CN104899513A - 一种工业控制系统恶意数据攻击的数据图检测方法 - Google Patents
一种工业控制系统恶意数据攻击的数据图检测方法 Download PDFInfo
- Publication number
- CN104899513A CN104899513A CN201510289048.3A CN201510289048A CN104899513A CN 104899513 A CN104899513 A CN 104899513A CN 201510289048 A CN201510289048 A CN 201510289048A CN 104899513 A CN104899513 A CN 104899513A
- Authority
- CN
- China
- Prior art keywords
- data
- variable
- relation
- state
- industrial control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 33
- 238000010586 diagram Methods 0.000 title claims abstract description 12
- 238000000034 method Methods 0.000 claims abstract description 19
- 230000008901 benefit Effects 0.000 claims abstract description 4
- 239000013598 vector Substances 0.000 claims description 19
- 238000002347 injection Methods 0.000 claims description 12
- 239000007924 injection Substances 0.000 claims description 12
- 230000008569 process Effects 0.000 claims description 9
- 230000008859 change Effects 0.000 claims description 7
- 238000007689 inspection Methods 0.000 claims description 4
- 238000004458 analytical method Methods 0.000 claims description 3
- 238000012360 testing method Methods 0.000 claims description 3
- 230000008878 coupling Effects 0.000 claims 2
- 238000010168 coupling process Methods 0.000 claims 2
- 238000005859 coupling reaction Methods 0.000 claims 2
- 238000012512 characterization method Methods 0.000 claims 1
- 230000001419 dependent effect Effects 0.000 claims 1
- 238000005206 flow analysis Methods 0.000 claims 1
- 230000007704 transition Effects 0.000 abstract description 7
- 238000005516 engineering process Methods 0.000 abstract description 4
- 238000012549 training Methods 0.000 abstract description 4
- 238000001914 filtration Methods 0.000 abstract 1
- 241000700605 Viruses Species 0.000 description 4
- 230000002596 correlated effect Effects 0.000 description 3
- 230000005611 electricity Effects 0.000 description 3
- 230000003542 behavioural effect Effects 0.000 description 2
- 230000007423 decrease Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000012847 principal component analysis method Methods 0.000 description 1
- 230000035939 shock Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 230000001550 time effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510289048.3A CN104899513B (zh) | 2015-06-01 | 2015-06-01 | 一种工业控制系统恶意数据攻击的数据图检测方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510289048.3A CN104899513B (zh) | 2015-06-01 | 2015-06-01 | 一种工业控制系统恶意数据攻击的数据图检测方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104899513A true CN104899513A (zh) | 2015-09-09 |
CN104899513B CN104899513B (zh) | 2018-06-19 |
Family
ID=54032173
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510289048.3A Active CN104899513B (zh) | 2015-06-01 | 2015-06-01 | 一种工业控制系统恶意数据攻击的数据图检测方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104899513B (zh) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017160913A1 (en) * | 2016-03-15 | 2017-09-21 | Sri International | Intrusion detection via semantic fuzzing and message provenance |
CN107968776A (zh) * | 2017-10-30 | 2018-04-27 | 北京计算机技术及应用研究所 | 一种基于双向控制函数的动态攻击面变换方法 |
CN109074453A (zh) * | 2016-04-26 | 2018-12-21 | 三菱电机株式会社 | 入侵检测装置、入侵检测方法以及入侵检测程序 |
EP3460701A4 (en) * | 2016-06-23 | 2019-05-22 | Mitsubishi Electric Corporation | IMPACT DETECTOR AND IMPACT DETECTION PROGRAM |
CN110768946A (zh) * | 2019-08-13 | 2020-02-07 | 中国电力科学研究院有限公司 | 一种基于布隆过滤器的工控网络入侵检测系统及方法 |
CN110809009A (zh) * | 2019-12-12 | 2020-02-18 | 江苏亨通工控安全研究院有限公司 | 一种应用于工控网络的两级入侵检测系统 |
CN111404915A (zh) * | 2020-03-11 | 2020-07-10 | 湖南大学 | 一种基于三层模型的电网信息物理安全风险检测方法 |
CN113778054A (zh) * | 2021-09-09 | 2021-12-10 | 大连理工大学 | 一种针对工业控制系统攻击的双级检测方法 |
CN114785589A (zh) * | 2022-04-20 | 2022-07-22 | 浙江大学 | 基于控制不变量建模的入侵检测与定位方法及系统 |
WO2023043369A3 (en) * | 2021-09-14 | 2023-05-25 | Singapore University Of Technology And Design | Systems for establishing intrusion detection logic for programmable logic controllers |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101375840B1 (ko) * | 2013-01-02 | 2014-03-17 | 주식회사 안랩 | 악성코드 침입 방지시스템 및 악성코드 침입 방지시스템의 동작 방법 |
CN104125112A (zh) * | 2014-07-29 | 2014-10-29 | 西安交通大学 | 基于物理-信息模糊推理的智能电网攻击检测方法 |
CN104331072A (zh) * | 2014-10-28 | 2015-02-04 | 冶金自动化研究设计院 | 一种面向典型冶金工艺控制系统的信息安全风险评估方法 |
-
2015
- 2015-06-01 CN CN201510289048.3A patent/CN104899513B/zh active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101375840B1 (ko) * | 2013-01-02 | 2014-03-17 | 주식회사 안랩 | 악성코드 침입 방지시스템 및 악성코드 침입 방지시스템의 동작 방법 |
CN104125112A (zh) * | 2014-07-29 | 2014-10-29 | 西安交通大学 | 基于物理-信息模糊推理的智能电网攻击检测方法 |
CN104331072A (zh) * | 2014-10-28 | 2015-02-04 | 冶金自动化研究设计院 | 一种面向典型冶金工艺控制系统的信息安全风险评估方法 |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017160913A1 (en) * | 2016-03-15 | 2017-09-21 | Sri International | Intrusion detection via semantic fuzzing and message provenance |
US11689544B2 (en) | 2016-03-15 | 2023-06-27 | Sri International | Intrusion detection via semantic fuzzing and message provenance |
US11089033B2 (en) | 2016-04-26 | 2021-08-10 | Mitsubishi Electric Corporation | Intrusion detection device, intrusion detection method, and computer readable medium |
EP3432184A4 (en) * | 2016-04-26 | 2019-03-20 | Mitsubishi Electric Corporation | INTRUSION DETECTION DEVICE, INTRUSION DETECTION METHOD, AND INTRUSION DETECTION PROGRAM |
CN109074453A (zh) * | 2016-04-26 | 2018-12-21 | 三菱电机株式会社 | 入侵检测装置、入侵检测方法以及入侵检测程序 |
EP3460701A4 (en) * | 2016-06-23 | 2019-05-22 | Mitsubishi Electric Corporation | IMPACT DETECTOR AND IMPACT DETECTION PROGRAM |
CN107968776B (zh) * | 2017-10-30 | 2020-10-13 | 北京计算机技术及应用研究所 | 一种基于双向控制函数的动态攻击面变换方法 |
CN107968776A (zh) * | 2017-10-30 | 2018-04-27 | 北京计算机技术及应用研究所 | 一种基于双向控制函数的动态攻击面变换方法 |
CN110768946A (zh) * | 2019-08-13 | 2020-02-07 | 中国电力科学研究院有限公司 | 一种基于布隆过滤器的工控网络入侵检测系统及方法 |
CN110809009A (zh) * | 2019-12-12 | 2020-02-18 | 江苏亨通工控安全研究院有限公司 | 一种应用于工控网络的两级入侵检测系统 |
CN111404915A (zh) * | 2020-03-11 | 2020-07-10 | 湖南大学 | 一种基于三层模型的电网信息物理安全风险检测方法 |
CN113778054A (zh) * | 2021-09-09 | 2021-12-10 | 大连理工大学 | 一种针对工业控制系统攻击的双级检测方法 |
WO2023043369A3 (en) * | 2021-09-14 | 2023-05-25 | Singapore University Of Technology And Design | Systems for establishing intrusion detection logic for programmable logic controllers |
CN114785589A (zh) * | 2022-04-20 | 2022-07-22 | 浙江大学 | 基于控制不变量建模的入侵检测与定位方法及系统 |
CN114785589B (zh) * | 2022-04-20 | 2023-11-14 | 浙江大学 | 基于控制不变量建模的入侵检测与定位方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN104899513B (zh) | 2018-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104899513A (zh) | 一种工业控制系统恶意数据攻击的数据图检测方法 | |
CN111614627B (zh) | 一种面向sdn的跨平面协作ddos检测与防御方法与系统 | |
WO2016082284A1 (zh) | 基于OCSVM双轮廓模型的Modbus TCP通信行为异常检测方法 | |
CN113094707B (zh) | 一种基于异质图网络的横向移动攻击检测方法及系统 | |
Sayegh et al. | SCADA intrusion detection system based on temporal behavior of frequent patterns | |
CN111049680B (zh) | 一种基于图表示学习的内网横向移动检测系统及方法 | |
CN103957203B (zh) | 一种网络安全防御系统 | |
KR20210115991A (ko) | 시계열 데이터 분석을 이용한 네트워크 이상징후 탐지 방법 및 장치 | |
CN112788008A (zh) | 一种基于大数据的网络安全动态防御系统及方法 | |
CN112560029A (zh) | 基于智能分析技术的网站内容监测和自动化响应防护方法 | |
Lim et al. | Network anomaly detection system: The state of art of network behaviour analysis | |
Suo et al. | Research on the application of honeypot technology in intrusion detection system | |
CN116962052A (zh) | 网络安全监测方法、装置、设备、介质和计算机程序产品 | |
CN112804204B (zh) | 一种基于大数据分析的智能网络安全系统 | |
TianYu et al. | Research on security threat assessment for power iot terminal based on knowledge graph | |
CN113709097B (zh) | 网络风险感知方法及防御方法 | |
Qi et al. | An APT attack analysis framework based on self-define rules and mapreduce | |
Rele et al. | Supervised and Unsupervised ML Methodologies for Intrusive Detection in Nuclear Systems | |
Li | Research and Design of Network Intrusion Detection System | |
Almehmadi | SCADA networks anomaly-based intrusion detection system | |
Atkison et al. | Feature Extraction Optimization for Network Intrusion Detection in Control System Networks. | |
Presekal et al. | Cyber Forensic Analysis for Operational Technology Using Graph-Based Deep Learning | |
Qassim et al. | An anomaly detection technique for deception attacks in industrial control systems | |
CN118432943B (zh) | 一种电力物联网信息安全风险评估方法及系统 | |
Yang et al. | A Multi-step Attack Detection Framework for the Power System Network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20150909 Assignee: SHANGHAI YUNJIAN INFORMATION TECHNOLOGY Co.,Ltd. Assignor: SHANGHAI CLOUD INFORMATION TECHNOLOGY Co.,Ltd. Contract record no.: 2018310000045 Denomination of invention: Data diagram detection method for industrial control system malicious data attack Granted publication date: 20180619 License type: Exclusive License Record date: 20180927 |
|
TR01 | Transfer of patent right |
Effective date of registration: 20210114 Address after: Room 1001-11, 323 Guoding Road, Yangpu District, Shanghai 200433 Patentee after: SHANGHAI YUNJIAN INFORMATION TECHNOLOGY Co.,Ltd. Address before: 200433 Room 202, building 1, Lane 866, Yingkou Road, Yangpu District, Shanghai Patentee before: SHANGHAI CLOUD INFORMATION TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
EC01 | Cancellation of recordation of patent licensing contract |
Assignee: SHANGHAI YUNJIAN INFORMATION TECHNOLOGY Co.,Ltd. Assignor: SHANGHAI CLOUD INFORMATION TECHNOLOGY Co.,Ltd. Contract record no.: 2018310000045 Date of cancellation: 20220119 |
|
EC01 | Cancellation of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20150909 Assignee: SHANGHAI CLOUD INFORMATION TECHNOLOGY Co.,Ltd. Assignor: SHANGHAI YUNJIAN INFORMATION TECHNOLOGY Co.,Ltd. Contract record no.: X2022310000003 Denomination of invention: A data graph detection method for malicious data attack in industrial control system Granted publication date: 20180619 License type: Common License Record date: 20220120 |
|
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20150909 Assignee: Huaxin Ruizhi (Shanghai) Big Data Technology Co.,Ltd. Assignor: SHANGHAI YUNJIAN INFORMATION TECHNOLOGY Co.,Ltd. Contract record no.: X2024980015456 Denomination of invention: A data graph detection method for malicious data attacks on industrial control systems Granted publication date: 20180619 License type: Common License Record date: 20240919 |