[go: up one dir, main page]

CN113641997A - Safety protection method, device and system for industrial host and storage medium - Google Patents

Safety protection method, device and system for industrial host and storage medium Download PDF

Info

Publication number
CN113641997A
CN113641997A CN202110812804.1A CN202110812804A CN113641997A CN 113641997 A CN113641997 A CN 113641997A CN 202110812804 A CN202110812804 A CN 202110812804A CN 113641997 A CN113641997 A CN 113641997A
Authority
CN
China
Prior art keywords
target
white list
file
industrial host
industrial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110812804.1A
Other languages
Chinese (zh)
Inventor
黄玉宝
孙明
林宏
于海东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haier Digital Technology Qingdao Co Ltd
Haier Caos IoT Ecological Technology Co Ltd
Qingdao Haier Industrial Intelligence Research Institute Co Ltd
Original Assignee
Haier Digital Technology Qingdao Co Ltd
Haier Caos IoT Ecological Technology Co Ltd
Qingdao Haier Industrial Intelligence Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haier Digital Technology Qingdao Co Ltd, Haier Caos IoT Ecological Technology Co Ltd, Qingdao Haier Industrial Intelligence Research Institute Co Ltd filed Critical Haier Digital Technology Qingdao Co Ltd
Priority to CN202110812804.1A priority Critical patent/CN113641997A/en
Publication of CN113641997A publication Critical patent/CN113641997A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明实施例公开了一种工业主机的安全防护方法、装置、系统及存储介质。该方法应用于安装在工业主机上的安全防护系统客户端,包括:检测到工业主机中运行有目标软件时,自动扫描目标软件的可执行文件的数据内容,生成目标文件特征码;使用目标文件特征码从白名单库中匹配目标白名单,并从目标白名单中获取与目标文件特征码对应的工作模式;确定执行目标软件的可疑文件所对应的可疑文件特征码,查询白名单库中是否存在与可疑文件特征码匹配的白名单;如果不存在,则根据目标软件的工作模式对可疑文件进行相应的告警或阻断操作。本发明实施例的技术方案,通过进行轻量级的白名单匹配,禁止异常程序在工业主机中运行,实现对工业主机的安全防护。

Figure 202110812804

The embodiments of the present invention disclose a security protection method, device, system and storage medium for an industrial host. The method is applied to a client of a security protection system installed on an industrial host, and includes: when it is detected that target software is running in the industrial host, automatically scanning the data content of an executable file of the target software to generate a feature code of the target file; using the target file The feature code matches the target whitelist from the whitelist library, and obtains the working mode corresponding to the target file feature code from the target whitelist; determines the suspicious file feature code corresponding to the suspicious file executing the target software, and queries whether the whitelist library contains There is a whitelist that matches the signature of the suspicious file; if it does not exist, the suspicious file will be alerted or blocked according to the working mode of the target software. In the technical solution of the embodiment of the present invention, by performing light-weight whitelist matching, abnormal programs are prohibited from running in the industrial host, so as to realize the security protection of the industrial host.

Figure 202110812804

Description

Safety protection method, device and system for industrial host and storage medium
Technical Field
The embodiment of the invention relates to the technical field of industrial safety, in particular to a safety protection method, a device, a system and a storage medium for an industrial host.
Background
In the prior art, compared with a common IT system host, the industrial host has the following characteristics in the aspect of safety protection: 1) the industrial host can run for many years after being put into operation, the hardware resource is limited, and antivirus software cannot be installed frequently; 2) the industrial host can not be upgraded or added with new software and plug-in at will, and the anti-virus library in the industrial control system can not be upgraded regularly; 3) the installed common antivirus software may kill the key process by mistake, causing an event that the industrial control system runs abnormally; 4) antivirus software generally uses a local engine or a cloud virus library to perform virus killing on an industrial host, which may cause processing delay of the industrial software. These features make it difficult to fully secure the industrial host.
Disclosure of Invention
The embodiment of the invention provides a safety protection method, a device, a system and a storage medium of an industrial host, which can realize the safety protection of the industrial host by matching a lightweight white list and prohibiting an abnormal program from running in the industrial host.
In a first aspect, an embodiment of the present invention provides a security protection method for an industrial host, which is applied to a security protection system client installed on the industrial host, and includes:
when the target software is detected to run in the industrial host, automatically scanning the data content of the executable file of the target software to generate a target file feature code;
matching a target white list from a white list library by using the target file feature codes, and acquiring a working mode corresponding to the target file feature codes from the target white list;
determining suspicious file feature codes corresponding to suspicious files of executing target software, and inquiring whether a white list matched with the suspicious file feature codes exists in a white list library or not;
and if the file does not exist, performing corresponding alarm or blocking operation on the suspicious file according to the working mode of the target software.
Optionally, the working mode includes an alarm mode and a protection mode;
the alarm mode is used for giving an alarm in real time when the abnormal program executes the protected executable file, but the abnormal program is not blocked from executing;
and the protection mode is used for giving an alarm in real time and blocking the execution of the abnormal program when the abnormal program executes the protected executable file.
Optionally, the method further includes:
if the industrial host is detected to download or start to use the new software, setting a working mode for the new software, automatically scanning the data content of the executable file of the new software, and generating a new file feature code;
and generating a new white list by using the new file feature codes and the working mode, and storing the new white list into a white list library for updating and taking effect.
Optionally, the method further includes:
when the access of the external storage equipment is detected, judging whether the external storage equipment has the access authority or not based on the unique identifier of the external storage equipment;
and if the access authority exists, matching and acquiring the device operation authority according to the unique identifier of the external storage device, and responding to the operation of the external storage device according to the device operation authority.
In a second aspect, an embodiment of the present invention further provides a security protection device for an industrial host, which is applied to a security protection system client installed on the industrial host, and includes:
the file scanning module is used for automatically scanning the data content of the executable file of the target software to generate a target file feature code when the target software is detected to run in the industrial host;
the white list matching module is used for matching a target white list from the white list library by using the target file feature codes and acquiring a working mode corresponding to the target file feature codes from the target white list;
the query module is used for determining suspicious file feature codes corresponding to suspicious files of the executed target software and querying whether a white list matched with the suspicious file feature codes exists in a white list library or not;
and the alarm module is used for carrying out corresponding alarm or blocking operation on the suspicious file according to the working mode of the target software if the suspicious file does not exist.
Optionally, the working mode includes an alarm mode and a protection mode;
the alarm mode is used for giving an alarm in real time when the abnormal program executes the protected executable file, but the abnormal program is not blocked from executing;
and the protection mode is used for giving an alarm in real time and blocking the execution of the abnormal program when the abnormal program executes the protected executable file.
In a third aspect, an embodiment of the present invention further provides an industrial host security protection system, where the system includes: the system comprises a client installed on an industrial host and a control center installed on a server;
the client is used for executing the safety protection method of the industrial host provided by the embodiment of the invention;
and the control center is used for carrying out centralized management on the plurality of industrial hosts under the networking condition.
Optionally, the industrial host security protection system includes a stand-alone version and a network version;
the industrial host safety protection system of the stand-alone version is used for carrying out safety protection on isolated industrial hosts under the isolation condition, and the system comprises: a client installed on an industrial host;
the industrial host safety protection system of the network version is used for carrying out centralized management and control on a plurality of industrial hosts under the networking condition, and the system comprises: a client installed on an industrial host and a control center installed on a server.
Optionally, the control center is configured to collect log data reported by each client for analysis, and if a network attack event is found, cut off a propagation path of the network attack event, and generate a security policy to be issued to the clients on all the industrial hosts.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method for securing an industrial host according to any embodiment of the present invention.
In the embodiment of the invention, when the client of the industrial host safety protection system detects that the target software runs in the industrial host, the client automatically scans the data content of the executable file of the target software to generate the feature code of the target file; matching a target white list from a white list library by using the target file feature codes, and acquiring a working mode corresponding to the target file feature codes from the target white list; determining suspicious file feature codes corresponding to suspicious files of executing target software, and inquiring whether a white list matched with the suspicious file feature codes exists in a white list library or not; if the operation mode does not exist, corresponding warning or blocking operation is carried out on the suspicious file according to the working mode of the target software, the problem that the industrial host is difficult to protect in the prior art is solved, and the abnormal program is forbidden to run in the industrial host by carrying out lightweight white list matching, so that the safety protection of the industrial host is realized.
Drawings
FIG. 1a is a flow chart of a method for securing an industrial host according to a first embodiment of the present invention;
FIG. 1b is a block diagram of a white list architecture according to a first embodiment of the present invention;
FIG. 1c is a flowchart illustrating an exception procedure according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a safety protection device of an industrial host according to a second embodiment of the present invention;
fig. 3a is a schematic structural diagram of an industrial host security protection system according to a third embodiment of the present invention;
fig. 3b is an architecture diagram of a network version of the industrial host security protection system according to the third embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It is to be further noted that, for the convenience of description, only a part of the structure relating to the present invention is shown in the drawings, not the whole structure.
Example one
Fig. 1a is a flowchart of a security protection method for an industrial host according to a first embodiment of the present invention, where the present embodiment is applicable to perform comprehensive security protection on the industrial host, and the method can be performed by a security protection device of the industrial host, and the security protection device can be implemented by hardware and/or software and can be generally integrated in a client of a security protection system of the industrial host that provides industrial security protection services. As shown in fig. 1a, the method comprises:
step 110, when detecting that the target software runs in the industrial host, automatically scanning the data content of the executable file of the target software to generate the feature code of the target file.
In the embodiment, in order to detect whether an abnormal program exists in the industrial host where the client is located, whether software runs in the industrial host can be detected in real time, and if the running target software is captured, the executable file of the target software is formed into the unique target file feature code through full-disk automatic scanning. The file feature code does not depend on information such as a file name, a file path or an extension of the executable file, only depends on the data feature of the executable file, and changes correspondingly as long as the executable file changes.
And step 120, matching the target white list from the white list library by using the target file feature codes, and acquiring a working mode corresponding to the target file feature codes from the target white list.
In this embodiment, the white list includes preset file feature codes and operation modes of executable files allowed to run in the industrial host. After the target file feature codes are determined, the matched white list can be inquired in the white list library by using the target file feature codes, if the target white list comprising the target file feature codes is inquired, the target software is considered to be protected conventional software, a working mode corresponding to the target file feature codes needs to be acquired from the target white list, and the safety protection level of the target software is determined. And if the white list comprising the feature codes of the target file is not inquired, the target software is considered to be unprotected, and the security protection operation is not carried out on the target software.
Optionally, the working mode includes an alarm mode and a protection mode; the alarm mode is used for giving an alarm in real time when the abnormal program executes the protected executable file, but the abnormal program is not blocked from executing; and the protection mode is used for giving an alarm in real time and blocking the execution of the abnormal program when the abnormal program executes the protected executable file.
In this embodiment, the working mode of the software to be protected may be set to an alarm mode or a protection mode according to the importance. When the working mode is the alarm mode, if the protected executable file is executed by the abnormal program, the real-time alarm is carried out according to the related information of the executable file and the abnormal program, but the execution of the abnormal program is not blocked; when the working mode is the protection mode, if the protected executable file is executed by the abnormal program, the alarm is given out and the blocking is carried out at the same time, so that the abnormal program cannot run.
In this embodiment, when the system client is installed in the industrial host, software used by the industrial host is selected, an executable file of the software is automatically scanned to generate a file feature code, the file feature code is added to a white list, a corresponding working mode is set for the software, the software is added to the white list library, and the application of the white list added to the white list library is validated, as shown in fig. 1b, so that whether the software in the host is allowed to run or not is judged according to the white list in the white list library subsequently.
Step 130, determining the suspicious file feature codes corresponding to the suspicious files of the executed target software, and inquiring whether a white list matched with the suspicious file feature codes exists in a white list library.
In this embodiment, after determining that the target software is the protected software, it needs to be further verified whether the executor of the target software is an exception program. The method comprises the steps of firstly obtaining a program for executing target software as a suspicious file, scanning data content of the suspicious file to generate a suspicious file feature code, carrying out white list matching in a white list library according to the suspicious file feature code, and if the white list is matched, determining that an executor of the target software is not an abnormal program and can normally run.
And 140, if the file does not exist, performing corresponding alarm or blocking operation on the suspicious file according to the working mode of the target software.
In this embodiment, if a white list which can be matched with the file feature codes cannot be found in the white list library, the executor of the target software is considered as an abnormal program and needs to perform corresponding protection processing, and at this time, if the working mode of the target software is an alarm mode, a real-time alarm is performed according to the relevant information of the executable file and the abnormal program, but the operation of the abnormal program is not blocked; and if the working mode is the protection mode, the abnormal program operation is blocked while the alarm is carried out.
Optionally, the method may further include: if the industrial host is detected to download or start to use the new software, setting a working mode for the new software, automatically scanning the data content of the executable file of the new software, and generating a new file feature code; and generating a new white list by using the new file feature codes and the working mode, and storing the new white list into a white list library for updating and taking effect.
In this embodiment, as shown in fig. 1b, when the industrial host needs to use new software and needs to update the white list software, the additional directory or the additional file may be used to perform white list release, or the trust directory or the trust file may be set to perform complete trust and release. And when the white list is updated, the application is required to be stored in the white list library for application to take effect. The white list of the new software can be imported and generated, and can also be scanned and generated. The import generation can directly import the generated white list into the client; and scanning generation, namely generating a new file feature code by automatically scanning the data content of the executable file of the new software, and adding the working mode of the new software and the new file feature code into a new white list. The white list library supports operations of querying, importing, exporting, displaying lists and the like of the white list.
Optionally, the method may further include: when the access of the external storage device is detected, judging whether the external storage device has the access authority or not based on the unique identifier of the external storage device; and if the access authority exists, matching and acquiring the device operation authority according to the unique identifier of the external storage device, and responding to the operation of the external storage device according to the device operation authority.
In this embodiment, as shown in fig. 1c, in order to protect the industrial host more comprehensively, an access right may be set for the external storage device in advance, so as to prevent unauthorized external storage devices from introducing viruses. Therefore, when discovering that the external storage device is accessed to the industrial host, whether the device has the access authority or not can be judged according to the device identification of the device, if the device is not authorized, the device is not allowed to be accessed, if the device is determined to have the authorization, the device identification of the device is continuously used for inquiring the specific operation authority, and only the operation of the open authority is responded.
In this embodiment, besides performing access authorization on the external storage device, the network attack of "permanent blue" and its variants can be intercepted in real time by a network defense engine and a specialized tool of a "permanent blue" vulnerability built in the system. By utilizing technologies such as vulnerability analysis, flow analysis and comparison, suspicious attack blocking and the like, the prejudgment and the prevention of the permanent blue Lesox virus can be carried out without patching and closing ports for an industrial host.
In this embodiment, the industrial host security protection system protects the resource usage of the host in a full-azimuth manner in a lightweight "white list" technical manner. According to the white list strategy, the industrial host safety protection system can prohibit the operation of illegal processes, prohibit the access of illegal USB equipment through the control of the USB mobile storage peripheral based on the unique equipment identifier, simultaneously perform authority control on legal USB equipment, and can cut off the propagation and damage paths of viruses and trojans by combining safety protection measures such as vulnerability defense and network protection.
In the embodiment of the invention, when the client of the industrial host safety protection system detects that the target software runs in the industrial host, the client automatically scans the data content of the executable file of the target software to generate the feature code of the target file; matching a target white list from a white list library by using the target file feature codes, and acquiring a working mode corresponding to the target file feature codes from the target white list; determining suspicious file feature codes corresponding to suspicious files of executing target software, and inquiring whether a white list matched with the suspicious file feature codes exists in a white list library or not; if the operation mode does not exist, corresponding warning or blocking operation is carried out on the suspicious file according to the working mode of the target software, the problem that the industrial host is difficult to protect in the prior art is solved, and the abnormal program is forbidden to run in the industrial host by carrying out lightweight white list matching, so that the safety protection of the industrial host is realized.
Example two
Fig. 2 is a schematic structural diagram of a security device of an industrial host according to a second embodiment of the present invention, which is applicable to a situation of performing comprehensive security protection on the industrial host, and the security device may be implemented by hardware and/or software and may be generally integrated in a client of a security protection system of the industrial host that provides an industrial security protection service. As shown in fig. 2, the apparatus includes:
the file scanning module 210 is configured to, when it is detected that target software runs in the industrial host, automatically scan data content of an executable file of the target software, and generate a target file feature code;
the white list matching module 220 is configured to match a target white list from a white list library by using the target file feature codes, and acquire a working mode corresponding to the target file feature codes from the target white list;
the query module 230 is configured to determine a suspicious file feature code corresponding to a suspicious file executing the target software, and query whether a white list matching the suspicious file feature code exists in a white list library;
and the alarm module 240 is configured to perform corresponding alarm or blocking operation on the suspicious file according to the working mode of the target software if the suspicious file does not exist.
In the embodiment of the invention, when the client of the industrial host safety protection system detects that the target software runs in the industrial host, the client automatically scans the data content of the executable file of the target software to generate the feature code of the target file; matching a target white list from a white list library by using the target file feature codes, and acquiring a working mode corresponding to the target file feature codes from the target white list; determining suspicious file feature codes corresponding to suspicious files of executing target software, and inquiring whether a white list matched with the suspicious file feature codes exists in a white list library or not; if the operation mode does not exist, corresponding warning or blocking operation is carried out on the suspicious file according to the working mode of the target software, the problem that the industrial host is difficult to protect in the prior art is solved, and the abnormal program is forbidden to run in the industrial host by carrying out lightweight white list matching, so that the safety protection of the industrial host is realized.
Optionally, the working mode includes an alarm mode and a protection mode;
the alarm mode is used for giving an alarm in real time when the abnormal program executes the protected executable file, but the abnormal program is not blocked from executing;
and the protection mode is used for giving an alarm in real time and blocking the execution of the abnormal program when the abnormal program executes the protected executable file.
Optionally, the method further includes:
the updating module is used for setting a working mode for the new software if the industrial host is detected to download or start to use the new software, automatically scanning the data content of the executable file of the new software and generating a new file feature code;
and generating a new white list by using the new file feature codes and the working mode, and storing the new white list into a white list library for updating and taking effect.
Optionally, the method further includes:
the access detection module is used for judging whether the external storage equipment has the access authority or not based on the unique identifier of the external storage equipment when the access of the external storage equipment is detected;
and if the access authority exists, matching and acquiring the device operation authority according to the unique identifier of the external storage device, and responding to the operation of the external storage device according to the device operation authority.
The safety protection device of the industrial host provided by the embodiment of the invention can execute the safety protection method of the industrial host provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
EXAMPLE III
Fig. 3a is a schematic structural diagram of a safety protection system for an industrial host according to a third embodiment of the present invention, which is applicable to a situation of performing comprehensive safety protection on an industrial host. As shown in fig. 3a, the system comprises: a client 310 installed on an industrial host and a control center 320 installed on a server;
the client 310 is used for executing the safety protection method of the industrial host provided by any embodiment of the invention;
and the control center 320 is used for carrying out centralized management on the client sides on the industrial hosts under the networking condition.
In this embodiment, the client 310 is deployed on an industrial host to be protected, executes security protection operations such as white list scanning and protection, peripheral management and control, vulnerability defense, and the like, communicates with the control center, and provides related security alarm information required by the control center management.
Optionally, the control center 320 is configured to collect log data reported by each client for analysis, and if a network attack event is found, cut off a propagation path of the network attack event, generate a security policy, and issue the security policy to the clients on all industrial hosts.
In this embodiment, as shown in fig. 3B, the control center adopts a B/S architecture, which allows access through a browser anytime and anywhere to manage and control the client, and mainly includes group management, policy making and issuing, unified white list scanning (and timed scanning), client software and hardware asset management, and the like. In addition, the control center can also provide basic services of system operation and maintenance, such as: client upgrade services, data services, communication services, and the like. And the single control center can manage 6000 the plurality of host clients simultaneously and can perform security risk management based on the user organization architecture. Meanwhile, flexible module configuration, authority configuration, page configuration and scanning time configuration can be carried out aiming at each client, and the requirement of an industrial host on-site customized security strategy is met.
In this embodiment, the control center may learn the alarm information of the entire network client, grasp the entire network threat status, and preset a security protection policy, such as intercepting a common network attack event or virus. If the control center finds out a network attack event or virus and the like by analyzing the log data of the client, the control center cuts off the transmission and damage paths and issues the corresponding security protection strategy to the clients of all the hosts for security protection.
Optionally, the industrial host security protection system includes a stand-alone version and a network version; the industrial host security protection system of unit version is used for carrying out the security protection to isolated industrial host under the isolation condition, and the system includes: a client installed on an industrial host; the industrial host safety protection system of network version is used for concentrating the management and control to a plurality of industrial hosts under the networking condition, and the system includes: a client installed on an industrial host and a control center installed on a server.
In this embodiment, considering that the industrial host may not communicate with the outside due to a networking situation or other reasons, a security protection system for the industrial host in a stand-alone version and a network version is designed. The system can install a control center on the server, and for an isolated industrial host under the isolation condition, because the industrial host can not be connected with the control center, a system client installed on the industrial host can be independently regarded as an industrial host safety protection system, namely the system is switched into a single machine version, so that the safety protection of the isolated industrial host is realized. For the industrial hosts which can be networked, as the client sides on the hosts can be connected with the control center, the system can be switched into a network version, and the control center carries out security policy management, configuration issuing and the like on the client sides on all the industrial hosts in the network, so that unified management and control and security risk analysis are realized.
In this embodiment, the industrial host security protection system is a software product dedicated for industrial control environments, and by installing a client of the system on an industrial host and installing a control center of the system on a server, barrier virus interception such as entry interception, operation interception, diffusion interception and the like can be performed on the industrial host based on an intelligent matching white list technology and USB mobile storage management and control based on an equipment identifier, so that operation of malicious programs and illegal peripheral access can be prevented, comprehensive centralized management, security risk management and the like can be performed on a plurality of industrial hosts, and comprehensive security protection of the industrial host is realized.
In addition, the industrial host safety protection system can guarantee that the purchased points cannot be lost and the investment cost is additionally increased under the conditions of equipment replacement and the like through an authorization recovery mechanism aiming at the condition that the safety protection software authorization cannot be replaced and used due to the relocation of industrial equipment, the industrial replacement and the like, so that the user cost is saved.
In this embodiment, the industrial host security protection system has strong software and hardware adaptability, supports various operating systems, and various system versions such as enterprise versions and professional versions, and only requires 256M memory for hardware resources and 400M available hard disk space to adapt to more than 100 kinds of industrial software.
In the embodiment of the invention, the industrial host safety protection system comprises a client installed on the industrial host and a control center installed on a server; access authentication is carried out on external storage equipment through a client, and a malicious program in operation is intercepted by using an intelligent matching technology of a lightweight white list; the log data reported by the client side is analyzed through the control center, if a network attack event is found, the propagation path of the network attack event is cut off, a safety protection strategy is generated and issued to the client sides on all industrial hosts, the centralized management and safety risk analysis of the client sides on the industrial hosts under the networking condition are realized, the problem that the industrial hosts are difficult to protect in the prior art is solved, and the abnormal programs are forbidden to run in the industrial hosts through the light-weight white list matching, so that the safety protection of the industrial hosts is realized.
Example four
The fourth embodiment of the present invention further discloses a computer storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a security protection method for an industrial host, and is applied to a security protection system client installed on the industrial host, and the method includes:
when the target software is detected to run in the industrial host, automatically scanning the data content of the executable file of the target software to generate a target file feature code;
matching a target white list from a white list library by using the target file feature codes, and acquiring a working mode corresponding to the target file feature codes from the target white list;
determining suspicious file feature codes corresponding to suspicious files of executing target software, and inquiring whether a white list matched with the suspicious file feature codes exists in a white list library or not;
and if the file does not exist, performing corresponding alarm or blocking operation on the suspicious file according to the working mode of the target software.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions without departing from the scope of the invention. Therefore, although the present invention has been described in more detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A safety protection method of an industrial host is applied to a safety protection system client installed on the industrial host, and comprises the following steps:
when the target software is detected to run in the industrial host, automatically scanning the data content of the executable file of the target software to generate a target file feature code;
matching a target white list from a white list library by using the target file feature codes, and acquiring a working mode corresponding to the target file feature codes from the target white list;
determining a suspicious file feature code corresponding to a suspicious file executing the target software, and inquiring whether a white list matched with the suspicious file feature code exists in a white list library or not;
and if not, performing corresponding alarm or blocking operation on the suspicious file according to the working mode of the target software.
2. The method of claim 1, wherein the operating modes include an alert mode and a guard mode;
the alarm mode is used for giving an alarm in real time when the abnormal program executes the protected executable file, but the abnormal program is not blocked from executing;
the protection mode is used for giving an alarm in real time and blocking the execution of the abnormal program when the abnormal program executes the protected executable file.
3. The method of claim 2, further comprising:
if the industrial host is detected to download or start to use the new software, setting a working mode for the new software, automatically scanning the data content of the executable file of the new software, and generating a new file feature code;
and generating a new white list by using the new file feature codes and the working mode, and storing the new white list into a white list library for updating and taking effect.
4. The method of claim 1, further comprising:
when the access of an external storage device is detected, judging whether the external storage device has the access authority or not based on the unique identifier of the external storage device;
and if the access authority exists, matching and acquiring the device operation authority according to the unique identifier of the external storage device, and responding to the operation of the external storage device according to the device operation authority.
5. The safety protection device of the industrial host is applied to a safety protection system client installed on the industrial host, and comprises:
the file scanning module is used for automatically scanning the data content of the executable file of the target software and generating a target file feature code when the target software is detected to run in the industrial host;
the white list matching module is used for matching a target white list from a white list library by using the target file feature codes and acquiring a working mode corresponding to the target file feature codes from the target white list;
the query module is used for determining suspicious file feature codes corresponding to suspicious files executing the target software and querying whether a white list matched with the suspicious file feature codes exists in a white list library or not;
and the alarm module is used for carrying out corresponding alarm or blocking operation on the suspicious file according to the working mode of the target software if the suspicious file does not exist.
6. The apparatus of claim 5, wherein the operating modes include an alert mode and a guard mode;
the alarm mode is used for giving an alarm in real time when the abnormal program executes the protected executable file, but the abnormal program is not blocked from executing;
the protection mode is used for giving an alarm in real time and blocking the execution of the abnormal program when the abnormal program executes the protected executable file.
7. An industrial host security protection system, the system comprising: the system comprises a client installed on an industrial host and a control center installed on a server;
the client for executing the security protection method of the industrial host according to any one of claims 1 to 4;
and the control center is used for carrying out centralized management on the client sides on the plurality of industrial hosts under the networking condition.
8. The system of claim 7, wherein the industrial host security protection system comprises a stand-alone version and a network version;
the industrial host safety protection system of the stand-alone version is used for carrying out safety protection on isolated industrial hosts under the isolation condition, and the system comprises: a client installed on an industrial host;
the industrial host safety protection system of the network version is used for carrying out centralized management and control on a plurality of industrial hosts under the networking condition, and the system comprises: a client installed on an industrial host and a control center installed on a server.
9. The system of claim 7,
the control center is used for collecting log data reported by each client for analysis, cutting off a propagation path of a network attack event if the network attack event is found, generating a security protection strategy and issuing the security protection strategy to the clients on all the industrial hosts.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a method of securing an industrial host according to any one of claims 1 to 4.
CN202110812804.1A 2021-07-19 2021-07-19 Safety protection method, device and system for industrial host and storage medium Pending CN113641997A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110812804.1A CN113641997A (en) 2021-07-19 2021-07-19 Safety protection method, device and system for industrial host and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110812804.1A CN113641997A (en) 2021-07-19 2021-07-19 Safety protection method, device and system for industrial host and storage medium

Publications (1)

Publication Number Publication Date
CN113641997A true CN113641997A (en) 2021-11-12

Family

ID=78417708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110812804.1A Pending CN113641997A (en) 2021-07-19 2021-07-19 Safety protection method, device and system for industrial host and storage medium

Country Status (1)

Country Link
CN (1) CN113641997A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114817156A (en) * 2022-06-27 2022-07-29 北京网藤科技有限公司 Method and system for carrying out characteristic value matching retrieval through file path grouping
CN115314286A (en) * 2022-08-05 2022-11-08 中原内配集团股份有限公司 Safety guarantee system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140068774A1 (en) * 2012-08-28 2014-03-06 Alibaba Group Holding Limited Detecting a malware process
CN107679421A (en) * 2017-10-23 2018-02-09 郑州云海信息技术有限公司 A kind of movable memory apparatus monitoring means of defence and system
CN109766694A (en) * 2018-12-29 2019-05-17 北京威努特技术有限公司 Program protocol white list linkage method and device of industrial control host
CN110188543A (en) * 2019-05-21 2019-08-30 北京威努特技术有限公司 White list library, white list program library update method and industrial control system
CN111931178A (en) * 2020-07-21 2020-11-13 贵州黔源电力股份有限公司 Host protection method and system based on white list and file feature code in industrial environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140068774A1 (en) * 2012-08-28 2014-03-06 Alibaba Group Holding Limited Detecting a malware process
CN107679421A (en) * 2017-10-23 2018-02-09 郑州云海信息技术有限公司 A kind of movable memory apparatus monitoring means of defence and system
CN109766694A (en) * 2018-12-29 2019-05-17 北京威努特技术有限公司 Program protocol white list linkage method and device of industrial control host
CN110188543A (en) * 2019-05-21 2019-08-30 北京威努特技术有限公司 White list library, white list program library update method and industrial control system
CN111931178A (en) * 2020-07-21 2020-11-13 贵州黔源电力股份有限公司 Host protection method and system based on white list and file feature code in industrial environment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
KIM D 等,: "Blacklist vs. Whitelist-Based Ransomware Solutions", 《 IEEE CONSUMER ELECTRONICS MAGAZINE》, vol. 9, no. 3, 1 January 2020 (2020-01-01), pages 22 - 28, XP011781490, DOI: 10.1109/MCE.2019.2956192 *
何远德 等,: "基于白名单与主动防御混搭的安卓终端安全应用研究", 《西南民族大学学报(自然科学版)》, vol. 44, no. 2, 31 December 2018 (2018-12-31), pages 176 - 183 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114817156A (en) * 2022-06-27 2022-07-29 北京网藤科技有限公司 Method and system for carrying out characteristic value matching retrieval through file path grouping
CN115314286A (en) * 2022-08-05 2022-11-08 中原内配集团股份有限公司 Safety guarantee system

Similar Documents

Publication Publication Date Title
US10057284B2 (en) Security threat detection
CN108259449B (en) Method and system for defending against APT (android packet) attack
Kruegel et al. Alert verification determining the success of intrusion attempts
JP6104149B2 (en) Log analysis apparatus, log analysis method, and log analysis program
US6892303B2 (en) Method and system for caching virus-free file certificates
KR101130385B1 (en) System and method for securing a computer system connected to a network from attacks
US9015829B2 (en) Preventing and responding to disabling of malware protection software
US20070294756A1 (en) FirewallApparatus, Method and System
US20040039921A1 (en) Method and system for detecting rogue software
US20140013436A1 (en) System and method for enabling remote registry service security audits
KR102222377B1 (en) Method for Automatically Responding to Threat
CN1900941A (en) Computer safety protective method based on software identity identifying technology
TWI407328B (en) Network virus protection method and system
CN113179271A (en) Intranet security policy detection method and device
EP3826263B1 (en) Method for combining a firewall and a forensics agent to detect and prevent malicious software activity
US20220417255A1 (en) Managed detection and response system and method based on endpoints
KR101768079B1 (en) System and method for improvement invasion detection
CN113641997A (en) Safety protection method, device and system for industrial host and storage medium
US6976271B1 (en) Method and system for retrieving an anti-virus signature from one or a plurality of virus-free certificate authorities
US11030309B2 (en) Threat detection system
US8640242B2 (en) Preventing and detecting print-provider startup malware
CN113923021A (en) Sandbox-based encrypted flow processing method, system, device and medium
KR101767591B1 (en) System and method for improvement invasion detection
CN110086812B (en) A safe and controllable intranet security patrol system and method
US20240086538A1 (en) Computer investigation method and system for investigating authentication in remote host computers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 266000 No. 1, Minshan Road, Qingdao area, China (Shandong) pilot Free Trade Zone, Qingdao, Shandong

Applicant after: CAOS industrial Intelligence Research Institute (Qingdao) Co.,Ltd.

Applicant after: Kaos Digital Technology (Qingdao) Co.,Ltd.

Applicant after: Karos IoT Technology Co.,Ltd.

Address before: Room 257, management committee of Sino German ecological park, 2877 Tuanjie Road, Huangdao District, Qingdao City, Shandong Province, 266510

Applicant before: QINGDAO HAIER INDUSTRIAL INTELLIGENCE RESEARCH INSTITUTE Co.,Ltd.

Country or region before: China

Applicant before: Haier digital technology (Qingdao) Co.,Ltd.

Applicant before: Haier Kaos IOT Technology Co.,Ltd.

Country or region after: China

Address after: Room 257, management committee of Sino German ecological park, 2877 Tuanjie Road, Huangdao District, Qingdao City, Shandong Province, 266510

Applicant after: QINGDAO HAIER INDUSTRIAL INTELLIGENCE RESEARCH INSTITUTE Co.,Ltd.

Applicant after: Haier digital technology (Qingdao) Co.,Ltd.

Applicant after: Haier Kaos IOT Technology Co.,Ltd.

Address before: Room 257, management committee of Sino German ecological park, 2877 Tuanjie Road, Huangdao District, Qingdao City, Shandong Province, 266510

Applicant before: QINGDAO HAIER INDUSTRIAL INTELLIGENCE RESEARCH INSTITUTE Co.,Ltd.

Country or region before: China

Applicant before: Haier digital technology (Qingdao) Co.,Ltd.

Applicant before: Haier CAOS IOT Ecological Technology Co.,Ltd.