Font Size: a A A

Research On Industrial Network Security Based On Xinchuan

Posted on:2024-09-07Degree:MasterType:Thesis
Country:ChinaCandidate:D HanFull Text:PDF
GTID:2568306923988079Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With the rise of Xinchuang,a new industry,the self controllable network security problem of the core technology of software and hardware in various IT industries has been solved.In the industrial control,the Internet of Things(Io T)has gradually entered the fields of transportation system,substation power system,construction system and industrial production.Industrial Io T devices can effectively improve work efficiency,but with the gradual growth of the number of industrial Io T devices,the data traffic generated by them is also growing,and the potential risks of industrial control systems being subjected to network attacks,tampering with operational data,and launching vulnerability attacks are also escalating.Therefore,the network security problems of industrial control systems cannot be ignored.How to ensure the network security of industrial control systems and prevent vulnerability attacks becomes a key issue in the field of industrial information security.Based on the research status of industrial control network security at home and abroad,this paper analyzes various common control protocol messages in five industrial control systems,including Modbus/TCP,MMS,S7,IEC104,GOOSE,and deeply analyzes the industrial control protocol messages.At the same time,it detects,captures and alerts the vulnerability messages in the industrial control network traffic,and designs the industrial control audit and industrial vulnerability detection functions for the industrial security protection system.VPP platform is selected for the industrial control audit function.Through vector packet processing,each industrial control message is split according to the OSI model to obtain key information.Combining with My SQL database,the information of industrial control message is saved,and the in-depth analysis and recording of industrial control message are efficiently and accurately realized.The industrial vulnerability detection function matches the industrial control flow message with Snort rules on the VPP platform,detects the vulnerability message,and stores the information of the vulnerability message in the mysql database to capture and record the vulnerability attacks.
Keywords/Search Tags:Industrial network security, Industrial control audit, Industrial control vulnerability detection
PDF Full Text Request
Related items