Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for monitoring information security domain of industrial control system

A technology for industrial control systems and information security, which is applied in the field of monitoring information security of industrial control systems, and can solve problems such as incomplete details

Active Publication Date: 2022-07-26
CHINA JILIANG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, log files are not always reliable, in some cases the details of the log file records are not comprehensive, and some assets do not generate logs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for monitoring information security domain of industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0020] (1) Log collection

[0021] Log collection refers to collecting data from all possible sources of data, that is, guiding and outputting log information to a log collection node and using a network storage device. If events are stored in a local database rather than in log files, the event information needs to be reprocessed locally through a software agent such as snare and transmitted through the standard syslog. View user activities in the collected logs, including user configuration changes, online and offline user statistics, login operations performed by users, and offline operations performed by users. By analyzing the collected logs, if an abnormal phenomenon is detected, such as the increase of illegal new users, sensitive user operations, etc., a warning will be issued.

[0022] (2) Direct monitoring

[0023] Since some systems, such as RTU...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for monitoring the information security domain of an industrial control system, which is characterized by comprising the following specific methods: (1) Log collection: collect data from all possible sources of data, and guide and output the log information to a log collection node , use a network storage device; (2) Direct monitoring: directly monitor systems that do not directly generate logs, use network probes or other devices to directly check network traffic or hosts, and can also be used to confirm network behavior recorded in log files. Correctness; (3) Speculative monitoring: Speculative monitoring is a situation in which information about other systems is inferred by monitoring a system. The invention relates to a method for monitoring the information security domain of an industrial control system, which has the advantages of simple method and high security, and can efficiently monitor the security domain.

Description

technical field [0001] The invention relates to the technical field of industrial information security, in particular to a method for monitoring the information security domain of an industrial control system. Background technique [0002] Industrial control system network security faces many unknown threats and illegal use. At the same time, most assets do not generate events and log records, which makes it impossible to monitor such equipment. At the same time, the total amount of information that needs to be analyzed and processed in the industrial SACDA system is easily Exceed the limits of information processing and storage capabilities of existing tools. Log files in industrial systems are primarily designed to describe activities that have occurred. However, log files are not always reliable, in some cases the details of log files are not comprehensive, and some assets do not produce logs. SUMMARY OF THE INVENTION [0003] The technical problem to be solved by the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L41/0631H04L41/069H04L67/1095H04L9/40
CPCH04L41/0631H04L41/069H04L63/1408H04L63/30H04L67/025H04L67/1095H04L63/0236
Inventor 张振雄徐向纮
Owner CHINA JILIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products