Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security vulnerability detection method and apparatus based on industrial control system

A technology for industrial control systems and loopholes, applied in transmission systems, electrical components, etc., can solve the problems of detecting industrial control equipment and poor practicability, and achieve the effect of improving safety, stability and good practicability

Inactive Publication Date: 2018-10-23
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The broadcast data should be obtained from the complicated network, and then useless data should be eliminated. However, during the retrieval period of the device, the target device may not have the behavior of sending packets, so the passive scanning method is difficult to fully and effectively detect the industrial control equipment connected to the network. poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security vulnerability detection method and apparatus based on industrial control system
  • Security vulnerability detection method and apparatus based on industrial control system
  • Security vulnerability detection method and apparatus based on industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. the embodiment. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] Considering that the passive scanning method for industrial control equipment in the prior art is difficult to comprehensively and effectively detect the industrial control equipment connected to the network, and the practicability is poor, the embodiment of the present invention provides a security vulnerability detection method based on the industrial control system and devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security vulnerability detection method and apparatus based on an industrial control system. The method comprises the following steps: performing ping scanning on industrial control devices within a set address range to obtain an IP address list of online industrial control devices; sending information request data packets to the corresponding online industrial control devices according to the IP address list; determining the device information of the online industrial control devices according to the response information of the online industrial control devices and apreset device information base, wherein the device information comprises multiple of a system manufacturer identifier, product series and model numbers, a firmware version, a device address and a device name; and searching for the vulnerability information of the online industrial control devices from a preset vulnerability information base. By adoption of the security vulnerability detection method and apparatus provided by the invention, the industrial control devices can be comprehensively and effectively detected in an active scanning manner, the practicability is relatively good, and thevulnerability information of different types of devices are searched, so that the safety and stability of the industrial control devices are improved.

Description

technical field [0001] The invention relates to the technical field of industrial control, in particular to a method and device for detecting security loopholes based on an industrial control system. Background technique [0002] Industrial control systems are widely used in industry, electric power, energy, transportation, water conservancy, public utilities and production enterprises. The controlled device is related to the national economy and the people's livelihood. The stable operation of the device is very important. Once the device fails, it will bring more than just Huge economic loss, worse is the social impact. Through the in-depth analysis of numerous industrial control security incidents, it can be seen that most of the industrial control security incidents exploit the "loopholes" of the industrial control system, and then attack the entire industrial control system. Therefore, helping enterprises to find loopholes in time before hackers successfully attack the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/1466
Inventor 周玉刚范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products