CN108737417A - A kind of vulnerability checking method towards industrial control system - Google Patents

A kind of vulnerability checking method towards industrial control system Download PDF

Info

Publication number
CN108737417A
CN108737417A CN201810492275.XA CN201810492275A CN108737417A CN 108737417 A CN108737417 A CN 108737417A CN 201810492275 A CN201810492275 A CN 201810492275A CN 108737417 A CN108737417 A CN 108737417A
Authority
CN
China
Prior art keywords
vulnerability
data packet
industry control
protocol
agreement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810492275.XA
Other languages
Chinese (zh)
Inventor
周伟平
黄益彬
韩勇
茅兵
张磊
卢朝晖
郭健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University
State Grid Hebei Electric Power Co Ltd
Nari Information and Communication Technology Co
Information and Telecommunication Branch of State Grid Gansu Electric Power Co Ltd
Original Assignee
Nanjing University
State Grid Hebei Electric Power Co Ltd
Nari Information and Communication Technology Co
Information and Telecommunication Branch of State Grid Gansu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University, State Grid Hebei Electric Power Co Ltd, Nari Information and Communication Technology Co, Information and Telecommunication Branch of State Grid Gansu Electric Power Co Ltd filed Critical Nanjing University
Priority to CN201810492275.XA priority Critical patent/CN108737417A/en
Publication of CN108737417A publication Critical patent/CN108737417A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/26Special purpose or proprietary protocols or architectures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of vulnerability checking method towards industrial control system:Network detection based on Industrial Ethernet feature is carried out to target environment, identify industrial control equipment and captures session data packet.Data packet is parsed according to industry control protocol specification and proprietary protocol reversal technique, and construction feature code data packet carries out further system detection, obtains specific finger print information.Aspect ratio based on the proprietary vulnerability database of industry control carries out relevant Hole Detection to matching the vulnerability information of target based on policy-driven.Fuzz testing is carried out based on industry control agreement fragility, excavate the security breaches of industry control grid and detects its Security Vulnerability.The present invention detects security risk by carrying out vulnerability checking to industry control target, prior to network attack person, improves industrial control system security reliability.

Description

A kind of vulnerability checking method towards industrial control system
Technical field
The invention belongs to field of computer technology, especially industry control security fields.The present invention provides one kind towards industry control The vulnerability checking method of system, for detecting industrial control system Security Vulnerability.
Background technology
Industrial control system is national critical infrastructures important component, be widely used in petroleum and petrochemical industry, water conservancy, The industrial circles such as electric power, food processing and sewage disposal are mainly used for data acquisition and production control etc..The industry control of early stage Industrial control system is physically isolated with internet, and mostly uses special software and hardware greatly, so even there are security risk in industrial control system, But the external world is both difficult to touch industrial control system or is difficult to that the research to industrial control system is unfolded.But as computer technology is in work Extensive use in industry environment, universal computing device, the general-purpose operating system start the realization for industrial control system, industry control agreement ICP/IP protocol structure is started based on, traditional industrial control system has gradually broken previous closure and monopoly so that The threat that conventional internet system is faced is spread in industrial control system environment.Industrial control system safety is concerning economic development, society It can stablize and national security, the security study for industrial control system are extremely urgent.
Industrial control system fragility:Different from conventional internet system, industrial control system is functionally more heavily weighted toward in real time Property and reliability, whole system framework and communication protocol do not account for safety factor, safety policy and managing system at the beginning of design Degree is formulated not perfect;Due to system compatible sex chromosome mosaicism, industrial control system do not upgrade usually, not patch installing, therefore transports for a long time Capable industrial control system can accumulate a large amount of security breaches, these defects make industrial control system very fragile in face of network attack, So that industry control security status is become " inadequate natural endowment will be lost and support the day after tomorrow " by industry personnel.
Vulnerability scanning refers to the Security Vulnerability using the means such as scanning detection destination host or network, concurrent existing utilization Loophole a kind of safety detection technology, belong to mainstream safety detection technology with fire wall and Intrusion Detection Technique one.But, Fire wall and Intrusion Detection Technique belong to passive defensive measure, and Vulnerability-scanning technology then belongs to a kind of strick precaution of active and arranges It applies, the security reliability of itself can be improved before the non-attacking system network of invader.
Existing vulnerability scanning method includes mainly following several:
1) vulnerability scanning of Intrusion Detection based on host.The method uses passive, nondestructive method to examine goal systems Survey, generally involve the kernel of system, file attribute, operating system patch the problems such as, can very accurate positioning system The problem of, system vulnerability is found in time.Its advantage is it is obvious that but since it is desired that each destination host in goal systems is pacified Dress agency and some specific softwares, do not meet the positioning and configuration of host in industrial control system environment, thus be difficult industry with It is applicable in netting very much.
2) network-based vulnerability scanning.The method examines goal systems using active, nondestructive method It surveys, is generally divided into two kinds of means of active scan and simulated strike.During active scan, vulnerability scanning system is directed to target master The information such as the port assignment of machine or network, software and hardware configuration, anonymous login and the service of offer are scanned, and according to these letters Breath judges the vulnerability information of goal systems;And simulated strike this be using specific script to system carry out simulated strike, and point It analyses attacking as a result, to judge system with the presence or absence of the possibility collapsed;Common attack method has buffer overflow, password to attack It hits, distributed denial of service attack.In addition, this method also tests to goal systems based on known loophole, its peace is assessed Full fragility.But the Vulnerability-scanning technology based on traditional network, network detection data packet may be because industrial fireproof wall and peace The presence of full gateway and cannot achieve Intranet infiltration, to effectively being detected to target network.
Agreement is reverse:Procotol refers to when two or more terminals carry out message exchange, format that message should follow with And terminal receives the operation that these message should execute;And agreement reverse (Protocol Reverse) refers to informal In the case that agreement describes, the parameter of agreement, the process of format and semantic normalization are inferred.Modern agreement, which inversely mainly has, is divided into two Kind:Method based on binary file and the method based on network flow.
Invention content
On the basis of work on hand, it is an object of the invention to:It is proposed a kind of vulnerability checking towards industrial control system Method, solving existing vulnerability checking method, not strong, system detects the not deep and privately owned association of industry control to Industrial Ethernet applicability The problems such as discussing supportive difference.
The technical scheme is that:A kind of vulnerability checking method towards industrial control system, it is characterized in that using asymptotic The scanning strategy of layering does Industrial Ethernet based on industry control protocol suite and equipment feature the network detection of active, and to catching It obtains data packet and carries out protocol analysis and reverse;Industrial equipment is done according to the format of protocol analysis and syntactic constructs particular data packet Further system detection;It establishes the special vulnerability database of industry control and carries out comparing;Fuzzy survey is carried out based on industry control agreement fragility Examination excavates the security breaches of industry control grid and detects its Security Vulnerability;
The present invention specifically includes following steps:
1) network detection based on industry control ethernet environment;
2) according to the resolve packet of industry control disclosure agreement collection;
3) analysis of the unknown industry control protocol data packet based on existing protocol reversal technique;
4) particular data packet is constructed according to protocol analysis result and further system detection is done to industry control Ethernet;
5) data based on industry control vulnerability database and system detection do aspect ratio pair, and carry out Hole Detection;
6) it is based on industry control agreement fragility and carries out fuzz testing, detect its Security Vulnerability.
Further:
In step 1), to target industry control environment carry out vulnerability scanning premise network environment detect, be connected to industry with Too net under the premise of, using industrial control equipment have periodicity sending inquire data packet characteristic, will capture in industry control environment into The network packet of row data interaction;In addition, the detection for carrying out network topology to target Industrial Ethernet is also in the step One of hold, the title of industrial control equipment in target network, the essential informations such as address of interchanger can be detected, are to be further The basis of system detection.
In step 2), gives the data packet captured to industry control protocol suite and judge, to find corresponding communication protocol, so as to Specific inquiry data packet and vulnerability checking are constructed according to the characteristic of agreement.
In step 3), this step is not disclose to illustrate for insurmountable industrial control field proprietary protocol in previous step Document, protocol suite cannot judge the data packet of unknown protocol, the benefit done to parse the deficiency of its content and feature It fills;According to existing agreement reversal technique, under the premise of not contacting unknown protocol document, extracted in it from network flow packet Syntax and semantics, and combine communication protocol priori, conclude the template and rule of its data packet.
In step 4), according to protocol analysis as a result, in conjunction with network detection Industrial Ethernet in broadcast address and be applicable in The essential information of agreement, the particular data packet that construction meets industry control communication feature carry out profound system detection;Using principal and subordinate Pattern, active broadcast send particular data packet and intercept and capture the data packet of target industrial control equipment response, and mesh is obtained according to protocol characteristic Specifying information of marking device, such as station type, manufacturer, unit type, firmware version etc..
In step 5), after completing network detection and the with different levels information detection of system detection, after the vulnerability scanning method Continuous process is namely based on the proprietary vulnerability database of the industry control established in advance, by the specifying information of industrial control equipment, especially model and admittedly Part version compares with industry control vulnerability database, matches loophole existing for the equipment, in conjunction with the policy-driven mechanism of user demand, Hole Detection can be carried out to target.
In step 6), scanned in Industrial Ethernet after the loophole of industrial control equipment according to appeal step, in order to more complete Ground detects the fragility of target, and safety factor is not considered based on industry control Protocol Design and realization, to logical in target network Believe that agreement carries out fuzz testing, excavates its security breaches to improve its Security Vulnerability, more completely to assess the industry The safety of Ethernet.
By using above technical scheme, the present invention has the following advantages:
1. strong applicability:The present invention is the vulnerability checking method proposed towards industrial control system, is different from for traditional net The detection technique of network is essentially characterized in that, using industrial specialized protocol and equipment feature, construction particular data packet carries out system Detection has great advantage for obtaining industrial control system underlying device information tool.
2. with strong points:The proprietary vulnerability database of industry control that the present invention is established is based on industrial control system safety defect, and using special Matched data comparison method is levied, the low defect of original detection method Hole Detection accuracy rate is improved.
3. agreement coverage rate is high:The present invention is directed to the basis of reality of industry control proprietary protocol substantial amounts, reverse using agreement Technology does unknown protocol data packet the application for inversely greatly improving the detection method under a variety of industry control environment;In addition, Based on the fuzz testing of industry control agreement, existing vulnerability database can be supplemented, more completely detects its Security Vulnerability.
Description of the drawings
Fig. 1 is the structural schematic diagram of the vulnerability checking method towards industrial control system of the embodiment of the present invention.
Fig. 2 is the object of experiment industry control network topological diagram in the embodiment of the present invention.
Fig. 3 is the flow chart of network detection part in Fig. 1.
Fig. 4 is the flow chart of system probe portion in Fig. 1.
Fig. 5 is the flow chart of fuzz testing part in Fig. 1
Specific implementation mode
With reference to related description figure and embodiment, the present invention will be further described, and the example is to be based on Modbus/TCP Communication protocol carries out for the industry control network of data interaction.Fig. 2 is the target Industrial Ethernet network for the vulnerability scanning of being carried out Topological diagram, Quantum PLC are the programmable logic controller (PLC)s of Industry Control manufacturer Schneider, wherein CPU module support and work Cheng Shizhan carries out the data interaction of Modbus/TCP agreements, and ethernet module can provide abundanter interaction according to user demand Means, and Modbus master-slave equipment replicating machines station is the common PC machines of the corresponding Modbus services of operation.The present invention is directed to propose one Vulnerability checking method of the kind towards industrial control system, is detected for loophole present in Industrial Ethernet, to reduce industrial field Security risk and raising industrial control system security reliability in scape.
The first step:Based on network insertion mouth, network detection is carried out to target Industrial Ethernet, because industrial protocol starts base It is built in TCP/IP, so carrying out inner-mesh network topology probe using traditional network detection means.As started target in Fig. 3 Network detection thread carries out network environment host identification first.Ping Scan is mainly used for detecting the addresses IP of host, generally The network information is unknown for attacker or penetration testing personnel in fact, and obtaining network essential information by Ping Scan is Carry out the basis of vulnerability scanning and invasion.The ICMP ECH0 request bags that ICMP types are 8 are sent to target network, and waiting is The no ICMP ECH0 response bags for being recovered to ICMP types and being 0, judge the host survival condition of target network according to replying;When Firewall configuration prevents ICMP ECH0 flows, then it is 13 to be scanned by non-ECH0 and send an ICMP type to target Whether the ICMP ADDRESS MASK request bags that ICMP TIMESTAMP request bags or ICMP types are 13, waiting receive Response bag.After determining target network host survival condition, in order to obtain more effective miniport service information, it can attempt to and deposit Host living enlivens port and establishes connection, and the difference based on different operating system and software version obtains specific version information.Together When, according to the inquiry request feature of industry control network device periodically, start capture packet thread, capture destination host and corresponding The interaction data of service.
Second step:The data packet captured is given to industry control protocol suite to judge, identify data packet based on communication Agreement extracts effective information.It is based on for example, Modbus master-slave equipments station can be parsed from the data packet captured Modbus/TCP is interacted, and main equipment periodically sends out the different request data package of function to from equipment, including coil and Register read etc.;Equally, disclosure agreement Modbus/TCP protocol suites are based on, engineer station can be parsed to Quantum PLC Issue the flow of program and the condition code of special command.Based on information extraction, in the communication for learning Unity Pro and PLC Some off-gauge function codes are used, it can be achieved that terminating the function of PLC CPU, it can in the industry control environment for lacking authentication mechanism To carry out data packet playback, serious Denial of Service attack is caused.
Third walks:In order to improve applicability of the scan method in industrial control field, based on privately owned in industrial control condition Custom protocol data rich, this step are reverse mainly for that can not be carried out according to the data on flows packet that industry control protocol suite is parsed The work of parsing.The reverse key technology of agreement based on network flow packet is that protocol format extraction and protocol status are inferred.Base In the incremental learning of data packet, key field point effectively is carried out to unknown protocol data packet using alive data domain and byte-aligned It cuts;Based on the priori to protocol data, length field and verification data therein domain (if the proprietary protocol presence) is found out, This provides the construction of follow-up data packet the support in template and rule.More agreement is shifted for state, for example is based on Modbus/TCP interacts data, and state change is first to establish TCP connection, is passing through Modbus requests and response data Packet transmission data, in-between process can irregular transmission TCP determine packet, prevent, etc. after data transmissions, there will be corresponding TCP wave for tetra- times;And the dedicated S7 agreements of Siemens, then there can be COTP numbers between TCP connection and S7COMM data transmissions According to connection request and response.For unknown industry control agreement, agreement inversely infers have using state machine to the transfer of its state More specific effective information, such as unit type and firmware version can be detected conducive to the function of system probe data packet, Improve the matched accuracy of loophole.
4th step:Template and rule based on the target industry control environment applicable protocols that previous work parses, according to Fig. 4 institutes The step of showing carries out profound system detection.It is public in real time based on crucial domain construction according to the packet structure of protocol analysis Agreement or the probe data packet of unknown protocol are opened, based on specific objective is sent in target network environment, waits number of responses to be received According to packet;If not being successfully transmitted or being not received by response bag, detection data is reconfigured in conjunction with agreement priori Packet.It is after having successfully received the response data packet of detection target, then rule-based that information extraction is carried out to data packet, if extraction letter Include the specific version information of detection target in breath, is then based on the proprietary vulnerability database of industry control and carries out comparing, otherwise combine agreement State machine adjusts the structure of probe data packet, retransmits.
5th step:Comparing is a kind of common data matching method, by will wait for correction data and reference data into Row comparison, matches the information of needs.According to the work detected for the with different levels network detection of industry control Ethernet and system The specifying information of equipment, such as station type, station name, manufacturer, device identification, firmware model and firmware version are controlled, with Related data in the proprietary vulnerability database of industry control compares, and matches loophole existing for target device;It is assisted in combining target network communication The feature of view obtains its relevant fragility in conjunction with industrial control system information bank and vulnerability database, based on the corresponding peace of policy mechanism scheduling Full vulnerability checking remotely permeates engineer station such as the detection of Network Environment, to local after the local permission of acquisition Software Unity Pro carry out DLL abduction, it is blocked to issue PLC orders;Modbus communications protocol is held in Network Environment It is subject to man-in-the-middle attack, implementation record is reset and the vulnerability checking of refusal service.
6th step:After completing to the vulnerability scanning of test target and detection, to the parsing of data packet in can working above The reverse achievement with agreement, and industry control agreement priori is utilized, fuzz testing is carried out (such as to the communication protocol in target network Shown in Fig. 5), its potential loophole is excavated, its Security Vulnerability is more completely detected.
To sum up, the present invention can effectively solve existing vulnerability checking method to Industrial Ethernet applicability not strong, system The problems such as detection is not goed deep into and industry control proprietary protocol is supportive poor.

Claims (8)

1. a kind of vulnerability checking method towards industrial control system, it is characterised in that:Using the scanning strategy of asymptotic layering, The network detection of active is done to Industrial Ethernet based on industry control protocol suite and equipment feature, and agreement is carried out to capture data packet It parses and reverse;Further system is done according to the format of protocol analysis and syntactic constructs particular data packet to industrial equipment to visit It surveys;It establishes the special vulnerability database of industry control and carries out comparing;Fuzz testing is carried out based on industry control agreement fragility, excavates industrial control system The security breaches of network simultaneously detect its Security Vulnerability.
2. the vulnerability checking method according to claim 1 towards industrial control system, it is characterised in that include the following steps:
1) network detection based on industry control ethernet environment and packet capture, and pass to data packet analysis module;
2) according to the resolve packet of industry control disclosure agreement collection
3) analysis of the unknown industry control protocol data packet based on existing protocol reversal technique;
4) particular data packet is constructed according to protocol analysis result and further system detection is done to industry control Ethernet, obtain equipment tool Body information;
5) data based on industry control vulnerability database and system detection do aspect ratio pair, and carry out Hole Detection;
6) it is based on industry control agreement fragility and carries out fuzz testing, detect its Security Vulnerability.
3. the vulnerability checking method according to claim 2 towards industrial control system, it is characterized in that in step 1), with work Control agreement be based on ICP/IP protocol structure, network detection technology it is detectable go out Industrial Ethernet environment in industrial control equipment title With the essential informations such as interchanger broadcast address, the interaction data packet of industry control master-slave equipment can be also captured.
4. the vulnerability checking method according to claim 2 towards industrial control system is based on work it is characterized in that in step 2) Control protocol suite judges network detection capture data packet, is parsed to data packet with finding corresponding agreement.
5. the vulnerability checking method according to claim 2 towards industrial control system is based on work it is characterized in that in step 3) The data packet of proprietary protocol interaction is controlled, step 2) can not provide solution, using the agreement reversal technique based on network flow, Rule is done to data packet by protocol information classification policy, format and grammar extraction strategy and template parses.
6. the vulnerability checking method according to claim 2 towards industrial control system utilizes step it is characterized in that in step 4) It is rapid that the probe data packet of particular configuration and intercepting and capturing actively 2) are sent using master slave mode with the resolve packet structure of step 3) The returned data packet of underlying device is compared by industrial control equipment library and obtains device type, title, mark, address, firmware version letter The specifying informations such as breath.
7. the vulnerability checking method according to claim 2 towards industrial control system, it is characterized in that in step 5), based on building The proprietary vulnerability database of vertical industry control compares with equipment specifying information in step 4), obtains vulnerability information and carries out industry control loophole inspection It surveys.
8. the vulnerability checking method according to claim 2 towards industrial control system is based on work it is characterized in that in step 6) Control agreement Lay Importance on Practical, reliability and lack the design of safety, fuzz testing is carried out to disclosure agreement and proprietary protocol, is dug It digs the security breaches of test target and detects its fragility.
CN201810492275.XA 2018-05-16 2018-05-16 A kind of vulnerability checking method towards industrial control system Pending CN108737417A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810492275.XA CN108737417A (en) 2018-05-16 2018-05-16 A kind of vulnerability checking method towards industrial control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810492275.XA CN108737417A (en) 2018-05-16 2018-05-16 A kind of vulnerability checking method towards industrial control system

Publications (1)

Publication Number Publication Date
CN108737417A true CN108737417A (en) 2018-11-02

Family

ID=63938804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810492275.XA Pending CN108737417A (en) 2018-05-16 2018-05-16 A kind of vulnerability checking method towards industrial control system

Country Status (1)

Country Link
CN (1) CN108737417A (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109558736A (en) * 2018-11-22 2019-04-02 浙江国利网安科技有限公司 A kind of unknown threat construction method of industry and threaten generation system
CN109768887A (en) * 2019-01-11 2019-05-17 四川大学 A kind of method of automatic mining industry control flow period feature
CN109873737A (en) * 2019-01-31 2019-06-11 杭州迪普科技股份有限公司 A kind of test method and device
CN109901551A (en) * 2019-03-05 2019-06-18 烽台科技(北京)有限公司 Information acquisition method, information acquisition device and the terminal device of industrial control equipment
CN110166440A (en) * 2019-04-26 2019-08-23 中国人民解放军战略支援部队信息工程大学 Print protocol vulnerability analysis method and system
CN110191021A (en) * 2019-05-29 2019-08-30 北京百度网讯科技有限公司 A kind of protocol testing method, device, electronic equipment and storage medium
CN110430223A (en) * 2019-09-12 2019-11-08 北京京航计算通讯研究所 Vehicle control system network security detection system based on multilevel feedback queue
CN110493254A (en) * 2019-09-03 2019-11-22 国家计算机网络与信息安全管理中心 Industrial Yunan County's overall evaluating method and device
CN110505111A (en) * 2019-07-09 2019-11-26 杭州电子科技大学 The industry control agreement fuzz testing method reset based on flow
CN110868408A (en) * 2019-11-07 2020-03-06 广州安加互联科技有限公司 Industrial control equipment safety detection method and system based on industrial protocol analysis
CN110995733A (en) * 2019-12-12 2020-04-10 江苏亨通工控安全研究院有限公司 Intrusion detection system in industrial control field based on remote measuring technology
CN111026012A (en) * 2019-11-29 2020-04-17 哈尔滨安天科技集团股份有限公司 Method and device for detecting PLC firmware level bugs, electronic equipment and storage medium
CN111272255A (en) * 2018-12-05 2020-06-12 陕西思科锐迪网络安全技术有限责任公司 Method for monitoring water level border crossing of Siemens S7-PLC water storage tank
CN111277547A (en) * 2018-12-05 2020-06-12 陕西思科锐迪网络安全技术有限责任公司 Method for monitoring Siemens S7-PLC setting internal clock
CN111294347A (en) * 2020-01-22 2020-06-16 奇安信科技集团股份有限公司 Safety management method and system for industrial control equipment
CN111314289A (en) * 2019-12-26 2020-06-19 青岛海天炜业过程控制技术股份有限公司 Method for identifying industrial control protocol dangerous communication data based on Ethernet
CN111327636A (en) * 2020-03-10 2020-06-23 西北工业大学 S7-300PLC private protocol reverse method relating to network security
CN111427305A (en) * 2020-03-29 2020-07-17 博智安全科技股份有限公司 Method for Siemens P L C vulnerability mining
CN111709009A (en) * 2020-06-17 2020-09-25 杭州安恒信息技术股份有限公司 Detection method and device for networked industrial control system, computer equipment and medium
CN111723377A (en) * 2020-06-17 2020-09-29 中国电子信息产业集团有限公司第六研究所 Platform vulnerability assessment method and device, electronic equipment and storage medium
CN111752586A (en) * 2020-06-23 2020-10-09 上海交通大学 Method and system for detecting unrepaired bugs of cross-architecture embedded equipment firmware
CN113364746A (en) * 2021-05-24 2021-09-07 湖南华菱涟源钢铁有限公司 Equipment identification method, device, equipment and computer storage medium
CN113507449A (en) * 2021-06-17 2021-10-15 北京惠而特科技有限公司 Deep identification method and device for GE private protocol
CN114676438A (en) * 2022-04-15 2022-06-28 电子科技大学 Quick detection method for multi-dimensional vulnerability of hardware system
CN115065568A (en) * 2022-08-19 2022-09-16 北京珞安科技有限责任公司 Industrial control network intrusion detection method and system
CN116318783A (en) * 2022-12-05 2023-06-23 浙江大学 Network industrial control equipment safety monitoring method and device based on safety index

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468267A (en) * 2014-11-24 2015-03-25 国家电网公司 Information safety penetration testing method for distribution automation system
US20160050225A1 (en) * 2014-08-13 2016-02-18 Honeywell International Inc. Analyzing cyber-security risks in an industrial control environment
CN106161426A (en) * 2016-06-08 2016-11-23 北京工业大学 A kind of vulnerability scanning method being applied to industry Internet of Things
CN106656657A (en) * 2016-11-11 2017-05-10 北京匡恩网络科技有限责任公司 Adaptive vulnerability mining framework based on industrial control protocol
CN107612733A (en) * 2017-09-19 2018-01-19 杭州安恒信息技术有限公司 A kind of network audit and monitoring method and its system based on industrial control system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160050225A1 (en) * 2014-08-13 2016-02-18 Honeywell International Inc. Analyzing cyber-security risks in an industrial control environment
CN104468267A (en) * 2014-11-24 2015-03-25 国家电网公司 Information safety penetration testing method for distribution automation system
CN106161426A (en) * 2016-06-08 2016-11-23 北京工业大学 A kind of vulnerability scanning method being applied to industry Internet of Things
CN106656657A (en) * 2016-11-11 2017-05-10 北京匡恩网络科技有限责任公司 Adaptive vulnerability mining framework based on industrial control protocol
CN107612733A (en) * 2017-09-19 2018-01-19 杭州安恒信息技术有限公司 A kind of network audit and monitoring method and its system based on industrial control system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
工控系统漏洞扫描技术的研究: "王欢欢", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
王继业: "电力工控系统攻击仿真验证关键技术研究", 《电力信息与通信技术》 *

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109558736A (en) * 2018-11-22 2019-04-02 浙江国利网安科技有限公司 A kind of unknown threat construction method of industry and threaten generation system
CN109558736B (en) * 2018-11-22 2022-12-09 浙江国利网安科技有限公司 Industrial unknown threat construction method and threat generation system for enriching industrial control system attack samples
CN111272255A (en) * 2018-12-05 2020-06-12 陕西思科锐迪网络安全技术有限责任公司 Method for monitoring water level border crossing of Siemens S7-PLC water storage tank
CN111277547A (en) * 2018-12-05 2020-06-12 陕西思科锐迪网络安全技术有限责任公司 Method for monitoring Siemens S7-PLC setting internal clock
CN109768887A (en) * 2019-01-11 2019-05-17 四川大学 A kind of method of automatic mining industry control flow period feature
CN109873737A (en) * 2019-01-31 2019-06-11 杭州迪普科技股份有限公司 A kind of test method and device
CN109901551A (en) * 2019-03-05 2019-06-18 烽台科技(北京)有限公司 Information acquisition method, information acquisition device and the terminal device of industrial control equipment
CN110166440A (en) * 2019-04-26 2019-08-23 中国人民解放军战略支援部队信息工程大学 Print protocol vulnerability analysis method and system
CN110191021A (en) * 2019-05-29 2019-08-30 北京百度网讯科技有限公司 A kind of protocol testing method, device, electronic equipment and storage medium
CN110191021B (en) * 2019-05-29 2021-04-30 北京百度网讯科技有限公司 Protocol testing method and device, electronic equipment and storage medium
CN110505111A (en) * 2019-07-09 2019-11-26 杭州电子科技大学 The industry control agreement fuzz testing method reset based on flow
CN110505111B (en) * 2019-07-09 2020-12-01 杭州电子科技大学 Industrial control protocol fuzzy test method based on flow playback
CN110493254A (en) * 2019-09-03 2019-11-22 国家计算机网络与信息安全管理中心 Industrial Yunan County's overall evaluating method and device
CN110430223B (en) * 2019-09-12 2021-07-02 北京京航计算通讯研究所 Vehicle control system network safety detection system based on multistage feedback queue
CN110430223A (en) * 2019-09-12 2019-11-08 北京京航计算通讯研究所 Vehicle control system network security detection system based on multilevel feedback queue
CN110868408A (en) * 2019-11-07 2020-03-06 广州安加互联科技有限公司 Industrial control equipment safety detection method and system based on industrial protocol analysis
CN111026012A (en) * 2019-11-29 2020-04-17 哈尔滨安天科技集团股份有限公司 Method and device for detecting PLC firmware level bugs, electronic equipment and storage medium
CN110995733A (en) * 2019-12-12 2020-04-10 江苏亨通工控安全研究院有限公司 Intrusion detection system in industrial control field based on remote measuring technology
CN111314289B (en) * 2019-12-26 2022-04-22 青岛海天炜业过程控制技术股份有限公司 Method for identifying industrial control protocol dangerous communication data based on Ethernet
CN111314289A (en) * 2019-12-26 2020-06-19 青岛海天炜业过程控制技术股份有限公司 Method for identifying industrial control protocol dangerous communication data based on Ethernet
CN111294347A (en) * 2020-01-22 2020-06-16 奇安信科技集团股份有限公司 Safety management method and system for industrial control equipment
CN111294347B (en) * 2020-01-22 2022-06-10 奇安信科技集团股份有限公司 Safety management method and system for industrial control equipment
CN111327636A (en) * 2020-03-10 2020-06-23 西北工业大学 S7-300PLC private protocol reverse method relating to network security
CN111327636B (en) * 2020-03-10 2021-05-07 西北工业大学 S7-300PLC private protocol reverse method relating to network security
CN111427305A (en) * 2020-03-29 2020-07-17 博智安全科技股份有限公司 Method for Siemens P L C vulnerability mining
CN111427305B (en) * 2020-03-29 2021-09-24 博智安全科技股份有限公司 Method for Siemens PLC vulnerability mining
CN111709009A (en) * 2020-06-17 2020-09-25 杭州安恒信息技术股份有限公司 Detection method and device for networked industrial control system, computer equipment and medium
CN111723377A (en) * 2020-06-17 2020-09-29 中国电子信息产业集团有限公司第六研究所 Platform vulnerability assessment method and device, electronic equipment and storage medium
CN111723377B (en) * 2020-06-17 2023-02-07 中国电子信息产业集团有限公司第六研究所 Platform vulnerability assessment method and device, electronic equipment and storage medium
CN111752586A (en) * 2020-06-23 2020-10-09 上海交通大学 Method and system for detecting unrepaired bugs of cross-architecture embedded equipment firmware
CN111752586B (en) * 2020-06-23 2024-04-02 上海交通大学 Cross-architecture embedded device firmware unrepaired vulnerability detection method and system
CN113364746A (en) * 2021-05-24 2021-09-07 湖南华菱涟源钢铁有限公司 Equipment identification method, device, equipment and computer storage medium
CN113507449A (en) * 2021-06-17 2021-10-15 北京惠而特科技有限公司 Deep identification method and device for GE private protocol
CN114676438A (en) * 2022-04-15 2022-06-28 电子科技大学 Quick detection method for multi-dimensional vulnerability of hardware system
CN115065568A (en) * 2022-08-19 2022-09-16 北京珞安科技有限责任公司 Industrial control network intrusion detection method and system
CN115065568B (en) * 2022-08-19 2022-12-20 北京珞安科技有限责任公司 Industrial control network intrusion detection method and system
CN116318783A (en) * 2022-12-05 2023-06-23 浙江大学 Network industrial control equipment safety monitoring method and device based on safety index
CN116318783B (en) * 2022-12-05 2023-08-22 浙江大学 Network industrial control equipment safety monitoring method and device based on safety index

Similar Documents

Publication Publication Date Title
CN108737417A (en) A kind of vulnerability checking method towards industrial control system
CN103200230B (en) Based on the vulnerability scanning method of Mobile agent
CN108809951A (en) A kind of penetration testing frame suitable for industrial control system
KR101883400B1 (en) detecting methods and systems of security vulnerability using agentless
CN112347485B (en) Processing method for acquiring loopholes and automatically penetrating multiple engines
CN108712396A (en) Networked asset management and loophole governing system
CN113691566B (en) Mail server secret stealing detection method based on space mapping and network flow statistics
CN107154940A (en) A kind of Internet of Things vulnerability scanning system and scan method
US20060037077A1 (en) Network intrusion detection system having application inspection and anomaly detection characteristics
CN102223267B (en) IDS (intrusion detection system) detecting method and IDS detecting equipment
CN111709009A (en) Detection method and device for networked industrial control system, computer equipment and medium
CN106656657A (en) Adaptive vulnerability mining framework based on industrial control protocol
CN101695033A (en) Network fragility analyzing system based on privilege lift
CN108989296A (en) A kind of Internet of things system safety comprehensive assessment system and method
CN114050979B (en) Industrial control protocol safety test system and device
Liao et al. A comprehensive detection approach of nmap: Principles, rules and experiments
CN110474906A (en) Master based on closed loop feedback passively combines cyberspace target depth digging technology
CN106878339A (en) A kind of vulnerability scanning system and method based on internet-of-things terminal equipment
CN100493065C (en) Method for using immediate information software by data detection network address switching equipment
Matoušek et al. Efficient modelling of ICS communication for anomaly detection using probabilistic automata
Shi et al. The penetration testing framework for large-scale network based on network fingerprint
He et al. Fingerprinting mainstream IoT platforms using traffic analysis
Kumar et al. Light weighted CNN model to detect DDoS attack over distributed scenario
CN105656730A (en) Network application quick discovery method and system based on TCP data packet
Luo et al. BLEEM: packet sequence oriented fuzzing for protocol implementations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice
DD01 Delivery of document by public notice

Addressee: Zhou Weiping

Document name: the First Notification of an Office Action

DD01 Delivery of document by public notice
DD01 Delivery of document by public notice

Addressee: Zhou Weiping

Document name: Deemed notice of withdrawal

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181102