Nothing Special   »   [go: up one dir, main page]

CN106778210B - Industrial control system function safety verification method based on immune learning - Google Patents

Industrial control system function safety verification method based on immune learning Download PDF

Info

Publication number
CN106778210B
CN106778210B CN201611169479.7A CN201611169479A CN106778210B CN 106778210 B CN106778210 B CN 106778210B CN 201611169479 A CN201611169479 A CN 201611169479A CN 106778210 B CN106778210 B CN 106778210B
Authority
CN
China
Prior art keywords
industrial control
behavior
abnormal
data set
parameter data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201611169479.7A
Other languages
Chinese (zh)
Other versions
CN106778210A (en
Inventor
刘单丹
赵勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Qiaoban Technology Co ltd
Original Assignee
Chengdu Qiaoban Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Qiaoban Technology Co ltd filed Critical Chengdu Qiaoban Technology Co ltd
Priority to CN201611169479.7A priority Critical patent/CN106778210B/en
Publication of CN106778210A publication Critical patent/CN106778210A/en
Application granted granted Critical
Publication of CN106778210B publication Critical patent/CN106778210B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an industrial control system function safety verification method based on immune learning, which comprises the following steps: A. acquiring behavior parameter data of industrial control, wherein the mode of testing an industrial control component in an off-line and on-loop manner is adopted; B. according to the behavior parameter data, a safety reference mode library for industrial control under multiple scales is modeled; C. identifying abnormal control behaviors through a safety reference pattern library; D. constructing an abnormal behavior pattern database based on the abnormal control behavior; the method does not depend on prior information such as normal analysis rules, abnormal black characteristics and the like, and can accurately lock failure and hidden dangers from the aspect of behavior expression on the premise of not mastering specific defect causes, characteristics and utilization details of the characteristics, so that the functional safety risk is obviously reduced.

Description

Industrial control system function safety verification method based on immune learning
Technical Field
The invention relates to the field of industrial control system function safety guarantee, in particular to an industrial control system function safety verification method based on immune learning.
Background
The industrial control system is an important component of national key infrastructure and is related to national strategic safety. Under the background that the transformation and upgrade of the industry are becoming the new competitive focus of the global economic development, the "manufacturing regression" in the united states, the "industry 4.0" in germany and the "china manufacturing 2025" strategy in china all express the same contents by different koji and the same work: the technology of internet of things perception, cloud computing, big data, industrial interconnection and the like is used for leading the change of industrial production modes and pulling the innovative development of industrial economy. Hitherto, the curtain of the deep integration of the control system and the information technology has been pulled open, the industrial control system taking the monitoring and control of the industrial processes such as power, energy, traffic and the like as the core is also undergoing an unprecedented transformation trend that intellectualization, networking, service and integration become irreversible trend, and the evolution transformation thereof is characterized by the following three aspects: one is the evolution of specificity towards generality. The industrial control system develops along with the development of the IT technology, and a great deal of IT general software and hardware are adopted, such as a PC, an operating system, a database system, an Ethernet, a TCP/IP protocol and the like; the second is the evolution of the closure to the development. The development of the internet and the internet of things technology and the deep integration of industrialization and informatization make the industrial control system not be an independent system any more. And thirdly, the hardware type is evolved to the software type. The industrial control system is continuously evolving from mechanization, electrification and electronization to software intellectualization. Namely, the industrial control system continuously evolves from hard to soft.
And (3) technical path selection of functional safety verification of the industrial control system:
"force" is not from the heart. The common problems in the field of modern industrial control are closed product principle, privacy of code documents, missing positions of development teams and dependence of three-party software, so that the existing control system and equipment quality safety guarantee technology thereof can only deal with known faults and risks of own brands. The support of main stream companies of industrial control markets such as general electricity, Siemens, Schneider and the like is difficult to effectively obtain in a cross-industry and cross-equipment mechanism analysis mode, and the innovative active defense based on prior information is developed by collecting control data rather than speaking. Typical representatives include the Predix platform of general electric and the Sinalytics platform of siemens, etc.
"prevent" does not prevail. At present, a safety system formed by industrial system deployment and taking industrial-grade firewalls, antivirus, tamper-proofing, denial-proofing and intrusion-proofing as cores is a passive safety solution idea mainly based on 'prevention'. However, "prevent" is not the best one, and security monitoring using black features such as "illegal", "abnormal", "malicious", etc. as detection purposes cannot cope with active, dynamic, and diverse cyberspace attacks at all. Typical representatives include a starry star industrial control vulnerability scanning system and a distinguished communication industrial control intrusion prevention system and the like.
The "name" does not match the reality. The white listing of process services such as industrial control PC, HMI, operator and engineer stations, WEB server and database server, the white listing of industrial system access control list and user assets are only authenticated and identified nominally, and the behavior function of the industrial system cannot be verified and audited in the actual industrial process. The risk hidden danger that the name is not in accordance with the reality enables the traditional industrial system safety guarantee to be similar to the nominal one. Typical representatives include industrial grade firewalls in Hainan weishi industry and industrial control security monitoring systems of three-zero weirs.
Disclosure of Invention
The invention provides an industrial control system function safety verification method based on immune learning, which is used for solving the technical problems, does not depend on prior information such as normal analysis rules, abnormal black characteristics and the like, accurately locking failure and hidden dangers from a behavior expression level on the premise of not mastering specific defect causes, characteristics and utilization details thereof, and remarkably reducing function safety risks.
The invention is realized by the following technical scheme:
an industrial control system function safety verification method based on immune learning comprises the following steps:
A. acquiring behavior parameter data of industrial control in a mode of testing the industrial control assembly in an off-line and in-loop manner;
B. according to the behavior parameter data, a safety reference mode library for industrial control under multiple scales is modeled;
C. identifying abnormal control behaviors through a safety reference pattern library;
D. and constructing an abnormal behavior pattern database based on the abnormal control behavior.
The method comprises the steps of driving and shaping a safety reference mode library through behavior big data of an industrial control assembly offline test, realizing active defense, learning and constructing an abnormal behavior mode database by using a defect-induced abnormal behavior example set, generating a defect immune antibody library similar to evolutionary selection, promoting standard conformity identification of control functions under various scales through double-factor joint diagnosis of the safety reference mode library and the abnormal behavior mode database, and improving the safety of an industrial control system. By adopting the method, the safety reference mode library is directly constructed based on a large amount of off-line behavior parameter data, the prior information such as normal analysis rules, abnormal black characteristics and the like is not relied on, the safety reference mode library for industrial control under multiple scales is constructed on the premise of not mastering the specific defect cause, characteristics and utilization details thereof, failure and hidden danger are accurately locked from the aspect of behavior expression, and the functional safety risk is obviously reduced.
The step B specifically comprises the following steps:
b1, reconstructing data distribution traces by adopting a Bayesian network construction and probability inference based method according to the behavior parameter data;
b2, converting the process transition instance into a behavior function model by a principal component analysis method according to the actual industrial control object states built in each industrial control process instance; converting the ontology attribute examples into a processing service model by a principal component analysis method and the like in combination with actual industrial control operation instructions built in each industrial control operation process example;
and B3, expressing information flow form in the industrial control access and operation process by using the graphic symbols according to the behavior function model and the processing service model to form a safety reference mode library.
Further, step B1 is specifically:
b1-1, sorting the behavior parameter data according to the relevance influence degree of each variable on other variables, ranking the variables with the largest influence on the other variables at the 1 st position, firstly entering a networking step, and in the networking stage, each variable iteratively searches nodes capable of increasing the current score from the variables entering the Bayesian network to add into a father node set until all scores are not increased any more;
b1-2, carrying out probability inference based on the Bayesian network aiming at each incomplete behavior parameter data, finding out all candidate values and relative probabilities thereof, and filling the candidate value with the highest probability as the vacant data.
Further, the specific method for constructing the behavior function model based on the principal component analysis method in the step B2 is as follows:
b2-1-1, converting the industrial control object state expression data set under the normal working condition into a standard data set with a mean value of 0 and a variance of 1;
b2-1-2, establishing an industrial control access process principal element model through the standard data set, and extracting principal elements;
b2-1-3, calculating the statistics of the master model of the industrial control access process of the standard data set and the corresponding control limit.
Further, the specific method for constructing the processing service model based on the principal component analysis method in step B2 is as follows:
b2-2-1, converting the industrial control assembly behavior instruction data set under the normal working condition into a standard data set with a mean value of 0 and a variance of 1;
b2-2-2, establishing an industrial control operation process principal component model through the standard data set, and extracting principal components;
further, the identification method in the step C specifically includes:
c-1, promoting standard conformity determination of control functions under all scales by using a safety reference mode library, and identifying whether abnormal behavior tendency occurs from a performance level by a principal component analysis method;
c-2, aiming at the abnormal control behavior, if the defect can be judged to utilize cluster attribution, locking the pathological behavior; if the determination is impossible, the process proceeds to step D.
Further, the method for identifying the abnormal behavior tendency from the expression level in the step C-1 specifically comprises the following steps:
c-1-1, acquiring the increased state expression behavior parameter data on line and standardizing;
c-1-2, calculating statistic Hotelling's T for standard data set respectively2And the square prediction error SPE is used for monitoring whether the value exceeds the control limit of the normal state or not, if not, the step C-1-1 is repeated, and if the value exceeds the control limit, the step C-1-3 is carried out;
c-1-3, calculating the Houtelling's T for each variable pair2And the contribution rate of the statistic and the square prediction error SPE statistic, wherein the variable with the largest contribution rate is the variable which can cause the fault.
Further, step D specifically comprises:
d-1, building an industrial control honey net supporting network and system high simulation reproduction, user behavior replication, automatic resource configuration and release, environment safety isolation and controlled exchange by utilizing a computer technology, and trapping pathological behaviors;
d-2, on the premise of defining the defect utilization mechanism, adopting a decision tree constructed by a rough set under a characteristic relation, mining prior black characteristics, and constructing an abnormal behavior pattern database.
The method for constructing the abnormal behavior pattern database in the step D-2 specifically comprises the following steps:
d-2-1, calling a cloud transformation algorithm based on a peak method to discretize all continuous attributes in the behavior parameter data to obtain a new behavior parameter data set;
d-2-2, calculating the upper and lower approximation degrees of each condition attribute relative to each division set of the decision attribute and the weighted average roughness of each condition attribute for the new behavior parameter data set;
d-2-3, selecting the attribute B with the minimum weighted average roughness under the characteristic relation as a current splitting node, and constructing a decision tree by taking the B as a root, namely obtaining a sample branch Q for each value of the B;
d-2-4, for each sample branch Q, if he has not reached a leaf node, continue repeating step D-2-2.
Compared with the prior art, the invention has the following advantages and beneficial effects:
the invention realizes active defense by driving and shaping a safety reference mode library through behavior big data of an industrial control assembly offline test, learns and constructs an abnormal behavior mode database by using a defect-induced abnormal behavior example set, generates a defect immune antibody library similar to evolutionary selection, promotes standard conformity identification of control functions under various scales through double-factor joint diagnosis of the safety reference mode library and the abnormal behavior mode database, and improves the safety of an industrial control system.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
FIG. 1 is a flow chart of the method of the present invention.
FIG. 2 is a functional block diagram of the present invention in off-line in-loop testing of an industrial control component.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
Example 1
An industrial control system function safety verification method based on immune learning comprises the following steps:
A. acquiring behavior parameter data of industrial control in a mode of testing the industrial control assembly in an off-line and in-loop manner;
B. according to the behavior parameter data, a safety reference mode library for industrial control under multiple scales is modeled;
C. in the actual industrial control process, identifying abnormal control behaviors through a safety reference pattern library;
D. and constructing an abnormal behavior pattern database based on the abnormal control behavior.
Aiming at the defect that the existing industrial control system function safety verification method is limited by an open mechanism and diagnosis is carried out under the known fault condition, the invention explores an innovative guarantee mechanism independent of a mechanism analysis model and a prior fault mode, develops a risk-controllable industrial control system established on the basis of a closed principle component and a latent fault component, and has the invisibility and the acquaintance to the risk control. A safety reference mode library of industrial control is constructed by using a large amount of behavior parameter data of a controlled object, and the problem of functional safety is supported and solved; and a large amount of behavior parameter data is generated, mainly by off-line in-loop test manufacturing, and is not dependent on monitoring data of online state performance. Data obtained by online monitoring often cannot correspond to specific functional behaviors and has too much noise; furthermore, it is not possible to distinguish between normal or abnormal performance data, which is too difficult to label.
Example 2
This example specifically refines each step based on example 1.
Before the step A is carried out, the operation process and the industrial control access process of the industrial control system need to be formally expressed:
first, the explanation of the access function is developed: the specific behavior function of the industrial control access process is explained by clearly defining the controlled object, the initial state and the termination state before and after the industrial control is implemented and each key intermediate state of the state change during the implementation; the behavior function is used as an entity for bearing the industrial control access process, and the controlled object state is used as the information following the logic flow between the entities.
Secondly, the functional explanation of the expansion operation is as follows: the service for processing information is used as an entity for bearing the industrial control operation process, the functional agent for scheduling the processing service is used as a behavior functional role, and the industrial control operation instruction is used as information which flows according to logic among the entities.
Thirdly, drawing an industrial control information flow diagram: expressing information flow form in the process of industrial control access and operation by using normalized graphic symbols; each entity in the access and job information flow diagram is regarded as an information input and output unit, namely an IPO unit, and the input information source, the input information content, the output information flow direction, the output information content and the like of the unit are specified.
In the step A, hardware-in-loop simulation drive test can be specifically developed around the industrial control assembly, and the large data of the behavior parameters of the industrial control is manufactured in an off-line mode.
In step a, the off-line in-loop test mainly comprises: a1, defining deliverable level components in an industrial control system with a common accepted granularity that carry homogeneous functional characteristics; in the industrial control field, two types of deliverable-level components are of particular interest, namely: a computing component and a communication component; a2, developing an offline hardware-in-loop test around the industrial control component by using a measurement and control platform supporting test tool calling, test sequence generation and test model simulation, and manufacturing behavior parameter big data. As shown in fig. 2, the measurement and control platform includes three functional components: the main control computer, the bus instrument measurement and control combination, the signal conditioning and switching device. The main control computer provides development and operation environment of the test execution program, controls the test and measurement instrument through the control bus to complete execution of the test execution program and retrieve test data. The bus instrument measurement and control combination mainly comprises a modular test and measurement instrument, various control switches, a communication bus and the like. The signal conditioning and switching device mainly comprises switching and adapting of various measurement and excitation control signals.
Based on a large amount of behavior parameter data of industrial control behavior instantiation collected in the step A, modeling an endogenous immune mechanism and modeling a safety benchmark model library with approximate mechanism, the method specifically comprises the following steps:
b1, reconstructing data distribution traces by adopting a Bayesian network construction and probabilistic reasoning-based method according to the behavior parameter data, wherein the reconstructed data distribution traces are mainly used for completely supplementing necessary industrial process data to avoid data defects and model bias caused by test blind points and measurement break points by aiming at ensuring the effectiveness of behavior instance modeling and functional structure modeling;
b2, converting the process transition instance into a behavior function model by a principal component analysis method according to the actual industrial control object states built in each industrial control process instance; converting the ontology attribute examples into a processing service model by a principal component analysis method and the like in combination with actual industrial control operation instructions built in each industrial control operation process example;
and B3, expressing information flow forms in the process of industrial control access and operation by using the graphic symbols according to the behavior function model, the processing service model and the route navigation model to form a safety reference model library.
Wherein, B1 is specifically:
b1-1, sequencing the original behavior parameter data according to the degree of influence of each variable on the correlation of other variables, ranking the variables with the greatest influence on the other variables at the 1 st position, and entering a networking step firstly, so that most variables can find related father nodes as much as possible; in the network building stage, each variable is iteratively searched for nodes which can increase the current score from the variables which enter the Bayesian network and added into a father node set until all the scores are not increased any more;
b1-2, carrying out probability inference based on the Bayesian network aiming at each incomplete behavior parameter data, finding out all candidate values and relative probabilities thereof, and filling the candidate value with the highest probability as the vacant data.
The concrete method for constructing the behavior function model in the B2 comprises the following steps:
b2-1-1, converting the industrial control object state expression data set under the normal working condition into a standard data set with a mean value of 0 and a variance of 1;
b2-1-2, establishing an industrial control access process principal element model through the standard data set, and extracting principal elements;
b2-1-3, calculating the statistics of the master model of the industrial control access process of the standard data set and the corresponding control limit.
The specific method for constructing the processing service model in the step B2 comprises the following steps:
b2-2-1, converting the industrial control assembly behavior instruction data set under the normal working condition into a standard data set with a mean value of 0 and a variance of 1;
b2-2-2, establishing an industrial control operation process principal component model through the standard data set, and extracting principal components;
and B2-2-3, calculating the statistics of the principal component model of the standard data set industrial control operation process and corresponding control limits.
And step C is realized in the actual industrial control process, online data is collected, sensing points are arranged, and the characterization behavior parameter data of the industrial control process in the component category is monitored and collected on site.
The online data acquisition mainly comprises the following steps: 1. measuring points are selected, the sensors are optimally configured, and the optimal safety detection effect and the minimum dynamic performance influence on the industrial control assembly are ensured; 2. a control process data integration platform based on an industrial real-time database is established, on-line information such as field operation, operation instructions and equipment states is fully acquired, and functional mode detection, logic behavior capture of real-time control and monitoring software and communication transmission analysis of industrial control network protocols facing programmable embedded electronic equipment are supported. The industrial real-time database should conform to the following schema: the method supports equipment and software with different brands by high-precision time resolution, supports wide data source forms by multi-protocol acquisition adaptation rate, and supports transmission and storage performance of large data by ultra-efficient data compression rate.
The identification method in the step C comprises the following specific steps:
c-1, promoting standard conformity determination of control functions under all scales by a safety reference mode library established by a behavior function model, a processing service model and a route navigation model, and identifying whether abnormal behavior tendency occurs from a performance level by a principal component analysis method;
c-2, aiming at the abnormal control behaviors, judging the defect of the abnormal control behaviors by utilizing the cluster attribution by utilizing the decision rule stored in the abnormal behavior feature library, and locking the pathological behaviors if the abnormal control behaviors are clearly classified; if the determination is impossible, the process proceeds to step D.
The method for identifying the abnormal behavior tendency from the expression level specifically comprises the following steps:
c-1-1, acquiring the increased state expression behavior parameter data on line and standardizing;
c-1-2, calculating statistic Hotelling's T for standard data set respectively2And the square prediction error SPE is used for monitoring whether the value exceeds the control limit of the normal state or not, if not, the step C-1-1 is repeated, and if the value exceeds the control limit, the step C-1-3 is carried out;
c-1-3, calculating the Houtelling's T for each variable pair2And the contribution rate of the statistic and the square prediction error SPE statistic, wherein the variable with the largest contribution rate is the variable which can cause the fault.
In C-2, the method for judging the defect of the abnormal behavior characteristic library by using the decision rule stored in the library and using the cluster attribution specifically comprises the following steps:
c-2-1, calling a cloud transformation algorithm based on a peak method to discretize all continuous attributes in the behavior parameter data to obtain a new data record;
c-2-2, calling a decision tree which is stored in an abnormal behavior feature library and constructed based on a rough set under a characteristic relation to judge the attribution of the defect utilization cluster class of the abnormal control behavior.
Step D, constructing an abnormal behavior pattern database of static and dynamic defects based on abnormal control behaviors, which comprises the following steps:
d-1, building an industrial control redundancy honey net supporting network and system high simulation reproduction, user behavior replication, automatic resource configuration and release, environment safety isolation and controlled exchange by utilizing a computer technology, and trapping pathological behaviors;
d-2, on the premise of defining the defect utilization mechanism, adopting a decision tree constructed by a rough set under a characteristic relation, mining prior black characteristics, and constructing an abnormal behavior pattern database.
The abnormal control behavior which can not be judged to have defects and belongs to clusters is induced into a sparse industrial control redundancy honey net which takes industrial control operation as gene bearing and supports simulated reconstruction, potential pathological tendency research and judgment and prior black characteristic mining are carried out on the sparse industrial control redundancy honey net, an abnormal behavior pattern database is constructed, the abnormal behavior pattern database has acquaintance, and can be updated according to abnormal data such as the prior black characteristic and the like, so that the attack of the prior black characteristic is prevented.
The method for constructing the abnormal behavior pattern database in the step D-2 specifically comprises the following steps:
d-2-1, calling a cloud transformation algorithm based on a peak method to discretize all continuous attributes in the behavior parameter data to obtain a new behavior parameter data set;
d-2-2, calculating the upper and lower approximation degrees of each condition attribute relative to each division set of the decision attribute and the weighted average roughness of each condition attribute for the new behavior parameter data set;
d-2-3, selecting the attribute B with the minimum weighted average roughness under the characteristic relation as a current splitting node, and constructing a decision tree by taking the B as a root, namely obtaining a sample branch Q for each value of the B, wherein the Q is a subsample meeting the attribute value v of the B in a behavior parameter data set;
d-2-4, for each sample branch Q, if he has not reached a leaf node, continue repeating step D-2-2.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (6)

1. An industrial control system function safety verification method based on immune learning is characterized by comprising the following steps: A. acquiring behavior parameter data of industrial control in a mode of testing the industrial control assembly in an off-line and in-loop manner; b. According to the behavior parameter data, a safety reference mode library for industrial control under multiple scales is modeled; c. Identifying abnormal control behaviors through a safety reference pattern library; d. Constructing an abnormal behavior pattern database based on the abnormal control behavior;
the step B specifically comprises the following steps: b1, reconstructing data distribution traces by adopting a Bayesian network construction and probability inference based method according to the behavior parameter data; b2, converting the process transition instance into a behavior function model by a principal component analysis method according to the actual industrial control object states built in each industrial control process instance; converting the ontology attribute examples into a processing service model by a principal component analysis method in combination with actual industrial control operation instructions built in the industrial control operation process examples; b3, expressing information flow form in the process of industrial control access and operation by using a graphic symbol according to the behavior function model and the processing service model to form a safety reference mode library;
the identification method in the step C comprises the following specific steps: c-1, promoting standard conformity determination of control functions under all scales by using a safety reference mode library, and identifying whether abnormal behavior tendency occurs from a performance level by a principal component analysis method; c-2, aiming at the abnormal control behavior, if judging that the defects utilize cluster attribution, locking the pathological behavior; if the judgment cannot be made, the step D is carried out;
the step D is specifically as follows: d-1, building an industrial control redundancy honey net supporting network and system high simulation reproduction, user behavior replication, automatic resource configuration and release, environment safety isolation and controlled exchange by utilizing a computer technology, and trapping pathological behaviors; d-2, on the premise of defining the defect utilization mechanism, adopting a decision tree constructed by a rough set under a characteristic relation, mining prior black characteristics, and constructing an abnormal behavior pattern database.
2. The industrial control system function safety verification method based on immune learning of claim 1, wherein: the step B1 specifically includes: b1-1, sorting the behavior parameter data according to the relevance influence degree of each variable on other variables, ranking the variables with the largest influence on the other variables at the 1 st position, firstly entering a networking step, and in the networking stage, each variable iteratively searches nodes capable of increasing the current score from the variables entering the Bayesian network to add into a father node set until all scores are not increased any more; b1-2, carrying out probability inference based on the Bayesian network aiming at each incomplete behavior parameter data, finding out all candidate values and relative probabilities thereof, and filling the candidate value with the highest probability as the vacant data.
3. The industrial control system function safety verification method based on immune learning of claim 1, wherein: the concrete method for constructing the behavior function model based on the principal component analysis method in the step B2 is as follows: b2-1-1, converting the industrial control object state expression data set under the normal working condition into a standard data set with a mean value of 0 and a variance of 1; b2-1-2, establishing an industrial control access process principal element model through the standard data set, and extracting principal elements; b2-1-3, calculating the statistics of the master model of the industrial control access process of the standard data set and the corresponding control limit.
4. The industrial control system function safety verification method based on immune learning of claim 1, wherein: the specific method for constructing the processing service model based on the principal component analysis method in the step B2 is as follows: b2-2-1, converting the industrial control assembly behavior instruction data set under the normal working condition into a standard data set with a mean value of 0 and a variance of 1; b2-2-2, establishing an industrial control operation process principal component model through the standard data set, and extracting principal components; and B2-2-3, calculating the statistics of the principal component model of the standard data set industrial control operation process and corresponding control limits.
5. The industrial control system function safety verification method based on immune learning of claim 1, wherein: the method for identifying the abnormal behavior tendency from the expression level in the step C-1 specifically comprises the following steps: c-1-1, acquiring the increased state expression behavior parameter data on line, and standardizing to form a standard data set; c-1-2, calculating statistic Hotelling's T for standard data set respectively2And the square prediction error SPE is used for monitoring whether the value exceeds the control limit of the normal state or not, if not, the step C-1-1 is repeated, and if the value exceeds the control limit, the step C-1-3 is carried out; c-1-3, calculating the Houtelling's T for each variable pair2And the contribution rate of the statistic and the square prediction error SPE statistic, wherein the variable with the largest contribution rate is the variable which can cause the fault.
6. The industrial control system function safety verification method based on immune learning of claim 1, wherein: the method for constructing the abnormal behavior pattern database in the step D-2 specifically comprises the following steps: d-2-1, calling a cloud transformation algorithm based on a peak method to discretize all continuous attributes in the behavior parameter data to obtain a new behavior parameter data set; d-2-2, calculating the upper and lower approximation degrees of each condition attribute relative to each division set of the decision attribute and the weighted average roughness of each condition attribute for the new behavior parameter data set; d-2-3, selecting the attribute B with the minimum weighted average roughness under the characteristic relation as a current splitting node, and constructing a decision tree by taking the B as a root, namely obtaining a sample branch Q for each value of the B; d-2-4, for each sample branch Q, if he has not reached a leaf node, continue repeating step D-2-2.
CN201611169479.7A 2016-12-16 2016-12-16 Industrial control system function safety verification method based on immune learning Expired - Fee Related CN106778210B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611169479.7A CN106778210B (en) 2016-12-16 2016-12-16 Industrial control system function safety verification method based on immune learning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611169479.7A CN106778210B (en) 2016-12-16 2016-12-16 Industrial control system function safety verification method based on immune learning

Publications (2)

Publication Number Publication Date
CN106778210A CN106778210A (en) 2017-05-31
CN106778210B true CN106778210B (en) 2020-04-07

Family

ID=58892374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611169479.7A Expired - Fee Related CN106778210B (en) 2016-12-16 2016-12-16 Industrial control system function safety verification method based on immune learning

Country Status (1)

Country Link
CN (1) CN106778210B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107370732B (en) * 2017-07-14 2021-08-17 成都信息工程大学 Abnormal behavior discovery system of industrial control system based on neural network and optimal recommendation
CN108769071B (en) * 2018-07-02 2021-02-09 腾讯科技(深圳)有限公司 Attack information processing method and device and Internet of things honeypot system
CN109445406B (en) * 2018-10-18 2021-05-18 西南交通大学 Industrial control system safety detection method based on scene test and transaction search
CN111239529A (en) * 2020-03-05 2020-06-05 西南交通大学 Excitation test method and system supporting predictive maintenance of electromechanical equipment
CN113378151A (en) * 2021-06-23 2021-09-10 上海红阵信息科技有限公司 Unified identity authentication system and method based on mimicry structure
CN115001866B (en) * 2022-08-01 2022-11-08 成都市以太节点科技有限公司 Safety protection method based on immune mechanism, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102637019A (en) * 2011-02-10 2012-08-15 武汉科技大学 Intelligent integrated fault diagnosis method and device in industrial production process
CN105763392A (en) * 2016-02-19 2016-07-13 中国人民解放军理工大学 Industrial control protocol fuzzing test method based on protocol state
EP3076291A1 (en) * 2015-03-30 2016-10-05 Rockwell Automation Germany GmbH & Co. KG Method for assignment of verification numbers

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959144B (en) * 2016-06-02 2019-08-06 中国科学院信息工程研究所 Secure data acquisition and method for detecting abnormality and system towards industrial control network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102637019A (en) * 2011-02-10 2012-08-15 武汉科技大学 Intelligent integrated fault diagnosis method and device in industrial production process
EP3076291A1 (en) * 2015-03-30 2016-10-05 Rockwell Automation Germany GmbH & Co. KG Method for assignment of verification numbers
CN105763392A (en) * 2016-02-19 2016-07-13 中国人民解放军理工大学 Industrial control protocol fuzzing test method based on protocol state

Also Published As

Publication number Publication date
CN106778210A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
CN106778210B (en) Industrial control system function safety verification method based on immune learning
CN109347801B (en) Vulnerability exploitation risk assessment method based on multi-source word embedding and knowledge graph
CN106709613B (en) Risk assessment method applicable to industrial control system
Sommestad et al. The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures
CN112114579B (en) Industrial control system safety measurement method based on attack graph
CN112131882A (en) Multi-source heterogeneous network security knowledge graph construction method and device
CN111881452A (en) Safety test system for industrial control equipment and working method thereof
CN111435393A (en) Object vulnerability detection method, device, medium and electronic equipment
CN111049827A (en) Network system safety protection method, device and related equipment
JP2019523512A (en) System and method for analyzing and authenticating scenarios and actions performed in a plant or factory
Daubner et al. Towards verifiable evidence generation in forensic-ready systems
CN113704772A (en) Safety protection processing method and system based on user behavior big data mining
Kummerow et al. Cyber-physical data stream assessment incorporating Digital Twins in future power systems
Jiang et al. Model-Based Cybersecurity Analysis: Extending Enterprise Modeling to Critical Infrastructure Cybersecurity
Liu et al. SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering
Wu et al. Security Evaluation Method of Smart Home Cloud Platform
CN117749426A (en) Abnormal flow detection method based on graph neural network
CN110995747A (en) Distributed storage security analysis method
Larrinaga et al. Implementation of a reference architecture for cyber physical systems to support condition based maintenance
CN116208416A (en) Attack link mining method and system for industrial Internet
Lamp et al. Exsol: Collaboratively assessing cybersecurity risks for protecting energy delivery systems
CN111698199A (en) Firewall monitoring method and device
Ganesh et al. The Industry 4.0 for Secure and Smarter Manufacturing
Lamp et al. Ontoeds: Protecting energy delivery systems by collaboratively analyzing security requirements
Barletta et al. Quantum-based Automotive Threat Intelligence and Countermeasures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200407