spec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an industrial internet equipment attack path restoration method, related equipment and a system. The method comprises the following steps of: acquiring a malicious code in a to-be-tested sample, and evaluating the malicious code based on a multi-feature fusion method to generate a malicious code evaluation result; performing homologous association on attack loads of multiple attack events in the malicious code evaluation result based on a calling habit mode, and determining a hidden attack path; obtaining multi-dimensional data, constructing an attacker portrait for the multi-dimensional data based on a multi-feature fusion method, and determining an attack intention, the multi-dimensional data comprising application program interface calling record data, network behavior record data, process behavior record data, network quintuple data and network intrusion detection/defense system rule detection data; and tracing an attacker according to the hidden attack path and the attack intention. According to the method, the tracing effect can be improved, and hidden attack paths among attackers and multiple devices can be effectively found.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method for restoring an attack path of an industrial Internet device, related equipment and a system. Background technique [0002] With the integration and development of industrial Internet and automatic control technology, industrial control systems are widely used in important national infrastructures such as electric power, transportation, energy, water conservancy, metallurgy, and aerospace. With the emergence of a new generation of 5G communication technology and the arrival of the digital twin era, the security of the industrial Internet will face more severe challenges. In addition to its unique advantages and tenacious vitality in the prevention and control of the epidemic, the industrial Internet has made more industries and manufacturing companies realize the importance of implementing informatization and intelligent construction. Therefore, strengthening the con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/552G06F21/563
Inventor 王冲华周昊郝志强王墨李耀兵林晨樊佩茹张雪莹李俊余果
Owner 国家工业信息安全发展研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products