Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for monitoring industrial control system information security domain

An industrial control system and information security technology, applied in the field of monitoring industrial control system information security, can solve problems such as incomplete details

Active Publication Date: 2020-02-07
CHINA JILIANG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, log files are not always reliable, in some cases the details of the log file records are not comprehensive, and some assets do not generate logs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for monitoring industrial control system information security domain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0020] (1) Log collection

[0021] Log collection refers to collecting data from all possible sources of data generation, that is, guiding and outputting log information to a log collection node and using a network storage device. If the events are stored in a local database instead of a log file, the event information needs to be reprocessed locally by software agents such as snare and transmitted through standard system logs. The collected logs are used to view user activities, including user configuration changes, statistics of users who log in and out, login operations performed by users, and logout operations performed by users. By analyzing the collected logs, if abnormal phenomena are detected, such as the increase of illegal new users, sensitive user operations, etc., a warning will be issued.

[0022] (2) Direct monitoring

[0023] Since some syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for monitoring an industrial control system information security domain, which is characterized by comprising the following specific steps of: (1) log collection: collecting data from all sources which possibly generate data, guiding and outputting log information to a log collection node, and using a network storage device; (2) direct monitoring: directly monitoring a system which does not directly generate a log, directly checking network flow or a host by utilizing a network probe or other equipment, and meanwhile, confirming the correctness of network behaviors recorded by a log file; and (3) speculative monitoring: speculating the situation of related information of other systems by monitoring one system. The method for monitoring the information security domain of the industrial control system is simple, high in security and capable of efficiently monitoring the security domain.

Description

technical field [0001] The invention relates to the technical field of industrial information security, and specifically refers to a method for monitoring the information security domain of an industrial control system. Background technique [0002] Industrial control system network security faces many unknown threats and illegal use. At the same time, most assets do not generate events and log records, making it impossible to monitor such devices. At the same time, the total amount of information that needs to be analyzed and processed in industrial SACDA systems is very easy. Exceeding the limits of information processing and storage capabilities of existing tools. Log files in industrial systems are primarily designed to describe activities that have occurred. However, log files are not always reliable, in some cases the details recorded in log files are not comprehensive, and some assets do not generate logs. Contents of the invention [0003] The technical problem t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06H04L29/08
CPCH04L41/0631H04L41/069H04L63/1408H04L63/30H04L67/025H04L67/1095H04L63/0236
Inventor 张振雄徐向纮
Owner CHINA JILIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products