Unlock instant, AI-driven research and patent intelligence for your innovation.

Industrial internet data monitoring method, device, equipment and medium

An industrial Internet and industrial equipment technology, applied in the field of computer data processing, can solve the problems of lack of monitoring mechanism, industrial control system without audit function, lack of log audit and configuration change management, etc., and achieve the effect of improving detection ability

Pending Publication Date: 2022-03-22
EVERSEC BEIJING TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Various detection technologies find possible security problems in the network from different angles, but cannot accurately and effectively find out the real threats in the industrial control network, and capture the communication behavior of the industrial production system, industrial control protocol vulnerabilities, abnormal events, and The authenticity of data, etc., lack of monitoring mechanisms for system misoperations and intentional sabotage, and lack of log audit and configuration change management. Even most industrial control systems do not have audit functions, or although they have audit functions, the performance requirements of the system Restricted the opening of the audit function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial internet data monitoring method, device, equipment and medium
  • Industrial internet data monitoring method, device, equipment and medium
  • Industrial internet data monitoring method, device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] figure 1 It is a flow chart of a method for monitoring industrial Internet data provided by Embodiment 1 of the present invention. This embodiment can be applied to the scenarios of industrial Internet security audit and traceability monitoring, to manage, monitor and audit industrial Internet device operations, network behaviors, intrusion detection, and other behaviors. The method of this embodiment can be executed by an industrial Internet data monitoring device, which can be realized by means of software and / or hardware, and which can be configured in computer devices such as servers or terminal devices.

[0029] Correspondingly, the method specifically includes the following steps:

[0030] S110. Obtain abnormal industrial Internet data that does not conform to the rules of the proprietary protocol of the industrial Internet from among the various industrial Internet data collected from the industrial Internet.

[0031] Among them, the Industrial Internet can be ...

Embodiment 2

[0053] figure 2 It is a flow chart of another industrial Internet data monitoring method provided by Embodiment 1 of the present invention. This embodiment is refined based on the above-mentioned embodiments. In this embodiment, each abnormal industrial Internet data is analyzed, and the abnormal types corresponding to each abnormal industrial Internet data are obtained for further refinement.

[0054] Correspondingly, the method specifically includes the following steps:

[0055] S210. Obtain abnormal industrial Internet data that does not conform to the rules of the proprietary industrial Internet protocol from among the various industrial Internet data collected from the industrial Internet.

[0056] S220. Analyze the currently processed target abnormal industrial Internet data, and obtain at least one data characteristic corresponding to the target abnormal industrial Internet data.

[0057] Wherein, the data feature may be abnormal industrial Internet data. Due to diff...

Embodiment 3

[0075] image 3 It is a schematic structural diagram of an industrial Internet data monitoring device provided in Embodiment 3 of the present invention. The industrial Internet data monitoring device provided in this embodiment can be realized by software and / or hardware, and can be configured on a server or a terminal A method for monitoring industrial Internet data in an embodiment of the present invention is implemented in the device. Such as image 3 As shown, the device may specifically include: an abnormal industrial Internet data acquisition module 310 , an abnormal type acquisition module 320 and a data detection report formation module 330 .

[0076] Among them, the abnormal industrial Internet data acquisition module 310 is used to obtain abnormal industrial Internet data that does not conform to the rules of the industrial Internet proprietary protocol from among the various industrial Internet data collected from the industrial Internet;

[0077] The abnormal typ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an industrial internet data monitoring method and device, equipment and a medium. The method comprises the following steps: acquiring abnormal industrial internet data which does not conform to industrial internet proprietary protocol rules from industrial internet data acquired from the industrial internet; analyzing each abnormal industrial internet data, obtaining an abnormal type corresponding to each abnormal industrial internet data, and tracing an industrial equipment identifier matched with each abnormal industrial internet data; and forming a data detection report according to the abnormal type and the industrial equipment identifier corresponding to each abnormal industrial internet data. According to the embodiment of the invention, the problem that real threats existing in the industrial control network cannot be accurately and effectively found out is solved, behavior management monitoring auditing of industrial internet equipment operation, network behaviors, intrusion detection and the like is realized, and the detection capability of continuously evolved advanced threats is improved.

Description

technical field [0001] The embodiments of the present invention relate to computer data processing technology, and in particular to a method, device, equipment and medium for monitoring industrial Internet data. Background technique [0002] In the past, the industrial control industry generally believed that an industrial control system based on a relatively isolated system deployment environment and multi-layer in-depth security protection measures could protect it from external attacks. easily overlooked. However, with the continuous development and integration of informatization and industrialization-related technologies, the introduction of open communication protocols, the development of intelligent terminal equipment, the increase in connections with other equipment / software, the enhancement of external connectivity, and the frequent occurrence of network attacks, etc. With the increase of factors, the security risk of industrial control system is increasing day by d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/12G16Y30/10H04L41/069
CPCH04L63/1425H04L63/1416H04L67/12G16Y30/10H04L41/069
Inventor 魏永丽王泽政李鹏超尚程傅强梁彧蔡琳杨满智王杰田野金红陈晓光
Owner EVERSEC BEIJING TECH