Network attack induction method and device, equipment and storage medium

A network attack and attack device technology, applied in the field of network security, can solve problems such as poor network attack protection capabilities, and achieve the effects of improving accuracy, increasing network attack costs, and improving network attack protection capabilities

Active Publication Date: 2021-12-03
哈尔滨工大天创电子有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present application provides a network attack induction method, device, equipment, and storage medium to solve the problem of poor network attack protection capabilities of existing industrial control systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack induction method and device, equipment and storage medium
  • Network attack induction method and device, equipment and storage medium
  • Network attack induction method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0029] It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of described features, integers, steps, operations, elements and / or components, but does not exclude one or more other Presence or addition of features, wholes, steps, operations, elements, components and / or collections thereof.

[0030] It should...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of network security, and provides a network attack induction method and device, equipment and a storage medium. The method comprises the following steps: receiving a data packet sent to an industrial control system; detecting whether the data packet is used for performing network scanning on the industrial control system; when it is detected that the data packet is used for network scanning, obtaining a calling instruction of the data packet is obtained, wherein the calling instruction is used for calling target attack equipment; determining a device type to which the target attack device belongs according to the calling instruction; and executing a preset strategy corresponding to the equipment type, and inducing the data packet to attack the virtual simulation equipment belonging to the equipment type, the preset strategy being used for generating the virtual simulation equipment belonging to the equipment type, thereby improving the accuracy of network attack detection, reducing the probability of false detection and missing detection, and while improving the network attack cost of an attacker, protecting real equipment from being attacked by the data packet, and improving the network attack protection capability of the industrial control system.

Description

technical field [0001] The present application belongs to the technical field of network security, and in particular relates to a network attack induction method, device, equipment and storage medium. Background technique [0002] Industrial Control Systems (ICS) can collect and monitor real-time data of equipment, and realize automatic operation of equipment under computer deployment. Traditional industrial control systems are closed due to technical and architectural limitations, and cannot be implemented with business systems. , information systems and other front-end systems work together. With the continuous development of computer technology, communication technology and control technology, the closed use environment of traditional industrial control systems is gradually opened up, and the interconnectivity is improved. The establishment of industrial control systems that cooperate with various front-end systems has become the current mainstream development trend. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1416H04L63/1458H04L41/145H04L41/0631Y02P90/02
Inventor 刘文跃张提刘思尧张大强
Owner 哈尔滨工大天创电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products