Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial control information security risk assessment model based on distributed inspection

A risk assessment model and industrial control technology, applied in the direction of comprehensive factory control, comprehensive factory control, program control, etc., can solve the problem of inability to guarantee the safety, objectivity, comparability of results, lack of industrial enterprises, industrial control system characteristic design, It does not have problems such as analysis and processing interfaces, so as to achieve the effect of improving inspection efficiency, improving inspection efficiency, and strong data sensitivity

Pending Publication Date: 2020-02-14
上海三零卫士信息安全有限公司
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there are many industrial control inspection and evaluation tools on the market, but there are still many shortcomings and bottlenecks in the inspection process and inspection efficiency: First, most of the inspection tools are oriented to traditional information networks, and are made up of manual or scanning tools. The results of advanced technology and tool testing are used as the basis for evaluation and judgment, which cannot guarantee the safety, objectivity, and comparability of the results. When dealing with reports in various formats, there is no unified analysis and processing interface, or the interface processing is complicated and messy. A large amount of manual intervention is required in the processing work, which reduces the efficiency of detection and evaluation, and there are defects in the detection mode
Secondly, some of them are simply modified on the basis of traditional information security inspection and evaluation tool technology, and lack the characteristic design for industrial enterprises and industrial control systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The technical solutions in the embodiments of the present invention will be described clearly and completely below. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0022] An industrial control information security risk assessment model based on distributed inspection includes the following steps:

[0023] Automatically collect system asset information: Through in-depth analysis of industrial control protocols, collect industrial control system communication data packets, and through a period of self-learning, parse out source IP, destination IP, source MAC, destination MAC, source port, destination port, Elements such as industrial protocols are stored to form a list of asset samp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information security of an industrial control system, in particular to an industrial control information security risk assessment model based on distributed inspection. An inspection assessment model is constructed by combining industrial control network characteristics; system asset information is collected automatically to form an industrial control asset inspection list; and an asset object inspection model is formed automatically. According to the invention, industrial data are collected and automatic analysis is carried out on the data, and reductionanalysis is carried out on various industrial communication protocols, so that the asset information attributes of the industrial control system are fully and accurately identified; because of combination of the automatically and intelligently generated asset inspection object model with the distributed inspection evaluation implementation mode, the workload of inspection personnel is reduced andmanual and artificial misoperation and misjudgment are reduced, so that high-efficiency risk evaluation system architecture based on industrial control network characteristics is constructed.

Description

technical field [0001] The invention relates to the field of industrial control system information security, in particular to an industrial control information security risk assessment model based on distributed inspection. Background technique [0002] Industrial Control System (ICS) is widely used in my country's energy, municipal, chemical, transportation, water conservancy, national defense science and industry, food and medicine, and equipment manufacturing and other industries. More than half of the important infrastructure involving the national economy and people's livelihood relies on ICS to achieve automated operations. ICS information security has become an important part of the national cybersecurity strategy. [0003] Since the "Stuxnet" incident in Iran in 2010, the state has successively promulgated and implemented a series of laws, regulations and policies related to industrial control information security risk assessment, such as the Cybersecurity Law of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G05B19/418
CPCG05B19/41885G05B2219/32339Y02P90/02
Inventor 刘江柳宋迟干露仵大奎李绪国吴国雄
Owner 上海三零卫士信息安全有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products