Disclosure of Invention
The technical problem to be solved by the invention is how to solve the problems that the prior safety protection method has single protection type, causes poor overall protection effect, cannot meet the actual protection requirement, and brings certain influence to the use of the safety protection method, and provides the safety protection method of the ship industrial control system.
The invention solves the technical problems through the following technical proposal, and the invention comprises the following steps:
The method comprises the steps of access control and authority management, namely, identity verification is carried out on a user of a ship industrial control system, access is allowed when the identity verification passes, and meanwhile, the authority information of the collected user is collected and analyzed to carry out user authority control;
Step two, data encryption, which is to encrypt the data in the industrial control system;
Step three, repairing the loopholes, namely checking the loopholes of the ship industrial control system to update patches and repair the loopholes;
step four, performing intrusion detection and protection on the control system;
fifthly, carrying out safety training and management on system users;
And step six, periodically acquiring safety related information of the ship industrial control system, and analyzing the safety related information to acquire safety warning information.
The authentication mode for authenticating the user of the ship industrial control system comprises user name and password, fingerprint identification, intelligent card/token and biological identification;
The specific process of the identity authentication is that a user selects any one of a user name and a password, fingerprint identification, a smart card/token and biological identification according to the actual condition, and first identifies the user name and the password;
After the primary identification is passed, selecting any one mode except the primary identification mode from the user name and password, fingerprint identification, intelligent card/token and biological identification for secondary verification, and generating identity verification passing information by the secondary verification passing, so that the user is allowed to use the ship industrial control system;
Extracting collected user authority information, wherein the user authority information comprises user authority level information and authentication failure times information in a preset time length of a user, calculating a ratio of the authentication failure times information in the preset time length to the preset time length, and acquiring evaluation parameters;
the user level comprises a first-level user, a second-level user and a third-level user;
when the user level is a first-level user, and the evaluation parameter is larger than a preset value, degrading the user to a second-level user;
when the user level is a secondary user and the evaluation parameter is larger than a preset value, degrading the user to a tertiary user;
And stopping authorizing the user when the user level is three-level users and the evaluation parameter exceeds the preset times when the evaluation parameter is continuously larger than the preset value.
Further, when the second verification fails, i.e. no matter what way the first two verification ways are, the biological recognition way is selected to perform the identity verification again, and when the identity verification passes, the user is allowed to use the ship industrial control system, and when the identity verification fails, the abnormal personnel warning information is generated to warn.
Further, the specific process of data encryption is as follows:
selecting a safe transmission protocol, and selecting a proper safe transmission protocol according to the requirements of a ship industrial control system and the safety requirements;
generating and exchanging keys, namely generating a pair of public keys and private keys respectively in two communication parties;
key exchange, namely, through a secure key exchange protocol, the two communication parties can safely exchange key information, so that the security of subsequent encrypted communication is ensured;
encrypting data, namely encrypting the content, namely encrypting the data to be transmitted by using an encryption algorithm negotiated by the two parties, wherein the encrypted content comprises a control instruction, state information and sensor data;
Integrity protection, namely adopting a message authentication code or a digital signature technology to carry out integrity protection on data besides data encryption;
Establishing an encryption channel for data transmission, namely, based on an SSL/TLS protocol, after establishing an encrypted communication channel between two communication parties, transmitting the encrypted data to a receiver by a sender through the encryption channel;
The method comprises the steps of decrypting and verifying data, receiving encrypted data from an encryption channel by a receiver, decrypting the data, decrypting the received encrypted data by the receiver by using a private key of the receiver and a previously negotiated encryption algorithm, recovering original data, and finally verifying the data, wherein the receiver can verify the integrity and the source reliability of the data according to a message authentication code or a digital signature.
Further, the specific process of bug fixes is as follows:
Firstly, performing vulnerability identification and vulnerability classification, namely dividing vulnerabilities in an industrial control system into two main categories, namely software vulnerabilities and hardware vulnerabilities;
evaluating the identified loopholes and determining the severity and the influence range of the identified loopholes;
Performing vulnerability repair by using vulnerability repair software, and timely installing patches and updates released by suppliers aiming at known software vulnerabilities;
Hardware bug repair, namely updating firmware aiming at the firmware problem of hardware equipment;
hardware replacement, namely when the hardware has design defects and cannot be repaired through firmware updating, replacing hardware equipment;
the reinforcement measures are safety isolation, namely, a safety isolation device is adopted to isolate an industrial control system from external networks such as the Internet and the like;
Verifying and testing the repairing effect, namely verifying and testing the repaired system, and completing the vulnerability repairing flow after the verification test is passed.
The specific process of intrusion detection and protection of the control system is as follows:
firstly, performing intrusion detection system deployment, selecting an IDS technology, and selecting the intrusion detection technology based on the characteristics and requirements of a ship industrial control system, wherein the content of the intrusion detection technology comprises an IDS based on a host, an IDS based on a network or a hybrid IDS;
deploying IDS, namely deploying IDS at a preset position of the system;
information collection-IDS gathers information from a number of sources, including unexpected changes in system and weblogs, directories and files, unexpected behavior in program behavior, and intrusion information in physical form;
Data analysis, in which IDS analyzes the collected information to find abnormal or attack signs, wherein the abnormal or attack signs comprise pattern matching, statistical analysis or machine learning technology;
in the process of abnormality detection and misuse detection, the abnormality detection is carried out by establishing a model of normal behavior accessed by a system and detecting the behavior which does not accord with the model;
misuse detection, namely detecting possible attacks by matching known unacceptable behavior patterns;
generating an alarm to notify an administrator when the IDS detects an intrusion;
The manager adopts proper response strategy according to the alarm information;
Updating and maintaining protection strategies, namely periodically updating a rule base and an engine of an IDS;
Network isolation, namely isolating the ship industrial control system from an external network by using a network isolation technology;
and (3) carrying out security audit on the ship industrial control system regularly, identifying potential security holes and risks, and repairing and improving the potential security holes and risks.
Further, the specific process of safety training for the system user is as follows:
and (3) carrying out safety protection tests on system users at regular intervals, obtaining system user safety test scores, continuously collecting x system user safety test scores, removing the maximum value and the minimum value in the x system user safety test scores, calculating the average value of the rest system user safety test scores, namely obtaining the safety training evaluation score of a single person, and when the safety training evaluation score of the single person is smaller than a preset value, generating personnel training information and sending the personnel training information to the person to prompt the person to carry out safety training.
The specific process of acquiring the safety warning information comprises the steps of extracting the acquired safety related information, wherein the safety related information comprises the abnormal times of network fluctuation of a ship industrial control system, the times of attack on the network of the ship industrial control system and the times of attack on a database of the ship industrial control system within a preset duration;
the method comprises the steps of extracting and marking the abnormal times of network fluctuation of a ship industrial control system in preset time as U1, the times of attack on a ship industrial control system network as U2 and the times of attack on a ship industrial control system database as U3;
giving U1 a correction value Q1, U2 a correction value Q2, U3 a correction value Q3, q1+q2+q3=1, q3> q1> q2;
q1+u by the formula U1 2 q2+u3 q3=uu, namely, obtaining a protection evaluation parameter Uu;
and when the protection evaluation parameter Uu is larger than a preset value, generating safety warning information.
Compared with the prior art, the ship industrial control system safety protection method has the advantages that the safety and stability of the ship industrial control system can be greatly improved by implementing an effective identity verification strategy, unauthorized access is prevented, the identity verification can ensure that only authorized and verified users can access the ship industrial control system, and the system can ensure that only legal users can access and operate personal data of the users and key assets of the ship industrial control system by verifying the identities of the users. The method is beneficial to preventing data leakage, tampering or destruction, protecting the core interests of enterprises, improving the safety of the system, and setting encryption transmission can ensure that data in a ship industrial control system is protected in the transmission process, and even if the data is intercepted, unauthorized users cannot decrypt and acquire sensitive information in the data. This greatly improves the security of the data, reducing the risk of data leakage. This helps to promote the safety of the overall marine industrial control system;
Intrusion detection is performed, and network activities of the ship industrial control system can be monitored in real time, and any potential malicious behaviors or threats can be detected and identified. The real-time monitoring can ensure that the system responds at the first time of threat occurrence, thereby reducing the influence range of security events, and through intrusion detection, the system can identify and prevent unauthorized access, malicious software, phishing and other attack means, so that the data security and the system stability of the ship industrial control system are effectively protected. The method can prevent data leakage and damage, and can ensure the normal operation of the control system, so that the method is more worth popularizing and using.
Detailed Description
The following describes in detail the examples of the present invention, which are implemented on the premise of the technical solution of the present invention, and detailed embodiments and specific operation procedures are given, but the scope of protection of the present invention is not limited to the following examples.
As shown in fig. 1, the embodiment provides a technical scheme that a safety protection method for a ship industrial control system comprises the following steps:
The method comprises the steps of access control and authority management, namely, identity verification is carried out on a user of a ship industrial control system, access is allowed when the identity verification passes, and meanwhile, the authority information of the collected user is collected and analyzed to carry out user authority control;
Step two, data encryption, which is to encrypt the data in the industrial control system;
Step three, repairing the loopholes, namely checking the loopholes of the ship industrial control system to update patches and repair the loopholes;
step four, performing intrusion detection and protection on the control system;
fifthly, carrying out safety training and management on system users;
And step six, periodically acquiring safety related information of the ship industrial control system, and analyzing the safety related information to acquire safety warning information.
The authentication mode for authenticating the user of the ship industrial control system comprises user name and password, fingerprint identification, intelligent card/token and biological identification;
The specific process of the identity authentication is that a user selects any one of a user name and a password, fingerprint identification, a smart card/token and biological identification according to the actual condition, and first identifies the user name and the password;
After the primary identification is passed, selecting any one mode except the primary identification mode from the user name and password, fingerprint identification, intelligent card/token and biological identification for secondary verification, and generating identity verification passing information by the secondary verification passing, so that the user is allowed to use the ship industrial control system;
Extracting collected user authority information, wherein the user authority information comprises user authority level information and authentication failure times information in a preset time length of a user, calculating a ratio of the authentication failure times information in the preset time length to the preset time length, and acquiring evaluation parameters;
the user level comprises a first-level user, a second-level user and a third-level user;
when the user level is a first-level user, and the evaluation parameter is larger than a preset value, degrading the user to a second-level user;
when the user level is a secondary user and the evaluation parameter is larger than a preset value, degrading the user to a tertiary user;
When the user level is three-level users and the evaluation parameter is continuously larger than a preset value and exceeds the preset times, the authorization is stopped;
Authentication is the process of validating the identity of a user, ensuring that only authorized users can access the system. In industrial control systems, authentication generally employs the following methods:
user name and password, the most common authentication method. The user needs to provide a preset user name and password to log in the system. To improve security, the password should be changed periodically, and the password is required to have a certain complexity.
Fingerprint identification, namely, performing identity verification by utilizing fingerprint characteristics of a user. This approach is more secure than user names and passwords because fingerprints are unique and difficult to replicate.
Smart card/token-a user needs to carry a physical device (such as a smart card or token) containing specific information to perform authentication. The device may interact with the system to verify the identity of the user.
Biometric identification, including facial recognition, iris recognition, and other advanced authentication methods. The methods utilize the biological characteristics of the user to carry out identity verification, and have higher security.
Rights management is the process of assigning appropriate access rights and resource usage rights to a user based on his identity and role. In an industrial control system, rights management should follow the following principles:
Minimum rights principle-only the minimum rights required to grant a user to complete his task. This may reduce the risk of potential attacks, since even if an attacker successfully invades the system, they can only access limited resources.
Role separation-separating the rights of different roles (e.g., operators, engineers, administrators, etc.). This can prevent rights abuse and mishandling and improve security of the system.
Permission auditing, periodically auditing the user's permission settings to ensure that they still meet the security policies and business requirements of the organization. If the role or responsibility of the user changes, the authority setting of the user should be updated in time.
Access audit-recording the access activity and operation log of the user for tracking and investigation when security events occur. This helps to find potential safety issues and take corrective action in time.
By implementing effective authentication and rights management policies, the industrial control system can greatly improve its security and stability. Meanwhile, in order to cope with increasingly complex network security threats, organizations should also take other security measures, such as updating software patches periodically, using secure communication protocols, deploying firewalls and intrusion detection systems, etc.;
Preventing unauthorized access authentication ensures that only authorized and authenticated users can access the marine industry control system. This may prevent unauthorized persons, such as hackers, malicious users, or internal unauthorized personnel, from accessing sensitive information or performing malicious operations.
The system security is improved, and the identity verification is an important component of the system security. By verifying the identity of the user, the system can detect and prevent intrusion of a malicious user or attacker, and security vulnerabilities and potential security risks are reduced. This helps to promote the safety of the overall marine industrial control system.
When the second verification fails, namely, no matter what the previous two verification modes are, the biological identification mode is selected to perform the identity verification again, and when the identity verification passes, the user is allowed to use the ship industrial control system, and when the identity verification fails, abnormal warning information of personnel is generated to warn.
The specific process of data encryption is as follows:
selecting a secure transport protocol
First, a suitable secure transport protocol, such as SSL/TLS (secure sockets layer/transport layer security protocol), is selected according to the requirements and security requirements of the marine industrial control system.
Key generation and exchange
Asymmetric key generation, namely, generating a pair of public key and private key respectively in two communication parties (such as a ship control center and a remote terminal).
Key exchange, namely through a secure key exchange protocol (such as Diffie-Hellman key exchange), the two communication parties can exchange key information securely, and the security of subsequent encrypted communication is ensured.
Data encryption
And (3) encrypting the content, namely encrypting the data to be transmitted by using an encryption algorithm (such as AES) negotiated by the two parties. The data herein may include control instructions, status information, sensor data, and the like.
Integrity protection-in addition to data encryption, message Authentication Code (MAC) or digital signature techniques may be employed to ensure data integrity and source reliability.
Data transmission
And establishing an encryption channel, namely establishing an encrypted communication channel between two communication parties based on the SSL/TLS protocol. This channel will ensure confidentiality and integrity of the data during transmission.
And sending the encrypted data, namely sending the encrypted data to a receiver by a sender through an encryption channel.
Data decryption and verification
Receiving encrypted data-the receiving party receives the encrypted data from the encrypted channel.
Decrypting the data, namely decrypting the received encrypted data by a receiver by using the private key of the receiver and the encryption algorithm negotiated before, and restoring the original data.
Data verification, the receiver can also verify the integrity and source reliability of the data according to the message authentication code or the digital signature.
Key updating and management
And the secret key is updated periodically, so that the secret key is required to be updated periodically by both communication parties for further improving the security, and the security risk caused by using the same secret key for a long time is avoided.
And the key management adopts a safe key management method to ensure the safe storage, transmission and updating of the key.
Security audit and monitoring
And security audit and monitoring are carried out on the whole encryption transmission process, so that compliance and security of encryption transmission are ensured.
And timely discovering and coping with potential security threats and attacks.
Through the steps, the ship industrial control system can realize data encryption transmission, and confidentiality, integrity and source reliability of data in the transmission process are ensured, so that the safety of the whole system is improved.
The encrypted transmission can ensure that data in the ship industrial control system is protected in the transmission process, and even if the data is intercepted, unauthorized users cannot decrypt and acquire sensitive information in the data. This greatly improves the security of the data, reducing the risk of data leakage.
The specific process of bug fixes is as follows:
Firstly, performing vulnerability identification and vulnerability classification, namely dividing vulnerabilities in an industrial control system into two main categories, namely software vulnerabilities and hardware vulnerabilities;
evaluating the identified loopholes and determining the severity and the influence range of the identified loopholes;
Performing vulnerability repair by using vulnerability repair software, and timely installing patches and updates released by suppliers aiming at known software vulnerabilities;
Hardware bug repair, namely updating firmware aiming at the firmware problem of hardware equipment;
hardware replacement, namely when the hardware has design defects and cannot be repaired through firmware updating, replacing hardware equipment;
the reinforcement measures are safety isolation, namely, a safety isolation device is adopted to isolate an industrial control system from external networks such as the Internet and the like;
Verifying and testing the repairing effect, namely verifying and testing the repaired system, and completing the vulnerability repairing flow after the verification test is passed.
The specific process of intrusion detection and protection of the control system is as follows:
Intrusion Detection System (IDS) deployment
IDS technology is selected, namely, a proper intrusion detection technology is selected based on the characteristics and the requirements of the ship industrial control system. This may include host-based IDSs, network-based IDSs, or hybrid IDSs.
Deploying IDSs-deploying IDSs at critical locations of the system, such as behind a gateway, firewall, or network segment directly connected to an important server.
Intrusion detection process
Information collection-IDS gathers information from a number of sources, including unexpected changes in system and web logs, directories and files, unexpected behavior in program behavior, and intrusion information in physical form.
Data analysis-IDS analyzes the collected information for possible anomalies or attack signs. This may include pattern matching, statistical analysis, or machine learning techniques.
Abnormality detection and misuse detection, namely, abnormality detection, namely, detecting the behavior which does not accord with a model by establishing the model of normal behavior accessed by a system.
Misuse detection by matching known unacceptable patterns of behavior, a possible attack is detected.
Intrusion response
Alarm generation when the IDS detects a possible intrusion, an alarm notification manager is generated.
Response policy-an administrator takes appropriate response policies based on the alert information, such as disconnecting, logging, notifying relevant personnel, or performing other automated response measures.
Protection strategy
Updating and maintenance the rules repository and engine of the IDS are updated periodically to ensure that it can detect the latest threats.
Network isolation, namely isolating the ship industrial control system from an external network by using a firewall, VPN or other network isolation technology, so as to reduce potential attack surface.
And (4) encryption transmission, namely carrying out encryption transmission on key data, and ensuring confidentiality and integrity of the data in the transmission process.
Access control-implementing strict access control policies including authentication, authorization, and auditing to prevent unauthorized access and operation.
And (3) carrying out safety audit on the ship industrial control system regularly, identifying potential security holes and risks, and timely repairing and improving.
Through the comprehensive application of the steps, the effective intrusion detection and protection of the ship industrial control system can be realized, and the safety and stability of the system are improved;
Real-time threat detection-the intrusion detection system is capable of monitoring network activity of the marine industrial control system in real time, detecting and identifying any potential malicious behavior or threat. Such real-time monitoring can ensure that the first time a threat occurs is responded to, thereby reducing the scope of impact of the security event.
The security of the system is improved, namely, through intrusion detection, the system can identify and prevent unauthorized access, malicious software, phishing and other attack means, so that the data security and the system stability of the ship industrial control system are effectively protected. This can prevent not only data leakage and destruction but also ensure the normal operation of the control system.
The specific process for carrying out safety training on the system user is as follows:
the method comprises the steps of regularly carrying out safety protection test on system users, obtaining system user safety test scores, continuously collecting x times of system user safety test scores, calculating the average value of the rest system user safety test scores after removing the maximum value and the minimum value in the x times of system user safety test scores, namely obtaining the safety training evaluation score of a single person, and generating person training information to prompt the person to carry out safety training when the safety training evaluation score of the single person is smaller than a preset value, wherein x is more than or equal to 10;
Through the process, whether the safety awareness of the system user is in place or not can be known, abnormality can be timely found, and then training prompt is carried out, so that the information safety protection of the ship industrial control system is ensured.
Extracting the collected safety related information, wherein the safety related information comprises the abnormal times of network fluctuation of a ship industrial control system, the times of attack on the network of the ship industrial control system and the times of attack on a database of the ship industrial control system within preset duration;
the method comprises the steps of extracting and marking the abnormal times of network fluctuation of a ship industrial control system in preset time as U1, the times of attack on a ship industrial control system network as U2 and the times of attack on a ship industrial control system database as U3;
giving U1 a correction value Q1, U2 a correction value Q2, U3 a correction value Q3, q1+q2+q3=1, q3> q1> q2;
q1+u by the formula U1 2 q2+u3 q3=uu, namely, obtaining a protection evaluation parameter Uu;
When the protection evaluation parameter Uu is larger than a preset value, generating safety warning information;
through the process, the abnormality of the ship industrial control system can be timely found and accurate warning prompt can be carried out.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present invention, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
While embodiments of the present invention have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the invention.