CN103581160A - Heuristic detection method and device for malicious codes in industrial control system - Google Patents

Heuristic detection method and device for malicious codes in industrial control system Download PDF

Info

Publication number
CN103581160A
CN103581160A CN201210330563.8A CN201210330563A CN103581160A CN 103581160 A CN103581160 A CN 103581160A CN 201210330563 A CN201210330563 A CN 201210330563A CN 103581160 A CN103581160 A CN 103581160A
Authority
CN
China
Prior art keywords
test point
module
control system
industrial control
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210330563.8A
Other languages
Chinese (zh)
Inventor
赵世平
肖新光
桑胜田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Antiy Technology Co Ltd
Original Assignee
Harbin Antiy Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Antiy Technology Co Ltd filed Critical Harbin Antiy Technology Co Ltd
Priority to CN201210330563.8A priority Critical patent/CN103581160A/en
Publication of CN103581160A publication Critical patent/CN103581160A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a heuristic detection method and device for malicious codes in an industrial control system. Firstly, a detection point is arranged in the industrial control system; a real-time clock is mounted on the detection point to carry out synchronous time service; time markers are marked on detected data packets or effective data by using the real-time clock; corresponding heuristic marks are arranged aiming at the detection events in the industrial control system and are configured with weights; then input data are acquired through the detection point to carry out analysis, the fact that whether the detection events corresponding to the heuristic marks occur or not is judged, the corresponding heuristic marks are lighted if the detection events corresponding to the heuristic marks occur, and otherwise, the fact that malicious code attack does not occur is judged; weighting operation is carried out on the weight corresponding to the lighted heuristic marks by using a weighting algorithm; finally, the fact that whether malicious code attack occurs is judged according to the result of the weighting operation, and the result is output. The problem that the malicious code attack in the industrial control system cannot be detected by using a network detection method is solved.

Description

Heuristic detection method and device for industrial control system malicious code
Technical field
The present invention relates to computer security technique field and industrial control system field, relate in particular to heuristic detection method and device for industrial control system malicious code.
Background technology
Because industrial control system has inside and outside network physical isolation, so attack for the malicious code of industrial control system, not propagation Network Based conventionally.Now traditional malicious code detecting method, by network packet is detected, and will no longer be applicable to industrial control field by detection methods such as condition code couplings.
Summary of the invention
For above-mentioned technical problem, the invention provides heuristic detection method and device for industrial control system malicious code, thereby solved traditional detection method, cannot detect the problem of attacking for the malicious code of industrial control system.
The present invention adopts with the following method and realizes: the heuristic detection method for industrial control system malicious code, comprising:
Test point is set in industrial control system;
At described test point, real-time clock is installed, is carried out synchronous time service;
Utilize real-time clock to stamp time mark to the packet detecting or valid data;
For the detection event in industrial control system, corresponding enlightening sign is set, and configures weights;
By described test point, obtain input data, and analyze, determine whether the detection event corresponding with enlightening sign occurs, if so, light corresponding enlightening sign; Otherwise, judge it is not that malicious code is attacked;
Utilize weighting algorithm to indicate that to the enlightenment of lighting corresponding weights compute weighted;
According to ranking operation result, take a decision as to whether malicious code and attack, and Output rusults.
Further, described test point comprises: detect the test point of Industrial Ethernet packet, the test point of the test point of Test Field bus data bag or detection communication simulation signal.
Further, described real-time clock carries out the precise synchronization time service that precision is 1ms level.
Further, described detection event comprises: unmatched request-response data packet, and it is abnormal that request data package sends the cycle, and request-response data packet is abnormal time of delay, there is ANOMALOUS VARIATIONS in measured value or controller output, or measured value or the abnormal vibration of controller output generation.
Heuristic checkout gear for industrial control system malicious code, comprising:
Test point arranges module, and test point is set in industrial control system;
Real-time clock module, arranges at test point the test point place installation real-time clock that module arranges, and carries out synchronous time service, utilizes real-time clock to stamp time mark to the packet detecting or valid data;
Enlightening Sign module, arranges corresponding enlightening sign for the detection event in industrial control system, and configures weights;
Input data acquisition module, the test point that module setting is set by test point obtains input data;
Determination module, the input data analysis that input data acquisition module is obtained, determines whether and occurs to indicate corresponding detection event with the enlightenment described in enlightening Sign module, if so, lights corresponding enlightening sign; Otherwise, judge it is not that malicious code is attacked;
Computing module, utilizes the enlightenment that weighting algorithm is lighted determination module to indicate that corresponding weights compute weighted;
The second determination module, takes a decision as to whether malicious code according to the result of computing module and attacks, and Output rusults.
Further, test point arranges the test point described in module and comprises: detect the test point of Industrial Ethernet packet, the test point of the test point of Test Field bus data bag or detection communication simulation signal.
Further, the real-time clock described in real-time clock module carries out the precise synchronization time service that precision is 1ms level.
Further, detection event described in enlightening Sign module comprises: unmatched request-response data packet, it is abnormal that request data package sends the cycle, request-response data packet is abnormal time of delay, there is ANOMALOUS VARIATIONS in measured value or controller output, or measured value or the abnormal vibration of controller output generation.
In sum, the invention provides heuristic detection method and device for industrial control system malicious code, first test point is set in industrial control system, at each test point place, real-time clock is set, for the packet detecting or valid data, stamp time mark, simultaneously, for the detection event in industrial control system, corresponding enlightening sign is set, and configure weights, the input data that analysis is obtained by test point, determine whether the detection event corresponding with enlightening sign that occur, if, light corresponding enlightening sign, and utilize weighting algorithm to indicate that to the enlightenment of lighting corresponding weights compute weighted, by operation result, taking a decision as to whether malicious code attacks, otherwise, judge it is not that malicious code is attacked.This method is not the detection that packet Network Based carries out, but the analyzing and testing event such as characteristic based on industrial control system, general character, control mathematical model and carry out didactic detection.For industrial control system, this detection method is better than the detection method of traditional emphasis malicious code itself.
Accompanying drawing explanation
In order to be illustrated more clearly in technical scheme of the present invention, to the accompanying drawing of required use in embodiment be briefly described below, apparently, the accompanying drawing the following describes is only some embodiment that record in the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the heuristic detection method flow chart for industrial control system malicious code provided by the invention;
Fig. 2 is the heuristic structure of the detecting device figure for industrial control system malicious code provided by the invention.
Embodiment
The present invention has provided heuristic detection method and the device for industrial control system malicious code, in order to make those skilled in the art person understand better the technical scheme in the embodiment of the present invention, and above-mentioned purpose of the present invention, feature and advantage can be become apparent more, below in conjunction with accompanying drawing, technical scheme in the present invention is described in further detail:
First the present invention provides the heuristic detection method for industrial control system malicious code, as shown in Figure 1, comprising:
S101 arranges test point in industrial control system;
S102 installs real-time clock at described test point, carries out synchronous time service;
S103 utilizes real-time clock to stamp time mark to the packet detecting or valid data;
S104 arranges corresponding enlightening sign for the detection event in industrial control system, and configures weights;
S105 obtains input data by described test point, and analyzes input data;
S106 determines whether the detection event corresponding with enlightening sign occurs, if so, carries out S107; Otherwise, judge it is not that malicious code is attacked;
S107 lights corresponding enlightening sign;
S108 utilizes weighting algorithm to indicate that to the enlightenment of lighting corresponding weights compute weighted;
S109 takes a decision as to whether malicious code according to ranking operation result and attacks, and Output rusults.
Further, described test point comprises: detect the test point of Industrial Ethernet packet, the test point of the test point of Test Field bus data bag or detection communication simulation signal.
Further, described real-time clock carries out the precise synchronization time service that precision is 1ms level.
Further, described detection event comprises: unmatched request-response data packet, and it is abnormal that request data package sends the cycle, and request-response data packet is abnormal time of delay, there is ANOMALOUS VARIATIONS in measured value or controller output, or measured value or the abnormal vibration of controller output generation.
The present invention also provides the heuristic checkout gear for industrial control system malicious code, as shown in Figure 2, comprising:
Test point arranges module 201, and test point is set in industrial control system;
Real-time clock module 202, arranges at test point the test point place installation real-time clock that module 201 arranges, and carries out synchronous time service, utilizes real-time clock to stamp time mark to the packet detecting or valid data;
Enlightening Sign module 203, arranges corresponding enlightening sign for the detection event in industrial control system, and configures weights;
Input data acquisition module 204, the test point that module 201 settings are set by test point obtains input data;
Determination module 205, the input data analysis that input data acquisition module 204 is obtained, checks that the enlightenment whether occurring with described in enlightening Sign module 203 indicates corresponding detection event, if so, lights corresponding enlightening sign; Otherwise, judge it is not that malicious code is attacked;
Computing module 206, utilizes the enlightenment that weighting algorithm is lighted determination module to indicate that corresponding weights compute weighted;
The second determination module 207, takes a decision as to whether malicious code according to the result of computing module 206 and attacks, and Output rusults.
Further, test point arranges the test point described in module and comprises: detect the test point of Industrial Ethernet packet, the test point of the test point of Test Field bus data bag or detection communication simulation signal.
Further, the real-time clock described in real-time clock module carries out the precise synchronization time service that precision is 1ms level.
Further, detection event described in enlightening Sign module comprises: unmatched request-response data packet, it is abnormal that request data package sends the cycle, request-response data packet is abnormal time of delay, there is ANOMALOUS VARIATIONS in measured value or controller output, or measured value or the abnormal vibration of controller output generation.
As mentioned above, the present invention has provided heuristic detection method and the device for industrial control system malicious code, the difference of itself and traditional detection method is, not the detection that utilizes network packet to carry out, but the didactic detection method of utilizing the characteristic of industrial control system itself to carry out.First test point is set in industrial control system, at each test point place, high-precision real-time clock is installed, thereby is stamped time mark for the packet detecting; After the input data analysis by described test point place is obtained, determine whether and occur and the corresponding detection event of enlightening sign, if, light corresponding heuristic sign, and utilize weighting algorithm to indicate that to the enlightenment of lighting corresponding weights compute weighted, according to result, take a decision as to whether malicious code and attack; Otherwise, judge it is not that malicious code is attacked.The present invention utilizes the characteristic of industrial control system itself, has solved the problem that traditional malicious code detecting method is not suitable for the detection of industrial control system, has reached good detection effect.
Above embodiment is unrestricted technical scheme of the present invention in order to explanation.Any modification or partial replacement that does not depart from spirit and scope of the invention, all should be encompassed in the middle of claim scope of the present invention.

Claims (8)

1. for the heuristic detection method of industrial control system malicious code, it is characterized in that:
Test point is set in industrial control system;
At described test point, real-time clock is installed, is carried out synchronous time service;
Utilize real-time clock to stamp time mark to the packet detecting or valid data;
For the detection event in industrial control system, corresponding enlightening sign is set, and configures weights;
By described test point, obtain input data, and analyze, determine whether the detection event corresponding with enlightening sign occurs, if so, light corresponding enlightening sign; Otherwise, judge it is not that malicious code is attacked;
Utilize weighting algorithm to indicate that to the enlightenment of lighting corresponding weights compute weighted;
According to ranking operation result, take a decision as to whether malicious code and attack, and Output rusults.
2. the method for claim 1, is characterized in that, described test point comprises: detect the test point of Industrial Ethernet packet, the test point of the test point of Test Field bus data bag or detection communication simulation signal.
3. the method for claim 1, is characterized in that, described real-time clock carries out the precise synchronization time service that precision is 1ms level.
4. the method for claim 1, it is characterized in that, described detection event comprises: unmatched request-response data packet, it is abnormal that request data package sends the cycle, request-response data packet is abnormal time of delay, there is ANOMALOUS VARIATIONS in measured value or controller output, or measured value or the abnormal vibration of controller output generation.
5. for the heuristic checkout gear of industrial control system malicious code, it is characterized in that, comprising:
Test point arranges module, and test point is set in industrial control system;
Real-time clock module, arranges at test point the test point place installation real-time clock that module arranges, and carries out synchronous time service, utilizes real-time clock to stamp time mark to the packet detecting or valid data;
Enlightening Sign module, arranges corresponding enlightening sign for the detection event in industrial control system, and configures weights;
Input data acquisition module, the test point that module setting is set by test point obtains input data;
Determination module, the input data analysis that input data acquisition module is obtained, determines whether and occurs to indicate corresponding detection event with the enlightenment described in enlightening Sign module, if so, lights corresponding enlightening sign; Otherwise, judge it is not that malicious code is attacked;
Computing module, utilizes the enlightenment that weighting algorithm is lighted determination module to indicate that corresponding weights compute weighted;
The second determination module, takes a decision as to whether malicious code according to the result of computing module and attacks, and Output rusults.
6. device as claimed in claim 5, is characterized in that, test point arranges the test point described in module and comprises: detect the test point of Industrial Ethernet packet, the test point of the test point of Test Field bus data bag or detection communication simulation signal.
7. device as claimed in claim 5, is characterized in that, the real-time clock described in real-time clock module carries out the precise synchronization time service that precision is 1ms level.
8. device as claimed in claim 5, it is characterized in that, detection event described in enlightening Sign module comprises: unmatched request-response data packet, it is abnormal that request data package sends the cycle, request-response data packet is abnormal time of delay, there is ANOMALOUS VARIATIONS in measured value or controller output, or measured value or the abnormal vibration of controller output generation.
CN201210330563.8A 2012-09-10 2012-09-10 Heuristic detection method and device for malicious codes in industrial control system Pending CN103581160A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210330563.8A CN103581160A (en) 2012-09-10 2012-09-10 Heuristic detection method and device for malicious codes in industrial control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210330563.8A CN103581160A (en) 2012-09-10 2012-09-10 Heuristic detection method and device for malicious codes in industrial control system

Publications (1)

Publication Number Publication Date
CN103581160A true CN103581160A (en) 2014-02-12

Family

ID=50052095

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210330563.8A Pending CN103581160A (en) 2012-09-10 2012-09-10 Heuristic detection method and device for malicious codes in industrial control system

Country Status (1)

Country Link
CN (1) CN103581160A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599997A (en) * 2016-12-20 2017-04-26 中兴软创科技股份有限公司 Zero dynamic-based industrial control attack detection and identification method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020066024A1 (en) * 2000-07-14 2002-05-30 Markus Schmall Detection of a class of viral code
CN101455029A (en) * 2006-03-20 2009-06-10 王建 Intrinsically safe data remote monitoring system and monitoring method thereof
CN102243699A (en) * 2011-06-09 2011-11-16 深圳市安之天信息技术有限公司 Malicious code detection method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020066024A1 (en) * 2000-07-14 2002-05-30 Markus Schmall Detection of a class of viral code
CN101455029A (en) * 2006-03-20 2009-06-10 王建 Intrinsically safe data remote monitoring system and monitoring method thereof
CN102243699A (en) * 2011-06-09 2011-11-16 深圳市安之天信息技术有限公司 Malicious code detection method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
雷迟骏: "基于启发式算法的恶意代码检测系统研究与实现", 《中国优秀硕士学位论文全文数据库》, no. 06, 15 June 2012 (2012-06-15), pages 28 - 31 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599997A (en) * 2016-12-20 2017-04-26 中兴软创科技股份有限公司 Zero dynamic-based industrial control attack detection and identification method and system
CN106599997B (en) * 2016-12-20 2021-07-02 浩鲸云计算科技股份有限公司 Zero-dynamic-based industrial control attack detection and identification method and system

Similar Documents

Publication Publication Date Title
US9177139B2 (en) Control system cyber security
CN102607630B (en) Fault detection method, device and system of encoder
RU2011151543A (en) METHOD AND DEVICE FOR DETECTING LEAKS IN THE FUEL SUPPLY SYSTEM
DK1297313T3 (en) Monitoring the health of a power plant
CN106643765A (en) Method for calculating collection abnormality maintenance time
KR101862566B1 (en) Simulation evaluation system of traffic signal controller
ATE521159T1 (en) CHARGE TEST METHOD AND CHARGE DEVICE
CN103616887A (en) Monitoring system and terminal of light-emitting identification
CN104750633B (en) FPGA device access verifying device and method
CN105069701A (en) Monte Carlo method based risk evaluation method for power transmission system
Chromik et al. Context-aware local Intrusion Detection in SCADA systems: a testbed and two showcases
WO2011006117A3 (en) Apparatus and method for enhancing forwarding, classification, and monitoring of network traffic
CN107192981A (en) Visible ray alignment system and method based on illumination shade and machine learning
CN104702598A (en) Distributed network protocol security detection method for smart power grid
FI20105541A0 (en) Control module, system and method
CN103581160A (en) Heuristic detection method and device for malicious codes in industrial control system
CN102062817B (en) Frequency offset detection method and device for crystal oscillator of electronic product
CN204944483U (en) High precision power transmission line shaft tower inclination monitoring system
CN103399813B (en) A kind of embedded system off-line trace analysis method based on Trace information
CN103678014A (en) Method for effectively detecting and analyzing SGPIO signals
CN105978642A (en) Wireless monitoring station analysis addressing method and system based on interference big data
CN104880595A (en) Current-sharing power transmission detection method and device for in-phase parallel power transmission system
CN103823134B (en) Electronic device detection system and method
CN103645284B (en) A kind of quick smell fingerprint detection method based on improving RANSAC theory
CN103033800A (en) Precise distance measuring monitoring unit circuit and implement method of function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140212

RJ01 Rejection of invention patent application after publication