CN111881451A - 一种工业控制系统的漏洞关联挖掘方法 - Google Patents
一种工业控制系统的漏洞关联挖掘方法 Download PDFInfo
- Publication number
- CN111881451A CN111881451A CN202010684099.7A CN202010684099A CN111881451A CN 111881451 A CN111881451 A CN 111881451A CN 202010684099 A CN202010684099 A CN 202010684099A CN 111881451 A CN111881451 A CN 111881451A
- Authority
- CN
- China
- Prior art keywords
- vulnerability
- industrial control
- authority
- control system
- ics
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/214—Generating training patterns; Bootstrap methods, e.g. bagging or boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/243—Classification techniques relating to the number of classes
- G06F18/24323—Tree-organised classifiers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- General Physics & Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Biophysics (AREA)
- Molecular Biology (AREA)
- Mathematical Physics (AREA)
- General Health & Medical Sciences (AREA)
- Computational Linguistics (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Biomedical Technology (AREA)
- Health & Medical Sciences (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010684099.7A CN111881451B (zh) | 2020-07-16 | 2020-07-16 | 一种工业控制系统的漏洞关联挖掘方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010684099.7A CN111881451B (zh) | 2020-07-16 | 2020-07-16 | 一种工业控制系统的漏洞关联挖掘方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111881451A true CN111881451A (zh) | 2020-11-03 |
CN111881451B CN111881451B (zh) | 2022-09-30 |
Family
ID=73155460
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010684099.7A Active CN111881451B (zh) | 2020-07-16 | 2020-07-16 | 一种工业控制系统的漏洞关联挖掘方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111881451B (zh) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113010895A (zh) * | 2020-12-08 | 2021-06-22 | 四川大学 | 一种基于深度学习的漏洞危害评估指标技术 |
CN113076541A (zh) * | 2021-03-09 | 2021-07-06 | 麒麟软件有限公司 | 一种基于反向传播神经网络的操作系统的漏洞评分模型和方法 |
CN114244824A (zh) * | 2021-11-25 | 2022-03-25 | 国家计算机网络与信息安全管理中心河北分中心 | 一种网络空间WEB类资产风险Server同性快速识别的方法 |
CN115033881A (zh) * | 2022-08-12 | 2022-09-09 | 中国电子科技集团公司第三十研究所 | Plc控制器病毒检测方法、装置、设备及存储介质 |
CN115225348A (zh) * | 2022-06-29 | 2022-10-21 | 北京天融信网络安全技术有限公司 | 一种获取网络威胁情报的方法、装置、介质及设备 |
CN115225336A (zh) * | 2022-06-24 | 2022-10-21 | 中国人民解放军国防科技大学 | 一种面向网络环境的漏洞可利用性的计算方法及装置 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106897625A (zh) * | 2017-01-22 | 2017-06-27 | 北京理工大学 | 支持漏洞关联性挖掘的漏洞自动分类方法 |
CN107196955A (zh) * | 2017-06-15 | 2017-09-22 | 北京理工大学 | 基于漏洞关联性分析的网络系统主动防御方法 |
JP6608569B1 (ja) * | 2018-01-19 | 2019-11-20 | 三菱電機株式会社 | セキュリティ設計装置、セキュリティ設計方法およびセキュリティ設計プログラム |
-
2020
- 2020-07-16 CN CN202010684099.7A patent/CN111881451B/zh active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106897625A (zh) * | 2017-01-22 | 2017-06-27 | 北京理工大学 | 支持漏洞关联性挖掘的漏洞自动分类方法 |
CN107196955A (zh) * | 2017-06-15 | 2017-09-22 | 北京理工大学 | 基于漏洞关联性分析的网络系统主动防御方法 |
JP6608569B1 (ja) * | 2018-01-19 | 2019-11-20 | 三菱電機株式会社 | セキュリティ設計装置、セキュリティ設計方法およびセキュリティ設計プログラム |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113010895A (zh) * | 2020-12-08 | 2021-06-22 | 四川大学 | 一种基于深度学习的漏洞危害评估指标技术 |
CN113076541A (zh) * | 2021-03-09 | 2021-07-06 | 麒麟软件有限公司 | 一种基于反向传播神经网络的操作系统的漏洞评分模型和方法 |
CN113076541B (zh) * | 2021-03-09 | 2023-06-27 | 麒麟软件有限公司 | 一种基于反向传播神经网络的操作系统的漏洞评分模型和方法 |
CN114244824A (zh) * | 2021-11-25 | 2022-03-25 | 国家计算机网络与信息安全管理中心河北分中心 | 一种网络空间WEB类资产风险Server同性快速识别的方法 |
CN114244824B (zh) * | 2021-11-25 | 2024-05-03 | 国家计算机网络与信息安全管理中心河北分中心 | 一种网络空间WEB类资产风险Server同性快速识别的方法 |
CN115225336A (zh) * | 2022-06-24 | 2022-10-21 | 中国人民解放军国防科技大学 | 一种面向网络环境的漏洞可利用性的计算方法及装置 |
CN115225336B (zh) * | 2022-06-24 | 2023-08-08 | 中国人民解放军国防科技大学 | 一种面向网络环境的漏洞可利用性的计算方法及装置 |
CN115225348A (zh) * | 2022-06-29 | 2022-10-21 | 北京天融信网络安全技术有限公司 | 一种获取网络威胁情报的方法、装置、介质及设备 |
CN115033881A (zh) * | 2022-08-12 | 2022-09-09 | 中国电子科技集团公司第三十研究所 | Plc控制器病毒检测方法、装置、设备及存储介质 |
CN115033881B (zh) * | 2022-08-12 | 2022-12-09 | 中国电子科技集团公司第三十研究所 | Plc控制器病毒检测方法、装置、设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN111881451B (zh) | 2022-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111881451B (zh) | 一种工业控制系统的漏洞关联挖掘方法 | |
CN106897625B (zh) | 支持漏洞关联性挖掘的漏洞自动分类方法 | |
Murali et al. | A survey on intrusion detection approaches | |
CN111641634B (zh) | 一种基于蜜网的工业控制网络主动防御系统及其方法 | |
Ebrahimi et al. | Binary black-box evasion attacks against deep learning-based static malware detectors with adversarial byte-level language model | |
Dalai et al. | Neutralizing SQL injection attack using server side code modification in web applications | |
CN115622738A (zh) | 一种基于rbf神经网络安全应急处置系统及应急处置方法 | |
CN114091042A (zh) | 风险预警方法 | |
Alhassan et al. | A fuzzy classifier-based penetration testing for web applications | |
CN116996286A (zh) | 一种基于大数据分析的网络攻击和安全漏洞治理框架平台 | |
Demilie et al. | Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques | |
Mehmood et al. | Privilege escalation attack detection and mitigation in cloud using machine learning | |
CN112287345B (zh) | 基于智能风险检测的可信边缘计算系统 | |
Adebiyi et al. | An SQL injection detection model using chi-square with classification techniques | |
Alkhathami et al. | ‘Detection of SQL injection attacks using machine learning in cloud computing platform | |
CN112637108B (zh) | 一种基于异常检测和情感分析的内部威胁分析方法及系统 | |
AL-Maliki et al. | Comparison study for NLP using machine learning techniques to detecting SQL injection vulnerabilities | |
Song et al. | Generating Fake Cyber Threat Intelligence Using the GPT-Neo Model | |
CN111368291A (zh) | 一种类蜜罐防御的实现方法及系统 | |
Liu et al. | AI electronic products information security research | |
Al-Jarrah et al. | Hierarchical detection of insider attacks in cloud computing systems | |
Sarjitus et al. | Neutralizing SQL injection attack on web application using server side code modification | |
Vani et al. | Forecasting of Network Intrusion by means of Efficient Machine Learning Algorithm | |
Kodati et al. | Ensemble Framework of Artificial immune system based on Network Intrusion Detection System for Network Security Sustainability | |
Mohapatra et al. | Malware Detection using Artificial Intelligence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information |
Inventor after: Wang Zibo Inventor after: Qu Haikuo Inventor after: Liu Zhiyao Inventor after: Wang Bailing Inventor after: Zhang Ge Inventor after: Liu Yang Inventor before: Qu Haikuo Inventor before: Wang Zibo Inventor before: Liu Zhiyao Inventor before: Wang Bailing Inventor before: Zhang Ge Inventor before: Liu Yang |
|
CB03 | Change of inventor or designer information |