[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN116859804A - Safety situation monitoring and early warning system for ship manufacturing workshop - Google Patents

Safety situation monitoring and early warning system for ship manufacturing workshop Download PDF

Info

Publication number
CN116859804A
CN116859804A CN202310881584.7A CN202310881584A CN116859804A CN 116859804 A CN116859804 A CN 116859804A CN 202310881584 A CN202310881584 A CN 202310881584A CN 116859804 A CN116859804 A CN 116859804A
Authority
CN
China
Prior art keywords
data
analysis
situation
workshop
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310881584.7A
Other languages
Chinese (zh)
Inventor
邢卫强
武茂浦
王跃
牟家正
梁乐
陈卫彬
张�成
朱彤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Jierui Information Technology Co ltd
716th Research Institute of CSIC
CSIC Information Technology Co Ltd
Original Assignee
Jiangsu Jierui Information Technology Co ltd
716th Research Institute of CSIC
CSIC Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Jierui Information Technology Co ltd, 716th Research Institute of CSIC, CSIC Information Technology Co Ltd filed Critical Jiangsu Jierui Information Technology Co ltd
Priority to CN202310881584.7A priority Critical patent/CN116859804A/en
Publication of CN116859804A publication Critical patent/CN116859804A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • G05B19/0428Safety, monitoring
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/24Pc safety
    • G05B2219/24024Safety, surveillance

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a safety situation monitoring and early warning system for a ship manufacturing workshop, which comprises an equipment sensing module, a data acquisition module, a functional analysis module and a monitoring and early warning module, wherein the equipment sensing module acquires workshop data based on various terminal equipment of the ship manufacturing workshop, the data acquisition module acquires the workshop data and transmits the workshop data to the functional analysis module, the functional analysis module analyzes and manages the workshop safety situation based on the workshop data, and the monitoring and early warning module is used for displaying the workshop situation and workshop early warning response. The system is oriented to a ship manufacturing workshop, performs standardized processing and real-time association analysis on the collected heterogeneous data in real time, realizes security situation element extraction and association, security situation assessment and threat prediction, provides a security decision basis for a user, and can overcome the defect that an intrusion detection system cannot detect unknown intrusion behaviors to a certain extent.

Description

Safety situation monitoring and early warning system for ship manufacturing workshop
Technical Field
The invention belongs to the field of information safety, and particularly relates to a safety situation monitoring and early warning system for a ship manufacturing workshop.
Background
With the rapid development of industrial informatization, the trend of integration of industrialization and informatization is more and more obvious, and the industrial Internet is a trend. Ship manufacturing shop industrial control systems and networks are also utilizing the latest computer network technology to improve the level of integration, interconnection and informatization management between systems. In order to improve the production efficiency and benefit, the industrial control network of the ship manufacturing workshop is more and more opened, and the safety problem brought by the industrial control network becomes an important factor for restricting the integration of two types, the development of the industry 4.0 and the promotion of the industry Internet.
Currently, the number, scale, speed and variety of industrial network attacks in a ship manufacturing shop are continuously increasing, and the existing traditional security defense tools and technologies have difficulty in comprehensively coping with the novel attack behaviors.
(1) Many network security situation awareness models and systems have been proposed, and although different models and systems have different definitions of functions, most of the functions are substantially consistent, and no specific design and development are performed for specific industries, such as characteristics of industrial workshops in the ship industry.
(2) Aiming at the fact that a safety defense system, a production system and a data system in a ship manufacturing workshop are basically independently built, interconnection and intercommunication of data resources cannot be achieved, information islands are formed by the data barriers, the whole safety situation of a network cannot be comprehensively perceived and acquired in the workshop, each system can only acquire effective information from one side, so that operation and maintenance personnel cannot identify abnormal behaviors in the network, the hazard degree of the operation and maintenance personnel is analyzed and estimated, and the capability of handling emergencies through network safety management and emergency response decision making is reduced.
Disclosure of Invention
Aiming at the problems, the invention aims to provide a safety situation monitoring and early warning system for a ship manufacturing workshop.
The specific technical scheme for realizing the purpose of the invention is as follows:
a safety situation monitoring and early warning system for a ship manufacturing workshop comprises an equipment sensing module, a data acquisition module, a function analysis module and a monitoring and early warning module;
the equipment sensing module collects workshop data based on various terminal equipment of a ship manufacturing workshop;
the data acquisition module acquires workshop data and transmits the workshop data to the function analysis module;
the function analysis module is used for analyzing and managing the workshop safety situation based on workshop data;
the monitoring and early warning module is used for displaying workshop situations and workshop early warning response.
Further, the equipment sensing module comprises a ship manufacturing workshop terminal system, manufacturing equipment, industrial control equipment, operation and maintenance equipment, security equipment and network equipment.
Further, the data acquisition module comprises a log acquisition unit, a flow acquisition unit and an importing unit;
the log acquisition unit acquires a terminal log, a security log, a file log, a system log, an application log and an operation and maintenance log;
the flow acquisition unit comprises industrial gateway data, industrial detection system data, security audit system data, host protection system data, vulnerability scanning system data and security isolation device data;
the importing unit imports other needed workshop data according to the requirement.
Further, the function analysis module comprises a core function unit, a management support unit and a data analysis unit;
the data analysis unit performs local analysis and global analysis after preprocessing based on the data acquired by the data acquisition layer;
the core functional unit performs situation analysis and assessment of the ship manufacturing workshop based on the data analysis result;
the management support unit provides management support functions for the system based on the shop data.
Further, the data analysis unit comprises a local analysis and a global analysis;
the local analysis acquires data of the data acquisition layer, data preprocessing is carried out, the data is transmitted to global analysis, the global analysis is based on current safety data and historical safety data, rules are formed after classification learning, a classification method is transmitted back to the local analysis, and the local analysis carries out local association analysis of the data based on the classification learning;
and carrying out global situation analysis based on the current safety data, the historical safety data and the local association analysis result.
Further, the core functional unit comprises a safety response, IT operation and maintenance and fault investigation, compliance audit, strategy audit, attack and threat detection, business statistics analysis, situation analysis and situation assessment;
the situation analysis is used for carrying out aggregation and redundancy elimination on the network security events, carrying out network security event association analysis based on attack scenes, identifying alarm information, carrying out classification processing on repeated alarms, carrying out alarm classification according to time and similarity, and providing data for situation assessment;
the situation assessment is based on data and network security event data, and various index assessment results of the network are determined through ternary data fusion situation assessment;
the safety response is based on situation assessment result response, and comprises intra-system response and extra-system response, wherein corresponding safety response measures are made in the system during the intra-system response, and the extra-system response adjusts network safety situation indexes by sending a prompt to a network administrator;
the IT operation and maintenance and fault investigation is used for collecting various logs in the system, extracting various information comprising time stamps, IP addresses of visitors, behavior categories and response states from the logs, and rapidly determining the position and the reason of the fault by intensively analyzing the logs of a router and firewall equipment and by automating and interactive association analysis when the network has problems; determining a root cause and a starting point of the network interrupt by analyzing the time sequence relation of the network interrupt log; the power supply, the board card and the interface fault condition of the network equipment are rapidly found;
the compliance audit is used for collecting logs of IT infrastructure and application systems in the system, storing the logs in a distributed non-relational database in a centralized manner, supporting horizontal elastic expansion, carrying out structural description on the logs, and simultaneously storing the original logs for later investigation and evidence collection;
the policy audit judges whether the server accesses unauthorized IP, the host and the user in unauthorized time or not through log acquisition and flow acquisition by auditing the source IP address, login time and login user information in the login log; aiming at the password length of the mail account, judging whether the mail account with the password lower than 8-bit characters exists or not by collecting a detection log of the intrusion detection system;
the attack and threat detection is carried out by carrying out association analysis on logs of access connection log security equipment within a period of time, and a plurality of threats and attack behaviors in a network are discovered in real time through centralized association analysis on the logs;
the business statistical analysis aims at various logs of the system and carries out corresponding statistical analysis.
Furthermore, the management support unit comprises algorithm library management, model library management, patch management, dictionary configuration, log management, backup management, user management and tool management, so as to realize management of all databases and functions in the system.
Further, the network security event association analysis based on the attack scenario specifically includes:
firstly, filtering the analyzed logs and flow, extracting information fields to form an event queue, constructing an association analysis engine with rules, defining association relation of the same attack scene by using the association analysis engine, organizing scattered data records into complete attack scenes, and finally reconstructing an attack process.
Further, the ternary data fusion situation assessment specifically includes:
fusing the screened and processed information into a new complete information base, and further supporting the construction of a network security situation assessment model:
and (3) data source information fusion: determining a device attack birth support probability;
probability-based situation element fusion: determining the successful support probability of the threat to the host node attack by using the obtained attack occurrence support probability;
and (5) fusing key node situations: and solving the overall value of the network security situation, drawing the overall value into a time-security situation curve, and predicting and analyzing the network security situation in a future period of time.
Compared with the prior art, the invention has the beneficial effects that:
(1) Aiming at massive security data, the scheme of the invention has a large amount of redundancies, is not easy to directly manage, and can not reflect the whole attack threat overall problem by means of single event records, the network security event association analysis based on an attack scene is provided, an event queue is formed by filtering the analyzed logs and flow and extracting information fields, an association analysis engine is constructed with a rule base, the association analysis engine is used for defining the association relation of the same attack scene, the scattered data records are organized into a complete attack scene, and finally, the attack process is rebuilt, so that reliability support is provided for data management and future security situation prediction;
(2) Aiming at the problems of multi-source, complexity, fuzzy data relevance and the like of threat data in a network, three-element data fusion situation assessment is provided, screened and processed data are fused into a new complete database, potential dangerous features and dangerous relevance information in network information are modeled and assessed, after a simplified threat data and clear data relevance result are obtained, the information is summarized to a monitoring and early warning layer, and a safety manager can conveniently and accurately grasp the network safety situation;
(3) The scheme is oriented to a ship manufacturing workshop, aims at the data characteristics of the ship manufacturing workshop, solves the data problems of continuous data growth, complex types, various sources and the like in safety analysis, simultaneously uses a user and entity behavior analysis technology, realizes high-level continuous malicious attack and effective detection of internal illegal behaviors, and the system integrates various network safety factors to evaluate the safety situation of a network in real time from a macroscopic angle, realizes safety linkage after the threat is found, blocks in time, provides basis for decision analysis of enterprise informatization management departments, and protects customer core assets;
(4) According to the scheme, the interconnection and intercommunication of the data resources of the ship manufacturing workshop are realized, the data barriers are broken, the overall security situation of the network is comprehensively perceived, the effective information is obtained from all aspects, and the real-time monitoring and prediction of the overall security situation of the network of the ship manufacturing workshop are realized.
Drawings
Fig. 1 is a schematic diagram of a security situation monitoring and early warning system architecture for a ship manufacturing shop.
Fig. 2 is a schematic diagram of a situation element extraction process according to the present invention.
Fig. 3 is a schematic diagram of a network security event association analysis flow based on an attack scenario according to the present invention.
Fig. 4 is a schematic diagram of a ternary data fusion situation evaluation flow of the present invention.
Detailed Description
Examples
Referring to fig. 1, a security situation monitoring and early warning system for a ship manufacturing workshop comprises an equipment sensing module, a data acquisition module, a function analysis module and a monitoring and early warning module;
the equipment sensing module collects workshop data based on various terminal equipment of a ship manufacturing workshop;
the data acquisition module acquires workshop data and transmits the workshop data to the function analysis module;
the function analysis module is used for analyzing and managing the workshop safety situation based on workshop data;
the monitoring and early warning module is used for displaying workshop situations and workshop early warning response.
Further, the device sensing module includes a terminal system of the ship manufacturing shop (such as an operator station, an engineer station, an intelligent instrument, etc. of the ship manufacturing shop), manufacturing devices (such as a cutting machine tool, a forging device, a power machine, etc.), industrial control devices (such as a programmable controller, an industrial control computer, a numerical control system, etc.), operation and maintenance devices (such as a weak current system, an air conditioning system, etc.), security devices (such as a camera, an infrared detector, an alarm, etc.), network devices (such as an intrusion detection system, an industrial control vulnerability scanning system, an industrial security audit system, etc. security devices, switches, routers, firewalls, etc.).
The data acquisition module provides data support for the whole system and comprises a log acquisition unit, a flow acquisition unit and an importing unit;
the log acquisition unit acquires a terminal log, a security log, a file log, a system log, an application log and an operation and maintenance log;
the flow acquisition unit comprises industrial gateway data, industrial detection system data, security audit system data, host protection system data, vulnerability scanning system data and security isolation device data;
the importing unit imports other required workshop data, such as supervision data, virus data and the like, according to the requirement.
The function analysis module comprises a core function unit, a management support unit and a data analysis unit;
the data analysis unit performs local analysis and global analysis after preprocessing based on the data acquired by the data acquisition layer;
the core functional unit performs situation analysis and assessment of the ship manufacturing workshop based on the data analysis result;
the management support unit provides management support functions for the system based on the shop data.
Wherein the data analysis unit comprises local analysis and global analysis;
the local analysis acquires data of the data acquisition layer, data preprocessing is carried out, the data is transmitted to global analysis, the global analysis is based on current safety data and historical safety data, rules are formed after classification learning, a classification method is transmitted back to the local analysis, and the local analysis carries out local association analysis of the data based on the classification learning;
and carrying out global situation analysis based on the current safety data, the historical safety data and the local association analysis result.
This analysis mechanism can either obtain local situation elements or extract global situation elements, as shown in fig. 2.
Further, the core functional unit comprises a safety response, IT operation and maintenance and fault investigation, compliance audit, strategy audit, attack and threat detection, business statistics analysis, situation analysis and situation assessment;
the situation analysis is used for carrying out aggregation and redundancy elimination on the network security events, carrying out network security event association analysis based on attack scenes, identifying alarm information, carrying out classification processing on repeated alarms, carrying out alarm classification according to time and similarity, and providing data for situation assessment;
the network security event association analysis is carried out based on the attack scene, specifically:
with reference to fig. 3, first, the parsed log and flow are filtered, the information field is extracted to form an event queue, an association analysis engine is constructed with the rule, the association analysis engine is used for defining the association relation of the same attack scene, the scattered data records are organized into a complete attack scene, and finally, the attack process is rebuilt.
The situation assessment is based on data and network security event data, and various index assessment results of the network are determined through ternary data fusion situation assessment;
referring to fig. 4, the ternary data fusion situation assessment is specifically:
fusing the screened and processed information into a new complete information base, and further supporting the construction of a network security situation assessment model:
and (3) data source information fusion: determining a device attack birth support probability;
probability-based situation element fusion: determining the successful support probability of the threat to the host node attack by using the obtained attack occurrence support probability;
and (5) fusing key node situations: and solving the overall value of the network security situation, drawing the overall value into a time-security situation curve, and predicting and analyzing the network security situation in a future period of time.
The safety response is based on situation assessment result response, and comprises intra-system response and extra-system response, wherein corresponding safety response measures are made in the system during the intra-system response, and the extra-system response adjusts network safety situation indexes by sending a prompt to a network administrator;
the IT operation and maintenance and fault investigation is used for collecting various logs in the system, extracting various information comprising time stamps, IP addresses of visitors, behavior categories and response states from the logs, and rapidly determining the position and the reason of the fault by intensively analyzing the logs of a router and firewall equipment and by automating and interactive association analysis when the network has problems; determining a root cause and a starting point of the network interrupt by analyzing the time sequence relation of the network interrupt log; the power supply, the board card and the interface fault condition of the network equipment are rapidly found;
the compliance audit is used for collecting logs of IT infrastructure and application systems in the system, storing the logs in a distributed non-relational database in a centralized manner, supporting horizontal elastic expansion, carrying out structural description on the logs, and simultaneously storing the original logs for later investigation and evidence collection; the system can also help users eliminate various compliance constraints that prevent operation, and provide necessary log files for developers and application system administrators in a centralized manner to facilitate analysis and troubleshooting of production failures without seeking corresponding data materials sent by specific server administrators. Therefore, the problems can be quickly solved with less manpower, and meanwhile, the production server does not need to be accessed, so that the production operation is not affected, and the safety compliance audit of the access of the organization to the server can be satisfied.
The policy audit judges whether the server accesses unauthorized IP, the host and the user in unauthorized time or not through log acquisition and flow acquisition by auditing the source IP address, login time and login user information in the login log; aiming at the password length of the mail account, judging whether the mail account with the password lower than 8-bit characters exists or not by collecting a detection log of the intrusion detection system; aiming at the audit of the security policy, the log analysis function is combined with the organization security policy, and provides complete evidence for tracing, thereby replacing the tedious manual audit process.
The attack and threat detection are carried out by associating and analyzing access connection logs and security equipment logs such as IDS/IPS and the like in a period of time, the system can find that the port numbers are different by intensively analyzing a large number of logs with the same source and destination addresses, and the system can find that the port numbers are different and the port numbers are greatly changed by combining the scanning logs detected by the IDS, so that the system can find that the port numbers are purposeful port scanning and prying behaviors from the source address. Aiming at various security scenes, various threats and attack behaviors in the network are discovered in real time through centralized association analysis of logs;
the business statistical analysis aims at various logs of the system and carries out corresponding statistical analysis, the logs of the business system of the government enterprise clients can provide basis for business analysis of the clients, and the system can help operation and maintenance management personnel to collect and analyze the logs of the business system and carry out corresponding statistical analysis. For the access log of the application system, the system can perform statistical analysis for the source IP of the visitor; statistics are performed on the names of the access users, and active users and inactive users can be analyzed for a period of time.
Further, the management support unit comprises algorithm library management, model library management, patch management, dictionary configuration, log management, backup management, user management and tool management, and realizes management of various databases and functions in the system:
(1) Algorithm library management, namely detecting suspicious and abnormal behaviors, and realizing an algorithm after modeling a specific business object;
(2) Model library management, which is to establish a detection model based on network metadata and the like, and detect suspicious and abnormal behaviors;
the model supports modeling of specific business objects.
(3) Patch management, namely mainly completing the management functions of loopholes and patch information;
(4) Dictionary configuration, mainly completing functions of adding, deleting, changing, checking and the like of some basic dictionary information in a system;
(5) And (3) log management, namely mainly completing the network log information management in the system operation process. Such as user operation logs, system management logs, etc.;
(6) The backup management mainly completes the backup function of data information in the system operation process, and a basic information base and a network security event base formed in the data acquisition process need to be backed up;
(7) User management, mainly completing the functions of user information management, function authority configuration and the like;
(8) Tool management, integration of primary network tools such as ping, telnet, etc.
The monitoring and early warning module comprises a comprehensive situation, an asset situation, an attack situation, a comprehensive panel, threat panorama, attack early warning and safety warning, provides the display and early warning functions of monitoring the industrial control network situation of the ship manufacturing workshop, displays the overall network safety situation in an omnibearing manner, completes the display of the overall situation, the asset safety situation and the like of the workshop area, and provides friendly man-machine interfaces.
The system relies on multisource data extraction, network security event association based on attack scenes and situation assessment based on ternary data fusion, is oriented to ship manufacturing workshops, introduces artificial intelligence and big data, can perform standardized processing and real-time association analysis on collected heterogeneous data in real time, realizes security situation element extraction and association, security situation assessment and threat prediction, provides security decision basis for enterprise security personnel, and can overcome the defect that an intrusion detection system cannot detect unknown intrusion behaviors to a certain extent.
The foregoing embodiments illustrate and describe the basic principles, principal features of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and that the above embodiments and descriptions are merely illustrative of the principles of the present invention, and various changes and modifications may be made without departing from the spirit and scope of the invention, which is defined in the appended claims.

Claims (9)

1. The safety situation monitoring and early warning system for the ship manufacturing workshop is characterized by comprising an equipment sensing module, a data acquisition module, a functional analysis module and a monitoring and early warning module;
the equipment sensing module collects workshop data based on various terminal equipment of a ship manufacturing workshop;
the data acquisition module acquires workshop data and transmits the workshop data to the function analysis module;
the function analysis module is used for analyzing and managing the workshop safety situation based on workshop data;
the monitoring and early warning module is used for displaying workshop situations and workshop early warning response.
2. The ship manufacturing shop oriented security posture monitoring and early warning system according to claim 1, wherein the equipment sensing module comprises a ship manufacturing shop terminal system, manufacturing equipment, industrial control equipment, operation and maintenance equipment, security equipment and network equipment.
3. The ship manufacturing shop oriented security situation monitoring and early warning system according to claim 1, wherein the data acquisition module comprises a log acquisition unit, a flow acquisition unit and an importing unit;
the log acquisition unit acquires a terminal log, a security log, a file log, a system log, an application log and an operation and maintenance log;
the flow acquisition unit comprises industrial gateway data, industrial detection system data, security audit system data, host protection system data, vulnerability scanning system data and security isolation device data;
the importing unit imports other needed workshop data according to the requirement.
4. The ship manufacturing shop oriented security situation monitoring and early warning system according to claim 1, wherein the functional analysis module comprises a core functional unit, a management support unit and a data analysis unit;
the data analysis unit performs local analysis and global analysis after preprocessing based on the data acquired by the data acquisition layer;
the core functional unit performs situation analysis and assessment of the ship manufacturing workshop based on the data analysis result;
the management support unit provides management support functions for the system based on the shop data.
5. The ship manufacturing shop oriented security posture monitoring and early warning system of claim 4, wherein the data analysis unit comprises a local analysis and a global analysis;
the local analysis acquires data of the data acquisition layer, data preprocessing is carried out, the data is transmitted to global analysis, the global analysis is based on current safety data and historical safety data, rules are formed after classification learning, a classification method is transmitted back to the local analysis, and the local analysis carries out local association analysis of the data based on the classification learning;
and carrying out global situation analysis based on the current safety data, the historical safety data and the local association analysis result.
6. The ship manufacturing shop oriented security posture monitoring and early warning system of claim 4, wherein the core functional units include security response, IT operation and maintenance and fault investigation, compliance auditing, policy auditing, attack and threat detection, business statistics analysis, posture analysis and posture assessment;
the situation analysis is used for carrying out aggregation and redundancy elimination on the network security events, carrying out network security event association analysis based on attack scenes, identifying alarm information, carrying out classification processing on repeated alarms, carrying out alarm classification according to time and similarity, and providing data for situation assessment;
the situation assessment is based on data and network security event data, and various index assessment results of the network are determined through ternary data fusion situation assessment;
the safety response is based on situation assessment result response, and comprises intra-system response and extra-system response, wherein corresponding safety response measures are made in the system during the intra-system response, and the extra-system response adjusts network safety situation indexes by sending a prompt to a network administrator;
the IT operation and maintenance and fault investigation is used for collecting various logs in the system, extracting various information comprising time stamps, IP addresses of visitors, behavior categories and response states from the logs, and rapidly determining the position and the reason of the fault by intensively analyzing the logs of a router and firewall equipment and by automating and interactive association analysis when the network has problems; determining a root cause and a starting point of the network interrupt by analyzing the time sequence relation of the network interrupt log; the power supply, the board card and the interface fault condition of the network equipment are rapidly found;
the compliance audit is used for collecting logs of IT infrastructure and application systems in the system, storing the logs in a distributed non-relational database in a centralized manner, supporting horizontal elastic expansion, carrying out structural description on the logs, and simultaneously storing the original logs for later investigation and evidence collection;
the policy audit judges whether the server accesses unauthorized IP, the host and the user in unauthorized time or not through log acquisition and flow acquisition by auditing the source IP address, login time and login user information in the login log; aiming at the password length of the mail account, judging whether the mail account with the password lower than 8-bit characters exists or not by collecting a detection log of the intrusion detection system;
the attack and threat detection is carried out by carrying out association analysis on logs of access connection log security equipment within a period of time, and a plurality of threats and attack behaviors in a network are discovered in real time through centralized association analysis on the logs;
the business statistical analysis aims at various logs of the system and carries out corresponding statistical analysis.
7. The ship manufacturing shop oriented security situation monitoring and early warning system according to claim 4, wherein the management support unit comprises algorithm library management, model library management, patch management, dictionary configuration, log management, backup management, user management and tool management, and management of various databases and functions in the system is achieved.
8. The ship manufacturing shop oriented security situation monitoring and early warning system according to claim 6, wherein the network security event association analysis based on the attack scenario is specifically:
firstly, filtering the analyzed logs and flow, extracting information fields to form an event queue, constructing an association analysis engine with rules, defining association relation of the same attack scene by using the association analysis engine, organizing scattered data records into complete attack scenes, and finally reconstructing an attack process.
9. The ship manufacturing shop oriented safety situation monitoring and early warning system according to claim 6, wherein the ternary data fusion situation assessment is specifically:
fusing the screened and processed information into a new complete information base, and further supporting the construction of a network security situation assessment model:
and (3) data source information fusion: determining a device attack birth support probability;
probability-based situation element fusion: determining the successful support probability of the threat to the host node attack by using the obtained attack occurrence support probability;
and (5) fusing key node situations: and solving the overall value of the network security situation, drawing the overall value into a time-security situation curve, and predicting and analyzing the network security situation in a future period of time.
CN202310881584.7A 2023-07-18 2023-07-18 Safety situation monitoring and early warning system for ship manufacturing workshop Pending CN116859804A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310881584.7A CN116859804A (en) 2023-07-18 2023-07-18 Safety situation monitoring and early warning system for ship manufacturing workshop

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310881584.7A CN116859804A (en) 2023-07-18 2023-07-18 Safety situation monitoring and early warning system for ship manufacturing workshop

Publications (1)

Publication Number Publication Date
CN116859804A true CN116859804A (en) 2023-10-10

Family

ID=88226649

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310881584.7A Pending CN116859804A (en) 2023-07-18 2023-07-18 Safety situation monitoring and early warning system for ship manufacturing workshop

Country Status (1)

Country Link
CN (1) CN116859804A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118313673A (en) * 2024-06-11 2024-07-09 青岛大数华创科技有限公司 Laboratory security situation sensing system based on multidimensional data analysis

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118313673A (en) * 2024-06-11 2024-07-09 青岛大数华创科技有限公司 Laboratory security situation sensing system based on multidimensional data analysis

Similar Documents

Publication Publication Date Title
CN112651006B (en) Power grid security situation sensing system
CN114584405B (en) Electric power terminal safety protection method and system
CN108933791B (en) Intelligent optimization method and device based on power information network safety protection strategy
CN113486351A (en) Civil aviation air traffic control network safety detection early warning platform
CN107239707B (en) Threat data processing method for information system
CN116662989B (en) Security data analysis method and system
CN106371986A (en) Log treatment operation and maintenance monitoring system
CN105681298A (en) Data security abnormity monitoring method and system in public information platform
CN112416872A (en) Cloud platform log management system based on big data
CN113824682B (en) Modularized SCADA security situation sensing system architecture
CN107295010A (en) A kind of enterprise network security management cloud service platform system and its implementation
CN110020687B (en) Abnormal behavior analysis method and device based on operator situation perception portrait
CN115378711B (en) Intrusion detection method and system for industrial control network
CN113794276A (en) Power distribution network terminal safety behavior monitoring system and method based on artificial intelligence
CN112560029A (en) Website content monitoring and automatic response protection method based on intelligent analysis technology
CN117827813A (en) Computer information security monitoring system
CN115001934A (en) Industrial control safety risk analysis system and method
CN114125083A (en) Industrial network distributed data acquisition method and device, electronic equipment and medium
CN113709170A (en) Asset safe operation system, method and device
Skendžić et al. Management and monitoring security events in a business organization-siem system
CN113162897A (en) Industrial control network security filtering system and method
CN116859804A (en) Safety situation monitoring and early warning system for ship manufacturing workshop
CN113132370A (en) Universal integrated safety pipe center system
CN112596984A (en) Data security situation sensing system under weak isolation environment of service
CN117879887A (en) Computer host information transmission supervision system based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination