Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A system for predicting industrial control network vulnerabilities based on summary word segmentation features

A vulnerability and industrial control technology, applied in the computer field, can solve the problem of inability to guarantee the security of industrial control network, and achieve the effect of improving accuracy and prediction efficiency, improving security and stability, and improving accuracy and acquisition efficiency.

Active Publication Date: 2022-07-01
山东云天安全技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, if the outbreak of industrial control network vulnerabilities cannot be predicted in time and corresponding defense measures are taken, the security of the industrial control network cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system for predicting industrial control network vulnerabilities based on summary word segmentation features
  • A system for predicting industrial control network vulnerabilities based on summary word segmentation features
  • A system for predicting industrial control network vulnerabilities based on summary word segmentation features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] The computer program stored in the storage medium includes a first computer program, and when the processor executes the first computer program, the following steps are implemented:

[0037] Step S101, obtaining the training period T of the training data set 0 =LCM(TP m ), LCM is the least common multiple function.

[0038] Due to different P m and Q n There is a large difference in the update cycle of the model. If the sliding window is directly used to select the training parameters, many parameters will not change within a certain period of time, which wastes computing resources and has little significance for model training. Therefore, in this embodiment, TP is selected. m The LCM is used as the training period port. It should be noted that since the update period of the Internet vulnerability characteristic parameters is much larger than the update period of the industrial control network vulnerability characteristic parameters, only the update period of the In...

Embodiment 2

[0064] It should be noted that there are many Internet vulnerability characteristic parameters, which are easy to obtain. However, in some application scenarios, limited by various factors such as the scale of the industrial control network, it may not be possible to obtain enough characteristic parameters of the industrial control network to train the industrial control network. Vulnerability prediction model. However, since the trend of the outbreak of the same vulnerability in the industrial control network is consistent with the overall trend of the Internet outbreak, there is a correlation. Therefore, based on the correlation between the industrial control network and the Internet vulnerability outbreak, combined with the characteristic parameters of the Internet vulnerability, the probability of the outbreak of the industrial control network vulnerability can be calculated. predict.

[0065] Specifically, the computer program stored in the storage medium includes a secon...

Embodiment 3

[0094] The computer program stored in the storage medium includes a third computer program, and when the processor executes the third computer program, the following steps are implemented:

[0095] Step S300, obtain the text sequence {Str of each sample vulnerability id in the corresponding Summary from the database 1 ,Str 2 ,…}, Str e is the text of the Summary corresponding to the e-th update cycle, and the value of e ranges from 1 to infinity.

[0096] Step S301, when e=1, according to Str e The length of Str is determined e The feature weight w e .

[0097] Through step S301, each Str can be e Set the corresponding initial feature weights.

[0098] Step S302, when e>1, compare Str e-1 and Str e If the text information is completely consistent, then judge z*w e-1 Is it greater than the preset first feature weight threshold w emin , if greater than, set w e =z*w e-1 , where z is the preset weight adjustment coefficient, 0e-1 less than or equal to w emin , then ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a system for predicting industrial control network vulnerabilities based on summary word segmentation features, and implements step S400, acquiring the text sequence of each sample vulnerability id in the corresponding summary; step S401, comparing Str e Process to get the corresponding word segmentation set A e ; Step S402, when e=1, according to A e The number of participles determines Str e The feature weight w e ; Step S403, when e>1, compare Str e‑1 and Str e , if they are exactly the same, set w e =w e‑1 , if it is not completely consistent, then the participle set A e and participle set A e‑1 Perform the set difference operation to get A e relative to A e‑1 The number of difference participles A e ‑A e‑1 , and A e‑1 relative to A e The number of difference participles A e‑1‑ A e1 , set w e =[(A e ‑A e‑1 ) / (A e‑1‑ A e1 )]*w e‑1 ; Step S404, determine each Str e Corresponding summary characteristic parameter values; step S405, training to obtain an industrial control network vulnerability prediction model, and predicting the industrial control network vulnerability outbreak probability. The present invention can quickly and accurately predict the industrial control network vulnerability outbreak probability and improve the security of the industrial control network.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a system for predicting industrial control network vulnerabilities based on summary word segmentation features. Background technique [0002] With the accelerated integration of new-generation information technologies and manufacturing technologies such as cloud computing, big data, artificial intelligence, and the Internet of Things, industrial control systems have moved from original closed and independent to open, from stand-alone to interconnected, and from automation to intelligence. While industrial enterprises have gained tremendous momentum for development, there have also been a lot of potential security risks. From the Stuxnet virus that targeted Iran's nuclear plant in 2010 to the Havex virus that swept Europe in 2014, the network for industrial control systems (hereinafter referred to as the industrial control network) Attacks are intensifying, and industrial contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 李峰孙瑞勇郝丽娜靳海燕水沝张洪铭
Owner 山东云天安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products