CN112995122A - Industrial control network security data visualization system and equipment - Google Patents

Industrial control network security data visualization system and equipment Download PDF

Info

Publication number
CN112995122A
CN112995122A CN202010219923.1A CN202010219923A CN112995122A CN 112995122 A CN112995122 A CN 112995122A CN 202010219923 A CN202010219923 A CN 202010219923A CN 112995122 A CN112995122 A CN 112995122A
Authority
CN
China
Prior art keywords
data
industrial control
network security
control network
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010219923.1A
Other languages
Chinese (zh)
Other versions
CN112995122B (en
Inventor
李敏
李文强
李高明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changyang Tech Beijing Co ltd
Original Assignee
Changyang Tech Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changyang Tech Beijing Co ltd filed Critical Changyang Tech Beijing Co ltd
Priority to CN202010219923.1A priority Critical patent/CN112995122B/en
Publication of CN112995122A publication Critical patent/CN112995122A/en
Application granted granted Critical
Publication of CN112995122B publication Critical patent/CN112995122B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/26Visual data mining; Browsing structured data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Testing And Monitoring For Control Systems (AREA)

Abstract

The application provides a visual system of industrial control network security data and equipment, the system includes: the data acquisition module is used for acquiring network security data generated by the industrial control equipment by utilizing a host probe technology, a flow monitoring technology and an anomaly detection technology; the data mining module is electrically connected with the data acquisition module and is used for mining the acquired network security data; and the data visualization module is electrically connected with the data mining module and is used for graphically representing the mined industrial control safety data so as to show the industrial control safety data and the variation trend of the industrial control safety data. By the aid of the system, data acquisition and mining efficiency and data visualization quality can be improved.

Description

Industrial control network security data visualization system and equipment
Technical Field
The application relates to the field of network security, in particular to an industrial control network security data visualization system and equipment.
Background
Compared with the traditional information security, the industrial control system security has unique characteristics. The industrial control system is initially a special system, an operating system and a communication protocol of the industrial control system are greatly different from those of a common system, compared with an open internet environment, the industrial control system is relatively independent, the industrial control system is designed to complete various real-time control functions at the beginning, and the problem of safety protection is not considered.
However, with the development of computer and network technologies, along with the trend of "industrial 4.0", "two-way integration", and "internet +", the network security problem of the traditional industrial control system (for short, industrial control security) has become a serious challenge for enterprise and national security, and is concerned by more and more enterprises and governments, the industrial control system has been developed after undergoing a closed state for a long time, and the industrial control system exposes itself on the internet through network interconnection, so that the system itself is easily attacked by viruses, trojans, and hackers from the enterprise management network or the internet, and key infrastructure, important systems, etc. controlled by the industrial control system have huge security risks and hidden dangers.
On one hand, the situation visualization technology of the traditional network security enterprise mainly describes the host exposed at the internet end, the threat situation of the business host placed in the enterprise office network and the operation condition of the host, so as to form the network security situation display. On the other hand, the traditional industrial field monitoring is displayed by taking a control mode operation state generated by a certain industrial control system as a monitoring point. From the above, the conventional network security technology does not combine the characteristics of the industrial control system.
Disclosure of Invention
In view of this, an object of the present application is to provide an industrial control network security data visualization system and an apparatus, so as to solve the problems of low data acquisition and mining efficiency and poor data visualization quality in the prior art.
Based on the above purpose, the present application provides an industrial control network security data visualization system, which includes:
the data acquisition module is used for acquiring network security data generated by the industrial control equipment by utilizing a host probe technology, a flow monitoring technology and an anomaly detection technology;
the data mining module is electrically connected with the data acquisition module and is used for mining the acquired network security data;
and the data visualization module is electrically connected with the data mining module and is used for graphically representing the mined industrial control safety data so as to show the industrial control safety data and the variation trend of the industrial control safety data.
In one embodiment, the data acquisition module comprises:
the host probe unit is used for probing host information in a passive monitoring mode so as to acquire the running state security configuration or alarm log of the host;
the traffic monitoring unit is used for sniffing the network running state by adopting a network traffic mirroring technology and acquiring network threats and original information by combining an abnormal rule detection mechanism and an original traffic extraction mechanism;
and the message queue unit is used for transmitting and acquiring network information in real time by adopting a Kafka high-performance message queue.
Kafka is an open source stream processing platform developed by the Apache software foundation, written in Scala and Java. Kafka is a high throughput distributed publish-subscribe messaging system that can handle real-time streaming data. These data are typically addressed by handling logs and log aggregations due to throughput requirements. This is a viable solution to the limitations of logging data like the Elasticsearch and off-line analysis systems, but requiring real-time processing. The purpose of Kafka is to unify online and offline message processing through the parallel loading mechanism of the Elasticsearch, and also to provide real-time messages through clustering.
In one embodiment, the data mining module comprises:
the data preprocessing unit is used for preprocessing and converting the network information passing through the Kafka to obtain industrial control network security data;
and the clustering and classifying unit is electrically connected with the data preprocessing unit and is used for clustering and classifying the industrial control network safety data and storing the clustered and classified industrial control network safety data into a database.
In one embodiment, the data visualization module comprises:
the micro-service interface unit is used for building a micro-service interface by adopting a Spring closed framework and providing front-end calling;
and the visual component unit is electrically connected with the micro-service interface unit and is used for constructing the front end by adopting Angularlarts, Echarts, D3JS and Threejs.
In one embodiment, the system further comprises:
and the data storage module is electrically connected with the data acquisition module and is used for storing the acquired network security data by utilizing the relational data and NOSQL big data storage technology.
In one embodiment, the data storage module comprises:
and the big data storage unit is used for storing mass logs by adopting an elastic search non-relational database and performing word segmentation processing according to the network threat keywords.
An apparatus comprising at least one industrial control network security data visualization system as described in any one of the above.
The application provides a visual system of industrial control network security data and equipment, the system includes: the data acquisition module is used for acquiring network security data generated by the industrial control equipment by utilizing a host probe technology, a flow monitoring technology and an anomaly detection technology; the data mining module is electrically connected with the data acquisition module and is used for mining the acquired network security data; and the data visualization module is electrically connected with the data mining module and is used for graphically representing the mined industrial control safety data so as to show the industrial control safety data and the variation trend of the industrial control safety data. By the aid of the system, data acquisition and mining efficiency and data visualization quality can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic structural diagram of an industrial control network security data visualization system according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an industrial control asset location of an industrial control network security data visualization system according to an embodiment of the present application;
fig. 3 is a schematic diagram of industrial control vulnerabilities of an industrial control network security data visualization system according to an embodiment of the present application;
fig. 4 is a schematic supply chain analysis diagram of an industrial control network security data visualization system according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below with reference to the accompanying drawings in combination with specific embodiments.
It should be noted that technical terms or scientific terms used in the embodiments of the present application should have a general meaning as understood by those having ordinary skill in the art to which the present disclosure belongs, unless otherwise defined. The use of "first," "second," and similar terms in this disclosure is not intended to indicate any order, quantity, or importance, but rather is used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", and the like are used merely to indicate relative positional relationships, and when the absolute position of the object being described is changed, the relative positional relationships may also be changed accordingly.
In order to facilitate understanding of the present application, the following keywords are required to be described, specifically as follows:
industrial control terminal: the system refers to a host machine for running various industrial control software under an industrial control environment, and comprises an engineer station, an operator station and the like.
An industrial control system: the system mainly utilizes the combination of electronics, electricity, machinery and software to realize the automatic process control in a certain industrial field.
An industrial control protocol: and the protocol used when the uplink and downlink host machines transmit communication messages on the industrial control host machine or the laboratory host machine is indicated.
The invention aims to provide a system for carrying out data visualization on the industrial control network security.
The purpose of the invention can be realized by the following technical scheme:
with reference to fig. 1, an industrial control network security data visualization system is used for displaying detailed data related to network security of an industrial control system and corresponding variation trend, and the system includes:
the data acquisition module is used for collecting network information and network safety information generated by the industrial control equipment by utilizing a host probe technology, a flow monitoring technology and an anomaly detection technology;
the data mining module is used for mining industrial control network safety data acquired by data;
the data storage module is used for storing the acquired data by utilizing the relational data and NOSQL big data storage technology;
the data visualization module is used for graphically representing the mined and calculated industrial control safety data and displaying specific industrial control safety data and the change trend of the industrial control safety data;
the data acquisition module further comprises:
the host probe unit is used for probing host information in a passive monitoring mode so as to acquire the running state security configuration or alarm log of the host;
the traffic monitoring unit adopts a network traffic mirroring technology, sniffs the running state of the network, combines an abnormal rule detection mechanism and an original traffic extraction mechanism to acquire network threats and original information;
the message queue unit adopts a Kafka high-performance message queue to transmit the acquired information in real time;
the data mining module further comprises:
the data preprocessing unit is used for preprocessing and converting the data passing through the Kafka;
the clustering and classifying unit is used for clustering and classifying the preprocessed industrial control network safety data and storing the clustered and classified data into a database;
the data storage module further comprises:
the big data storage unit is used for storing mass logs by adopting an elastic search non-relational database and performing word segmentation processing according to network threat keywords;
the data visualization module further comprises:
the micro-service interface unit is used for building a micro-service interface by adopting a Springbound framework and providing front-end calling;
and the visual component unit adopts Angularlarts, Echarts, D3JS and Threejs for front-end construction.
As can be seen from fig. 2 to 4, the present application has the following advantages:
1) the data acquisition module adopts a host probe, log collection and flow mirror multimode acquisition, and is more comprehensive and effective compared with the traditional method of only collecting log alarm information;
2) the message queue is used for carrying out load balance on the data of a plurality of sources, so that the efficiency and the quality of data acquisition are further improved;
3) the mining module firstly preprocesses the data and then performs clustering and classification, so that the mining effect is enhanced, and the quality of the mined data is improved;
4) the whole system is divided into four parts of data acquisition, data mining, data storage and data visualization, and the whole system is mutually decoupled and is convenient to maintain;
5) the visualization unit comprises advanced visualization tools such as Angularlarts, Echarts, D3JS and Threejs, so that the data visualization effect is guaranteed;
6) and tracking an 'attack chain' in the process of fusing network security attack, carrying out visual analysis and drawing, and deeply perceiving APT attack.
While the present application has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of these embodiments will be apparent to those of ordinary skill in the art in light of the foregoing description. The embodiments of the present application are intended to embrace all such alternatives, modifications and variances that fall within the broad scope of the appended claims. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the application are intended to be included within the scope of the application.

Claims (7)

1. An industrial control network security data visualization system, characterized in that the system comprises:
the data acquisition module is used for acquiring network security data generated by the industrial control equipment by utilizing a host probe technology, a flow monitoring technology and an anomaly detection technology;
the data mining module is electrically connected with the data acquisition module and is used for mining the acquired network security data;
and the data visualization module is electrically connected with the data mining module and is used for graphically representing the mined industrial control safety data so as to show the industrial control safety data and the variation trend of the industrial control safety data.
2. The industrial control network security data visualization system according to claim 1, wherein the data acquisition module comprises:
the host probe unit is used for probing host information in a passive monitoring mode so as to acquire the running state security configuration or alarm log of the host;
the traffic monitoring unit is used for sniffing the network running state by adopting a network traffic mirroring technology and acquiring network threats and original information by combining an abnormal rule detection mechanism and an original traffic extraction mechanism;
and the message queue unit is used for transmitting and acquiring network information in real time by adopting a Kafka high-performance message queue.
3. The industrial control network security data visualization system according to claim 1, wherein the data mining module comprises:
the data preprocessing unit is used for preprocessing and converting the network information passing through the Kafka to obtain industrial control network security data;
and the clustering and classifying unit is electrically connected with the data preprocessing unit and is used for clustering and classifying the industrial control network safety data and storing the clustered and classified industrial control network safety data into a database.
4. The industrial control network security data visualization system according to claim 1, wherein the data visualization module comprises:
the micro-service interface unit is used for building a micro-service interface by adopting a Spring closed framework and providing front-end calling;
and the visual component unit is electrically connected with the micro-service interface unit and is used for constructing the front end by adopting Angularlarts, Echarts, D3JS and Threejs.
5. The industrial control network security data visualization system according to claim 1, wherein the system further comprises:
and the data storage module is electrically connected with the data acquisition module and is used for storing the acquired network security data by utilizing the relational data and NOSQL big data storage technology.
6. The industrial control network security data visualization system according to claim 1, wherein the data storage module comprises:
and the big data storage unit is used for storing mass logs by adopting an elastic search non-relational database and performing word segmentation processing according to the network threat keywords.
7. An apparatus, characterized in that the apparatus comprises at least an industrial control network security data visualization system as claimed in any one of claims 1 to 6.
CN202010219923.1A 2020-03-25 2020-03-25 Industrial control network safety data visualization system Active CN112995122B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010219923.1A CN112995122B (en) 2020-03-25 2020-03-25 Industrial control network safety data visualization system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010219923.1A CN112995122B (en) 2020-03-25 2020-03-25 Industrial control network safety data visualization system

Publications (2)

Publication Number Publication Date
CN112995122A true CN112995122A (en) 2021-06-18
CN112995122B CN112995122B (en) 2024-03-08

Family

ID=76344214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010219923.1A Active CN112995122B (en) 2020-03-25 2020-03-25 Industrial control network safety data visualization system

Country Status (1)

Country Link
CN (1) CN112995122B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108646722A (en) * 2018-07-18 2018-10-12 杭州安恒信息技术股份有限公司 A kind of industrial control system information security simulation model and terminal
CN109474607A (en) * 2018-12-06 2019-03-15 连云港杰瑞深软科技有限公司 A kind of industrial control network safeguard protection monitoring system
CN109840415A (en) * 2018-12-29 2019-06-04 江苏博智软件科技股份有限公司 A kind of industry control network Security Situation Awareness Systems
WO2020037634A1 (en) * 2018-08-24 2020-02-27 哈尔滨工程大学计算机科学与技术学院 Information monitoring system and method for industrial control device network, computer readable storage medium, and computer device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108646722A (en) * 2018-07-18 2018-10-12 杭州安恒信息技术股份有限公司 A kind of industrial control system information security simulation model and terminal
WO2020037634A1 (en) * 2018-08-24 2020-02-27 哈尔滨工程大学计算机科学与技术学院 Information monitoring system and method for industrial control device network, computer readable storage medium, and computer device
CN109474607A (en) * 2018-12-06 2019-03-15 连云港杰瑞深软科技有限公司 A kind of industrial control network safeguard protection monitoring system
CN109840415A (en) * 2018-12-29 2019-06-04 江苏博智软件科技股份有限公司 A kind of industry control network Security Situation Awareness Systems

Also Published As

Publication number Publication date
CN112995122B (en) 2024-03-08

Similar Documents

Publication Publication Date Title
US11516248B2 (en) Security system for detection and mitigation of malicious communications
CN107172022B (en) APT threat detection method and system based on intrusion path
CN102594623B (en) The data detection method of fire compartment wall and device
CN111343169B (en) System and method for gathering security resources and sharing information under industrial control environment
CN103593613A (en) Method, terminal, server and system for computer virus detection
CN110543506A (en) Data analysis method and device, electronic equipment and storage medium
CN109446042B (en) Log management method and system for intelligent electric equipment
CN110855461A (en) Log analysis method based on association analysis and rule base
CN110149303B (en) Party-school network security early warning method and early warning system
CN111800292A (en) Early warning method and device based on historical flow, computer equipment and storage medium
CN113179267B (en) Network security event correlation analysis method and system
CN104836815B (en) A kind of security incident retrogressive method and system based on log analysis function
CN113312321A (en) Abnormal monitoring method for traffic and related equipment
CN112732539A (en) Data responsibility adjustment early warning method and system based on personnel organization and post information transaction
CN112995122B (en) Industrial control network safety data visualization system
Ding et al. A data-driven based security situational awareness framework for power systems
CN115484326A (en) Method, system and storage medium for processing data
CN114282903A (en) City multisource data overall process integrated management system
Klinkhamhom et al. Threat Hunting for Digital Forensic Using GRR Rapid Response with NIST Framework
CN107819601A (en) A kind of safe O&M service architecture quickly and efficiently based on Spark
Xu et al. Research on condition monitoring platform for mineral processing equipment based on industrial cloud
US20240121268A1 (en) Using Neural Networks to Process Forensics and Generate Threat Intelligence Information
US20240064163A1 (en) System and method for risk-based observability of a computing platform
TWI776157B (en) Relay information real-time management system and method thereof
RU92550U1 (en) PASSWORD MANAGEMENT SYSTEM FOR ENCRYPTED FILES AND ARCHIVES (OPTIONS)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: Room 01, floor 1, building 104, No. 3 minzhuang Road, Haidian District, Beijing 100195

Applicant after: Changyang Technology (Beijing) Co.,Ltd.

Address before: 100195 2nd floor, building 3, yuquanhuigu phase II, No.3 minzhuang Road, Haidian District, Beijing

Applicant before: CHANGYANG TECH (BEIJING) Co.,Ltd.

Country or region before: China

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant