CN114779737A - Novel industrial control system information physical security system architecture - Google Patents

Novel industrial control system information physical security system architecture Download PDF

Info

Publication number
CN114779737A
CN114779737A CN202210377104.9A CN202210377104A CN114779737A CN 114779737 A CN114779737 A CN 114779737A CN 202210377104 A CN202210377104 A CN 202210377104A CN 114779737 A CN114779737 A CN 114779737A
Authority
CN
China
Prior art keywords
network
industrial control
data
control system
physical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210377104.9A
Other languages
Chinese (zh)
Inventor
周阳
方立晴
吕润
王昌杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nari Technology Co Ltd
NARI Nanjing Control System Co Ltd
Original Assignee
Nari Technology Co Ltd
NARI Nanjing Control System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nari Technology Co Ltd, NARI Nanjing Control System Co Ltd filed Critical Nari Technology Co Ltd
Priority to CN202210377104.9A priority Critical patent/CN114779737A/en
Publication of CN114779737A publication Critical patent/CN114779737A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0218Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
    • G05B23/0243Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults model based detection method, e.g. first-principles knowledge model
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/24Pc safety
    • G05B2219/24065Real time diagnostics

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a novel industrial control system information physical security system architecture, which comprises: the honeypot MimePot is used for simulating a network physical structure of the industrial control system to obtain a simulated industrial control system, the simulated industrial control system is located in a control area network, and the control area network is connected to the manufacturing area and the enterprise area; the depth detection system is used for evaluating the simulated industrial control system according to the network data and generating an accurate report of the condition of the industrial control system; the decision support system is used for processing an accurate report for generating the condition of the industrial control system based on an analytic hierarchy process to obtain a final processing suggestion; the architecture can provide information physical security service for an industrial control system, can detect information physical threats influencing data availability, integrity and confidentiality, and can distinguish information detection network threats from physical side problems.

Description

Novel industrial control system information physical security system architecture
Technical Field
The invention belongs to the technical field of industrial control system network information security, and particularly relates to a novel industrial control system information physical security system architecture.
Background
With the development of computer technology, communication technology and control technology, the traditional control field starts to develop towards networking. Modern Industrial Control Systems (ICS) are computer-based systems used to monitor and control physical devices. Today, modern industrial control systems ICS represent a variety of networked Information Technology (IT) infrastructures connected to the physical domain, which can be considered as a kind of Cyber-physical systems (CPS). Modern industrial control systems ICS have a multi-layered structure and are arranged as a set of network agents, such as sensors, actuators, control units (programmable logic controllers-PLC), remote communication devices (remote terminal units-RTU), which are now at risk due to the increasing penetration of IT into the operating technology, exposing the ICS network to motivating and highly skilled attackers.
In the past few years, many computer network security events have occurred in industrial control systems: the threat may be caused by any unexpected software error, non-targeted attack, and targeted attack. When an adversary knows of the controlling system process, it is possible that a targeted attack occurs and the attack is intended to destroy the physical system being controlled.
Therefore, security of ICS has become an active research area in recent years, and IT is noted that protecting ICS is different from conventional IT security. Software patches and frequent updates are less suitable for control systems because upgrading a system may require planning months ahead and taking the system offline, which is not economical in industrial control systems. Some research efforts have attempted to provide mechanisms to protect data integrity and confidentiality, but these can be viewed as short-term solutions.
Disclosure of Invention
The purpose of the invention is as follows: in order to solve the problem that the existing industrial control system is easy to attack and control, the invention provides a novel industrial control system information physical security system architecture.
The technical scheme is as follows: a novel industrial control system information physical security architecture comprises the following modules:
the depth detection system is used for carrying out security assessment on the industrial control system according to network data in the industrial control area network and generating a security condition report of the industrial control system;
wherein the depth detection system comprises:
the extractor is used for acquiring and analyzing network data from the industrial control area network and forwarding the network data;
the network anomaly detection system is used for comparing the acquired network data with parameters in a pre-constructed network behavior configuration file within sampling time to detect the network data behavior anomaly;
the finite state automata detector is used for judging whether the network data is a specific protocol to be analyzed and whether the network data is abnormal data;
the privacy restriction detector is used for extracting the equipment information from the acquired network data and judging whether the equipment corresponding to the equipment information is safe or not according to whether the equipment information exists in the white list database or not; generating a security alert for an unsecure device;
the fault detection system is used for carrying out physical fault identification according to the acquired network data and generating physical fault information;
and the safety information and event management system is used for performing data association on the behavior abnormity detection data obtained by the network abnormity detection system, the abnormal flow condition data obtained by the finite state automata detector, the safety alarm generated by the privacy limitation detector and the physical fault information generated by the fault detection system to generate a network safety condition report of the industrial control area.
Further, the extractor extracts and analyzes network data from all received network data packets by using different network filters, and forwards the network data to a network anomaly detection system, a finite state automata detector, a privacy limitation detector and a fault detection system.
Further, the step of constructing the network behavior profile includes:
under the condition of not experiencing attacks or abnormal conditions, the state value of the physical equipment is extracted from the network data by utilizing the network data provided by the extractor, and a network behavior configuration file is generated.
Further, in the network anomaly detection system, the network anomaly detection system is configured to compare the acquired network data with parameters in a pre-constructed network behavior configuration file within a sampling time, and perform network data behavior anomaly detection, and is represented as:
η(i)>η(i)+δ(i) (1)
where η (i) is the ith value of the abnormality detection parameter, η(i) An ith value representing a relevant parameter stored in a pre-constructed network behavior profile, δ (i) being an uncertainty value.
Further, said deterministic finite state machine is represented by a quintuple:
M=(Q,∑,δ,q0,F) (2)
wherein Q represents a finite state set, v is the alphabet of the input symbol, δ Q × Σ → Q is a transition function, Q0The epsilon Q is the initial state,
Figure BDA0003591130600000021
is a feasible state set;
the method for judging whether the network data is the specific protocol to be analyzed and whether the network data is abnormal data by utilizing the determined finite state automaton specifically comprises the following steps:
reading character strings of network data one by one, and taking the character strings as the input of a determined finite state automaton;
the input character string accepts or rejects the network data provided by the input extractor according to the state and the defined specific path; the states represent predefined conditions that are reached by the input through a defined function.
Further, the creating step of the white list database comprises:
acquiring equipment information of all physical equipment connected in a control area network when an industrial control system is in a safe state;
the white list database is created by inserting the device information of the same physical device twice;
the device information includes an IP address and a MAC address.
Further, in the fault detection system, the physical fault identification comprises the following specific implementation steps:
and according to the state vector and the output vector definition, calculating residual values by using a state estimation algorithm:
Figure BDA0003591130600000031
wherein, ykIn order to output the vector, the vector is output,
Figure BDA0003591130600000032
is the output estimate vector;
in the case of no fault, the residual value is zero;
when the residual error is larger than a set threshold value, detecting a physical fault; and if the residual error is not larger than the set threshold value, no physical fault is detected.
Further, in the system for managing security information and events, the data association includes:
converting data from the network anomaly detection system, finite state automata detector, privacy constraint detector, and fault detection system into a common format;
data summarization and data association are carried out on data with a common format;
and generating an industrial control area network safety condition report based on the predefined association rule.
Further, the system also comprises the following modules:
the honeypot MimePot is used for simulating the physical process of an industrial control system and a virtual industrial system of the control system, and induces an attacker to attack the industrial control system, so that the purpose of protecting the industrial control system is achieved.
Further, the method also comprises the following modules:
the decision support system is used for constructing decision problems in a layered mode according to the general targets and the sub-targets thereof and acquiring historical consequence data from the warning database based on the decision problems of each layer; and analyzing the historical result data to obtain decision information for assisting the decision of the user.
Has the beneficial effects that: the novel information physical security system architecture of the industrial control system can provide information physical security service for the industrial control system, is composed of a deep detection system, a honeypot and a decision support system, can detect information physical threats influencing data availability, integrity and confidentiality, and can distinguish information measurement network threats from physical side problems.
Drawings
FIG. 1 is a schematic block diagram of the present invention;
FIG. 2 is a depth detection system sub-module;
fig. 3 is a safety system with operator involvement.
Detailed Description
The technical solution of the present invention will be further explained with reference to the accompanying drawings and embodiments.
As shown in fig. 1, the novel industrial control system information physical security architecture of the present invention is composed of a depth detection system, a honeypot mimeot and a decision support system, and each of the constituent systems can be independently implemented, so as to increase the universality of the architecture for the requirements of end users. The architecture resides in a control area network that is connected to manufacturing and enterprise areas through firewalls and Demilitarized (DMZ) networks.
As shown in fig. 2, the Deep Detection System (DDS) of the present invention is a network detection System capable of distinguishing network and physical problems affecting an Industrial Control System (ICS) as a core of an architecture. The Depth Detection System (DDS) is composed of a plurality of flexible and interchangeable sub-modules and is used for realizing global security evaluation, and the specific sub-modules comprise: extractors, network anomaly detection systems (NADE), finite state automata detectors (FAD), privacy constraint detectors (CRD), feature-based intrusion detection systems (S-IDS), Fault Detection Systems (FDS), and Security Information and Event Management (SIEM) systems. A Depth Detection System (DDS) can also be implemented by connecting it to a mirror port in case of an existing network switch. Wherein, the network anomaly detection system (NADE), the finite state automata detector (FAD) and the privacy constraint detector (CRD) need to perform a learning phase before the active detection phase, which is defined as the security configuration and setting process of the modules that need the state history database as reference for detection, assuming that the initial state of security of the industrial control system can be foreseen.
The sub-modules that make up the Depth Detection System (DDS) are now described as follows.
The extractor receives all network data packets, extracts and analyzes data from the network data packets by using different network filters, and forwards the obtained network data to each sub-module. Network packet inspection is performed only once before different analysis methods of the core sub-module of the Deep Detector System (DDS).
The network anomaly detection system (NADE) is used for detecting the behavior anomaly. This sub-module is characterized by a learning phase and an active detection phase. The learning phase is performed without experiencing an attack or anomaly condition by storing multiple data of the same operation from the network data provided by the extractor to generate a normal network behavior profile to better determine the normal behavior pattern, the more accurate the learning phase, the greater the likelihood of identifying network traffic anomalies. The time required to complete the learning phase depends on the operating cycle of the system. Furthermore, the network anomaly detection system (NADE) is also able to extract physical system state values from network traffic, i.e. to implement a specific anomaly detection solution by selecting any traffic characteristics of the analyzed protocol. Once the network behavior profile is created, at each sampling time, the network anomaly detection system (NADE) analyzes the network traffic obtained at that sampling time and compares it to the network behavior profile generated during the learning phase, as follows:
η(i)>η(i)+δ(i) (1)
where η (i) is the ith value of the anomaly detection parameter obtained by analyzing the current network traffic, η(i) Represents the ith value of the relevant parameter stored in the network behavior profile, and δ (i) is an uncertainty value that is chosen precisely to reduce the false detection probability.
Wherein the finite state automata detector (FAD) analyzes a specific control network protocol and identifies abnormal traffic conditions using a deterministic finite state automata. Each specific protocol has a specific message format, can be read one by one through a character table of the priority state automaton, and generates the next state through a transition function to finally obtain the final state. Therefore, whether a certain message data is a specific protocol to be analyzed or not and whether the message data is an abnormal message or not is judged. Specifically, the finite state automata detector (FAD) distinguishes normal and abnormal packets in data transmission by detecting a string of traffic packets, and by recognizing a predefined pattern. Formally, finite state automata is defined as an idealized machine that takes input from a character set, the ultimate goal of finite state automata being to accept or reject input according to a particular path defined by states and transition functions, each state representing a predefined condition that the input can achieve according to the defined function. The deterministic finite state automata can be represented by a five-tuple:
M=(Q,∑,δ,q0,F) (2)
wherein Q represents a finite state set, Σ is the alphabet of the input symbol, δ Q × Σ → Q is the transition function, Q0E.g. Q is the initial state,
Figure BDA0003591130600000051
is a set of feasible states.
Among other things, the privacy constraint detector (CRD) represents a security system that is dedicated to discovering data confidentiality issues. The privacy restriction detector (CRD) comprises two stages: a learning phase and a detection phase. The learning phase is performed in a secure ICS state, and the privacy restrictions detector (CRD) is able to list all devices connected in the control zone in order to create a white list, populating the database with white list devices. To prevent malicious participants from finding a way to change the white list, therefore in the present privacy restriction detector (CRD), a simple but effective security check is applied by considering the insertion of the same entity twice; if a malicious participant finds a way to change the white list, he/she will not realize that the same entity needs to be inserted twice. In this way, during legacy user database analysis, if there is a single entity present, a security alert may be generated. A detection phase, a verification provided by a security restriction detector (CRD) which directly manages the users in the control area to prevent any intrusion, the security restriction detector (CRD) receiving the connected device information (for example IP address, MAC address) and verifying whether these information are present in the white list. A privacy restriction detector (CRD) may prevent a variety of potential network threats, such as Address Resolution Protocol (ARP) poisoning.
Among them, the feature-based intrusion detection system (S-IDS) is a detection tool based on predefined rules. Feature-based intrusion detection systems (S-IDS) are the basis for IT security applications, and their importance has also been recognized by Industrial Control Systems (ICS). Even if typical IT threats should not be present in the control area, the possibility of these threats occurring cannot be excluded in advance. Thus, signature-based intrusion detection techniques may also be used to control area networks. Further, the particular industrial protocol herein is typically different from the protocol in the IT network by defining special rules for the particular industrial protocol. A feature-based intrusion detection system (S-IDS) uses defined special rules for redundant security control of physical processes by analyzing network traffic associated with a particular industrial protocol.
Among other things, Fault Detection Systems (FDS) are used for physical fault identification, and in Industrial Control Systems (ICS) scenarios, physical devices as well as actuators and sensors are vulnerable to faults and attacks. Since network attacks on the control network also affect the physical behavior of the system, a Fault Detection System (FDS) may be used in conjunction with other sub-modules to distinguish between network threats and physical threats. Fault Detection Systems (FDS) can be addressed using linearized systems or nonlinear control dynamics methods, depending on the complexity and accuracy required for the particular CPS being analyzed. The ICS is assumed to be a substantially linear time invariant system:
xk+1=Axk+Buk+wk (3)
yk=Cxk+Duk+vk (4)
wherein x ∈ RnFor the state vector, u ∈ RpFor an input (or control) vector, y ∈ RqIs the output (or sensor) vector. The matrices a, B, C, D are real constant matrices defined as follows: a is equal to Rn×nRepresents the state transition matrix, B ∈ Rn×pFor the input matrix, C ∈ Rq×nIs an output matrix. Vector wkN (0, Q) and vkN (0, R) is an independent Gaussian noise with mean zero, variance Q and R, respectively. Based on the provided state and output vector definitions, the Fault Detection System (FDS) uses a state estimation algorithm for the computation of residual values. The residual is defined as follows:
Figure BDA0003591130600000061
wherein, ykIs the output vector of the system as defined previously,
Figure BDA0003591130600000062
is an estimated vector of system output values. In the absence of a fault, the residual is ideally zero. When the residual error is greater than a set threshold, a physical fault is detected. Several model-based fault detection methods may be implemented in a Fault Detection System (FDS). The method can be used to detect single and multiple physical faults of different types and is of great significance in a modular architecture.
Wherein a Security Information and Event Management (SIEM) system is used to analyze specific data and alarms from detecting each sub-module. First, a Security Information and Event Management (SIEM) system may capture event data from various sources throughout a network. By collecting, storing and analyzing logs and traffic data of the network in real time, security operators are enabled to automatically manage event logs and network traffic data of their networks at a centralized location. Second, event data from various sources is converted to a common format, the data is summarized and data from multiple sources is correlated to help an administrator distinguish true threats from false positives. Using customizable predefined association rules, an administrator can be alerted immediately and take appropriate mitigation measures to avoid it developing into more significant security issues.
The sub-modules that make up the Depth Detection System (DDS) are described in detail above.
The honeypot mimeot is now further explained. Honeypot MimePot is capable of simulating the physical processes and control programs of a plant. The most basic functions of honeypot MimePot are represented by a virtual system, which can simulate the network physical structure of a factory. Honeypot MimePot is a separation of the physical process and the control process. Thus, when an attacker enters a target network, it can be easily fooled by discovering the individual nodes that communicate between them via industrial protocols and viable physical process data. For this reason honeypot MimePot needs to be a realistic and attractive target for potential malicious participants. The simulated state space equation of the industrial control system is as follows:
Figure BDA0003591130600000063
Figure BDA0003591130600000064
wherein x isM∈RnFor the simulated state vector, uM∈RpFor an analogous control vector, yM∈RqIs the output vector of the simulation. Matrix AM,BM,CM,DMIs a matrix of real constants which is,
Figure BDA0003591130600000065
and
Figure BDA0003591130600000066
respectively gaussian noise with mean zero and variance Q and R, respectively.
The simulated plant depends on the complexity of the real plant, but the attacker must be tricked according to the attack conditions. Furthermore, the goal of honeypot mimeot is to hide the true plant physical topology and configuration when an attacker gains access to the control center network.
From a network communication perspective, honeypot MimePot can be implemented in a virtual environment. The simulated physical values are placed directly in the application layer of a particular network packet. In this way, the values of sensors and actuators are managed through a real industrial communication protocol, and an attacker is deceived in a preliminary reconnaissance stage through false but credible physical process behaviors.
The Decision Support System (DSS) will now be further explained.
A Decision Support System (DSS) is an information system that assists users in making decisions through data, models, and knowledge, assisting users in planning and solving various action scenarios, usually solving semi-structural or non-structural problems in a man-machine interaction manner. It is an advanced information management system resulting from the development of a management information system to a higher level. It provides the decision maker with the environment for analyzing the problem, building the model, simulating the decision process and scheme, calls various information resources and analysis tools, helps the decision maker make the decision or improve the decision level and quality, and emphasizes the support of decision making instead of human. Decision Support Systems (DSS) are based on analytic hierarchy methods, allowing selection among different alternatives in the presence of multiple criteria.
The Decision Support System (DSS) decomposes the decision problem into its constituent elements, builds it hierarchically according to the main objectives and their sub-objectives, and finally processes the data and opinions to achieve the objective. Firstly, a decision support system constructs a database according to alarm information, log information and the like, then the consequences which are possibly brought by the alarm are given through expert experience or historical records, and finally safety operators can see the consequences which can be brought by various alarm time through a human-computer interaction interface and make decisions according to analysis.
In fact, it is not possible to completely exclude manual decision-making operations in the critical security scenarios of ICS: the experience of human operators in applying countermeasures is always the most basic. In the proposed architecture, there are two possible complementary paths for information between modules for data from a Depth Detection System (DDS) containing alarms (fig. 3). The first is defined as passive defense, allowing the alarm to reach the operator directly. The second approach, namely to enhance passive defense, allows operators to receive alarm data from a Depth Detection System (DDS) and countermeasure recommendations provided by a Decision Support System (DSS), and network security operators to take the best countermeasures against the threat.

Claims (10)

1. A novel industrial control system information physical security system architecture is characterized in that: the system comprises the following modules:
the depth detection system is used for carrying out security assessment on the industrial control system according to network data in the industrial control area network and generating a security condition report of the industrial control system;
wherein the depth detection system comprises:
the extractor is used for acquiring and analyzing network data from the industrial control area network and forwarding the network data;
the network anomaly detection system is used for comparing the acquired network data with parameters in a pre-constructed network behavior configuration file within sampling time to detect the network data behavior anomaly;
the finite state automata detector is used for judging whether the acquired network data is a specific protocol to be analyzed and whether the acquired network data is abnormal data;
the privacy restriction detector is used for extracting the equipment information from the acquired network data and judging whether the equipment corresponding to the equipment information is safe or not according to whether the equipment information exists in the white list database or not; generating a security alert for an unsecure device;
the fault detection system is used for carrying out physical fault identification according to the acquired network data and generating physical fault information;
and the safety information and event management system is used for carrying out data association on the behavior abnormity detection data obtained by the network abnormity detection system, the abnormity data obtained by the finite state automata detector, the safety alarm generated by the confidentiality limit detector and the physical fault information generated by the fault detection system to generate a network safety condition report of the industrial control area.
2. The novel industrial control system cyber-physical security architecture of claim 1, wherein:
the extractor extracts and analyzes network data from all received network data packets by using different network filters, and forwards the network data to a network anomaly detection system, a finite state automata detector, a privacy limitation detector and a fault detection system.
3. The novel industrial control system cyber-physical security architecture of claim 1, wherein: the network behavior configuration file constructing step comprises the following steps:
under the condition of not experiencing attacks or abnormal conditions, the network data provided by the extractor is utilized to extract the physical equipment state value from the network data, and a network behavior configuration file is generated.
4. The novel industrial control system information physical security architecture according to claim 1, characterized in that: in the network anomaly detection system, the network data obtained in the sampling time is compared with parameters in a network behavior configuration file constructed in advance, and the network data behavior anomaly detection is performed, and is expressed as:
η(i)>η(i)+δ(i) (1)
where η (i) is the ith value of the abnormality detection parameter, η(i) An ith value representing a relevant parameter stored in a pre-constructed network behavior profile, δ (i) being an uncertainty value.
5. The novel industrial control system information physical security architecture according to claim 1, characterized in that: in the finite state automata detector, whether the acquired network data is a specific protocol to be analyzed and whether the acquired network data is abnormal data is judged, and the specific implementation operations are as follows:
reading character strings of network data one by one, and taking the character strings as the input of a determined finite state automaton;
the input character string accepts or rejects the network data provided by the input extractor according to the state and the defined specific path; the state represents a predefined condition to which the input is brought by a defined function;
said deterministic finite state automaton is represented by a quintuple:
M=(Q,∑,δ,q0,F) (2)
where Q represents a finite state set, Σ is the alphabet of the input symbol, δ Q × Σ → Q is the transition function, Q0The epsilon Q is the initial state,
Figure FDA0003591130590000023
is a set of feasible states.
6. The novel industrial control system cyber-physical security architecture of claim 1, wherein: the white list database creating step comprises:
acquiring equipment information of all physical equipment connected in a control area network when an industrial control system is in a safe state;
creating a white list database by inserting the same device information of the physical device twice;
the device information includes an IP address and a MAC address.
7. The novel industrial control system information physical security architecture according to claim 1, characterized in that: in a fault detection system, physical fault identification comprises the following specific implementation steps:
and according to the state vector and the output vector definition, calculating residual values by using a state estimation algorithm:
Figure FDA0003591130590000021
wherein, ykIn order to output the vector, the vector is,
Figure FDA0003591130590000022
is the output estimate vector;
in the case of no fault, the residual value is zero;
when the residual error is larger than a set threshold value, detecting a physical fault; and if the residual error is not larger than the set threshold value, no physical fault is detected.
8. The novel industrial control system information physical security architecture according to claim 1, characterized in that: in the system for managing security information and events, the data association comprises:
converting data from the network anomaly detection system, finite state automata detector, privacy constraint detector, and fault detection system into a common format;
data summarization and data association are carried out on the data with the common format;
and generating a network security condition report of the industrial control area based on the predefined association rule.
9. The novel industrial control system information physical security architecture according to claim 1, characterized in that: the system also comprises the following modules:
the honeypot MimePot is used for establishing a virtual industrial system which induces an attacker to attack the honeypot MimePot, and the virtual industrial system simulates the physical process and the control process of an industrial control system.
10. The novel industrial control system information physical security architecture according to claim 1, characterized in that: the system also comprises the following modules:
the decision support system is used for constructing decision problems in a layered mode according to the general targets and the sub-targets thereof and acquiring historical consequence data from the warning database based on the decision problems of each layer; and analyzing the historical result data to obtain decision information for assisting the decision of the user.
CN202210377104.9A 2022-04-12 2022-04-12 Novel industrial control system information physical security system architecture Pending CN114779737A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210377104.9A CN114779737A (en) 2022-04-12 2022-04-12 Novel industrial control system information physical security system architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210377104.9A CN114779737A (en) 2022-04-12 2022-04-12 Novel industrial control system information physical security system architecture

Publications (1)

Publication Number Publication Date
CN114779737A true CN114779737A (en) 2022-07-22

Family

ID=82428716

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210377104.9A Pending CN114779737A (en) 2022-04-12 2022-04-12 Novel industrial control system information physical security system architecture

Country Status (1)

Country Link
CN (1) CN114779737A (en)

Similar Documents

Publication Publication Date Title
US11522882B2 (en) Detection of adversary lateral movement in multi-domain IIOT environments
US20210288995A1 (en) Operational Network Risk Mitigation System And Method
US11949704B2 (en) Attribute-based policies for integrity monitoring and network intrusion detection
CN110602041A (en) White list-based Internet of things equipment identification method and device and network architecture
Vidal et al. Alert correlation framework for malware detection by anomaly-based packet payload analysis
CN112822151A (en) Multilayer accurate active network attack detection method and system for control network industrial computer
CN111049827A (en) Network system safety protection method, device and related equipment
Krauß et al. Ontology-based detection of cyber-attacks to SCADA-systems in critical infrastructures
Alserhani Alert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack
Bernieri et al. A novel architecture for cyber-physical security in industrial control networks
Sukhwani et al. A survey of anomaly detection techniques and hidden markov model
TWI744545B (en) Decentralized network flow analysis approach and system for malicious behavior detection
CN110958251A (en) Method and device for detecting and backtracking lost host based on real-time stream processing
CN114779737A (en) Novel industrial control system information physical security system architecture
Protic et al. WK-FNN design for detection of anomalies in the computer network traffic
de Moura et al. Towards safer industrial serial networks: An expert system framework for anomaly detection
Betancourt et al. Linking intrusion detection system information and system model to redesign security architecture
Herrero et al. Mobile hybrid intrusion detection
Suresh et al. Detection of malicious activities by AI-Supported Anomaly-Based IDS
Yu et al. Mining anomaly communication patterns for industrial control systems
Pramudya et al. Implementation of signature-based intrusion detection system using SNORT to prevent threats in network servers
Zafar et al. Botnet detection and prevention in software defined networks (sdn) using dns protocol
Fovino et al. Distributed intrusion detection system for SCADA protocols
KR102406421B1 (en) Explainable advanced persistent threat detect system and method using multiple machine learning
CN117544420B (en) Fusion system safety management method and system based on data analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination