CN109840077A - A kind of industry control safety auditing system and its application based on protocol depth analysis - Google Patents

A kind of industry control safety auditing system and its application based on protocol depth analysis Download PDF

Info

Publication number
CN109840077A
CN109840077A CN201910029343.3A CN201910029343A CN109840077A CN 109840077 A CN109840077 A CN 109840077A CN 201910029343 A CN201910029343 A CN 201910029343A CN 109840077 A CN109840077 A CN 109840077A
Authority
CN
China
Prior art keywords
layer
control
protocol
industry control
depth analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910029343.3A
Other languages
Chinese (zh)
Inventor
林亮成
杨宗跃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Network Technology (beijing) Co Ltd
Guonetcom Industry Group Co Ltd
State Grid Information and Telecommunication Co Ltd
Original Assignee
State Grid Network Technology (beijing) Co Ltd
Guonetcom Industry Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Network Technology (beijing) Co Ltd, Guonetcom Industry Group Co Ltd filed Critical State Grid Network Technology (beijing) Co Ltd
Priority to CN201910029343.3A priority Critical patent/CN109840077A/en
Publication of CN109840077A publication Critical patent/CN109840077A/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The present invention relates to a kind of industry control safety auditing system based on protocol depth analysis and its applications, the system comprises: the back-end processing layer for carrying out the front end represent layer of direct control operation to industrial control system and for auditing O&M operational order with control passes through middle-end and communicates to connect between front end display module and back-end processing layer;When operation, front end represent layer initiates message synchrodata, and is attached with back-end processing layer by middle-end communication and passes through back-end processing layer and receive and parse through message information, carries out log recording according to result, and the connection with service is closed, notify front end represent layer protocol communication result.The present invention has flexible adaptability and good scalability, pass through the functions such as electric power specialized protocol deep analysis, business conduct control, particular attack defence, it finds in real time and blocks security risk present in electric power industrial control system, ensure enterprise production service application under industry control network environment it is controllable, can control, control, effective safety is formed to industrial control system.

Description

A kind of industry control safety auditing system and its application based on protocol depth analysis
Technical field
The present invention relates to industrial control system Prevention-Security technical fields, and in particular to it is a kind of based on protocol depth analysis Industry control safety auditing system and its application.
Background technique
In recent years, with the gradually popularization of Industrial Ethernet and application, industrial control system product uses more and more Puppy parc, common hardware and common software are indirectly connected with public networks such as internets in various ways, traditional IT Information Network In security threat gradually penetrate into production control network.In order to promote the security protection ability of power industry, reinforce electricity Power monitoring system security protection, National Development and Reform Committee in 2014 have issued 14 commands " electric power monitoring system security protection regulation ", The publication of National Energy Board in 2015 is " about printing and distributing security protections scheme and the assessments such as electric power monitoring system security protection overall plan The notice of specification " (state can safe (2015) No. 36), referred to as No. 36 texts, further clarify safety management responsibility, perfect electricity Power monitoring system security protection scheme, implements safety prevention measure conscientiously, actively develops electric power monitoring system and information system peace Full assessment and protection based on security rank assessment, and site assessment and assessment are completed in time according to documentation requirements.
Modern information technologies are bringing new innovation chance for control technology, are being in conjunction with the depth of modern control technology While enterprise brings new business model, also the information security issue in information network has been brought into modern industry control together In system." shake net virus " event well-known from 2010,2011 " Duqu virus ", 2012 " flame virus " and Ukraine's power grid in 2015 meets with attack power-off event, then to the hacking tool being seen everywhere on internet today, place What place showed is " situation " that industrial control system is attacked, and sufficiently shows that the reality of industrial control system information security issue is compeled Cutting property.Therefore, using the U.S. as represent " industry internet ", using Germany as " industry 4.0 " of representative, all using information security as The most important thing.In Industry Control intelligence progradation, security assurance information work is but made slow progress, and is embodied in following several Aspect:
Information security blank: while improving production efficiency by information-based means, there is no consider protecting information safety Measure, some industrial control systems even keep " intimate contact " with internet.
Information security superficial: Some Enterprises, will original mutually independent industrial control system in order to meet production linkage Interconnection, or production control net is linked into business administration net;In order to meet information security demand, although increasing information security Safeguard, but what is used is the common firewall of information system.
Information security ossifys: individual enterprises recognize the importance of industrial control system information security, in Industry Control system It unites in transformation process, actively increases safety prevention measure, such as industrial fireproof wall, industry control network monitoring system, but due to work Requirement of the industry control system to highly reliable operation production, as user, during information safety operation and maintenance, corresponding information peace Full strategy is adjusted there is no the development with outside world technology, is caused in actual moving process, information security issue according to So happen occasionally.
Attack tool emerges one after another: two change in fusion, and security assurance information is not in place, but for industrial control system Attack technology but shows development trend with rapid changepl. never-ending changes and improvements, for the attack tool of industrial control system, is hacked customized work and dissipates Cloth on the internet so that intrusion scene is lower and lower.
Firing area expands rapidly: being attacked, is needed for the industrial control system for being deployed in critical infrastructures in early days Want stronger attacking ability;But after the industrial control system information security issue publicization, many hackers start with interconnection The attack tool being readily available on the net, aiming does not much have the industry of protecting information safety ability substantially or enterprise is attacked It hits, although causing serious financial consequences without serious malignant event.
Summary of the invention
For this purpose, the present invention provides a kind of industry control safety auditing systems based on protocol depth analysis, by using privately owned The conversed analysis technology of industry control control protocol, credible operation management technology, to meet at the business under electric power industry control network environment Reason, security audit, intrusion detection needs.
In order to achieve the above objectives, the present invention adopts the following technical scheme:
A kind of industry control safety auditing system based on protocol depth analysis, comprising: for directly being controlled to industrial control system Make the front end represent layer of operation and the back-end processing layer for auditing O&M operational order with control, the front end display module It is communicated to connect between back-end processing layer by middle-end;When operation, the front end represent layer initiates message synchrodata, and passes through Middle-end communication is attached with the back-end processing layer and receives and parses through message information by the back-end processing layer, according to knot Fruit carries out log recording, and closes the connection with service, notifies front end represent layer protocol communication result.
The front end represent layer is the B/S system based on JAVA language exploitation, and user can visit in such a way that WEB is accessed It asks.
The front end represent layer includes:
Display layer: realize that page effect is shown based on JSP/HTML cooperation jQuery;
Control layer: SpringMVC frame is used, while with the use of SHIRO as permission control assembly;
Service layer: the main services of business operation logic are provided in the represent layer of front end for system, are made on Technology Selection Use Spring as Container Management frame, carry out log management and output using Log4j, and report, safety, permission are provided etc. Infrastructure service and operation interface;
Cache layer: Cache Framework selection uses EhCache, is a kind of widely used open source Java distributed caching.
Data Layer: data persistence engine uses MyBatis in the choice of technology.
The back-end processing layer includes:
Normal protocol: the O&M function based on Telnet, SSH, RDP and RemoteApp agreement is provided for user;
Industry control agreement: the rule dimension of the agreements such as Modbus, OPC, Siemens S7, IEC104, Profinet and DNP3 It protects and issues, and carry out white list, the regular maintenance of control for all kinds of agreements and issue operation.
The normal protocol is the agreement with audit function.
The industry control agreement further includes warning processing module, for handling implementing result feedback and touching after rule issues Warning information after hair rule.
Application of the industry control safety auditing system that the above is analyzed based on protocol depth under industry control network environment.
Technical solution of the present invention has the following beneficial effects:
A, the present invention is based on the industry control safety auditing system of protocol depth analysis, has flexible adaptability and good expansion Malleability is to pass through electric power specialized protocol depth solution to reinforce the dynamics that industrial control system security audit is managed under environment of industrial network The functions such as analysis, electric power dedicated service behavior control, particular attack defence, find in real time and block present in electric power industrial control system The security risks such as malicious instructions attack, crucial unauthorized operation, trojan horse propagation, manufacturer's operation maintenance personnel violation O&M, meet Urgent need of the current enterprise to network content analysis and monitoring class equipment ensures enterprise's production service application in industry control network ring Under border it is controllable, can control, control, effective safety is formed to electric power industrial control system.
B, the present invention is based on the industry control safety auditing system of protocol depth analysis, petroleum, water conservancy, cigarette can be applied directly to In the intense industrializations industry such as grass, while the products such as industrial fireproof wall, industrial trusted gateway can be derived.In industrial control system The equipment such as PLC, DCS, industrial switch, HMI, operator station, engineer station and historical data base, real-time data base show In the maintenance of field, it will help user that malicious code is prevented to be diffused into industrial control system by O&M, prevent leakage production technology from matching Number formulary according to, prevent violation operation is improper from causing production accident, improve the granularity of monitoring and audit, reinforce risk identification and early warning Ability promotes the effective execution of industry control safety management system, promotes safety management performance.
Detailed description of the invention
It, below will be to needed in specific embodiment in order to illustrate more clearly of the specific embodiment of the invention Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present invention, for this field For those of ordinary skill, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is industry control safety auditing system schematic diagram of the present invention;
Fig. 2 is middle-end communication flow diagram of the present invention;
Fig. 3 is that industry control protocol integrated test system rule issues procedure chart in the present invention;
Fig. 4 is warning processing module process flow diagram in the present invention.
Description of symbols:
The front end 1- represent layer, 11- display layer, 12- control layer, 13- service layer, 14- cache layer, 15- data Layer;2- middle-end Communication;3- back-end processing layer, 31- normal protocol, 32- industry control agreement.
Specific embodiment
Technical solution of the present invention is clearly and completely described below in conjunction with attached drawing, it is clear that described implementation Example is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill Personnel's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
As shown in Figure 1, the present invention provides a kind of industry control safety auditing systems based on protocol depth analysis, comprising: use In the front end represent layer 1 for carrying out direct control operation to industrial control system and for rear end O&M operational order audit and controlled Process layer 3 communicates 2 connections by middle-end between front end display module 1 and back-end processing layer 3;When operation, middle-end communication 2 can be first First control back-end processing layer 3 starts TCP service, and waits communication request to be received, and in front end, represent layer 1 initiates the same step number of message According to, and be attached by middle-end communication 2 with back-end processing layer 3 and message information, root are received and parsed through by back-end processing layer 3 Log recording is carried out according to result, and closes the connection with service, notifies 1 protocol communication result of front end represent layer.
Front end represent layer 1 is the B/S system based on JAVA language exploitation, and user can access in such a way that WEB is accessed.Before Holding represent layer 1 mainly includes display layer 11, control layer 12, service layer 13, several parts such as cache layer 14 and data Layer 15.
(1) display layer 11: display layer 11 is mainly based upon JSP/HTML cooperation jQuery and realizes that page effect is shown.Wherein JQuery includes control abundant and special efficacy, is prefixed a variety of styles and selects for user, avoids stereotyped.It can also lead to The visualization interface of jQuery UI is crossed, the self-service display effect to foreground configures, and very convenient, can effectively be promoted can Depending on changing effect.
(2) control layer 12: control layer 12 mainly uses SpringMVC frame, while with the use of SHIRO as permission control Component processed.
Shiro is a powerful and easy-to-use Java security framework, executes authentication, authorization, cryptography and session pipe Reason.Use Shiro that can also effectively control unauthorized access as filter;Cooperate effective filtering control that can prevent simultaneously XSS cross-site attack and SQL injection.
(3) service layer 13: control layer 13 is that total system provides the main services of business operation logic in front end shows, It uses Spring as Container Management frame on Technology Selection, carries out log management and output using Log4j, and provide report The infrastructure services such as table, safety, permission and operation interface.
(4) cache layer 14: the frame selection of cache layer 14 uses EhCache.Ehcache is a kind of widely used open source Java distributed caching.It is mainly directed towards general caching, Java EE and Lightweight Container.It has memory and disk storage, caching Loader, caching extension cache exception handler, and a gzip caches servlet filter, supports REST and SOAP API The features such as.
(5) data Layer 15: data Layer 15 is primarily referred to as data persistence engine, and MyBatis is used in the choice of technology. MyBatis mainly completes two pieces thing: 1. establish the connection with database according to JDBC specification;2. passing through Annotaion/XML+ JAVA reflection technology is realized and is mutually converted between Java object and relational database.Its advantage: it efficiently, supports dynamic, is complicated SQL building is supported to have done lightweight Mapper encapsulation with Spring integration and AOP affairs, result set, supports to cache.
In systems in end communication 2: business service end is developed using Java, and the association of TCP/IP is selected in the communication technology View, communication process first starts TCP service in back-end processing layer 3 as shown in Fig. 2, system communicates 2 Shi Huixian in middle-end, and waits waiting Receive communication request.The represent layer 1 in front end can first create TCP Client with clothes after system meets the synchronous requirement of initiation data Business carries out First Contact Connections.It can be required to generate corresponding message format according to message protocol after creation connection, and record transmission Log, while message content is sent to server.Will do it after server-side receives message information message information parsing and The processing such as format check notifies client exception information after parsing fails or format goes wrong, otherwise notifies client Request is handled successfully.Log recording is carried out according to success/failure result after client receives server-side feedback result, and The connection with service is closed, notifies 1 protocol communication result of front end represent layer.
Back-end processing layer 3 can be divided mainly into two major classes from the protocol type of processing: normal protocol 31 and industry control agreement 32.
31 part of normal protocol provides the O&M function based on Telnet, SSH, RDP and RemoteApp agreement for user Can, system additionally provides corresponding audit function for the process of O&M and behavior.Its design principle is can be grasped by one Action control system realizes the reception and forwarding operated to O&M, while receiving with forwarding, realizes to O&M operational order Audit and control, and require the O&M operating right of realization system to control according to management.
Industry control agreement 32 relates generally to the agreements such as Modbus, OPC, Siemens S7, IEC104, Profinet and DNP3 Rule maintenance and issue.Major function is to carry out white list, the regular maintenance of control for all kinds of agreements and issue operation. Because the rule and interface of various industry control agreements are relatively independent, in design, each processing module is also independent from each other.? It is parallel to each other, is independent of each other in processing.This allow for subsequent protocol extension become easily, whenever need increase newly an agreement Processing module when, it is only necessary to a newly-increased module simultaneously does a little adjustment to configuration information.
White list or control rule issue process as shown in figure 3, back-end processing layer can wait first front end represent layer send out Trigger condition is sent, existing newest control rule or white list information can be retrieved if receiving message.And it will be final Query result assemble message according to corresponding interface specification, message is sent completely, and entirely issuing process terminates.
The part is exactly warning processing module there are one important module, and module master to be processed is that rule issues The warning information after implementing result feedback and triggering rule afterwards.Process flow is as shown in figure 4, when the rule triggering issued It has corresponding alarm information to generate, which is mainly responsible for receiving, parsing, classification and stores warning information.So as to front end exhibition Now displaying or other subsequent processings (such as short message or mail notification).
The present invention is based on the industry control safety auditing systems of protocol depth analysis, have flexible adaptability and good extension Property, be for reinforce environment of industrial network under industrial control system security audit manage dynamics, by electric power specialized protocol deep analysis, The functions such as electric power dedicated service behavior control, particular attack defence, find in real time and block evil present in electric power industrial control system Mean that security risks, the satisfactions such as attack, crucial unauthorized operation, trojan horse propagation, manufacturer's operation maintenance personnel violation O&M is enabled to work as Urgent need of the preceding enterprise to network content analysis and monitoring class equipment ensures enterprise's production service application in industry control network environment Under it is controllable, can control, control, effective safety is formed to electric power industrial control system.
In addition, the present invention can also be applied directly in the intense industrializations industry such as petroleum, water conservancy, tobacco, while can be with Derive the products such as industrial fireproof wall, industrial trusted gateway.In PL C of industrial control system, DCS, industrial switch, HMI, operation In the on-site maintenance of equipment such as member station, engineer station and historical data base, real-time data base, user will be helped to prevent Malicious code by O&M be diffused into industrial control system, prevent leakage production technology formulation data, prevent violation operation is improper from causing Production accident improves the granularity of monitoring and audit, reinforces the ability of risk identification and early warning, promotes industry control safety management system Effective execution promotes safety management performance.
Obviously, the above embodiments are merely examples for clarifying the description, and does not limit the embodiments.It is right For those of ordinary skill in the art, can also make on the basis of the above description it is other it is various forms of variation or It changes.There is no necessity and possibility to exhaust all the enbodiments.And it is extended from this it is obvious variation or Variation is still in the protection scope of this invention.

Claims (7)

1. it is a kind of based on protocol depth analysis industry control safety auditing system characterized by comprising for industrial control system into The front end represent layer (1) of row direct control operation and for O&M operational order audit with control back-end processing layer (3), institute It states and is connect between front end display module (1) and back-end processing layer (3) by middle-end communication (2);When operation, the front end represent layer (1) initiate message synchrodata, and by middle-end communication (2) and the back-end processing layer (3) be attached and pass through it is described after End process layer (3) receives and parses through message information, log recording is carried out according to result, and close the connection with service, before notice Hold represent layer (1) protocol communication result.
2. the industry control safety auditing system according to claim 1 based on protocol depth analysis, which is characterized in that before described End represent layer (1) is the B/S system based on JAVA language exploitation, and user can access in such a way that WEB is accessed.
3. the industry control safety auditing system according to claim 2 based on protocol depth analysis, which is characterized in that before described End represent layer (1) includes:
Display layer (11): realize that page effect is shown based on JSP/HTML cooperation jQuery;
Control layer (12): SpringMVC frame is used, while with the use of SHIRO as permission control assembly;
Service layer (13): the main services of business operation logic are provided in front end represent layer (1) for system, on Technology Selection Use Spring as Container Management frame, carries out log management and output using Log4j, and provide report, safety, permission Equal infrastructure services and operation interface;
Cache layer (14): Cache Framework selection uses EhCache, is a kind of widely used open source J ava distributed caching.
Data Layer (15): data persistence engine uses MyBatis in the choice of technology.
4. the industry control safety auditing system according to claim 1 based on protocol depth analysis, which is characterized in that after described End process layer (3) includes:
Normal protocol (31): the O&M function based on Telnet, SSH, RDP and RemoteApp agreement is provided for user;
Industry control agreement (32): the rule dimension of the agreements such as Modbus, OPC, Siemens S7, IEC104, Profinet and DNP3 It protects and issues, and carry out white list, the regular maintenance of control for all kinds of agreements and issue operation.
5. the industry control safety auditing system according to claim 4 based on protocol depth analysis, which is characterized in that described normal Advising agreement (31) is the agreement with audit function.
6. the industry control safety auditing system according to claim 4 based on protocol depth analysis, which is characterized in that the work Controlling agreement (32) further includes warning processing module, after handling the implementing result feedback after rule issues and triggering rule Warning information.
7. the industry control safety auditing system described in any one of claims 1-6 based on protocol depth analysis is in industry control network environment Under application.
CN201910029343.3A 2019-01-13 2019-01-13 A kind of industry control safety auditing system and its application based on protocol depth analysis Pending CN109840077A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910029343.3A CN109840077A (en) 2019-01-13 2019-01-13 A kind of industry control safety auditing system and its application based on protocol depth analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910029343.3A CN109840077A (en) 2019-01-13 2019-01-13 A kind of industry control safety auditing system and its application based on protocol depth analysis

Publications (1)

Publication Number Publication Date
CN109840077A true CN109840077A (en) 2019-06-04

Family

ID=66883814

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910029343.3A Pending CN109840077A (en) 2019-01-13 2019-01-13 A kind of industry control safety auditing system and its application based on protocol depth analysis

Country Status (1)

Country Link
CN (1) CN109840077A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112799358A (en) * 2020-12-30 2021-05-14 上海磐御网络科技有限公司 Industrial control safety defense system
CN113311809A (en) * 2021-05-28 2021-08-27 苗叶 Industrial control system-based safe operation and maintenance instruction blocking device and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112799358A (en) * 2020-12-30 2021-05-14 上海磐御网络科技有限公司 Industrial control safety defense system
CN112799358B (en) * 2020-12-30 2022-11-25 上海磐御网络科技有限公司 Industrial control safety defense system
CN113311809A (en) * 2021-05-28 2021-08-27 苗叶 Industrial control system-based safe operation and maintenance instruction blocking device and method

Similar Documents

Publication Publication Date Title
Radoglou-Grammatikis et al. Attacking iec-60870-5-104 scada systems
Chandia et al. Security strategies for SCADA networks
Lee et al. Design and implementation of cybersecurity testbed for industrial IoT systems
CA2623120C (en) Network security appliance
CN107347047B (en) Attack protection method and device
RU2634209C1 (en) System and method of autogeneration of decision rules for intrusion detection systems with feedback
CN101438255A (en) Network and application attack protection based on application layer message inspection
CN104394122A (en) HTTP (Hyper Text Transport Protocol) service firewall based on adaptive agent mechanism
CN109840077A (en) A kind of industry control safety auditing system and its application based on protocol depth analysis
CN109672569A (en) A kind of research of industry control safety monitoring system and application based on protocol depth analysis
Guo et al. A survey of industrial control system devices on the Internet
KR101887544B1 (en) Sdn-based network-attacks blocking system for micro server management system protection
Wanying et al. The study of security issues for the industrial control systems communication protocols
CN106453336B (en) Method for internal network to actively provide external network host calling service
CN113467311A (en) Electric power Internet of things safety protection device and method based on software definition
CN108933707B (en) Safety monitoring system and method for industrial network
Li et al. A defense model study based on IDS and firewall linkage
Ponomarev Intrusion Detection System of industrial control networks using network telemetry
CN103944896A (en) Smart power grid safety protection system
Masset et al. Simulating industrial control systems using mininet
Feng et al. Security analysis of simple network management protocol based IEEE P21451 internet of things
Takano Sustainable cyber security for tility facilities control system based on defense-in-depth concept
Cruz et al. A distributed IDS for industrial control systems
Yang et al. Research on computer network information security and protection strategy based on internet of things
CN116032512A (en) Multi-node dynamic trapping system and method for industrial control network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190604