Summary of the invention
For the above-mentioned problems in the prior art, one kind is now provided and is intended to have by setting and mechanized production system
There is the Safety Automation System of identical production environment, and attack is collected by Safety Automation System, and go to attack
To be classified and being analyzed, mechanized production system is written in the attack source automation after being classified and analyzed, to improve
The safety and reliability of mechanized production system, and improve the safety automation system of the efficiency for attack of collecting and audit
System and its control method.
Specific technical solution is as follows:
A kind of Safety Automation System is applied in mechanized production system;Wherein, Safety Automation System and automation
Production system production environment having the same;
Safety Automation System specifically includes:
Module is obtained, for obtaining the attack attacked Safety Automation System;
Classification and Identification module, connection obtain module, for being classified using preset attack type to attack;
Multiple decoy attack modules, each decoy attack module are connect with Classification and Identification module, each decoy attack module
Corresponding to the attack of a type, and the object of attack for the attack as corresponding types, generate corresponding day
Will simultaneously exports;
Data analysis module is connect with each decoy attack module, for receiving the day of each decoy attack module output
Will, and read from the specific fields of log and obtain the attack source information of each attack and counted, data analyze mould
Block exports statistical result;
Judgment module, connects data analysis module, and judgment module is used to judge attacking for each attack source according to statistical result
Number is hit whether more than a preset threshold, and the attack source more than preset threshold is integrated into a warning message and is exported;
Module is automated, is connect with judgment module, for warning message to be written in mechanized production system.
Preferably, Safety Automation System, wherein data analysis module includes:
Data analysis unit receives each log, and reads from the specific fields of log and obtain each attack
Attack source information;
Data statistics unit, connect with data analysis unit, unites to the same attack source information of each attack
Meter, and export statistical result.
Preferably, Safety Automation System, wherein automating module includes:
Warning message is written in mechanized production system writing unit;
Warning message is generated write-in file by generation unit;
Firewall unit is connect with text generation unit, and automated production is written in the attack source information in text file
In the firewall of system.
Preferably, Safety Automation System, wherein including a security audit module, security audit module and automation mould
Block connection, security audit module include:
First security audit unit, the warning message in mechanized production system is written in record automation module, to generate
First record content, and the first record content is sent to administrator;
Second security audit unit, real time monitoring automation module is by the behavior for attacking source information write-in firewall and prevents
Second record content to generate the second record content, and is sent to pipe by the change record that wall with flues is carried out according to attack source information
Reason person.
Preferably, Safety Automation System, wherein including memory module, memory module with acquisition module, is classified and known respectively
Other module, each decoy attack module are connected with judgment module, for storing attack, the tag along sort of attack, day
Will and warning message.
Further include a kind of control method of Safety Automation System, is applied in Safety Automation System;Wherein, safely certainly
Dynamicization system is applied in mechanized production system;
Control method the following steps are included:
Step S1 obtains the attack attacked Safety Automation System;
Step S2 classifies to attack using preset attack type;
The attack of each type is generated corresponding log and exported by step S3;
Step S4, receives the log of each decoy attack module output, and reads and obtained respectively from the specific fields of log
The attack source information of a attack is simultaneously counted, and data analysis module exports statistical result;
Step S5 judges whether the number of times of attack of each attack source is more than preset threshold;
It is exported if so, the attack source more than preset threshold is integrated into a warning message;
If it is not, return step S1;
Warning message is written in mechanized production system step S6.
Preferably, the control method of Safety Automation System, wherein step S4 the following steps are included:
Step S41 receives each log, and reads from the specific fields of log and obtain the attack source of each attack
Information;
Step S42 counts the same attack source information of each attack, and exports statistical result.
Preferably, the control method of Safety Automation System, wherein step S6 the following steps are included:
The warning message in mechanized production system is written in step S61A, record automation module, to generate the first record
Content;
First record content is sent to administrator by step S62A.
Preferably, the control method of Safety Automation System, wherein step S6 the following steps are included:
Step S61B, real time monitoring automation module will attack the behavior and firewall foundation of source information write-in firewall
The change record that source information carries out is attacked, to generate the second record content;
Second record content is sent to administrator by step S62B.
Above-mentioned technical proposal have the following advantages that or the utility model has the advantages that by be arranged it is having the same with mechanized production system
The Safety Automation System of production environment, and attack is collected by Safety Automation System, and divide attack
Class and analysis, the attack source automation write-in mechanized production system after being classified and analyzed, to improve automatic metaplasia
The safety and reliability of production system, and improve the efficiency collected and audit attack.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art without creative labor it is obtained it is all its
His embodiment, shall fall within the protection scope of the present invention.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the present invention can phase
Mutually combination.
The present invention will be further explained below with reference to the attached drawings and specific examples, but not as the limitation of the invention.
As shown in Figure 1, the present invention includes a kind of Safety Automation System, it is applied in mechanized production system 1;Safety is certainly
Dynamicization system 2 and the production environment having the same of mechanized production system 1;
Safety Automation System 2 specifically includes:
Module 21 is obtained, for obtaining the attack attacked Safety Automation System 2;
Classification and Identification module 22, connection obtain module 21, for being divided using preset attack type attack
Class;
Multiple decoy attack modules 23, each decoy attack module 23 connect with Classification and Identification module 22, each lure and attack
The attack that module 23 corresponds to a type, and the object of attack for the attack as corresponding types are hit, is generated
Corresponding log simultaneously exports;
Data analysis module 24 is connect with each decoy attack module 23, defeated for receiving each decoy attack module 23
Log out, and read from the specific fields of log and obtain the attack source information of each attack and counted, data
Analysis module 24 exports statistical result;
Judgment module 25, connects data analysis module 24, and judgment module 25 is used to judge each attack according to statistical result
The number of times of attack in source whether more than a preset threshold, and by be more than preset threshold attack source be integrated into it is defeated in a warning message
Out;
Module 26 is automated, is connect with judgment module 25, for warning message to be written in mechanized production system 1.
In the above-described embodiments, by the way that the safety automation with the production environment having the same of mechanized production system 1 is arranged
Change system 2, and attack is collected by the acquisition module 21 of Safety Automation System 2, attacked against each other by Classification and Identification module 22
The behavior of hitting is classified, and the attack of a type is corresponded to by each decoy attack module 23, and for as correspondence
The object of attack of the attack of type generates corresponding log and exports, by data analysis module 24 to the specific of log
It is read in field and obtains the attack source information of each attack and counted, statistical result is carried out by judgment module 25
Judge and obtain warning message, warning message is automated by write-in mechanized production system 1 by automation module 26, to mention
The safety and reliability of high mechanized production system 1, it is more time saving and energy saving by way of automation, and improve write efficiency
And accuracy rate.
Further, as preferred embodiment, multiple decoy attack modules 23 can be multiple honey jar modules, each
Honey jar module corresponds to the attack of a type, and attacking for the attack as corresponding types according to Honeypot Techniques
Object is hit, corresponding honey jar log is generated and is exported.
Further, in above-mentioned preferred embodiment, each honey jar module includes:
First honey jar module --- Cowrie honey jar, i.e., it is interactive to be based on SSH (Secure Shell, safety shell protocol)
Honey jar, scanning SSH and TELNET (remote terminal protocol) Brute Force account and password can be recorded, when user is broken
After solving account and password login, saves and pass through wget (a kind of free tool for downloading file automatically from network) and curl
(CommandLine Uniform Resource Locator, be one using URL (Uniform Resource Locator,
Uniform resource locator) file transfer conveyance that works under order line of grammer) downloading file and pass through SFTP (Secure
File TransferProtocol, secure file transportation protocol) and the file that uploads of SCP (secure copy, transmission order).
That is the targeted attack of the first honey jar module is the attack of Brute Force account and password.In other words,
The system vulnerability simulated in first honey jar module is the system vulnerability for the attack.
Second honey jar module --- Honeytrap honey jar, for recording needle to transmission control protocol (Transmission
Control Protocol, TCP) or User Datagram Protocol (User Datagram Protocol, UDP) service attack row
For;And Honeytrap honey jar simulates some well-known services as a demons, and can analytical attack character string,
Execute corresponding downloading file instruction.
That is attack in the second honey jar module be for transmission control protocol or User Datagram Protocol service (such as
SMTP, pop3, remote desktop etc. service) attack.
Third honey jar module --- Elasticpot honey jar, i.e., (one kind is for distribution by a kind of simulation elastcisearch
The search server of full-text search) RCE (Reverse Compile Enginering, long-range execute) loophole honey jar, pass through
Forge function/, fragility ES (elastcisearch) example is responded in the request of/_ search ,/_ nodes (node)
A kind of JSON (data interchange format of the lightweight based on JavaScript language) format messages.
4th honey jar module --- Glastopf honey jar, i.e., (World Wide Web, the whole world are wide by a kind of low interactive Web
Domain net) honey jar is applied, it can simulate thousands of web loophole to Glastopf honey jar, for the different attack means of attack
Attacker is responded, then collects data from the attack process to target web application.Its target is for automation
Vulnerability scanning/utilize tool returns to corresponding conjunction for certain a kind of Land use systems by sorting out to vulnerability exploit mode
Reason is as a result, realize low interaction with this.
That is attack in the 4th honey jar module is the attack for automation vulnerability scanning/utilize.
5th honey jar module --- Dionaea honey jar, Dionaea are operate in one in Linux (a kind of operating system)
A application program, program is run under network environment, the default port of its open Internet (internet) general service, when
When having external connection, simulation normal service, which is given, to be fed back, while recording discrepancy network data flow.Network data flow is via detection
Category is handled after module detection, if there is shellcode (filling data) is then emulated;Under program meeting is automatic
Carry the malicious file of the specified downloading of specified or follow-on attack order in shellcode.
That is the attack in the 5th honey jar module is the evil of the specified downloading of specified or follow-on attack order in shellcode
Attack in meaning file.
Further, in above-mentioned preferred embodiment, each honey jar module generates corresponding honey jar log.
For example, Cowrie honey jar module generates corresponding cowrie honey jar log;
Honeytrap honey jar module generates corresponding honeytrap module log;
Elasticpot honey jar module generates corresponding elasticpot module log;
Glastopf honey jar module generates corresponding glastopf module log;
Dionaea honey jar module generates corresponding dionaea module log.
Further, in the above-described embodiments, as shown in Fig. 2, data analysis module 24 includes:
Data analysis unit 241 receives each log, and reads from the specific fields of log and obtain each attack
Attack source information;
Data statistics unit 242 is connect with data analysis unit 241, to the same attack source information of each attack
It is counted, and exports statistical result.
Further, as preferred embodiment, when attack is in the first honey jar module --- in Cowrie honey jar
Attack when, Cowrie honey jar generates corresponding cowrie module log, and data analysis unit 241 receives each cowrie
Module log, and from the specific fields of cowrie module log read obtain each attack attack source information (such as:
Read the attack source information that specific fields in the log of cowrie module are attack in src_ip), data statistics unit 242 is right
The same attack source information of each attack is counted, and exports statistical result, i.e., the same attack obtained by statistics
The quantity of source information, i.e., the number of times of attack of the same attack source.
Then statistical result is exported to judgment module 25, judgment module 25 is used to judge each attack according to statistical result
The number of times of attack in source is hit whether more than a preset threshold, and by be more than preset threshold attack source be integrated into it is defeated in a warning message
Out.
I.e. by the embodiment above understand the first honey jar module cowrie module log in each attack source whether
Carry out malicious attack.
Further, as preferred embodiment, when attack is in the second honey jar module --- Honeytrap honey jar
In attack when, Honeytrap honey jar generates corresponding honeytrap module log, and data analysis unit 241 receives often
A honeytrap module log, and read from the specific fields of honeytrap module log and obtain attacking for each attack
Hit source information (such as: read the log of honeytrap module in specific fields be remote_ip in attack attack source letter
Breath), data statistics unit 242 counts the same attack source information of each attack, and exports statistical result, i.e., logical
Cross the quantity for the same attack source information that statistics obtains, i.e., the number of times of attack of the same attack source.
Then statistical result is exported to judgment module 25, judgment module 25 is used to judge each attack according to statistical result
The number of times of attack in source is hit whether more than a preset threshold, and by be more than preset threshold attack source be integrated into it is defeated in a warning message
Out.
The each attack source understood by the embodiment above in the honeytrap module log of the first honey jar module is
No carry out malicious attack.
Further, as preferred embodiment, when attack is in third honey jar module --- Elasticpot honey
When attack in tank, Elasticpot honey jar generates corresponding elasticpot module log, and data analysis unit 241 connects
Each elasticpot module log is received, and is read from the specific fields of elasticpot module log and obtains each attack row
For attack source information (such as: read the log of elasticpot module in specific fields be attack in src_ip attack
Source information), data statistics unit 242 counts the same attack source information of each attack, and exports statistical result,
The quantity of the same attack source information obtained by statistics, i.e., the number of times of attack of the same attack source.
Then statistical result is exported to judgment module 25, judgment module 25 is used to judge each attack according to statistical result
The number of times of attack in source is hit whether more than a preset threshold, and by be more than preset threshold attack source be integrated into it is defeated in a warning message
Out.
Each attack source in the elasticpot module log of third honey jar module is understood by the embodiment above
Whether malicious attack is carried out.
Further, as preferred embodiment, when attack is in the 4th honey jar module --- Glastopf honey jar
In attack when, Glastopf honey jar generates corresponding glastopf module log, and data analysis unit 241 receives each
Glastopf module log, and read from the specific fields of glastopf module log and obtain the attack source of each attack
Information (such as: read the attack source information that specific fields in the log of glastopf module are attack in IP), data statistics
Unit 242 counts the same attack source information of each attack, and exports statistical result, i.e., is obtained by statistics
The quantity of same attack source information, i.e., the number of times of attack of the same attack source.
Then statistical result is exported to judgment module 25, judgment module 25 is used to judge each attack according to statistical result
The number of times of attack in source is hit whether more than a preset threshold, and by be more than preset threshold attack source be integrated into it is defeated in a warning message
Out.
The each attack source understood by the embodiment above in the glastopf module log of the 4th honey jar module is
No carry out malicious attack.
Further, as preferred embodiment, when attack is in the 5th honey jar module --- in Dionaea honey jar
Attack when, Dionaea honey jar generates corresponding dionaea module log, and data analysis unit 241 receives each
Dionaea module log, and read from the specific fields of dionaea module log and obtain the attack source letter of each attack
Breath (such as: read the attack source information that specific fields in the log of dionaea module are attack in src_ip), data statistics
Unit 242 counts the same attack source information of each attack, and exports statistical result, i.e., is obtained by statistics
The quantity of same attack source information, i.e., the number of times of attack of the same attack source.
Then statistical result is exported to judgment module 25, judgment module 25 is used to judge each attack according to statistical result
The number of times of attack in source is hit whether more than a preset threshold, and by be more than preset threshold attack source be integrated into it is defeated in a warning message
Out.
I.e. by the embodiment above understand the 5th honey jar module dionaea module log in each attack source whether
Carry out malicious attack.
Further, in the above-described embodiments, the attack source more than preset threshold is integrated into alarm signal by judgment module 25
While output in breath, the analysis data that judgment module 25 will meet each type of alert if generate mail and inform management
Person, so that manager can be informed in time, and then can be for accurate, quickly exclusion threatens and provides the best opportunity.
Except of course that lettergram mode, can also inform manager by modes such as short message, wechats.
Further, in the above-described embodiments, as shown in figure 3, automation module 26 includes:
Warning message is written in mechanized production system 1 writing unit 261;
Warning message is generated write-in file by generation unit 262;
Firewall unit 263 is connect with text generation unit 262, the attack source information in text file is written automatic
In the firewall for changing production system 1, to prevent the corresponding attack source of attack source information in text file to automated production
The access of system 1.
Wherein, write-in file can be text file, or other can be written into the fire prevention of mechanized production system 1
The file of wall.
Further, in the above-described embodiments, including a security audit module 27, security audit module 27 and automation mould
Block 26 connects, and security audit module 27 includes:
First security audit unit, the warning message in mechanized production system 1 is written in record automation module 26, with life
Administrator is sent to by lettergram mode at the first record content, and by the first record content, for tracing change;
Second security audit unit, real time monitoring automation module 26 will attack source information and mechanized production system 1 are written
Firewall behavior and firewall according to attack source information carry out change record, with generate second record content, and will
Second record content is sent to administrator by lettergram mode.
Wherein, in addition to lettergram mode, manager can also be informed by modes such as short message, wechats.
Further, as preferred embodiment, mechanized production system 1 is written into source address in automation module 26
Firewall when, trigger the local log in firewall, while local log being sent in remote server, remote server
In security audit module 27 in the second security audit unit generate the second record content by way of real time monitoring, and will
Second record content is sent to administrator by lettergram mode, so as to carry out comprehensively and timely audit, quickly finds safety
Hidden danger, positioning security problem.
Further, in the above-described embodiments, including memory module 28, memory module 28 with acquisition module 21, are divided respectively
Class identification module 22, each decoy attack module 23 and judgment module 25 connect, for storing attack, point of attack
Class label, log and warning message.
Memory module 28 stores the information of modules, facilitates subsequent calling and audit.
Further include a kind of control method of Safety Automation System, is applied in Safety Automation System 2;Wherein, safety
Automated system 2 is applied in mechanized production system 1;
As shown in figure 4, control method the following steps are included:
Step S1 obtains the attack attacked Safety Automation System 2;
Step S2 classifies to attack using preset attack type;
The attack of each type is generated corresponding log and exported by step S3;
Step S4 receives the log that each decoy attack module 23 exports, and reads and obtain from the specific fields of log
The attack source information of each attack is simultaneously counted, and data analysis module 24 exports statistical result;
Step S5 judges whether the number of times of attack of each attack source is more than preset threshold;
It is exported if so, the attack source more than preset threshold is integrated into a warning message;
If it is not, return step S1;
Warning message is written in mechanized production system 1 step S6.
In the above-described embodiments, by the way that the safety automation with the production environment having the same of mechanized production system 1 is arranged
Change system 2 is classified to attack and is counted by successively collecting attack, and is judged simultaneously statistical result
Warning message is obtained, warning message is finally automated into write-in mechanized production system 1, so that mechanized production system 1 is protected,
It is more time saving and energy saving by way of automation, and improve write efficiency and accuracy rate.
Further, in the above-described embodiments, as shown in figure 5, step S4 the following steps are included:
Step S41 receives each log, and reads from the specific fields of log and obtain the attack source of each attack
Information;
Step S42 counts the same attack source information of each attack, and exports statistical result.
Statistical result and preset threshold i.e. obtained by calculation are compared, to judge whether each attack source carries out
Malicious attack.
Further, in the above-described embodiments, as shown in fig. 6, step S6 the following steps are included:
The warning message in mechanized production system 1 is written in step S61A, record automation module 26, to generate the first note
Record content;
First record content is sent to administrator by step S62A.
Further, in the above-described embodiments, as shown in fig. 7, step S6 the following steps are included:
Step S61B, real time monitoring automation module 26 by attack source information write-in firewall behavior and firewall according to
According to the change record that attack source information carries out, to generate the second record content;
Second record content is sent to administrator by step S62B.
First record content and the second record content by lettergram mode are sent to administrator, so as to carry out comprehensively with
It timely audits, quickly finds security risk, positioning security problem.
The foregoing is merely preferred embodiments of the present invention, are not intended to limit embodiments of the present invention and protection model
It encloses, to those skilled in the art, should can appreciate that all with made by description of the invention and diagramatic content
Equivalent replacement and obviously change obtained scheme, should all be included within the scope of the present invention.