Industrial protocol detection method and device, computer equipment and storage medium

An industrial protocol and detection method technology, applied in the direction of safety communication devices, digital transmission systems, electrical components, etc., can solve problems such as interruption of equipment, interruption of industrial production, and unrealization of technology, and achieve the effect of optimal applicability

Pending Publication Date: 2022-04-05
湖北天融信网络安全技术有限公司 +3
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technical effect of this patented technology described for use during an industrial communication between two machines without disrupting their normal operation or requiring any extra hardware like another machine. This ensures safety measures are taken against attacks from outside sources while still allowing data transmissions within the system.

Problems solved by technology

The technical problem addressed by this patented solution is that current security measures are unable to handle frequently repeated or critical communication between different machines due to their limitations with traditional fire walls used for protection purposes such as intrusion detection systems (IDS).

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial protocol detection method and device, computer equipment and storage medium
  • Industrial protocol detection method and device, computer equipment and storage medium
  • Industrial protocol detection method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] see figure 2 , figure 2 It is a schematic flowchart of an industrial protocol detection method disclosed in the embodiment of the present application, wherein the method in the embodiment of the present application is deployed in a mimic edge gateway in an industrial network in a bypass deployment mode. Such as figure 2 As shown, the method of the embodiment of the present application includes the following steps:

[0052] 101. Receive the target message;

[0053] 102. Determine whether the target message is an industrial protocol message;

[0054] 103. When the target message is an industrial protocol message, judge the state of the integrity detection switch;

[0055] 104. When the integrity detection switch is turned off, perform in-depth detection on the target message based on the preset industrial control security policy.

[0056] In some scenarios, the target message includes industrial protocol message and non-industrial protocol message, and it is only nec

Embodiment 2

[0081] see image 3 , image 3 It is a schematic structural diagram of an industrial protocol detection device disclosed in an embodiment of the present application, wherein the device in the embodiment of the present application is deployed in a mimic edge gateway in an industrial network in a bypass deployment mode. Such as image 3 As shown, the device of the embodiment of the present application includes the following functional modules:

[0082] A receiving module 201, configured to receive a target message;

[0083] The first judging module 202 is used to judge whether the target message is an industrial protocol message;

[0084] The second judging module 203 is used to judge the state of the integrity detection switch when the target message is an industrial protocol message;

[0085] The deep detection module 204 is configured to perform deep detection on the target message based on the preset industrial control security policy when the integrity detection switch is

Embodiment 3

[0089] see Figure 4 , Figure 4 It is a schematic structural diagram of a computer device according to an embodiment of the present application. Such as Figure 4 As shown, the computer equipment of the embodiment of the present application includes:

[0090] a memory 302 storing executable program code;

[0091] a processor 301 coupled with a memory 302;

[0092] The processor 301 invokes the executable program code stored in the memory 302 to execute the industrial protocol detection method in Embodiment 1 of the present application.

[0093] By implementing the industrial protocol detection method, the computer equipment in the embodiment of the present application can, on the one hand, realize in-depth detection of messages in the industrial network without interrupting the equipment in the industrial network; , based on the status of the integrity detection switch, the integrity detection process of the message is skipped, and the deep detection of the message is direc

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an industrial protocol detection method and device, computer equipment and a storage medium, and the method comprises the steps: receiving a target message; judging whether the target message is an industrial protocol message or not; when the target message is the industrial protocol message, judging the state of an integrity detection switch; and when the integrity detection switch is in an off state, performing deep detection on the target message based on a preset industrial control security policy. According to the method, whether deep detection is directly carried out or not can be determined based on the state of the integrity detection switch, and the integrity detection of the message is skipped, so that the method is suitable for a special scene in which the integrity detection of the message is not needed, and on the other hand, the detection method provided by the embodiment of the invention can not interrupt industrial production.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 湖北天融信网络安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products