Movatterモバイル変換


[0]ホーム

URL:


CN109818985B - Industrial control system vulnerability trend analysis and early warning method and system - Google Patents

Industrial control system vulnerability trend analysis and early warning method and system
Download PDF

Info

Publication number
CN109818985B
CN109818985BCN201910288572.7ACN201910288572ACN109818985BCN 109818985 BCN109818985 BCN 109818985BCN 201910288572 ACN201910288572 ACN 201910288572ACN 109818985 BCN109818985 BCN 109818985B
Authority
CN
China
Prior art keywords
attack
industrial control
control system
early warning
probe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910288572.7A
Other languages
Chinese (zh)
Other versions
CN109818985A (en
Inventor
吴志华
袁键
董超
施靖萱
杨枭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengtong Industrial Control Safety Research Institute Co Ltd
Original Assignee
Jiangsu Hengtong Industrial Control Safety Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengtong Industrial Control Safety Research Institute Co LtdfiledCriticalJiangsu Hengtong Industrial Control Safety Research Institute Co Ltd
Priority to CN201910288572.7ApriorityCriticalpatent/CN109818985B/en
Publication of CN109818985ApublicationCriticalpatent/CN109818985A/en
Application grantedgrantedCritical
Publication of CN109818985BpublicationCriticalpatent/CN109818985B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Landscapes

Abstract

The invention discloses a method and a system for analyzing and early warning industrial control system vulnerability trend, wherein the method comprises the following steps: simulating and establishing a plurality of probes with a core protocol in an industrial control system, and deploying the probes in a public network and an intranet; the probe collects attack information in an interactive mode; the simulated industrial control system probe sends the collected attack information to a data analysis module, and the data analysis module is responsible for data analysis and vulnerability mining; the data analysis module generates an attack utilization rule base and a leak base according to the results of data analysis and leak mining; and the data analysis module analyzes the attack information sent back by the matching probe by using the generated attack utilization rule base and the leak base, and reports the analysis result of the attack information to the safety equipment and the early warning display platform. The simulation industrial control system of the invention induces the simulation industrial control system to send out an attack, collects the attack means and analyzes the vulnerability, and early warns the users of the serious vulnerability information existing or to be utilized in the production environment.

Description

Industrial control system vulnerability trend analysis and early warning method and system
Technical Field
The invention relates to the field of industrial control system safety, in particular to a vulnerability trend analysis and early warning method and system for an industrial control system.
Background
The traditional information security defense system comprises: the system comprises a firewall, a UTM, an IPS, an IDS, a vulnerability scanning system, an anti-virus system, a terminal management system, a WAF, a DB-AUDIT, a security monitoring platform and the like, and from the aspect of network structure layering, a product system is sound, however, in the aspect of actual functions, the defects are obvious, and the system is mainly represented in the following three aspects:
1. these conventional security products can only defend against security threats from a certain aspect, and form individual 'security defense islands'.
2. The method lacks of carrying out effective fusion association analysis on massive multi-dimensional information safety data, and cannot generate synergistic effect.
3. These security monitoring data cannot be made an effective resource for upper-level security decisions.
Most of the traditional security defense facilities analyze and monitor the occurring attack behaviors by analyzing logs of security devices in the seven layers of the network, are basically passive defense ideas, lack of network security situation perception and linkage early warning capability, and take corresponding emergency measures after detecting a network attack event, which is usually late, because the network attack has already occurred at the moment, the attack causes irreparable loss.
Disclosure of Invention
The invention provides a method and a system for analyzing and early warning industrial control system vulnerability trend, wherein a key control part of a production environment is simulated, and the method comprises the following steps of: the industrial control system induces the industrial control system to send out an attack to the simulated industrial control system, collects the attack means, analyzes the vulnerability and warns the user in advance about the serious vulnerability information existing or to be utilized in the production environment.
In order to solve the technical problem, the invention provides an industrial control system vulnerability trend analysis and early warning method, which is characterized by comprising the following steps:
simulating and establishing a plurality of probes with a core protocol in an industrial control system, and deploying the probes in an intranet with higher completion degree of a public network and an industrial internet;
the simulated industrial control system probe collects attack information in an interactive mode;
the simulated industrial control system probe sends the collected attack information to a data analysis module, and the data analysis module is responsible for data analysis and vulnerability mining;
the data analysis module generates an attack utilization rule base and a leak base according to the results of data analysis and leak mining;
and the data analysis module analyzes the attack information sent back by the matching probe by using the generated attack utilization rule base and the leak base, and reports the analysis result of the attack information to the safety equipment and the early warning display platform.
In a preferred embodiment of the invention, the method further comprises the steps of deploying the simulated industrial control system probe in a public network in a distributed mode, inducing attack information in the public network to actively attack the probe, wherein the probe is used for collecting the attack information, sending the attack information collected in the public network to a data analysis module, carrying out data analysis and vulnerability mining on massive data returned by the public network deployment probe by the data analysis module based on a big data technology, firstly counting key characters which actually threaten the industrial control production environment in the massive data, generating an attack utilization rule base, mining behaviors which accord with the attack utilization rule base from the massive data, defining the behaviors as vulnerability utilization and generating a vulnerability base.
In a preferred embodiment of the invention, the method further comprises the steps of deploying the simulated industrial control system probe in an intranet, utilizing an attack utilization rule base and a leak base which are generated by a data analysis module, and analyzing and matching data sent back by the probe in the intranet, firstly, quickly matching the attack utilization rule base with the attack utilization rule base based on the attack utilization rule base to find out key characters causing threats, then, mining behaviors which accord with the attack utilization rules from the key characters, matching the behaviors with the leak base data, analyzing specific leak information, and reporting results and warnings to a safety device and a warning display platform to play double roles of warning and blocking.
In a preferred embodiment of the present invention, the core protocol set on the probe further includes: modbus, OPC, S7common, IEC04, EtherNet/IP, kamstrup, bacnet.
In a preferred embodiment of the present invention, the probe interaction process further comprises: the communication flow of the simulation upper computer and the industrial control system comprises read ver and wirte read-write instructions, start and stop function codes and register value modification interactive operation, wherein the deep interaction comprises function code utilization and register value modification, a probe can make actual strain response to the operations, a flow capture tool is used for monitoring and capturing flow data packets of different network request modes and storing the flow data packets into a big data middleware, the probe is packaged by using a mirror image technology, and the probe is uniformly deployed on an early warning display platform in an up-and-down mode.
In a preferred embodiment of the present invention, the probe may be deployed to an engineer station or a scada server in the intranet.
In a preferred embodiment of the invention, the method further comprises the steps of establishing an early warning display platform and a patch forwarding platform, wherein the early warning display platform intensively displays the attack trend in the monitoring range and the construction completion degree of the industrial control environment in the monitoring range; the patch forwarding platform pushes early warning information and patch repairing information to an enterprise where the user is located.
In a preferred embodiment of the invention, the attack information analysis result obtained by the data analysis module is linked with the safety equipment, the attack information is submitted to the safety equipment and recorded and stored, and meanwhile, the attack information is also linked with the abnormal log of the whole production environment, so that the consistency of abnormal presentation is achieved, and an information island type security system is broken.
In order to solve the technical problem, the invention also provides an industrial control system vulnerability trend analysis and early warning system, which comprises a data collection unit, a data storage medium, a data analysis module, an early warning display platform and a patch forwarding platform;
the data collection unit comprises distributed probes with a core protocol in an industrial control system, and the probes are deployed in an intranet with higher completion degree of a public network and an industrial internet and are used for collecting attack information in the public network or the intranet;
the data storage medium is used for storing the attack information collected by the data collection unit and forwarding the attack information to the data analysis module;
the data analysis module comprises a database generation unit and a data analysis matching unit, the database generation unit is used for generating an attack utilization rule base and a leak base, the database matching unit analyzes attack information sent back by the matching probe by using the generated attack utilization rule base and the leak base, and an attack information analysis result is reported to the safety equipment, the early warning display platform and the patch forwarding platform.
The early warning display platform is used for intensively displaying the attack trend in the monitoring range and the construction completion degree of the industrial control environment in the monitoring range; the patch forwarding platform pushes early warning information and patch repairing information to an enterprise where the user is located.
The invention has the beneficial effects that:
the invention simulates and simulates an industrial control system, induces attack information to send an attack to the simulated industrial control system, establishes an attack utilization rule base and a leakage base according to the collected attack information, analyzes the mainstream attack trend, provides threat early warning for a user in real time, and the user can be protected from the accident, repairs the hidden loophole of the production environment in time, and simultaneously avoids the production accident caused by the acceptance and detection of the production environment.
Compared with the traditional industrial control defense system: the method is mainly used for analyzing and monitoring the occurring attack behaviors, basically adopts a passive defense idea, lacks the capabilities of network security situation perception and linkage early warning, and adopts corresponding emergency measures after a network attack event is detected, so that the time is often too late, and the network attack has already occurred at the moment, so that the attack has already caused irreparable loss.
The method does not need to simply take specific vulnerability information as a fingerprint library, does not need to collect vulnerability information issued by an authoritative website in real time, ensures the authority of the fingerprint library, has various and abundant hacking means, and greatly reduces the timeliness when the vulnerability information is issued by the authority. The invention can provide a solution completely aiming at the production core for the industrial control system under the condition of the same production environment; the probe part of the invention simulates the core protocol of various PLC controllers and can be freely deployed in a public network or an intranet with higher industrial internet completion degree; when the probe is deployed in a public network, the probe is used as a target for inducing attack, a current industrial control vulnerability utilization mode is collected in real time, the latest vulnerability threat trend is pushed for a user and a database is established, when the probe is deployed in an intranet, the probe can be deployed in parallel with real industrial control equipment, when the intranet is attacked, certain buffer time is given to security personnel, vulnerability attack is captured in advance according to the established database and early warning is sent to the user, meanwhile, attack information is submitted to the security equipment and blocked, and the defense purpose that the production environment is not influenced is achieved.
Drawings
FIG. 1 is a flow chart of a vulnerability trend analysis and early warning method of an industrial control system according to the present invention;
FIG. 2 is a frame diagram of an industrial control system vulnerability trend analysis and early warning system according to the present invention;
FIG. 3 is a technical framework diagram of the present invention for deploying probes in a public network;
fig. 4 is a technical framework diagram of the present invention for deploying probes in an intranet.
The reference numbers in the figures illustrate: 10. a data collection unit; 20. a data storage medium; 30. a data analysis module; 301. a database generation unit; 302. a data analysis matching unit; 40. the early warning display platform and the patch forwarding platform; 50. a security device.
Detailed Description
The present invention is further described below in conjunction with the following figures and specific examples so that those skilled in the art may better understand the present invention and practice it, but the examples are not intended to limit the present invention.
Referring to fig. 1, in an embodiment of the industrial control system vulnerability trend analysis and early warning method, a plurality of probes with a core protocol in an industrial control system are established in a simulation manner, and the probes are deployed in a public network or an intranet with high industrial internet completion degree; the simulated industrial control system probe collects attack information in an interactive mode; the simulated industrial control system probe sends the collected attack information to a data analysis module, and the data analysis module is responsible for data analysis and vulnerability mining; the data analysis module generates an attack utilization rule base and a leak base according to the results of data analysis and leak mining; and the data analysis module analyzes the attack information sent back by the matching probe by using the generated attack utilization rule base and the leak base, and reports the analysis result of the attack information to the safety equipment and the early warning display platform.
In step S1, the core protocols include interface protocols, network protocols, and communication protocols in the industrial control system, such as Modbus, OPC, S7common, IEC04, EtherNet/IP, kamstrup, bacnet, and other common industrial control protocols at home and abroad.
The probe is packaged by using a mirror image technology, and distributed deployment of an upper line and a lower line is uniformly carried out on the early warning display platform, so that not only is full coverage of a probe deployment network ensured, but also the trouble of manual installation is avoided.
In the step S2, the interaction process of the probe mainly simulates the communication flow between the host computer and the PLC, including read ver, wirte read/write instructions, start, stop function code, register value modification, and other interaction operations, where deep interaction includes function code utilization and register value modification, the probe can make actual strain response to these operations to ensure the integrity of the captured data when the request time is sufficient, and a traffic capture tool is used to monitor and capture traffic data packets of various network request modes and store them in the big data middleware.
In steps S3 to S4, deploying the probe in the public network to establish a database, where the database includes an attack utilization rule base and a vulnerability base, and as shown in fig. 3, the database establishment process includes the following steps: the method comprises the steps that an artificial industrial control system probe is deployed in a public network in a distributed mode, attack information in the public network is induced to actively attack the probe, the probe is used for collecting attack information, the probe sends the attack information collected in the public network to a data analysis module, the data analysis module conducts data analysis and vulnerability mining aiming at mass data returned by the public network deployment probe based on a big data technology, firstly, key characters which actually threaten an industrial control production environment in the mass data are counted, an attack utilization rule base is generated, behaviors which accord with the attack utilization rules are mined from the attack utilization rule base, the behaviors are defined as vulnerability utilizations and a vulnerability base is generated, key characters which threaten the industrial control production environment are defined in the attack utilization rule base, specific attack behaviors which threaten the industrial control production environment are defined in the vulnerability base, and in this way, the threat information can be quickly screened out from the mass attack information through key character matching And (4) matching the screened dangerous information with the cave library to lock specific attack behaviors.
In step S5, the procedure of deploying the probe in the intranet and detecting the matching of the attack information attacking the intranet and the database information includes the following steps, as shown in fig. 4: the method comprises the steps of deploying simulated industrial control system probes in an intranet, utilizing an attack utilization rule base and a leak base which are generated by a data analysis module, combining data sent back by the probes in the intranet to carry out analysis and matching, firstly, quickly matching with the attack utilization rule base based on the attack utilization rule base to find out key characters causing threats, then, exploring behaviors meeting the attack utilization rules from the key characters, matching with the leak base data, analyzing specific leak information, reporting results and warnings to a safety device and a warning display platform, and playing double roles of warning and blocking.
In the embodiment, the attack information matched with the leak library is uploaded to the safety equipment, the attack information analysis result obtained by the data analysis module is linked with the safety equipment, the attack information is submitted to the safety equipment and recorded and stored, the performance and reliability of the safety equipment are improved, meanwhile, the attack information is communicated with an abnormal log of the whole production environment, the abnormal presentation consistency is achieved, an information island type security system is broken through, the attack information can be combined with the virtual and real conditions of an intranet real industrial control system, the method is equivalent to reconstructing a software production system which is separated from a hardware environment, and the purpose of protecting the safety of the industrial control system is achieved on the premise that a real production line is not influenced.
In the embodiment, an early warning display platform and a patch forwarding platform are established, and the early warning display platform intensively displays the attack trend in the monitoring range and the construction completion degree of the industrial control environment in the monitoring range; the patch forwarding platform pushes early warning information and patch repairing information to an enterprise where the user is located.
In another embodiment, the probes may be deployed to an engineer station or a scada server in the intranet, or the probes may be connected in series to the core route, but this is the most extreme, and it is necessary for the control system in the entire production system to add them to the trust list, which should be avoided as much as possible.
Based on the industrial control system vulnerability trend analysis and early warning method, referring to fig. 2, an embodiment of the industrial control system vulnerability trend analysis and early warning system of the present invention includes adata collection unit 10, adata storage medium 20, a data analysis module 30, an early warning display platform and a patch forwarding platform 40;
thedata collection unit 10 comprises distributed probes with a core protocol in an industrial control system, and the probes are deployed in an intranet with higher completion degree of a public network and an industrial internet and are used for collecting attack information in the public network or the intranet;
thedata storage medium 20 is configured to store the attack information collected by thedata collection unit 10, and forward the attack information to the data analysis module 30;
the data analysis module 30 comprises a database generation unit 301 and a data analysis matching unit 302, the database generation unit 301 is used for generating an attack utilization rule base and a leak base, and the database matching unit 302 is used for analyzing the attack information sent back by the matching probe by using the generated attack utilization rule base and the leak base, and reporting the analysis result of the attack information to the security device 50, the early warning display platform and the patch forwarding platform 40.
The early warning display platform is used for intensively displaying the attack trend in the monitoring range and the construction completion degree of the industrial control environment in the monitoring range; the patch forwarding platform pushes early warning information and patch repairing information to an enterprise where the user is located.
The above-mentioned embodiments are merely preferred embodiments for fully illustrating the present invention, and the scope of the present invention is not limited thereto. The equivalent substitution or change made by the technical personnel in the technical field on the basis of the invention is all within the protection scope of the invention. The protection scope of the invention is subject to the claims.

Claims (8)

2. The industrial control system vulnerability trend analysis and early warning method as claimed in claim 1, wherein the simulated industrial control system probe is deployed in the public network in a distributed manner to induce the attack information in the public network to actively attack the probe, the probe is used for collecting the attack information, the probe sends the attack information collected in the public network to the data analysis module, the data analysis module carries out data analysis and vulnerability mining on the data returned by the public network deployment probe based on big data technology, firstly, the key characters which actually threaten the industrial control production environment in the data are counted, an attack exploitation rule base is generated, the behavior which accords with the attack exploitation rule base is excavated from the data, and the behavior is defined as vulnerability exploitation and a vulnerability base is generated.
4. The industrial control system vulnerability trend analysis and early warning method of claim 3, wherein the probe interaction process comprises: the communication flow of the simulation upper computer and the industrial control system comprises read and wirte read-write instructions, start and stop function codes and register value modification interactive operation, wherein the deep interaction comprises function code utilization and register value modification, a probe can make actual strain response to the operations, a flow capture tool is used for monitoring and capturing flow data packets of different network request modes and storing the flow data packets into a big data middleware, the probe is packaged by using a mirror image technology, and the probe is uniformly deployed on an early warning display platform in an up-and-down mode.
the data analysis module comprises a database generation unit and a data analysis matching unit, wherein the database generation unit is used for generating an attack utilization rule base and a leak base, the database matching unit is used for rapidly matching with the attack utilization rule base based on the attack utilization rule base in combination with data sent back by a probe in an intranet by using the generated attack utilization rule base and the leak base to find out key characters causing threats, then, behaviors meeting the attack utilization rules are found from the key characters and matched with the leak base data, attack information sent back by the matching probe is analyzed, and an attack information analysis result is reported to a security device, an early warning display platform and a patch forwarding platform;
CN201910288572.7A2019-04-112019-04-11Industrial control system vulnerability trend analysis and early warning method and systemActiveCN109818985B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910288572.7ACN109818985B (en)2019-04-112019-04-11Industrial control system vulnerability trend analysis and early warning method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910288572.7ACN109818985B (en)2019-04-112019-04-11Industrial control system vulnerability trend analysis and early warning method and system

Publications (2)

Publication NumberPublication Date
CN109818985A CN109818985A (en)2019-05-28
CN109818985Btrue CN109818985B (en)2021-06-22

Family

ID=66611688

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910288572.7AActiveCN109818985B (en)2019-04-112019-04-11Industrial control system vulnerability trend analysis and early warning method and system

Country Status (1)

CountryLink
CN (1)CN109818985B (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110149350B (en)*2019-06-242021-11-05国网安徽省电力有限公司信息通信分公司 A method and device for analyzing network attack events associated with alarm logs
CN110475227B (en)*2019-07-262022-03-22上海帆一尚行科技有限公司Method, device and system for protecting information security of Internet of vehicles and electronic equipment
CN110658796B (en)*2019-10-102020-11-17江苏亨通工控安全研究院有限公司Method for identifying industrial control network key component
CN110708332A (en)*2019-10-182020-01-17河南中烟工业有限责任公司Cigarette network safety protection method
CN110866278A (en)*2019-11-142020-03-06吉林亿联银行股份有限公司Method and device for blocking real-time intrusion of database
CN111404917B (en)*2020-03-112022-10-04江苏亨通工控安全研究院有限公司Industrial control simulation equipment-based threat information analysis and detection method and system
CN111585969B (en)*2020-04-132022-07-22上海核工程研究设计院有限公司Industrial control network security impact analysis method based on function analysis
CN111680906B (en)*2020-06-032021-03-02贵州航天云网科技有限公司Industrial control system safety detection and early warning oriented system construction method and device
CN111913430B (en)*2020-06-302022-03-18物耀安全科技(杭州)有限公司Detection and protection method and system for control behavior of industrial control system
CN112688938B (en)*2020-12-222023-09-29太原微木智能装备有限公司Network performance measurement system and method based on attack and defense modes
CN113315771B (en)*2021-05-282023-06-27苗叶Safety event alarm device and method based on industrial control system
CN113671909B (en)*2021-06-302024-07-12云南昆钢电子信息科技有限公司Safety monitoring system and method for steel industrial control equipment
CN113592034B (en)*2021-08-232022-07-22江苏鼎跃腾信息技术有限公司Content push method and AI (Artificial Intelligence) management and control system based on big data visualization mining processing
CN114091036B (en)*2021-11-232025-08-29国网江西省电力有限公司电力科学研究院 A cluster vulnerability mining method based on industrial control systems
CN114301640B (en)*2021-12-152023-09-01中电信数智科技有限公司Attack and defense exercise method and system based on SRv6 network protocol
CN115102738B (en)*2022-06-152023-02-10珠海市鸿瑞信息技术股份有限公司Equipment base station health situation perception system and method based on network attack trend
CN114986105A (en)*2022-07-022022-09-02绍兴市上虞幼发轴承有限公司Rolling bearing production process
CN116318783B (en)*2022-12-052023-08-22浙江大学Network industrial control equipment safety monitoring method and device based on safety index
CN116578995B (en)*2023-07-132023-09-15汉兴同衡科技集团有限公司Anti-attack information security vulnerability analysis method, system, terminal and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105721417A (en)*2015-11-162016-06-29哈尔滨安天科技股份有限公司Honeypot apparatus carried in industrial control system, and industrial control system
CN107070929A (en)*2017-04-202017-08-18中国电子技术标准化研究院A kind of industry control network honey pot system
CN107221140A (en)*2017-06-142017-09-29广州云峰信息科技有限公司A kind of business intelligence monitoring and early warning platform
CN108769022A (en)*2018-05-292018-11-06浙江大学A kind of industrial control system safety experiment platform for penetration testing
CN109474607A (en)*2018-12-062019-03-15连云港杰瑞深软科技有限公司A kind of industrial control network safeguard protection monitoring system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9098876B2 (en)*2013-05-062015-08-04Viridity Energy, Inc.Facilitating revenue generation from wholesale electricity markets based on a self-tuning energy asset model
CN103561004B (en)*2013-10-222016-10-12西安交通大学Cooperating type Active Defending System Against based on honey net

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105721417A (en)*2015-11-162016-06-29哈尔滨安天科技股份有限公司Honeypot apparatus carried in industrial control system, and industrial control system
CN107070929A (en)*2017-04-202017-08-18中国电子技术标准化研究院A kind of industry control network honey pot system
CN107221140A (en)*2017-06-142017-09-29广州云峰信息科技有限公司A kind of business intelligence monitoring and early warning platform
CN108769022A (en)*2018-05-292018-11-06浙江大学A kind of industrial control system safety experiment platform for penetration testing
CN109474607A (en)*2018-12-062019-03-15连云港杰瑞深软科技有限公司A kind of industrial control network safeguard protection monitoring system

Also Published As

Publication numberPublication date
CN109818985A (en)2019-05-28

Similar Documents

PublicationPublication DateTitle
CN109818985B (en)Industrial control system vulnerability trend analysis and early warning method and system
CN106534195B (en)A kind of network attack person's behavior analysis method based on attack graph
CN108646722A (en)A kind of industrial control system information security simulation model and terminal
CN117375985A (en)Method and device for determining security risk index, storage medium and electronic device
CN101447991A (en)Test device used for testing intrusion detection system and test method thereof
CN108810034A (en)A kind of safety protecting method of industrial control system information assets
CN111049827A (en)Network system safety protection method, device and related equipment
CN113055375A (en)Power station industrial control system physical network oriented attack process visualization method
CN113381980B (en)Information security defense method and system, electronic device and storage medium
CN114125083A (en) Industrial network distributed data acquisition method, device, electronic device and medium
CN108259202A (en)A kind of CA monitoring and pre-alarming methods and CA monitoring and warning systems
CN118802230A (en) Safety analysis system
CN119051990A (en)Enterprise network security test evaluation method and system
CN105871775B (en) A security protection method and DPMA protection model
Mishchenko et al.Multidomain cyber-physical testbed for power system vulnerability assessment
CN111404917B (en)Industrial control simulation equipment-based threat information analysis and detection method and system
CN110351237A (en)Honey jar method and device for numerically-controlled machine tool
CN120165922A (en) Industrial network security honeypot simulation and threat trapping system
CN120106569A (en) A dynamic risk visualization management method for asset and risk management
CN107332731A (en)A kind of test system and test envelope for network security monitoring device
KR101991736B1 (en)Correlation visualization method and correlation visualization apparatus
CN114374530A (en) IDS system and detection method based on real-time network traffic monitoring and analysis
CN114266365A (en) A network security situational awareness method based on information fusion of primary and secondary systems in substations
US20130291106A1 (en)Enterprise level information alert system
CN117714162A (en) A micro-sensing and intelligent management and control method and system based on data security

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp