CN104735043A - Method for preventing suspicious data package from attacking PLC via industrial Ethernet - Google Patents

Method for preventing suspicious data package from attacking PLC via industrial Ethernet Download PDF

Info

Publication number
CN104735043A
CN104735043A CN201310755533.6A CN201310755533A CN104735043A CN 104735043 A CN104735043 A CN 104735043A CN 201310755533 A CN201310755533 A CN 201310755533A CN 104735043 A CN104735043 A CN 104735043A
Authority
CN
China
Prior art keywords
plc
data package
industrial ethernet
suspicious data
depth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310755533.6A
Other languages
Chinese (zh)
Inventor
谷永国
何迪江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING LIKONG HUACON TECHNOLOGY Co Ltd
Original Assignee
BEIJING LIKONG HUACON TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING LIKONG HUACON TECHNOLOGY Co Ltd filed Critical BEIJING LIKONG HUACON TECHNOLOGY Co Ltd
Priority to CN201310755533.6A priority Critical patent/CN104735043A/en
Publication of CN104735043A publication Critical patent/CN104735043A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Abstract

Provided is a method for preventing a suspicious data package from attacking a PLC via an industrial Ethernet. The method comprises the following steps that a protecting device is arranged between a user computer and the PLC; the data package in a network of the industrial Ethernet is intercepted and analyzed by the protecting device; an analysis result is compared with a preset rule in the protecting device, and a corresponding depth defense module is searched; a specific analysis is carried out on a protocol by the depth defense module; based on the judgment of the depth defense module, passing of the data package is prevented or allowed. The method is based on a deep package inspection technology, an in-depth analysis and an inspection are carried out on application layer content of the data package which tries to access the PLC, and the suspicious data package is blocked, so that attacking behaviors targeting a PLC register are prevented. Once the suspicious data package is intercepted, beside from rejecting the suspicious data package from entering a protected area, a TCP connection can be reset, or a data package which shows an error is sent to an upper computer, and the attacking behaviors are alerted, so that attacks from hackers or viruses are effectively intercepted, and the safety of data in the PLC is protected.

Description

A kind of suspicious data bag that stops attacks the method for PLC by Industrial Ethernet
Technical field
The present invention relates to Industrial Ethernet security technology area, particularly relate to a kind of suspicious data bag that stops and attack the method for PLC by Industrial Ethernet.
Background technology
Along with the arrival of networked information era, there is earth-shaking change in China's industrial model, thoroughly broken " information island " pattern, enterprise's complete networking, creation data easily realizes Macro or mass analysis, not only increases production efficiency, also promotes the national strategy of energy-saving and emission-reduction.The information-based favourable change brought to industry, obviously, but thing followed Network Information Security Problem, make people alarmed for it again.
Commercial firewalls is a kind of more common Network Security Device, is a kind of protective equipment the most frequently used on network boundary.Generally provide these functions: packet filtering, examination & verification and alarm mechanism, NAT, agency, flow control etc., wherein, " packet filtering " is a most important function, general principle checks to filter each network packet passed through, check essential information (source address and destination address, port numbers, agreement etc.) available in bag, by these information compared with the rule of setting, if legal bag can be passed through by clearance, the bag varied from a rule can be rejected and abandon.Therefore, commercial firewalls possesses stronger attack resistance and resists the ability of invasion.
Commercial firewalls is a kind of fire compartment wall according to the design of office network safety requirements, and it can carry out packet filtering to the most of general purpose network protocol (as http, ftp etc.) transmitting use in office network, can provide effective protection to office network.But, for the network packet of the industrial communication protocol that industrial network uses (as application layer protocols such as Modbus, OPC), commercial firewalls can only do the shallow-layer packet filtering of network layer and transport layer, it cannot carry out deep layer inspection to application layer data in network packet, therefore, commercial firewalls has certain limitation, cannot meet the requirement of industrial network.
In industrial network, run the various Process Control System such as DCS, PLC, SCADA, their cores often in production system, have been responsible for basic production control.But, if these control system are once be invaded or destroy, will impact industrial production, enterprise may be made to suffer great economic loss, even jeopardize the life security of producers.Therefore; ensure that the security of operation of these control system is very important somethings; but traditional commercial firewalls cannot safeguard industries network, in the urgent need to a industrial fireproof wall being exclusively used in industrial network in automation industry, effectively inspection can be filtered for industrial communication protocol.
PLC (Programmable Logic Controller), is usually used in industrial real-time control.The user of PLC carries out host computer and PLC swap data frequently by Ethernet, gathers production status and assigns control command.If hacker or Virus entry computer, attempt to destroy the data in PLC, will lead to production accident, this is a kind of attack of malice.
Summary of the invention
For solving the problems of the technologies described above, the invention provides a kind of suspicious data bag that stops and attacking the method for PLC by Industrial Ethernet.
For achieving the above object, technical scheme disclosed by the invention is as follows:
Stop suspicious data bag to attack a method of PLC by Industrial Ethernet, comprise the following steps:
Step one arranges protective device between subscriber computer and PLC;
Step 2 protective device intercepts the packet in Industrial Ethernet network and analyzes;
Preset rules in analysis result and protective device compares by step 3, searches corresponding depth in-verse module;
Step 4 is specifically resolved agreement by depth in-verse module;
Step 5 stops according to the judgement of depth in-verse or allows packet to pass through.
Further, also step 6 is comprised: packet is dropped or allows by or carries out other operations.
Further, other operations described comprise TCP reset or/and abnormal answer.
Further, also comprise step 4 ': export depth in-verse daily record.
Further, also comprise step 5 ': export Firewall Alerts information.
The present invention is based on deep packet inspection technical, carries out analysing in depth checking and stoping suspicious packet, to stop the attack for PLC register the application layer content of attempting the packet of accessing PLC.Suspicious data bag is once be intercepted and captured; except refusal enters protection zone; also according to setting processing method; connect to reset or send host computer to TCP and represent wrong packet and attack is reported to the police, to reach the object stoping the packet of misoperation or malicious attack to enter PLC.The attack of effective interception hacker and virus, the safety of data in protection PLC.
Accompanying drawing explanation
Fig. 1 is flow chart of the present invention;
Fig. 2 is one embodiment of the invention schematic diagram.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Fig. 1 is flow chart of the present invention, and as shown in Figure 1, a kind of suspicious data bag that stops attacks the method for PLC by Industrial Ethernet, comprises the following steps:
Step one arranges protective device between subscriber computer and PLC;
Step 2 protective device intercepts the packet in Industrial Ethernet network and analyzes;
Preset rules in analysis result and protective device compares by step 3, searches corresponding depth in-verse module;
Step 4 is specifically resolved agreement by depth in-verse module;
Step 4 ' output depth in-verse daily record.
Step 5 stops according to the judgement of depth in-verse or allows packet to pass through.
Step 5 ' output Firewall Alerts information.
Step 6 packet is dropped or allows by or carries out other operations such as TCP reset or abnormal answer.
Fig. 2 is one embodiment of the invention schematic diagram; as shown in Figure 2; protective device first intercepts the packet in Industrial Ethernet network; each byte content of whole application layer contents of packet is analyzed; for Siemens's communication protocol, be below intercepting one section and the data packet messages content of SIEMENS PLC communication:
03 00 00 1f 02 f0 80 32 01 00 00 03 23 00 0e 00 00 04 01 12 0a 10 0500 0a 00 00 83 00 00 00
The value of the 18th byte is 04, represents read-write properties for reading;
The value of the 23rd byte is 05, and representing resolution data type is INT type;
The value of the 28th byte is 83, and representative data register district is M district;
……
After data packet analysis completes, the information analyzed out and setting (preset rules) are in advance compared, if mated completely, allow to pass through, Incomplete matching is then refused to pass through.For above-mentioned data packet messages, suppose that setting content be read-write properties is read, data type is INT, and data register district is M district, and above-mentioned data packet messages then meets this setting rule completely, then this packet enters protection zone by allowing; Suppose that read-write properties in setting content are for writing, data type is Real, and above-mentioned data packet messages is then not in full conformity with this setting rule, and so this packet will be denied access to protection zone.
The device (protective device) that the inventive method carries is the device that subscriber computer must first pass through when being connected with PLC; user can arrange shielded secure data district in the middle of PLC according to field condition; data type, the data address range in the protected data district that device can set according to user; data value range; read-write properties etc.; com-parison and analysis is carried out to the packet passed through, effectively can tackle the attack of hacker and virus, the safety of data in protection PLC.
The above embodiment only have expressed embodiments of the present invention, and it describes comparatively concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.

Claims (5)

1. stop suspicious data bag to attack a method of PLC by Industrial Ethernet, it is characterized in that comprising the following steps:
Step one arranges protective device between subscriber computer and PLC;
Step 2 protective device intercepts the packet in Industrial Ethernet network and analyzes;
Preset rules in analysis result and protective device compares by step 3, searches corresponding depth in-verse module;
Step 4 is specifically resolved agreement by depth in-verse module;
Step 5 stops according to the judgement of depth in-verse or allows packet to pass through.
2. the method for PLC attacked by prevention suspicious data bag according to claim 1 by Industrial Ethernet, characterized by further comprising step 6: packet is dropped or allows by or carries out other operations.
3. the method for PLC attacked by prevention suspicious data bag according to claim 2 by Industrial Ethernet, it is characterized in that: other operations described comprise TCP and reset or/and abnormal answer.
4. prevention suspicious data bag according to claim 1 attacks the method for PLC by Industrial Ethernet, characterized by further comprising step 4 ': export depth in-verse daily record.
5. prevention suspicious data bag according to claim 1 attacks the method for PLC by Industrial Ethernet, characterized by further comprising step 5 ': export Firewall Alerts information.
CN201310755533.6A 2013-12-24 2013-12-24 Method for preventing suspicious data package from attacking PLC via industrial Ethernet Pending CN104735043A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310755533.6A CN104735043A (en) 2013-12-24 2013-12-24 Method for preventing suspicious data package from attacking PLC via industrial Ethernet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310755533.6A CN104735043A (en) 2013-12-24 2013-12-24 Method for preventing suspicious data package from attacking PLC via industrial Ethernet

Publications (1)

Publication Number Publication Date
CN104735043A true CN104735043A (en) 2015-06-24

Family

ID=53458481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310755533.6A Pending CN104735043A (en) 2013-12-24 2013-12-24 Method for preventing suspicious data package from attacking PLC via industrial Ethernet

Country Status (1)

Country Link
CN (1) CN104735043A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104993976A (en) * 2015-07-07 2015-10-21 北京科技大学 Method and system for evaluating PLC safety protection equipment
CN106534068A (en) * 2016-09-29 2017-03-22 广州华多网络科技有限公司 Method and device for cleaning forged source IP in DDOS (Distributed Denial of Service) defense system
CN109933001A (en) * 2019-04-11 2019-06-25 韩拥军 Firewall, method and system for programmable logic controller (PLC)
CN112305986A (en) * 2020-10-23 2021-02-02 广州大学 PLC protection system, method and medium based on verification separation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101035111A (en) * 2007-04-13 2007-09-12 北京启明星辰信息技术有限公司 Intelligent protocol parsing method and device
CN101567888A (en) * 2008-12-29 2009-10-28 郭世泽 Safety protection method of network feedback host computer

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101035111A (en) * 2007-04-13 2007-09-12 北京启明星辰信息技术有限公司 Intelligent protocol parsing method and device
CN101567888A (en) * 2008-12-29 2009-10-28 郭世泽 Safety protection method of network feedback host computer

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104993976A (en) * 2015-07-07 2015-10-21 北京科技大学 Method and system for evaluating PLC safety protection equipment
WO2017004867A1 (en) * 2015-07-07 2017-01-12 北京科技大学 Device testing and evaluation method and system for plc security protection
CN104993976B (en) * 2015-07-07 2018-07-13 北京科技大学 A kind of PLC safety protection equipments assessment method and system
CN106534068A (en) * 2016-09-29 2017-03-22 广州华多网络科技有限公司 Method and device for cleaning forged source IP in DDOS (Distributed Denial of Service) defense system
CN106534068B (en) * 2016-09-29 2023-12-22 广州华多网络科技有限公司 Method and device for cleaning counterfeit source IP in DDOS defense system
CN109933001A (en) * 2019-04-11 2019-06-25 韩拥军 Firewall, method and system for programmable logic controller (PLC)
CN112305986A (en) * 2020-10-23 2021-02-02 广州大学 PLC protection system, method and medium based on verification separation
CN112305986B (en) * 2020-10-23 2021-08-17 广州大学 PLC protection system, method and medium based on verification separation

Similar Documents

Publication Publication Date Title
CN109922085B (en) Safety protection system and method based on CIP (common interface protocol) in PLC (programmable logic controller)
EP2382512B1 (en) Communication module with network isolation and communication filter
CN110958262A (en) Ubiquitous Internet of things safety protection gateway system, method and deployment architecture in power industry
CN107493265A (en) A kind of network security monitoring method towards industrial control system
CN108183886B (en) Safety enhancement equipment for safety gateway of rail transit signal system
CN104917776A (en) Industrial control network safety protection equipment and industrial control network safety protection method
JP2016220213A (en) Configurable Robustness Agent in Plant Security System
CN104683332A (en) Security isolation gateway in industrial control network and security isolation method thereof
CN105847251B (en) Using the industrial control system safety protecting method and system of S7 agreements
CN104753936A (en) Opc security gateway system
KR101206095B1 (en) Intelligent Electric Device, network system including the device and the protecting method for the network
CN110572412A (en) Firewall based on intrusion detection system feedback in cloud environment and implementation method thereof
CN204392296U (en) Secure isolation gateway in a kind of industrial control network
CN110768965B (en) Remote operation safety permission method for power grid dispatching based on message replacement
CN104735043A (en) Method for preventing suspicious data package from attacking PLC via industrial Ethernet
CN105245555A (en) Communication protocol security defending system for electric power serial server
GB2495214A (en) Firewalls for process control systems
CN209627407U (en) The safety isolation network gate of limited connection
CN113079185B (en) Industrial firewall control method and equipment for realizing deep data packet detection control
CN104539600A (en) Industrial control firewall implementing method for supporting filtering IEC 104 protocol
CN105577705B (en) For the safety protecting method and system of IEC60870-5-104 agreements
Kang et al. Whitelists based multiple filtering techniques in SCADA sensor networks
Feng et al. Snort improvement on profinet RT for industrial control system intrusion detection
CN112417434A (en) Program white list protection method combined with UEBA mechanism
CN110990900B (en) Computer network intelligent monitoring system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150624