Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack simulation method based on network threat intelligence in industrial Internet of Things

An industrial Internet of Things and simulation method technology, applied in the field of attack simulation based on network threat intelligence in the industrial Internet of Things, can solve the problems of low integration of attack simulation, high cost, difficult security assessment, etc., to improve threat response capabilities and The effect of the ability to resist attacks

Pending Publication Date: 2022-05-27
ZHONGYUAN ENGINEERING COLLEGE
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problems of low integration, high cost and difficulty in security assessment of the existing attack simulation, the present invention proposes an attack simulation method based on network threat intelligence in the Industrial Internet of Things, which combines network threat intelligence with attack simulation, This improves the efficiency and accuracy of IIoT threat modeling and attack simulation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack simulation method based on network threat intelligence in industrial Internet of Things
  • Attack simulation method based on network threat intelligence in industrial Internet of Things
  • Attack simulation method based on network threat intelligence in industrial Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0066] like figure 1 As shown, an attack simulation method based on network threat intelligence in the Industrial Internet of Things, the implementation method is as follows:

[0067] Step S1. Threat intelligence collection: perform web crawling on the network threat intelligence information through the data collection module of the threat intelligence platform, and collect the threat intelligence information.

[0068] In this embod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attack simulation method based on network threat intelligence in an industrial internet of things, which comprises the following steps of: threat intelligence collection: carrying out web crawler on network threat intelligence information through a threat intelligence platform, and collecting the threat intelligence information; generating an attacker portrait: searching threat information of the attack organization, and generating the attacker portrait according to the threat information; acquiring an attack route: acquiring an overall architecture and a data flow diagram of a system environment for attack simulation, and screening out a suitable attack route; and attack simulation: constructing a meta-attack language model in combination with an attacker portrait, performing attack simulation on an attack line, and obtaining an experimental result for calculating time estimation of system damage. According to the invention, the problem of low integration level of threat intelligence and attack simulation technology is solved, and specific threats can be automatically evaluated, so that security personnel can quickly take positive measures, and the threat response capability and attack resistance capability of an industrial Internet of Things system are improved.

Description

technical field [0001] The invention relates to the technical field of industrial Internet of Things system security, in particular to an attack simulation method based on network threat intelligence in the Industrial Internet of Things. Background technique [0002] In recent years, the Industrial Internet of Things has developed rapidly and has great advantages in remote monitoring, information collection, and manpower reduction. Therefore, it has been widely used in IoT control scenarios such as smart grids and smart factories. But the Industrial Internet of Things is a complex network, and any failure or abnormality in one part of the system may cause huge damage to the entire system in a short period of time. However, attackers use the weak position of the industrial Internet of Things system to carry out network attacks, which will bring different degrees of economic losses to countries, enterprises, and individuals. Therefore, efficient assessment of threats to contr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/951G06F16/953G06F16/33G06F16/335G06F40/295G06F40/30H04L9/40
CPCG06F16/951G06F16/953G06F16/3344G06F16/3346G06F16/335G06F40/295G06F40/30H04L63/1416H04L63/205
Inventor 张书钦王世杰白光耀张敏智陈鹏赵春霞李书涵
Owner ZHONGYUAN ENGINEERING COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products