CN112398829A - 一种电力系统的网络攻击模拟方法及系统 - Google Patents
一种电力系统的网络攻击模拟方法及系统 Download PDFInfo
- Publication number
- CN112398829A CN112398829A CN202011216314.7A CN202011216314A CN112398829A CN 112398829 A CN112398829 A CN 112398829A CN 202011216314 A CN202011216314 A CN 202011216314A CN 112398829 A CN112398829 A CN 112398829A
- Authority
- CN
- China
- Prior art keywords
- module
- target host
- trojan
- attack
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000004088 simulation Methods 0.000 title claims abstract description 19
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 claims abstract description 94
- 230000008569 process Effects 0.000 claims abstract description 15
- 238000009826 distribution Methods 0.000 claims description 52
- 238000012360 testing method Methods 0.000 claims description 29
- 230000035515 penetration Effects 0.000 claims description 12
- 230000004083 survival effect Effects 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 claims description 8
- 241000283086 Equidae Species 0.000 claims description 3
- 230000008595 infiltration Effects 0.000 claims 1
- 238000001764 infiltration Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 13
- 230000000694 effects Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000002347 injection Methods 0.000 description 7
- 239000007924 injection Substances 0.000 description 7
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 241000700605 Viruses Species 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 238000012550 audit Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 235000009421 Myristica fragrans Nutrition 0.000 description 1
- 241000761456 Nops Species 0.000 description 1
- 206010033799 Paralysis Diseases 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000000740 bleeding effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000008260 defense mechanism Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000007943 implant Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 239000001115 mace Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Virology (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011216314.7A CN112398829A (zh) | 2020-11-04 | 2020-11-04 | 一种电力系统的网络攻击模拟方法及系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011216314.7A CN112398829A (zh) | 2020-11-04 | 2020-11-04 | 一种电力系统的网络攻击模拟方法及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112398829A true CN112398829A (zh) | 2021-02-23 |
Family
ID=74598794
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011216314.7A Pending CN112398829A (zh) | 2020-11-04 | 2020-11-04 | 一种电力系统的网络攻击模拟方法及系统 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112398829A (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113158184A (zh) * | 2021-03-03 | 2021-07-23 | 中国人民解放军战略支援部队信息工程大学 | 基于有限状态自动机的攻击脚本生成方法及相关装置 |
CN113221124A (zh) * | 2021-05-27 | 2021-08-06 | 杭州安恒信息安全技术有限公司 | 一种基于Nmap和Metasploit的安全漏洞扫描发布系统及方法 |
CN116506236A (zh) * | 2023-06-30 | 2023-07-28 | 北京华云安信息技术有限公司 | 基于节点层级连接的横向网络安全测试方法、装置及设备 |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100138925A1 (en) * | 2007-05-24 | 2010-06-03 | Bikash Barai | Method and system simulating a hacking attack on a network |
CN102468985A (zh) * | 2010-11-01 | 2012-05-23 | 北京神州绿盟信息安全科技股份有限公司 | 针对网络安全设备进行渗透测试的方法和系统 |
CN104468267A (zh) * | 2014-11-24 | 2015-03-25 | 国家电网公司 | 一种配电自动化系统信息安全渗透测试方法 |
CN105827642A (zh) * | 2016-05-16 | 2016-08-03 | 深圳市安络科技有限公司 | 一种自动化渗透测试方法及系统 |
WO2019169486A1 (en) * | 2018-03-05 | 2019-09-12 | EzoTech Inc. | Automated security testing system and method |
CN110677381A (zh) * | 2019-08-14 | 2020-01-10 | 奇安信科技集团股份有限公司 | 渗透测试的方法及装置、存储介质、电子装置 |
CN110768948A (zh) * | 2019-08-14 | 2020-02-07 | 奇安信科技集团股份有限公司 | 漏洞检测的方法及装置、存储介质、电子装置 |
CN110880983A (zh) * | 2019-08-14 | 2020-03-13 | 奇安信科技集团股份有限公司 | 基于场景的渗透测试方法及装置、存储介质、电子装置 |
CN111027074A (zh) * | 2019-12-05 | 2020-04-17 | 国网浙江省电力有限公司电力科学研究院 | 一种漏洞自动化利用方法以及系统 |
CN111488587A (zh) * | 2020-04-17 | 2020-08-04 | 北京墨云科技有限公司 | 一种基于ai的自动化渗透测试系统 |
-
2020
- 2020-11-04 CN CN202011216314.7A patent/CN112398829A/zh active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100138925A1 (en) * | 2007-05-24 | 2010-06-03 | Bikash Barai | Method and system simulating a hacking attack on a network |
CN102468985A (zh) * | 2010-11-01 | 2012-05-23 | 北京神州绿盟信息安全科技股份有限公司 | 针对网络安全设备进行渗透测试的方法和系统 |
CN104468267A (zh) * | 2014-11-24 | 2015-03-25 | 国家电网公司 | 一种配电自动化系统信息安全渗透测试方法 |
CN105827642A (zh) * | 2016-05-16 | 2016-08-03 | 深圳市安络科技有限公司 | 一种自动化渗透测试方法及系统 |
WO2019169486A1 (en) * | 2018-03-05 | 2019-09-12 | EzoTech Inc. | Automated security testing system and method |
US20210029154A1 (en) * | 2018-03-05 | 2021-01-28 | EzoTech Inc. | Automated security testing system and method |
CN110677381A (zh) * | 2019-08-14 | 2020-01-10 | 奇安信科技集团股份有限公司 | 渗透测试的方法及装置、存储介质、电子装置 |
CN110768948A (zh) * | 2019-08-14 | 2020-02-07 | 奇安信科技集团股份有限公司 | 漏洞检测的方法及装置、存储介质、电子装置 |
CN110880983A (zh) * | 2019-08-14 | 2020-03-13 | 奇安信科技集团股份有限公司 | 基于场景的渗透测试方法及装置、存储介质、电子装置 |
CN111027074A (zh) * | 2019-12-05 | 2020-04-17 | 国网浙江省电力有限公司电力科学研究院 | 一种漏洞自动化利用方法以及系统 |
CN111488587A (zh) * | 2020-04-17 | 2020-08-04 | 北京墨云科技有限公司 | 一种基于ai的自动化渗透测试系统 |
Non-Patent Citations (2)
Title |
---|
孙亮等: "基于UEFI固件的攻击验证技术研究", 《信息安全与通信保密》 * |
张昊等: "网络安全漏洞检测技术研究及应用", 《网络空间安全》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113158184A (zh) * | 2021-03-03 | 2021-07-23 | 中国人民解放军战略支援部队信息工程大学 | 基于有限状态自动机的攻击脚本生成方法及相关装置 |
CN113158184B (zh) * | 2021-03-03 | 2023-05-19 | 中国人民解放军战略支援部队信息工程大学 | 基于有限状态自动机的攻击脚本生成方法及相关装置 |
CN113221124A (zh) * | 2021-05-27 | 2021-08-06 | 杭州安恒信息安全技术有限公司 | 一种基于Nmap和Metasploit的安全漏洞扫描发布系统及方法 |
CN116506236A (zh) * | 2023-06-30 | 2023-07-28 | 北京华云安信息技术有限公司 | 基于节点层级连接的横向网络安全测试方法、装置及设备 |
CN116506236B (zh) * | 2023-06-30 | 2023-09-12 | 北京华云安信息技术有限公司 | 基于节点层级连接的横向网络安全测试方法、装置及设备 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107888607B (zh) | 一种网络威胁检测方法、装置及网络管理设备 | |
US10354072B2 (en) | System and method for detection of malicious hypertext transfer protocol chains | |
EP4027604A1 (en) | Security vulnerability defense method and device | |
EP2008188B1 (en) | Software vulnerability exploitation shield | |
US8006305B2 (en) | Computer worm defense system and method | |
CN112398829A (zh) | 一种电力系统的网络攻击模拟方法及系统 | |
CN111641620A (zh) | 用于检测进化DDoS攻击的新型云蜜罐方法及架构 | |
JP2012064208A (ja) | ネットワークウイルス防止方法及びシステム | |
CN115208634A (zh) | 一种网络资产的监管引擎 | |
Yamada et al. | RAT-based malicious activities detection on enterprise internal networks | |
CN114301647B (zh) | 态势感知中漏洞信息的预测防御方法、装置及系统 | |
KR20120137326A (ko) | 악성도메인을 검출하기 위한 방법 및 장치 | |
Khosravifar et al. | An experience improving intrusion detection systems false alarm ratio by using honeypot | |
Auliar et al. | Security in iot-based smart homes: A taxonomy study of detection methods of mirai malware and countermeasures | |
WO2017217247A1 (ja) | 悪性イベント検出装置、悪性イベント検出方法および悪性イベント検出プログラム | |
Diebold et al. | A honeypot architecture for detecting and analyzing unknown network attacks | |
Stiawan et al. | Penetration testing and network auditing: Linux | |
KR20200092508A (ko) | IoT 기기 악성코드 분석을 위한 대규모 허니팟 시스템 | |
Bansal et al. | Analysis and Detection of various DDoS attacks on Internet of Things Network | |
CN114553513A (zh) | 一种通信检测方法、装置及设备 | |
KR101606088B1 (ko) | 악성 코드 탐지 방법 및 장치 | |
Garg et al. | Analysis and categorization of emotet iot botnet malware | |
CN115208596B (zh) | 网络入侵防御方法、装置及存储介质 | |
CN115225297B (zh) | 一种阻断网络入侵的方法及装置 | |
Paxton et al. | Collecting and analyzing bots in a systematic honeynet-based testbed environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
CB03 | Change of inventor or designer information |
Inventor after: Liu Yongmei Inventor after: Yu Tongwei Inventor after: Chang Fangyuan Inventor after: Han Zilong Inventor after: Li Erxia Inventor after: Yang Honglei Inventor after: Sun Zhitao Inventor after: Dong Zhiwei Inventor after: Lu Yan Inventor after: Zhu Yu Inventor before: Liu Yongmei Inventor before: Chang Fangyuan Inventor before: Han Zilong Inventor before: Li Erxia Inventor before: Yang Honglei Inventor before: Sun Zhitao |
|
CB03 | Change of inventor or designer information | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210223 |