CN116880319A - Method, system, terminal and medium for identifying upper computer in industrial control system - Google Patents

Method, system, terminal and medium for identifying upper computer in industrial control system Download PDF

Info

Publication number
CN116880319A
CN116880319A CN202310984965.8A CN202310984965A CN116880319A CN 116880319 A CN116880319 A CN 116880319A CN 202310984965 A CN202310984965 A CN 202310984965A CN 116880319 A CN116880319 A CN 116880319A
Authority
CN
China
Prior art keywords
data packet
equipment
plc
industrial control
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310984965.8A
Other languages
Chinese (zh)
Other versions
CN116880319B (en
Inventor
郭锋
艾泽瑞
姚铮
阮涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Qi'an Information Technology Co ltd
Original Assignee
Zhejiang Qi'an Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Qi'an Information Technology Co ltd filed Critical Zhejiang Qi'an Information Technology Co ltd
Priority to CN202310984965.8A priority Critical patent/CN116880319B/en
Publication of CN116880319A publication Critical patent/CN116880319A/en
Application granted granted Critical
Publication of CN116880319B publication Critical patent/CN116880319B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • G05B19/0423Input/output
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/25Pc structure of the system
    • G05B2219/25257Microcontroller

Abstract

The application discloses an upper computer identification method in an industrial control system, which comprises the following steps: confirming an IP address range of the PLC equipment; setting the PLC equipment as one of ARP spoofing targets, sequentially attempting to set the rest of IPs as another target address in an enumeration mode, spoofing the PLC equipment to obtain a first data packet, capturing and monitoring the first data packet, wherein the first data packet comprises industrial control protocol interaction information; analyzing the industrial control protocol to obtain equipment information and protocol interaction for communication with the PLC equipment; using the data packet generated when the different IP address is used as another deception target as a second data packet, analyzing and decoding the first data packet and the second data packet, and determining the IP address of the equipment communicating with the first data packet and the second data packet; and confirming the upper computer equipment according to the IP address communicated with the PLC equipment. Based on ARP spoofing technology, the upper computer which is in industrial control protocol communication with the PLC equipment can be detected rapidly and effectively.

Description

Method, system, terminal and medium for identifying upper computer in industrial control system
Technical Field
The application relates to the technical field of industrial control, in particular to an upper computer identification method, an upper computer identification system, a terminal and a medium in an industrial control system.
Background
Industrial control systems are important infrastructure, and with the deep integration of informatization and industrialization, the information security situation of the industrial control systems is increasingly severe. Today's industrial control systems have undergone tremendous changes in control scale, control technology and information sharing, from initially simple controlled closed systems to now complex or advanced controlled open systems, with increasing incidents of cyber attacks against industrial control systems, which are facing unprecedented cyber security threats. Industrial control system protocols are becoming more and more interesting as important components of industrial control systems, communication of industrial control systems usually adopts communication protocols specific to industrial control systems, and the purpose of the industrial control system protocols is often to meet real-time operation requirements of large-scale distributed systems, and other functional requirements are mainly ignored in consideration of efficiency problems.
In modern industrial control systems, PLCs (programmable logic controllers) have become a common control device. PLCs control machines and processes by running programs, which have become an integral part of many industrial applications. However, industrial control systems also present some security risks, such as malicious attacks and cyber threats. Therefore, protecting the safety of industrial control systems has become an important task.
In industrial control systems, an upper computer is often used to communicate with a PLC to perform tasks such as monitoring and control. Since the PLC is generally connected to a network, an attacker may gain control over the PLC or tamper with the PLC's program through a network attack, thereby causing damage to the industrial control system. Therefore, a safe method is needed to detect and identify the host computer in communication with the PLC to protect the safety of the industrial control system.
In the prior art, some methods use network scanning techniques to probe PLC devices and then monitor and analyze the communications. This approach requires scanning the entire network, is inefficient, and is easily detected by network security devices. Other methods identify the host computer by directly monitoring network traffic on the PLC device, but such methods require changes or additions of devices to the PLC device, which may affect the normal operation of the PLC device.
In the field of industrial control systems, there have been many methods proposed to protect the safety of PLC devices and industrial control systems. The following are some common prior art:
a firewall: firewalls are commonly used to protect the network security of industrial control systems. They may deter attacks from external networks and limit access to internal networks. However, firewalls typically cannot detect and identify a host computer in communication with a PLC and thus cannot provide complete security protection.
Network scanning: network scanning is typically used to probe PLC devices on a network. However, this approach requires scanning the entire network, is inefficient, and is easily detected by network security devices.
Direct monitoring: the upper computer in communication with the PLC can be identified by directly monitoring the network traffic on the PLC device. However, this method requires modification or addition of equipment on the PLC equipment, which may affect the normal operation of the PLC equipment.
Signature detection: signature detection is a common intrusion detection method that identifies intrusion behavior by detecting specific patterns in network traffic. However, signature detection methods are generally unable to detect unknown attacks and may produce a large number of false positives.
Encrypted communication: the encryption communication can protect the communication security between the PLC device and the upper computer. However, encrypting communications requires encrypting and decrypting data, may reduce the speed of the communications, and may increase the complexity of the system.
While these techniques can provide some degree of protection, they all suffer from limitations that do not provide complete security. Therefore, a new method is needed to detect and identify the host computer in communication with the PLC to improve the safety of the industrial control system.
Disclosure of Invention
Aiming at the technical defects mentioned in the background art, the embodiment of the application aims to provide an upper computer identification method, an upper computer identification system, an upper computer identification terminal and an upper computer identification medium in an industrial control system, which can quickly and effectively detect an upper computer in industrial control protocol communication with a PLC device based on an ARP spoofing technology.
In order to achieve the above object, in a first aspect, an embodiment of the present application provides a method for identifying an upper computer in an industrial control system, including:
confirming an IP address range of the PLC equipment;
setting the PLC equipment as one of ARP spoofing targets, sequentially attempting to set the rest of IPs as another target address in an enumeration mode, and spoofing the PLC equipment to obtain a first data packet;
capturing and monitoring a first data packet, wherein the first data packet comprises industrial control protocol interaction information;
analyzing the industrial control protocol to obtain equipment information and protocol interaction for communication with the PLC equipment;
taking a data packet generated when the different IP address is taken as another spoofing target as a second data packet, analyzing and decoding the first data packet and the second data packet, and determining the IP address of equipment communicating with the PLC equipment;
and confirming the upper computer equipment according to the IP address of the equipment communicating with the PLC equipment.
In a second aspect, an embodiment of the present application provides an identification system for an upper computer in an industrial control system, which is characterized in that the identification system includes: the system comprises a confirmation module, a deception module, a capturing module, an analysis module and an upper computer identification module;
the confirmation module is used for confirming the IP address range of the PLC equipment;
the spoofing module is used for setting the PLC equipment as one of ARP spoofing targets, sequentially attempting to set the rest of IPs as another target address in an enumeration mode, and spoofing the PLC equipment to obtain a first data packet;
the capture module is used for capturing and monitoring a first data packet, and the first data packet comprises industrial control protocol interaction information;
the analysis module is used for analyzing the industrial control protocol to obtain equipment information and protocol interaction for communicating with the PLC equipment, taking a data packet generated when a different IP address is taken as another spoofing target as a second data packet, analyzing and decoding the first data packet and the second data packet, and determining the IP address of the equipment for communicating with the PLC equipment;
and the upper computer identification module confirms the upper computer equipment according to the IP address of the equipment communicating with the PLC equipment.
In a third aspect, an embodiment of the present application further provides an intelligent terminal, including a processor, an input device, an output device, and a memory, where the processor, the input device, the output device, and the memory are connected to each other, where the memory is configured to store a computer program, and the computer program includes program instructions, and the processor is configured to invoke the program instructions to perform a method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium storing a computer program comprising program instructions which, when executed by a processor, implement a method as described in the first aspect above.
The method for identifying the upper computer in the industrial control system provided by the embodiment of the application has the following advantages:
1. and the IP address of the upper computer of the PLC is accurately positioned, so that a manager can conveniently track and control network security.
2. Through ARP spoofing attack, the IP address of the upper computer of the PLC can be detected rapidly and effectively, and the success rate is high.
3. Capturing sniffing packets can help the manager to get deep knowledge of the traffic between the PLC and the host computer, helping to discover network security threats.
4. Industrial protocol analysis can help the manager to know the type of protocol used by the PLC and better grasp the operating condition of the PLC.
5. The IP identification function of the upper computer can provide more comprehensive information for the manager, and is beneficial to further improving the network security level.
The upper computer identification system, the terminal and the medium in the industrial control system provided by the embodiment of the application have the same inventive concept and the same beneficial effects as the upper computer identification method in the industrial control system, and are not described in detail herein.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
Fig. 1 is a flowchart of a method for identifying an upper computer in an industrial control system according to a first embodiment of the present application;
FIG. 2 is a block diagram of an industrial control system according to another embodiment of the present application;
fig. 3 is a block diagram of an intelligent terminal according to another embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Referring to fig. 1, an upper computer identification method in an industrial control system provided by an embodiment of the application includes the following steps:
s1, confirming an IP address range of a PLC device;
s2, setting the PLC equipment as one of ARP spoofing targets, sequentially attempting to set the rest of IPs as another target address in an enumeration mode, and spoofing the PLC equipment to obtain a first data packet;
s3, capturing and monitoring a first data packet, wherein the first data packet comprises industrial control protocol interaction information;
s4, analyzing the industrial control protocol to obtain equipment information and protocol interaction for communication with the PLC equipment;
s5, taking the data packet generated when the different IP address is taken as another deception target as a second data packet, analyzing and decoding the first data packet and the second data packet, and determining the IP address of the equipment which communicates with the PLC equipment;
and S6, confirming the upper computer equipment according to the IP address of the equipment communicating with the PLC equipment.
Specifically, in industrial control systems, the IP address of a PLC device is typically statically configured. The IP address field where the PLC device is located may be determined by scanning the management interface of the industrial switch or router, or manually probing the IP address range in the network.
ARP (Address Resolution Protocol), a TCP/IP protocol that obtains a physical address from an IP address. Broadcasting an ARP request containing a target IP address to all hosts on a local area network when the hosts send information, and receiving a return message so as to determine the physical address of the target; after receiving the return message, the IP address and the physical address are stored in the local ARP cache and kept for a certain time, and the ARP cache is directly inquired when the request is next time so as to save resources. And sending the forged ARP broadcast packet to the target PLC device by using an ARP spoofing technology. The specific method comprises the following steps: by setting the PLC device as one of the targets of ARP spoofing and then using an exhaustion or enumeration mode to try to set other IPs as another target address, the PLC device can be spoofed to mistaking the MAC address of a spoofer as the MAC address of a real gateway or an upper computer, and therefore the data packet is sent to the spoofer.
The specific method for capturing and monitoring the first data packet comprises the following steps: network traffic is monitored by a sniffer, such as Wireshark, to capture communication packets of the PLC device with other devices. The data packets contain detailed information of industrial control protocol interaction.
Analysis industry control protocols may use protocol analysis tools, such as Scapy or wireshark, to perform in-depth analysis on captured data packets to learn protocol interactions between PLC devices and other devices. By identifying and decoding the various fields and parameters in the industrial protocol, it is possible to understand the ongoing activities in the control system, through which it is possible to know which devices are in communication with the PLC device.
And confirming the IP address of the upper computer by analyzing the data packet. Before confirming which device is the upper computer, the data packet (second data packet) generated when the different IP is targeted for another ARP spoofing needs to be deeply analyzed and decoded, and the control protocol interaction between which device and the PLC device is determined. By analyzing the data packets, the IP address of the equipment communicating with the PLC equipment can be determined, and the detection and identification of the IP address of the upper computer are realized. And confirming the upper computer equipment according to the IP address of the equipment communicating with the PLC equipment.
The above embodiment will be described below using a specific example:
preparing a notebook computer carrying a kali system, accessing a current industrial control network environment by using a network cable connection mode, detecting the survival condition of equipment in the whole network section by using an Nmap tool in the notebook computer to obtain an equipment list of equipment survival, then carrying out full-port scanning or specific industrial control port scanning on each IP (Internet protocol) in the equipment list, carrying out fingerprint detection on a corresponding port after confirming the opening condition of the port, and preliminarily determining to be PLC equipment or other industrial control equipment. The notebook computer is used for starting the Ettercap to perform ARP spoofing, the spoofed target is divided into a target A and a target B, the target A is a PLC device determined through port fingerprint detection, and the target B is a non-industrial control device detected in a network segment, such as Windows system device. If 3 non-PLC devices are detected, the communication data packets of the target A and each device are respectively sniffed through ARP spoofing, and the data packets communicated with the industrial control protocol and the specific industrial control port are screened to confirm and locate which device is the upper computer of the target A.
The method for identifying the upper computer in the industrial control system can be used for safety protection of the industrial control system, can rapidly identify the network segment where the PLC equipment is located, and detects the upper computer which communicates with the industrial control protocol of the PLC equipment based on ARP spoofing technology. Through detection and identification of the upper computer, malicious attacks and security vulnerabilities can be effectively detected and prevented. Therefore, the upper computer identification method in the industrial control system provided by the embodiment has the characteristics of high efficiency, accuracy and reliability, and is suitable for various industrial control systems and computer networks.
The method for identifying the upper computer in the industrial control system has the advantages that:
1. and the IP address of the upper computer of the PLC is accurately positioned, so that a manager can conveniently track and control network security.
2. Through ARP spoofing attack, the IP address of the upper computer of the PLC can be detected rapidly and effectively, and the success rate is high.
3. Capturing sniffing packets can help the manager to get deep knowledge of the traffic between the PLC and the host computer, helping to discover network security threats.
4. Industrial protocol analysis can help the manager to know the type of protocol used by the PLC and better grasp the operating condition of the PLC.
5. The IP identification function of the upper computer can provide more comprehensive information for the manager, and is beneficial to further improving the network security level.
Referring to fig. 2, another embodiment of the present application provides an identification system of an upper computer in an industrial control system, including: the system comprises a confirmation module, a spoofing module, a capturing module, an analysis module and an upper computer identification module, wherein the confirmation module is used for confirming the IP address range of the PLC equipment, the spoofing module is used for setting the PLC equipment as one of the targets of ARP spoofing, sequentially attempting to set other IPs as the other target address by using an enumeration mode, spoofing the PLC equipment to obtain a first data packet, the capturing module is used for capturing and monitoring the first data packet, the first data packet comprises industrial control protocol interaction information, the analysis module is used for analyzing the industrial control protocol to obtain equipment information and protocol interaction communicated with the PLC equipment, the data packet generated when different IP addresses are used as the other spoofing targets is used as a second data packet, the first data packet and the second data packet are analyzed and decoded, the IP address of equipment communicated with the PLC equipment is determined, and the upper computer identification module confirms the upper computer equipment according to the IP address of the equipment communicated with the PLC equipment.
The validation module includes a scanning unit for scanning an industrial switch or router management interface and a manual probing unit for manually probing an IP address range in the network.
The analysis module comprises a protocol analysis unit for identifying and decoding fields and parameters in the industrial control protocol.
The capture module employs a sniffer to capture the listening first data packet.
The upper computer identification system in the industrial control system provided by the embodiment of the application has the following advantages:
1. and the IP address of the upper computer of the PLC is accurately positioned, so that a manager can conveniently track and control network security.
2. Through ARP spoofing attack, the IP address of the upper computer of the PLC can be detected rapidly and effectively, and the success rate is high.
3. Capturing sniffing packets can help the manager to get deep knowledge of the traffic between the PLC and the host computer, helping to discover network security threats.
4. Industrial protocol analysis can help the manager to know the type of protocol used by the PLC and better grasp the operating condition of the PLC.
5. The IP identification function of the upper computer can provide more comprehensive information for the manager, and is beneficial to further improving the network security level.
Referring to fig. 3, another embodiment of the present application provides an intelligent terminal, which includes a processor, an input device, an output device, and a memory, where the processor is connected to the input device, the output device, and the memory, respectively, and the memory is used to store a computer program, where the computer program includes program instructions, and the processor is configured to call the program instructions to perform the method described in the foregoing embodiment.
It should be appreciated that in embodiments of the present application, the processor may be a central processing unit (Central Processing Unit, CPU), which may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSPs), application specific integrated circuits (Application Specific Integrated Circuit, ASICs), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input devices may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of a fingerprint), a microphone, etc., and the output devices may include a display (LCD, etc.), a speaker, etc.
The memory may include read only memory and random access memory and provide instructions and data to the processor. A portion of the memory may also include non-volatile random access memory. For example, the memory may also store information of the device type.
In a specific implementation, the processor, the input device, and the output device described in the embodiments of the present application may execute the implementation described in the method embodiment provided in the embodiments of the present application, or may execute the implementation of the system embodiment described in the embodiments of the present application, which is not described herein again.
In a further embodiment of the application, a computer-readable storage medium is provided, in which a computer program is stored, the computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method described in the above embodiment.
The computer readable storage medium may be an internal storage unit of the terminal according to the foregoing embodiment, for example, a hard disk or a memory of the terminal. The computer readable storage medium may also be an external storage device of the terminal, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the terminal. Further, the computer-readable storage medium may also include both an internal storage unit and an external storage device of the terminal. The computer-readable storage medium is used to store the computer program and other programs and data required by the terminal. The computer-readable storage medium may also be used to temporarily store data that has been output or is to be output.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working procedures of the terminal and the unit described above may refer to the corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In several embodiments provided by the present application, it should be understood that the disclosed terminal and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. In addition, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices, or elements, or may be an electrical, mechanical, or other form of connection.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application, and are intended to be included within the scope of the appended claims and description.

Claims (10)

1. An upper computer identification method in an industrial control system is characterized by comprising the following steps:
confirming an IP address range of the PLC equipment;
setting the PLC equipment as one of ARP spoofing targets, sequentially attempting to set the rest of IPs as another target address in an enumeration mode, and spoofing the PLC equipment to obtain a first data packet;
capturing and monitoring a first data packet, wherein the first data packet comprises industrial control protocol interaction information;
analyzing the industrial control protocol to obtain equipment information and protocol interaction for communication with the PLC equipment;
taking a data packet generated when the different IP address is taken as another spoofing target as a second data packet, acquiring the second data packet, analyzing and decoding the first data packet and the second data packet, and determining the IP address of equipment communicating with the PLC equipment;
and confirming the upper computer equipment according to the IP address of the equipment communicating with the PLC equipment.
2. The method of claim 1, wherein the specific method for confirming the IP address range of the PLC device comprises:
the IP address range in the network is either detected manually by scanning the management interface of the industrial switch or router.
3. The method of claim 1, wherein the specific method of analyzing an industrial control protocol comprises: fields and parameters in the industrial control protocol are identified and decoded.
4. The method of claim 1, wherein the specific method for capturing the first data packet is: sniffer is employed to monitor network traffic of the PLC device.
5. An upper computer identification system in an industrial control system, comprising: the system comprises a confirmation module, a deception module, a capturing module, an analysis module and an upper computer identification module;
the confirmation module is used for confirming the IP address range of the PLC equipment;
the spoofing module is used for setting the PLC equipment as one of ARP spoofing targets, sequentially attempting to set the rest of IPs as another target address in an enumeration mode, and spoofing the PLC equipment to obtain a first data packet;
the capture module is used for capturing and monitoring a first data packet, and the first data packet comprises industrial control protocol interaction information;
the analysis module is used for analyzing the industrial control protocol to obtain equipment information and protocol interaction for communicating with the PLC equipment, taking a data packet generated when a different IP address is taken as another spoofing target as a second data packet, analyzing and decoding the first data packet and the second data packet, and determining the IP address of the equipment for communicating with the PLC equipment;
and the upper computer identification module confirms the upper computer equipment according to the IP address of the equipment communicating with the PLC equipment.
6. The system of claim 5, wherein the validation module comprises a scanning unit to scan an industrial switch or router management interface and a manual probing unit to manually probe a range of IP addresses in a network.
7. The system of claim 5, wherein the analysis module comprises a protocol analysis unit for identifying and decoding fields and parameters in an industrial control protocol.
8. The system of claim 5, the capture module employs a sniffer to capture the listening first data packet.
9. An intelligent terminal comprising a processor, an input device, an output device, and a memory, the processor, the input device, the output device, and the memory being interconnected, wherein the memory is configured to store a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method of any of claims 1-4.
10. A computer readable storage medium storing a computer program comprising program instructions, which when executed by a processor, implement the method of any one of claims 1-4.
CN202310984965.8A 2023-08-04 2023-08-04 Method, system, terminal and medium for identifying upper computer in industrial control system Active CN116880319B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310984965.8A CN116880319B (en) 2023-08-04 2023-08-04 Method, system, terminal and medium for identifying upper computer in industrial control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310984965.8A CN116880319B (en) 2023-08-04 2023-08-04 Method, system, terminal and medium for identifying upper computer in industrial control system

Publications (2)

Publication Number Publication Date
CN116880319A true CN116880319A (en) 2023-10-13
CN116880319B CN116880319B (en) 2024-04-09

Family

ID=88264480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310984965.8A Active CN116880319B (en) 2023-08-04 2023-08-04 Method, system, terminal and medium for identifying upper computer in industrial control system

Country Status (1)

Country Link
CN (1) CN116880319B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040103314A1 (en) * 2002-11-27 2004-05-27 Liston Thomas F. System and method for network intrusion prevention
CN106899612A (en) * 2017-04-01 2017-06-27 汕头大学 A kind of method of automatic detection personation host A RP deceptions
US20180013788A1 (en) * 2016-07-07 2018-01-11 Attivo Networks Inc. Detecting man-in-the-middle attacks
CN109039989A (en) * 2017-06-08 2018-12-18 腾讯科技(深圳)有限公司 Address resolution protocol cheat detecting method and device
US20180373868A1 (en) * 2017-06-25 2018-12-27 ITsMine Ltd. Utilization of deceptive decoy elements to identify data leakage processes invoked by suspicious entities
CN110325929A (en) * 2016-12-07 2019-10-11 阿瑞路资讯安全科技股份有限公司 System and method for detecting the waveform analysis of cable network variation
CN112491892A (en) * 2020-11-27 2021-03-12 杭州安恒信息安全技术有限公司 Network attack inducing method, device, equipment and medium
CN114257413A (en) * 2021-11-19 2022-03-29 南方电网数字电网研究院有限公司 Application container engine-based anti-braking blocking method and device and computer equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040103314A1 (en) * 2002-11-27 2004-05-27 Liston Thomas F. System and method for network intrusion prevention
US20180013788A1 (en) * 2016-07-07 2018-01-11 Attivo Networks Inc. Detecting man-in-the-middle attacks
CN110325929A (en) * 2016-12-07 2019-10-11 阿瑞路资讯安全科技股份有限公司 System and method for detecting the waveform analysis of cable network variation
CN106899612A (en) * 2017-04-01 2017-06-27 汕头大学 A kind of method of automatic detection personation host A RP deceptions
CN109039989A (en) * 2017-06-08 2018-12-18 腾讯科技(深圳)有限公司 Address resolution protocol cheat detecting method and device
US20180373868A1 (en) * 2017-06-25 2018-12-27 ITsMine Ltd. Utilization of deceptive decoy elements to identify data leakage processes invoked by suspicious entities
CN112491892A (en) * 2020-11-27 2021-03-12 杭州安恒信息安全技术有限公司 Network attack inducing method, device, equipment and medium
CN114257413A (en) * 2021-11-19 2022-03-29 南方电网数字电网研究院有限公司 Application container engine-based anti-braking blocking method and device and computer equipment

Also Published As

Publication number Publication date
CN116880319B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
CN110445770B (en) Network attack source positioning and protecting method, electronic equipment and computer storage medium
US10873594B2 (en) Test system and method for identifying security vulnerabilities of a device under test
Sayegh et al. Internal security attacks on SCADA systems
CN108931968B (en) Network security protection system applied to industrial control system and protection method thereof
CN104135474B (en) Intrusion Detection based on host goes out the Network anomalous behaviors detection method of in-degree
CN110912927B (en) Method and device for detecting control message in industrial control system
CN112306019A (en) Industrial control safety audit system based on protocol deep analysis and application thereof
EP2448211B1 (en) Method, system and equipment for detecting botnets
CN111510436B (en) Network security system
CN111541670A (en) Novel dynamic honeypot system
CN106878339A (en) A kind of vulnerability scanning system and method based on internet-of-things terminal equipment
CN111556473A (en) Abnormal access behavior detection method and device
CN113783886A (en) Intelligent operation and maintenance method and system for power grid based on intelligence and data
CN113079185A (en) Industrial firewall control method and equipment for realizing deep data packet detection control
CN115150208A (en) Zero-trust-based Internet of things terminal secure access method and system
CN113746810A (en) Network attack inducing method, device, equipment and storage medium
Lovinger et al. Detection of wireless fake access points
Kang et al. Whitelists based multiple filtering techniques in SCADA sensor networks
CN113660222A (en) Situation awareness defense method and system based on mandatory access control
CN116880319B (en) Method, system, terminal and medium for identifying upper computer in industrial control system
CN111726810A (en) Wireless signal monitoring and wireless communication behavior auditing system in numerical control processing environment
KR101186873B1 (en) Wireless intrusion protecting system based on signature
Rattanalerdnusorn et al. IoTDePT: Detecting security threats and pinpointing anomalies in an IoT environment
Mabsali et al. Effectiveness of Wireshark Tool for Detecting Attacks and Vulnerabilities in Network Traffic
CN107070861B (en) Method and system for discovering worm victim nodes of Internet of things equipment under sampling flow

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant