Industrial control flow acquisition and protocol analysis method
A protocol analysis and traffic technology, which is applied in the field of industrial control traffic collection and protocol analysis, can solve the problems affecting the safe and stable operation of industrial control networks and information systems, and cannot be manually replaced by system operations, achieving powerful data retrieval and analysis capabilities, fast analysis and query logs to avoid potential risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] like figure 1 As shown, the embodiment of the present invention provides a method for collecting and analyzing industrial control traffic, including the following steps:
[0043] Step (1) data collection, that is, to obtain data based on the mirror port of the industrial control network switch;
[0044] The purpose of data collection is to provide basic data sources for subsequent data analysis, so as to realize the discovery of abnormal network behavior through the analysis of industrial control network communication.
[0045] In a specific implementation manner of the embodiment of the present invention, the step (1) is specifically:
[0046] (1.1) Deploy flow collection device 2 beside industrial control network switch 1, described flow collection device 2 carries out data collection through the mirror port of industrial control network switch 1, simultaneously connects the communication port of oneself with management network in order to return data; See figure 2...
Embodiment 2
[0079] In order to ensure that the flow data after data preprocessing can be accurately and timely transmitted to the third-party management system, on the premise that the data transmission has a correct queue mechanism, the method of the present invention also designs the synchronous and asynchronous modes of data return;
[0080] Specifically, the difference between the embodiment of the present invention and embodiment 1 is:
[0081] like Figure 4 As shown, the method also includes:
[0082] Regularly detect the connection and disconnection of the interface with the external backhaul network. If the detection result is normal, the data will be returned; The data is sent to the third-party system according to the queue mechanism;
[0083] Among them, each data adopts the time stamp mechanism. Once the data transmission fails due to network abnormality, the local storage space can be used to cache the failed data. After the network is restored, the cached data can be sent...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com