Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Semi-passive industrial control network security analysis tool and method based on Bayesian attack graph

A Bayesian attack graph, industrial control network technology, applied in the field of network security, can solve problems such as hidden danger prevention and control, poor security analysis effect, etc., to achieve the effect of improving compatibility, protecting important nodes, and reducing occupation

Active Publication Date: 2022-03-01
SHANGHAI JIAO TONG UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above-mentioned existing technologies, the existing industrial control network security analysis tools currently have problems such as lack of compatible design for industrial control networks, poor security analysis effect, and failure to prevent and control hidden dangers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semi-passive industrial control network security analysis tool and method based on Bayesian attack graph
  • Semi-passive industrial control network security analysis tool and method based on Bayesian attack graph
  • Semi-passive industrial control network security analysis tool and method based on Bayesian attack graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0074] The embodiment of the present invention provides a semi-passive industrial control network security analysis tool and method based on Bayesian attack graph. figure 1 As shown, the network security analysis tool is divided into four modules: semi-passive information acquisition module, asset inventory building module, attribute attack graph generation module and Bayesian attack graph generation module.

[0075] refer to figure 2 As shown, the semi-passive information acquisition method can obtai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a semi-passive industrial control network security analysis tool and method based on a Bayesian attack graph, and relates to the technical field of network security. The method includes: a semi-passive information acquisition module: acquiring active scanning reports, network message data and management The combination suggested by the staff is corrected and used as an input file; build the asset list module: build the asset list, and generate the .P file as the input file of the attribute attack graph generation module and the Bayesian attack graph generation module; the attribute attack graph generation module: Input template network topology information and node information to generate attack paths; Bayesian attack graph generation module: based on the network information and logic rules recorded by Datalog statements, comprehensively analyze the information of the entire network, and finally generate all possible attack graphs. The invention can have strong compatibility with respect to industrial control networks, and at the same time comprehensively utilize various charts to intuitively assist network security analysis, and can achieve dynamic analysis and hidden danger prevention and control.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a semi-passive industrial control network security analysis tool and method based on a Bayesian attack graph. Background technique [0002] The industrial control system is composed of various automation control components and process control components for collecting and monitoring real-time data. It is a business process control system that ensures the automatic operation, process control and monitoring of industrial technical facilities. Its core components include data collection and Supervisory control system (SCADA), distributed control system (DCS), programmable logic controller (PLC), remote terminal (RTU), intelligent electronic device (IED). Explanation of related terms: ICS (Industrial Control System): Industrial Control System; AG (Attack Graph): Attack Graph; BAG (Bayesian Attack Graphs): Bayesian Attack Graph; CVSS (Common Vulnerability Scoring System): Com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L41/12H04L41/14H04L9/40
CPCH04L41/12H04L41/145H04L63/1416H04L63/20
Inventor 郭建铭刘功申陈子昂刘浩文刘子涵
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products