CN107835189A - A kind of bug excavation method and system - Google Patents

A kind of bug excavation method and system Download PDF

Info

Publication number
CN107835189A
CN107835189A CN201711213283.8A CN201711213283A CN107835189A CN 107835189 A CN107835189 A CN 107835189A CN 201711213283 A CN201711213283 A CN 201711213283A CN 107835189 A CN107835189 A CN 107835189A
Authority
CN
China
Prior art keywords
image
status image
bug excavation
abnormality
control system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711213283.8A
Other languages
Chinese (zh)
Inventor
肖小剑
蒋发群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Venus Information Security Technology Co Ltd
Venus Info Tech Inc
Venustech Group Inc
Original Assignee
Beijing Venus Information Security Technology Co Ltd
Venustech Group Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Venus Information Security Technology Co Ltd, Venustech Group Inc filed Critical Beijing Venus Information Security Technology Co Ltd
Priority to CN201711213283.8A priority Critical patent/CN107835189A/en
Publication of CN107835189A publication Critical patent/CN107835189A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Debugging And Monitoring (AREA)

Abstract

This application discloses a kind of bug excavation method and system, method includes:After test case is sent to system under test (SUT), the status image of acquisition monitoring object, the status image is compared with pre-stored image, and determines that industrial control system whether there is abnormality according to comparison result, in the case where abnormality be present, analysis determines abnormal cause.The bug excavation method and system are by gathering the image of special object in industrial control system, and the image of special object is compared with the object images under the normal condition to prestore, judge that industrial control system whether there is abnormality and abnormal cause.The implementation process of this method is not influenceed by procotol complexity and business are multifarious, compared to the technology that prior art analyzes the abnormal leak of communication return bag determination, polytype network and system vulnerability can be effectively found, improves the bug excavation quality of industrial control system.

Description

A kind of bug excavation method and system
Technical field
The present invention relates to technical field of network security, is to be related to a kind of bug excavation method and system in particular.
Background technology
Industrial control system refers to the automatic control system being made up of computer and industrial stokehold part, at present Develop into it is a kind of including enterprise management level, data acquisition information layer, Industry Control layer industrial control system.With computer The continuous development of information technology and network technology, industrial control system save management cost and improve operating efficiency while, There is also many potential safety hazards, such as platform leak, network hole.
In order to ensure the network of industrial control system and system safety, it is necessary to prevent trouble before it happens, industrial control system is entered The bug excavation of row active.Fuzz testing technology is the bug excavation technology of current main flow, and its realization device generally comprises initially Setup module, data generation subsystem, data transmit-receive subsystem and anomaly analysis subsystem.Wherein, initial setup module is used for Initialized necessary to each subsystem;Data generation subsystem is used to generate test case number according to the expression specification of agreement According to;Data transmit-receive subsystem is used to send to measurand test case data according to the communication specification of agreement and to receive its anti- Feedforward information communicates and returns to bag;Anomaly analysis subsystem is used to analyze to realize bug excavation communication return bag.
But by analyzing the information for communicating and returning in bag, many leaks can't find, and in industrial control system The complexity of procotol and the diversity of business, further increase anomaly analysis subsystem and return to discovery leakage in bag from communication The difficulty in hole.These problems cause prior art undesirable to the effect of industrial control system progress bug excavation.
The content of the invention
In view of this, the invention provides a kind of bug excavation method and system, to lift the digging of industrial control system leak The effect of pick.
A kind of bug excavation method, including:
After test case is sent to system under test (SUT), the status image of acquisition monitoring object;
The status image is compared with pre-stored image;
Determine that industrial control system whether there is abnormality according to comparison result;
In the case of it is determined that abnormality be present, analysis determines abnormal cause.
Optionally, the status image of the acquisition monitoring object, including:
According to the status image for the frequency collection monitored object that test case is sent to system under test (SUT).
Optionally, it is described the status image is compared with pre-stored image before, in addition to:
The status image is pre-processed.
Optionally, it is described that the status image is compared with pre-stored image, including:
The status image is subjected to gray processing processing, obtains grey states image;
The grey states image is compared with the normal gray level image to prestore.
Optionally, it is described to determine that industrial control system whether there is abnormality according to comparison result, including:
If the gray value difference of the grey states image and the normal gray level image to prestore is less than the first predetermined threshold value, really It is normal to determine industrial control system;
If it is default that the gray value difference of the grey states image and the normal gray level image to prestore is more than or equal to first Threshold value, determine industrial control system exception.
Optionally, it is described that the status image is compared with pre-stored image, including:
Neural-network learning model is built according to the characteristic index of things in the status image;
The weighted value of all characteristic indexs is determined by the machine learning to the neutral net;
The target value of the status image is determined according to the weighted value of each characteristic index;
The target value is compared with the second predetermined threshold value.
Optionally, it is described to determine that industrial control system whether there is abnormality according to comparison result, including:
If the target value is less than second predetermined threshold value, industrial control system exception is determined;
If the target value is more than or equal to second predetermined threshold value, determine that industrial control system is normal.
Optionally, the monitored object includes device signal lamp and host computer screen, then described it is determined that in the presence of abnormal shape In the case of state, analysis determines abnormal cause, including:
In the case of it is determined that abnormality be present, by by the status image of the device signal lamp and the signal that prestores Lamp abnormal image compares determination abnormal cause;Or,
Processing is identified by the word in the status image to host computer screen, analysis determines abnormal cause.
A kind of bug excavation system, including initial setup module, data generation system, data receiving-transmitting system and anomaly analysis System, the exception analysis system include:
Image capture module, for system under test (SUT) send test case after, the status image of acquisition monitoring object;
Anomaly judge module, for the status image to be compared with pre-stored image, and according to comparison result Determine that industrial control system whether there is abnormality;
Abnormal cause determining module, in the case of being in the judged result of the anomaly judge module, point Analysis determines abnormal cause.
Optionally, the exception analysis system also includes:
Initialization module, for being initialized to the exception analysis system.
Optionally, the exception analysis system also includes:
Image pre-processing module, for before the anomaly judge module is judged the status image, The status image is pre-processed.
The embodiment of the invention discloses a kind of bug excavation method and system, method includes:Surveyed being sent to system under test (SUT) After example on probation, the status image of acquisition monitoring object, the status image is compared with pre-stored image, and tied according to comparing Fruit determines that industrial control system whether there is abnormality, and in the case where abnormality be present, analysis determines abnormal cause.Institute Bug excavation method and system are stated by gathering the image of special object in industrial control system, and by the image of special object with Object images under the normal condition to prestore are compared, and judge that industrial control system whether there is abnormality and exception Reason.The implementation process of this method is not influenceed by procotol complexity and business are multifarious, is analyzed compared to prior art Communication returns to the technology that bag determines abnormal leak, can effectively find polytype network and system vulnerability, improves industry control The bug excavation quality of system processed.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 is the flow chart of the first bug excavation method disclosed in the embodiment of the present invention;
Fig. 2 is the flow chart of second of bug excavation method disclosed in the embodiment of the present invention;
Fig. 3 is the flow chart of the third bug excavation method disclosed in the embodiment of the present invention;
Fig. 4 is the structural representation of bug excavation system disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of exception analysis system disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Fig. 1 is the flow chart of the first bug excavation method disclosed in the embodiment of the present invention, as shown in figure 1, methods described It can include:
Step 101:After test case is sent to system under test (SUT), the status image of acquisition monitoring object.
For bug excavation system on startup, it is necessary to carry out initialization operation, initialization content includes but is not limited to deformity The contents such as the initialization of initialization, the daily record of data, anomaly analysis initial setting up.After the completion of bug excavation system initialization, it is System can combine lopsided database generation test case data according to the expression specification of the communication protocol of industrial control system, then be The test case data is sent to tested industrial control system and receives its feedback information by system according to the specification of communication protocol.
Some feedback informations of industrial test system can be embodied by specific equipment, as equipment state lamp, on Position machine screen and industry control test instrumentation.At this moment, can using the equipment state lamp, host computer screen and industry control test instrumentation as Monitored object, the status image of these monitored object is gathered, subsequently through the Treatment Analysis to the status image, it is determined that industrial Control system whether there is abnormal conditions.
In a schematical example, the status image of the acquisition monitoring object, it can include:According to tested system System sends the status image of the frequency collection monitored object of test case.Different test cases may be used for testing different leakages Hole, and these different test cases are not disposably to be sent to system under test (SUT).Under normal circumstances, different test cases can With according to specific time interval, sent with cycle regular time, to ensure after test case is sent to system under test (SUT), Have sufficient time to gather the feedback information of system under test (SUT), these feedback informations will be embodied on above-mentioned monitored object.
Step 102:The status image is compared with pre-stored image.
, it is necessary to prestore monitored object in bug excavation system before bug excavation is carried out to industrial control system Normal condition image and can gather or obtainable abnormality image.Above-mentioned normal condition image and abnormality image can To pass through the image for gathering and storing when the collection of the camera of monitored object site layout project or system work before.
Due to the difference of monitored object type, the particular technique hand that the status image and the pre-stored image use is compared Section is also different.In the following embodiments, the specific implementation for comparing the status image and the pre-stored image will be done in detail Introduce.
Step 103:Determine that industrial control system whether there is abnormality according to comparison result.
, can be normal with prestoring by the status image when specifically comparing the status image and the pre-stored image Status image is compared, if alignment parameters difference is less than normal predetermined threshold value, normally compares successfully, and comparison result is monitoring Obj State is normal;Normal to compare failure if alignment parameters difference is more than or equal to normal predetermined threshold value, comparison result is prison It is abnormal to control Obj State.
The status image can also be compared with the abnormality to prestore image, if alignment parameters difference is less than different Normal predetermined threshold value, then for anomaly ratio to success, comparison result is monitored object abnormal state.
Step 104:In the case of it is determined that abnormality be present, analysis determines abnormal cause.
Under certain situation, the abnormality image can carry label information, the label information when prestoring In can include Exception Type, as equipment state lamp be normally green lamp, in communication protocol mistake or communication failure In the case of, equipment state lamp is red, then the label information can be " communication protocol mistake ";Subsequently carrying out leak digging During pick, if by relevant art analyze the equipment state lamp status image it is identical with above-mentioned abnormality image when, When i.e. equipment state lamp is red, then the equipment state lamp abnormal state is judged, and further can be prestored according to The label information of abnormality image determines that abnormal cause is " communication protocol mistake ".
In the case of other, when it is determined that industrial control system has abnormality, it is necessary to by being carried out to status image Analysis can determine abnormal cause.Such as host computer screen display " I/O mistakes ", it is determined that the industrial control system is abnormal In the case of, " I/O mistakes " font in the status image of the host computer screen can be identified by character recognition technology, Determine abnormal cause.
Specifically, the analysis determines abnormal cause, can include:In the case of it is determined that abnormality be present, pass through By the status image of the device signal lamp compared with the signal lamp abnormal image to prestore determination abnormal cause, or, by upper Processing is identified in word in the status image of position machine screen, and analysis determines abnormal cause.
In the present embodiment, the implementation process of the bug excavation method is not multifarious by procotol complexity and business Influence, analyze to communicate with returning compared to prior art and wrap the technology for determining abnormal leak, can effectively find polytype net Network and system vulnerability, improve the bug excavation quality of industrial control system.
In other examples, can also be pre- before the status image is compared with the pre-stored image First the status image is pre-processed.Although the environment residing for the monitored object is controllable, because the environment bar such as light The change of part, the status image can be pre-processed first after status image is collected.It is described in the present embodiment Pretreatment can with but be not limited to include:The contents such as image filtering, denoising, image enhaucament.
Fig. 2 is the flow chart of second of bug excavation method disclosed in the embodiment of the present invention, as shown in Fig. 2 methods described It can include:
Step 201:After test case is sent to system under test (SUT), the status image of acquisition monitoring object.
Step 202:The status image is subjected to gray processing processing, obtains grey states image.
Step 203:The grey states image is compared with the normal gray level image to prestore.
Step 204:Judge whether the gray value difference of normal gray level image of the grey states image with prestoring is less than First predetermined threshold value;If so, into step 205;If it is not, into step 206.
Step 205:Determine that industrial control system is normal.
Step 206:Industrial control system exception is determined, into step 207.
Step 207:Analysis determines abnormal cause.
Fig. 3 is the flow chart of the third bug excavation method disclosed in the embodiment of the present invention, as shown in figure 3, methods described It can include:
Step 301:After test case is sent to system under test (SUT), the status image of acquisition monitoring object.
Step 302:Neural-network learning model is built according to the characteristic index of things in the status image.
Wherein, the characteristic index can with but be not limited to the indexs such as color, shape, texture.Pass through the neutral net Learning model, it can accurately identify the status image.
Step 303:The weighted value of all characteristic indexs is determined by the machine learning to the neutral net.
Can by a large amount of training to the neural-network learning model, namely machine learning, draw color, shape, Weighted value of the Texture eigenvalue index in the neural-network learning model.
Step 304:The target value of the status image is determined according to the weighted value of each characteristic index.
The weighted value of various features index is determined by neural-network learning model above, according to the weight Value, using certain algorithm, such as bayesian algorithm, the target value of the status image can be calculated.
Step 305;The target value is compared with the second predetermined threshold value.
Step 306:Judge whether the target value is less than second predetermined threshold value, if so, into step 307;If It is no, into step 309.
Step 307:Industrial control system exception is determined, into step 308.
Step 308:Analysis determines abnormal cause.
Step 309:Determine that industrial control system is normal.
Fig. 2 and Fig. 3 corresponds to embodiment and discloses the particular content that the status image is compared with pre-stored image.It is above-mentioned Bug excavation method disclosed in embodiment, implementation process are not influenceed by procotol complexity and business are multifarious, compared to Prior art analysis communication returns to the technology that bag determines abnormal leak, can effectively find polytype network and system leakage Hole, improve the bug excavation quality of industrial control system.
Fig. 4 is the structural representation of bug excavation system disclosed in the embodiment of the present invention, as shown in figure 4, the leak is dug Pick system 40 can include:
Initial setup module 401, data generation system 402, data receiving-transmitting system 403 and exception analysis system 404.
Wherein, the initial setup module 401 is used to initialize necessary to each subsystem;The data generation system System 402 is used to generate test case data according to the expression specification of agreement;The data receiving-transmitting system 403 is used for according to agreement Communication specification test case data send to measurand and receive its feedback information i.e. communicate return bag;The anomaly analysis System 404 is used to realize bug excavation.
The exception analysis system 404 can include:
Image capture module 4041, for system under test (SUT) send test case after, the state diagram of acquisition monitoring object Picture.
For bug excavation system on startup, it is necessary to carry out initialization operation, initialization content includes but is not limited to deformity The contents such as the initialization of initialization, the daily record of data, anomaly analysis initial setting up.After the completion of bug excavation system initialization, it is System can combine lopsided database generation test case data according to the expression specification of the communication protocol of industrial control system, then be The test case data is sent to tested industrial control system and receives its feedback information by system according to the specification of communication protocol.
Some feedback informations of industrial test system can be embodied by specific equipment, as equipment state lamp, on Position machine screen and industry control test instrumentation.At this moment, can using the equipment state lamp, host computer screen and industry control test instrumentation as Monitored object, the status image of these monitored object is gathered, subsequently through the Treatment Analysis to the status image, it is determined that industrial Control system whether there is abnormal conditions.
In a schematical example, described image acquisition module 4041 specifically can be used for:According to system under test (SUT) Send the status image of the frequency collection monitored object of test case.Different test cases may be used for testing different leakages Hole, and these different test cases are not disposably to be sent to system under test (SUT).Under normal circumstances, different test cases can With according to specific time interval, sent with cycle regular time, to ensure after test case is sent to system under test (SUT), Have sufficient time to gather the feedback information of system under test (SUT), these feedback informations will be embodied on above-mentioned monitored object.
Anomaly judge module 4042, for the status image to be compared with pre-stored image, and according to comparison As a result determine that industrial control system whether there is abnormality.
, it is necessary to prestore monitored object in bug excavation system before bug excavation is carried out to industrial control system Normal condition image and can gather or obtainable abnormality image.Above-mentioned normal condition image and abnormality image can To pass through the image for gathering and storing when the collection of the camera of monitored object site layout project or system work before.
Due to the difference of monitored object type, the particular technique hand that the status image and the pre-stored image use is compared Section is also different.Such as, in one embodiment, the anomaly judge module 4042 can be used for:The status image is entered The processing of row gray processing, obtains grey states image;The grey states image is compared with the normal gray level image to prestore; If the gray value difference of the grey states image and the normal gray level image to prestore is less than the first predetermined threshold value, it is determined that industry control System processed is normal, otherwise determines that industrial control system is abnormal.In other one embodiment, the anomaly judge module 4042 can be used for:Neural-network learning model is built according to the characteristic index of things in the status image;By to described The machine learning of neutral net determines the weighted value of all characteristic indexs;The shape is determined according to the weighted value of each characteristic index The target value of state image;The target value is compared with the second predetermined threshold value;If the target value is less than described Second predetermined threshold value, determines industrial control system exception, otherwise determines that industrial control system is normal.
, can be normal with prestoring by the status image when specifically comparing the status image and the pre-stored image Status image is compared, if alignment parameters difference is less than normal predetermined threshold value, normally compares successfully, and comparison result is monitoring Obj State is normal;Normal to compare failure if alignment parameters difference is more than or equal to normal predetermined threshold value, comparison result is prison It is abnormal to control Obj State.
The status image can also be compared with the abnormality to prestore image, if alignment parameters difference is less than different Normal predetermined threshold value, then for anomaly ratio to success, comparison result is monitored object abnormal state.
Abnormal cause determining module 4043, for the situation for being yes in the judged result of the anomaly judge module Under, analysis determines abnormal cause.
Under certain situation, the abnormality image can carry label information, the label information when prestoring In can include Exception Type, as equipment state lamp be normally green lamp, in communication protocol mistake or communication failure In the case of, equipment state lamp is red, then the label information can be " communication protocol mistake ";Subsequently carrying out leak digging During pick, if by relevant art analyze the equipment state lamp status image it is identical with above-mentioned abnormality image when, When i.e. equipment state lamp is red, then the equipment state lamp abnormal state is judged, and further can be prestored according to The label information of abnormality image determines that abnormal cause is " communication protocol mistake ".
In the case of other, when it is determined that industrial control system has abnormality, it is necessary to by being carried out to status image Analysis can determine abnormal cause.Such as host computer screen display " I/O mistakes ", it is determined that the industrial control system is abnormal In the case of, " I/O mistakes " font in the status image of the host computer screen can be identified by character recognition technology, Determine abnormal cause.
Specifically, the abnormal cause determining module 4043 can be used for:In the case of it is determined that abnormality be present, lead to The determination abnormal cause compared with the signal lamp abnormal image to prestore is crossed the status image of the device signal lamp, or, by right Processing is identified in word in the status image of host computer screen, and analysis determines abnormal cause.
In the present embodiment, the implementation process of the bug excavation system is not multifarious by procotol complexity and business Influence, analyze to communicate with returning compared to prior art and wrap the technology for determining abnormal leak, can effectively find polytype net Network and system vulnerability, improve the bug excavation quality of industrial control system.
Fig. 5 be exception analysis system disclosed in the embodiment of the present invention structural representation, shown in Figure 5, the exception Analysis system 50 can include:
Initialization module 501, for being initialized to the exception analysis system.
Image capture module 4041, for system under test (SUT) send test case after, the state diagram of acquisition monitoring object Picture.
Image pre-processing module 502, for carrying out judging it to the status image in the anomaly judge module Before, the status image is pre-processed.
Before the status image is compared with the pre-stored image, the status image can also be entered in advance Row pretreatment.Although the environment residing for the monitored object is controllable, because the change of the environmental condition such as light, can gathered To after status image, the status image is pre-processed first.In the present embodiment, the pretreatment can with but be not limited to Including:The contents such as image filtering, denoising, image enhaucament.
Anomaly judge module 4042, for the status image to be compared with pre-stored image, and according to comparison As a result determine that industrial control system whether there is abnormality.
Abnormal cause determining module 4043, for the situation for being yes in the judged result of the anomaly judge module Under, analysis determines abnormal cause.
In the present embodiment, the exception analysis system to status image before analysis judgement is carried out, first to the state Image is pre-processed, and is easy to subsequently accurately identify the things in the status image, to carry out accurately and effectively bug excavation. The bug excavation system is not influenceed by procotol complexity and business are multifarious in implementation process, compared to existing skill Art analysis communication returns to the technology that bag determines abnormal leak, can effectively find polytype network and system vulnerability, improve The bug excavation quality of industrial control system.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (11)

  1. A kind of 1. bug excavation method, it is characterised in that including:
    After test case is sent to system under test (SUT), the status image of acquisition monitoring object;
    The status image is compared with pre-stored image;
    Determine that industrial control system whether there is abnormality according to comparison result;
    In the case of it is determined that abnormality be present, analysis determines abnormal cause.
  2. 2. bug excavation method according to claim 1, it is characterised in that the status image of the acquisition monitoring object, Including:
    According to the status image for the frequency collection monitored object that test case is sent to system under test (SUT).
  3. 3. bug excavation method according to claim 1, it is characterised in that described by the status image and the figure that prestores Before picture is compared, in addition to:
    The status image is pre-processed.
  4. 4. bug excavation method according to claim 1, it is characterised in that described by the status image and pre-stored image It is compared, including:
    The status image is subjected to gray processing processing, obtains grey states image;
    The grey states image is compared with the normal gray level image to prestore.
  5. 5. bug excavation method according to claim 4, it is characterised in that described that Industry Control is determined according to comparison result System whether there is abnormality, including:
    If the gray value difference of the grey states image and the normal gray level image to prestore is less than the first predetermined threshold value, work is determined Industry control system is normal;
    If the gray value difference of the grey states image and the normal gray level image to prestore is more than or equal to the first predetermined threshold value, Determine industrial control system exception.
  6. 6. bug excavation method according to claim 1, it is characterised in that described by the status image and pre-stored image It is compared, including:
    Neural-network learning model is built according to the characteristic index of things in the status image;
    The weighted value of all characteristic indexs is determined by the machine learning to the neutral net;
    The target value of the status image is determined according to the weighted value of each characteristic index;
    The target value is compared with the second predetermined threshold value.
  7. 7. bug excavation method according to claim 6, it is characterised in that described that Industry Control is determined according to comparison result System whether there is abnormality, including:
    If the target value is less than second predetermined threshold value, industrial control system exception is determined;
    If the target value is more than or equal to second predetermined threshold value, determine that industrial control system is normal.
  8. 8. bug excavation method according to claim 1, it is characterised in that the monitored object include device signal lamp and Host computer screen, then described in the case of it is determined that abnormality be present, analysis determines abnormal cause, including:
    In the case of it is determined that abnormality be present, by the way that the status image of the device signal lamp and the signal lamp that prestores is different Normal image compares determination abnormal cause;Or,
    Processing is identified by the word in the status image to host computer screen, analysis determines abnormal cause.
  9. 9. a kind of bug excavation system, including initial setup module, data generation system, data receiving-transmitting system and anomaly analysis system System, it is characterised in that the exception analysis system includes:
    Image capture module, for system under test (SUT) send test case after, the status image of acquisition monitoring object;
    Anomaly judge module, for the status image to be compared with pre-stored image, and determined according to comparison result Industrial control system whether there is abnormality;
    Abnormal cause determining module, in the case of being in the judged result of the anomaly judge module, analysis is true Determine abnormal cause.
  10. 10. bug excavation system according to claim 9, it is characterised in that the exception analysis system also includes:
    Initialization module, for being initialized to the exception analysis system.
  11. 11. bug excavation system according to claim 9, it is characterised in that the exception analysis system also includes:
    Image pre-processing module, for before the anomaly judge module is judged the status image, to institute Status image is stated to be pre-processed.
CN201711213283.8A 2017-11-28 2017-11-28 A kind of bug excavation method and system Pending CN107835189A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711213283.8A CN107835189A (en) 2017-11-28 2017-11-28 A kind of bug excavation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711213283.8A CN107835189A (en) 2017-11-28 2017-11-28 A kind of bug excavation method and system

Publications (1)

Publication Number Publication Date
CN107835189A true CN107835189A (en) 2018-03-23

Family

ID=61646215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711213283.8A Pending CN107835189A (en) 2017-11-28 2017-11-28 A kind of bug excavation method and system

Country Status (1)

Country Link
CN (1) CN107835189A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109631784A (en) * 2018-11-27 2019-04-16 彩虹(合肥)液晶玻璃有限公司 Glass substrate detection system and method
CN112257075A (en) * 2020-11-11 2021-01-22 福建有度网络安全技术有限公司 System vulnerability detection method, device, equipment and storage medium under intranet environment
CN112653693A (en) * 2020-12-21 2021-04-13 哈尔滨工大天创电子有限公司 Industrial control protocol analysis method and device, terminal equipment and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101566656A (en) * 2008-04-25 2009-10-28 佛山市顺德区顺达电脑厂有限公司 System and method for automatic detection
CN103473558A (en) * 2013-09-04 2013-12-25 深圳先进技术研究院 Image recognizing method and system based on neural network
CN104698399A (en) * 2014-08-26 2015-06-10 安徽工程大学 Automotive lamp fault detecting system and method thereof
CN105100732A (en) * 2015-08-26 2015-11-25 深圳市银之杰科技股份有限公司 Machine room server remote monitoring method and system
US9430629B1 (en) * 2014-01-24 2016-08-30 Microstrategy Incorporated Performing biometrics in uncontrolled environments
US20170318162A1 (en) * 2016-04-27 2017-11-02 Kyocera Document Solutions Inc. Image-forming device with document reading unit
CN107360171A (en) * 2017-07-19 2017-11-17 成都明得科技有限公司 Industrial control system information security test device and method based on status lamp detection

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101566656A (en) * 2008-04-25 2009-10-28 佛山市顺德区顺达电脑厂有限公司 System and method for automatic detection
CN103473558A (en) * 2013-09-04 2013-12-25 深圳先进技术研究院 Image recognizing method and system based on neural network
US9430629B1 (en) * 2014-01-24 2016-08-30 Microstrategy Incorporated Performing biometrics in uncontrolled environments
CN104698399A (en) * 2014-08-26 2015-06-10 安徽工程大学 Automotive lamp fault detecting system and method thereof
CN105100732A (en) * 2015-08-26 2015-11-25 深圳市银之杰科技股份有限公司 Machine room server remote monitoring method and system
US20170318162A1 (en) * 2016-04-27 2017-11-02 Kyocera Document Solutions Inc. Image-forming device with document reading unit
CN107360171A (en) * 2017-07-19 2017-11-17 成都明得科技有限公司 Industrial control system information security test device and method based on status lamp detection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙超等: ""基于图像识别的电台直播机房视频监控系统"", 《东南传播》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109631784A (en) * 2018-11-27 2019-04-16 彩虹(合肥)液晶玻璃有限公司 Glass substrate detection system and method
CN112257075A (en) * 2020-11-11 2021-01-22 福建有度网络安全技术有限公司 System vulnerability detection method, device, equipment and storage medium under intranet environment
CN112653693A (en) * 2020-12-21 2021-04-13 哈尔滨工大天创电子有限公司 Industrial control protocol analysis method and device, terminal equipment and readable storage medium

Similar Documents

Publication Publication Date Title
KR102321765B1 (en) Display device quality inspection method, device, electronic device and storage medium
CN107835189A (en) A kind of bug excavation method and system
US20150039543A1 (en) Feature Based Three Stage Neural Network Intrusion Detection
US11336675B2 (en) Cyber resilience chaos stress testing
CN106656657A (en) Adaptive vulnerability mining framework based on industrial control protocol
CN104391797A (en) GUI (graphical user interface) widget identification method and device
CN109190379A (en) A kind of leak detection method and device of deep learning system
CN111931179B (en) Cloud malicious program detection system and method based on deep learning
CN106101130A (en) A kind of network malicious data detection method, Apparatus and system
CN106445817A (en) Test data processing method, apparatus and system
CN110135166A (en) A kind of detection method and system for the attack of service logic loophole
CN105933190A (en) Communication method and apparatus applied to intelligent household platform
CN107608848A (en) Method of testing and system
CN112180285B (en) Method and device for identifying traffic signal lamp faults, navigation system and road side equipment
CN109743286A (en) A kind of IP type mark method and apparatus based on figure convolutional neural networks
CN112798979A (en) System and method for detecting state of grounding wire of transformer substation based on deep learning technology
CN111949992A (en) Automatic safety monitoring method and system for WEB application program
EP4009586A1 (en) A system and method for automatically neutralizing malware
Tong et al. Improving accuracy of automatic optical inspection with machine learning
Cucinotta et al. Behavioral analysis for virtualized network functions: A som-based approach
WO2004038593A1 (en) Security hole diagnosis system
CN112132092A (en) Fire extinguisher and fire blanket identification method based on convolutional neural network
CN113569255A (en) Vulnerability detection method and device based on background RPC interface
CN107948385A (en) A kind of method and apparatus of fault detect
CN106773719A (en) A kind of industrial control system leak automatic mining method based on BP neural network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180323

RJ01 Rejection of invention patent application after publication