CN110266735A - Industry communications protocol white list access control based on timing - Google Patents

Industry communications protocol white list access control based on timing Download PDF

Info

Publication number
CN110266735A
CN110266735A CN201910692012.8A CN201910692012A CN110266735A CN 110266735 A CN110266735 A CN 110266735A CN 201910692012 A CN201910692012 A CN 201910692012A CN 110266735 A CN110266735 A CN 110266735A
Authority
CN
China
Prior art keywords
control
timing
industrial
access control
white list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910692012.8A
Other languages
Chinese (zh)
Other versions
CN110266735B (en
Inventor
曾光
靳沛
李芬桂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Cic Anneng Technology Co Ltd
Original Assignee
Beijing Cic Anneng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Cic Anneng Technology Co Ltd filed Critical Beijing Cic Anneng Technology Co Ltd
Priority to CN201910692012.8A priority Critical patent/CN110266735B/en
Publication of CN110266735A publication Critical patent/CN110266735A/en
Application granted granted Critical
Publication of CN110266735B publication Critical patent/CN110266735B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Communication Control (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses the industry communications protocol white list access controls based on timing, step 1: being learnt by long-time, the industrial control protocols obtained in industrial control network exchange data, step 2: all control commands in each message in parsing industrial control protocols interaction, step 3: record control protocol control instruction and timing values, step 4: industrial control protocols Interaction context control planning chain is added in access control policy chain, guide the matched control strategy matching condition of access control, utilize the logical sequence relationship of big data processing technique analytical industry control protocol control instruction, and calculate the context of this access control instruction, the beneficial effects of the present invention are: the industry communications protocol white list access control based on timing, solves the fine granularity that access control technology in current white list technology is single dimension Access control lacks the control of time dimension, can not reach the significant deficiency of believable degree.

Description

Industry communications protocol white list access control based on timing
Technical field
The present invention relates to white list access technique field, specific field is that the industry communications protocol white list based on timing is visited Ask control.
Background technique
White list technology widely uses in industrial control network safety, relative to traditional black name of network security Single technology is completed to build the white list of Industry Control communications protocol by intelligence learning more suitable for industrial control network environment Mould.By to the industrial protocol parsing and identification in industrial control network, the control word for parsing industrial control protocols of depth Section models the white name of industrial control protocols so that the protocol integrated test system learnt in all communication process instructs with control codomain field Single model, and then depth, the fine-grained access for controlling industry control agreement are carried out using white list, reach abnormal access business Control instruction can not access the purpose of industrial control equipment, prevent malice from controlling attack, so that safeguard industries control is set The safety of standby safety, industrial control network.
Summary of the invention
The purpose of the present invention is to provide the industry communications protocol white list access controls based on timing, to solve above-mentioned back The problem of being proposed in scape technology.
To achieve the above object, the invention provides the following technical scheme: the industry communications protocol white list based on timing is visited Ask control, comprising the following steps:
Step 1: being learnt by long-time, the industrial control protocols obtained in industrial control network exchange data.
Step 2: all control commands in each message in parsing industrial control protocols interaction.
Step 3: being closed by the control that the technology of artificial intelligence and big data finds out the interaction of industrial control protocols control command System forms industrial control protocols Interaction context control planning chain, and utilizes big data processing technique analytical industry control protocol The logical sequence relationship of control instruction records control protocol control instruction and timing values.
Step 4: industrial control protocols Interaction context control planning chain being added in access control policy chain, guides and visits It asks control matched control strategy matching condition, utilizes the logic of big data processing technique analytical industry control protocol control instruction Sequential relationship, and the context of this access control instruction is calculated, and record.
Step 5: calculating the logical sequence value of this access control instruction.
Step 6: above-mentioned numerical value being matched by matching contextual policies, it fails to match then by packet loss, matching Success carries out further work.
Step 7: when the success of above-mentioned values match, needing to carry out matching timing strategy to it, it fails to match then by message It abandons, successful match carries out further work.
Step 8: when the success of above-mentioned values match, needing to carry out it to match industrial protocol white list, it fails to match then By packet loss, then message passes through successful match.
Preferably, the control environment of the industrial control equipment has certain relevance.
Preferably, the control environment of the industrial control equipment has certain timing.
Compared with prior art, the beneficial effects of the present invention are: the industry communications protocol white list based on timing accesses control System, solves the fine-granularity access control that access control technology in current white list technology is single dimension, lacks time dimension Control, the significant deficiency of believable degree can not be reached, more meet the theory of the feasible access of industrial control network, allow hacker It can not be attacked for industrial control protocols.
Detailed description of the invention
Fig. 1 is the structural diagram of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
It please refers to Fig. 1 present invention and technical solution: the industry communications protocol white list access control based on timing is provided, including Following steps:
Step 1: being learnt by long-time, the industrial control protocols obtained in industrial control network exchange data.
Step 2: all control commands in each message in parsing industrial control protocols interaction.
Step 3: being closed by the control that the technology of artificial intelligence and big data finds out the interaction of industrial control protocols control command System forms industrial control protocols Interaction context control planning chain, and utilizes big data processing technique analytical industry control protocol The logical sequence relationship of control instruction records control protocol control instruction and timing values.
Step 4: industrial control protocols Interaction context control planning chain being added in access control policy chain, guides and visits It asks control matched control strategy matching condition, utilizes the logic of big data processing technique analytical industry control protocol control instruction Sequential relationship, and the context of this access control instruction is calculated, and record.
Step 5: calculating the logical sequence value of this access control instruction.
Step 6: above-mentioned numerical value being matched by matching contextual policies, it fails to match then by packet loss, matching Success carries out further work.
Step 7: when the success of above-mentioned values match, needing to carry out matching timing strategy to it, it fails to match then by message It abandons, successful match carries out further work.
Step 8: when the success of above-mentioned values match, needing to carry out it to match industrial protocol white list, it fails to match then By packet loss, then message passes through successful match.
Current industrial control protocols white list access control technology is the fine-granularity access control of single dimension, when lacking Between dimension control, believable degree, such as modbus-TCP agreement can not be reached, it is sharp in Schneider Quantum series of PLC With No. 90 function codes in modbus agreement specification come start and stop PLC, there are many attacks that No. 90 function codes are utilized at present Production is destroyed, but PLC is carried out start and stop not representing being exactly to attack in industrial control network, because in industrial production environment It can schedule reboot PLC.There is such as modbus's to write register instruction again, although the product of market can learn to this at present Instruction, and white list is generated, but defect is that this instruction of Life cycle is all believable, but attacker often also can use The mesh that this instruction controls the industrial control equipments such as PLC, and then reaches its business, extorts, endangers national basis facility , so current industrial protocol white list technology can not accomplish the control to these risks, the control ring of industrial control equipment There is certain relevance in border, there is certain timing, so the white list control to industrial control protocols needs two dimensions Control, so as to further achieve the purpose that complete credible access control.
Specifically, the control environment of the industrial control equipment has certain relevance.
Control command access incidence relation modeling to industrial control equipment, above and below industrial control equipment control command Text association, that is, the control incidence relation modeling of control command sequence.
Specifically, the control environment of the industrial control equipment has certain timing.
Timing in the control access environment of industry control equipment is modeled, the execution of control command is carried out Relative time is analyzed and is calculated, to create the time Controlling model of corresponding different command white list.
Working principle: the present invention passes through first to be learnt for a long time, and the industrial control protocols obtained in industrial control network are handed over Change data, all control commands in each message in parsing industrial control protocols interaction pass through artificial intelligence and big data Technology finds out the control planning of industrial control protocols control command interaction, forms industrial control protocols Interaction context control planning Chain, and using the logical sequence relationship of big data processing technique analytical industry control protocol control instruction, record control protocol control System instruction and timing values, industrial control protocols Interaction context control planning chain are added in access control policy chain, are guided The matched control strategy matching condition of access control, utilizes patrolling for big data processing technique analytical industry control protocol control instruction Sequential relationship is collected, and calculates the context of this access control instruction, and record, when calculating the logic of this access control instruction Sequence value matches above-mentioned numerical value by matching contextual policies, and it fails to match then by packet loss, and successful match carries out down The work of one step needs to carry out matching timing strategy to it when the success of above-mentioned values match, and it fails to match then by packet loss, Successful match carries out further work, when the success of above-mentioned values match, needs to carry out it to match industrial protocol white list, With failure then by packet loss, then message passes through successful match.
In the description of the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or integral;It can be machinery Connection, is also possible to be electrically connected;It can be directly connected, two elements can also be can be indirectly connected through an intermediary The interaction relationship of internal connection or two elements.It for the ordinary skill in the art, can be with concrete condition Understand the concrete meaning of above-mentioned term in the present invention.
The standardized element that the present invention uses can commercially, and shaped piece is according to specification and attached drawing note Load can carry out customized, and the specific connection type of each part is all made of in the prior art mature bolt, rivet, welding etc. Conventional means, mechanical, part and equipment are all made of in the prior art, conventional model, in addition circuit connection uses the prior art Middle conventional connection type, this will not be detailed here.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (3)

1. the industry communications protocol white list access control based on timing, it is characterised in that: the following steps are included:
Step 1: being learnt by long-time, the industrial control protocols obtained in industrial control network exchange data.
Step 2: all control commands in each message in parsing industrial control protocols interaction.
Step 3: the control planning of industrial control protocols control command interaction, shape are found out by the technology of artificial intelligence and big data Refer at industrial control protocols Interaction context control planning chain, and using the control of big data processing technique analytical industry control protocol The logical sequence relationship of order records control protocol control instruction and timing values.
Step 4: industrial control protocols Interaction context control planning chain being added in access control policy chain, access control is guided Matched control strategy matching condition is made, the logical sequence of big data processing technique analytical industry control protocol control instruction is utilized Relationship, and the context of this access control instruction is calculated, and record.
Step 5: calculating the logical sequence value of this access control instruction.
Step 6: above-mentioned numerical value being matched by matching contextual policies, it fails to match then by packet loss, successful match Carry out further work.
Step 7: when the success of above-mentioned values match, need to carry out matching timing strategy to it, it fails to match then by packet loss, Successful match carries out further work.
Step 8: when the success of above-mentioned values match, needing to carry out it to match industrial protocol white list, it fails to match then will report Text abandons, and then message passes through successful match.
2. the industry communications protocol white list access control according to claim 1 based on timing, it is characterised in that: described The control environment of industrial control equipment has certain relevance.
3. the industry communications protocol white list access control according to claim 1 based on timing, it is characterised in that: described The control environment of industrial control equipment has certain timing.
CN201910692012.8A 2019-07-30 2019-07-30 Industrial communication protocol white list access control method based on time sequence Active CN110266735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910692012.8A CN110266735B (en) 2019-07-30 2019-07-30 Industrial communication protocol white list access control method based on time sequence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910692012.8A CN110266735B (en) 2019-07-30 2019-07-30 Industrial communication protocol white list access control method based on time sequence

Publications (2)

Publication Number Publication Date
CN110266735A true CN110266735A (en) 2019-09-20
CN110266735B CN110266735B (en) 2021-08-27

Family

ID=67912339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910692012.8A Active CN110266735B (en) 2019-07-30 2019-07-30 Industrial communication protocol white list access control method based on time sequence

Country Status (1)

Country Link
CN (1) CN110266735B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468488A (en) * 2020-11-25 2021-03-09 杭州安恒信息技术股份有限公司 Industrial anomaly monitoring method and device, computer equipment and readable storage medium
CN112666907A (en) * 2020-12-23 2021-04-16 北京天融信网络安全技术有限公司 Industrial control strategy generation method and device, electronic equipment and storage medium
CN116318993A (en) * 2023-03-16 2023-06-23 北京宏志国际科技有限公司 Method and system for defending network harmful instruction attack by Internet of things product

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118749A (en) * 2009-12-30 2011-07-06 比亚迪股份有限公司 Network access control device for mobile terminal and mobile terminal equipment
CN105939334A (en) * 2015-03-04 2016-09-14 费希尔-罗斯蒙特系统公司 Anomaly detection in industrial communications networks
CN107040551A (en) * 2017-06-12 2017-08-11 北京匡恩网络科技有限责任公司 A kind of industry control network safe early warning method and system
CN108848067A (en) * 2018-05-28 2018-11-20 北京威努特技术有限公司 The OPC protocol security means of defence of intelligence learning and preset read-only white list rule
CN109218288A (en) * 2018-08-01 2019-01-15 北京科技大学 A kind of Network Intrusion Detection System for industrial robot control system
US20190156445A1 (en) * 2017-11-22 2019-05-23 General Electric Company Application store for dynamically implementing licensing scheme
CN110011968A (en) * 2019-02-28 2019-07-12 郑州轨道交通信息技术研究院 A kind of tactful access control method based on industry control agreement general framework

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118749A (en) * 2009-12-30 2011-07-06 比亚迪股份有限公司 Network access control device for mobile terminal and mobile terminal equipment
CN105939334A (en) * 2015-03-04 2016-09-14 费希尔-罗斯蒙特系统公司 Anomaly detection in industrial communications networks
CN107040551A (en) * 2017-06-12 2017-08-11 北京匡恩网络科技有限责任公司 A kind of industry control network safe early warning method and system
US20190156445A1 (en) * 2017-11-22 2019-05-23 General Electric Company Application store for dynamically implementing licensing scheme
CN108848067A (en) * 2018-05-28 2018-11-20 北京威努特技术有限公司 The OPC protocol security means of defence of intelligence learning and preset read-only white list rule
CN109218288A (en) * 2018-08-01 2019-01-15 北京科技大学 A kind of Network Intrusion Detection System for industrial robot control system
CN110011968A (en) * 2019-02-28 2019-07-12 郑州轨道交通信息技术研究院 A kind of tactful access control method based on industry control agreement general framework

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468488A (en) * 2020-11-25 2021-03-09 杭州安恒信息技术股份有限公司 Industrial anomaly monitoring method and device, computer equipment and readable storage medium
CN112468488B (en) * 2020-11-25 2023-05-23 杭州安恒信息技术股份有限公司 Industrial anomaly monitoring method, industrial anomaly monitoring device, computer equipment and readable storage medium
CN112666907A (en) * 2020-12-23 2021-04-16 北京天融信网络安全技术有限公司 Industrial control strategy generation method and device, electronic equipment and storage medium
CN112666907B (en) * 2020-12-23 2022-04-01 北京天融信网络安全技术有限公司 Industrial control strategy generation method and device, electronic equipment and storage medium
CN116318993A (en) * 2023-03-16 2023-06-23 北京宏志国际科技有限公司 Method and system for defending network harmful instruction attack by Internet of things product
CN116318993B (en) * 2023-03-16 2023-10-27 北京宏志国际科技有限公司 Method and system for defending network harmful instruction attack by Internet of things product

Also Published As

Publication number Publication date
CN110266735B (en) 2021-08-27

Similar Documents

Publication Publication Date Title
CN110266735A (en) Industry communications protocol white list access control based on timing
US20160330222A1 (en) System and methodology providing automation security analysis and network intrusion protection in an industrial environment
US20190220374A1 (en) Cyberattack-resilient control system design
Lemaire et al. A SysML extension for security analysis of industrial control systems
CN102984170A (en) System and method for safe filtering of industrial control network
JP2021515498A (en) Attribute-based policies for integrity monitoring and network intrusion detection
Escudero et al. Process-aware model based IDSs for industrial control systems cybersecurity: approaches, limits and further research
CN112738063A (en) Industrial control system network safety monitoring platform
CN103814501A (en) Diagnosis for GOOSE communication
CN114371682A (en) PLC control logic attack detection method and device
CN105786500A (en) Automatic generation method of embedded controller program framework
CN114168152A (en) Business application development and business operation and maintenance management system based on machine learning
Biró et al. Safe and secure cyber‐physical systems
Havlena et al. Accurate Automata-Based Detection of Cyber Threats in Smart Grid Communication
Kumar et al. IIoT-IDS network using inception CNN model
Anwar et al. Automatic security assessment of critical cyber-infrastructures
Larrinaga et al. Implementation of a reference architecture for cyber physical systems to support condition based maintenance
CN109754225A (en) A kind of design method and device of the monitoring system of the formulation of generation schedule a few days ago process
CN113837281B (en) Metallurgical factory Internet platform and data regeneration method
CN104009859A (en) Operation work order automatic processing method based on monitoring information
CN114760151A (en) Method and device for acquiring authority of upper computer through PLC
CN104468149B (en) Information processing method, intelligent terminal and cable network system
CN105005486A (en) Program online upgrading system and method for intelligent transformer substation equipment
Yao et al. AOIFF: a precise attack method for PLCs based on awareness of industrial field information
EP4099656A1 (en) Computer-implemented method and surveillance arrangement for identifying manipulations of cyber-physical-systems as well as computer-implemented-tool and cyber-physical-system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant