A few days ago, Fengtai Technology issued a message “issued, Fengtai technology won the first prize of science and technology progress!” The article introduced an award-winning project – “Industrial Internet endogenous security closed-loop protection key technologies and applications”, and it can stand out from tens of thousands of projects, by what?
The puzzle is broken by the sword
With special industrial attributes, in the face of frequent industrial Internet security incidents, the lack of relevant mature protection products, and the status quo of incomplete security research, how does the “first Prize for scientific and technological Progress” break the game?
As we all know, industrial Internet security is an extremely important part of national security, and industrial Internet security problems caused by different degrees of industrial modernization are also exposed in many aspects such as norms, management, personnel, and products.
Accumulation of steps, to a thousand miles. Based on decades of experience in the industrial field, Fengtai Technology refining summarizes the user pain points, application scenarios, and the situation of the number of intelligent transformation, and innovatively puts forward the overall idea of the industrial Internet dual-cycle integrated defense system, using the simulation exercise system, honey network system, and joint protection platform to build a complete internal security closed-loop defense system of the industrial Internet.
This closed-loop protection system specifically solves the current problems of “lack of fine-grained and realistic personnel network security training methods, limited national attack absorption and protection means, and insufficient dynamic management
and control technology of industrial control equipment vulnerabilities”.
The key technology of endogenous security closed-loop protection is to improve the security capability cycle as the core, focusing on improving the ability to deal with the security risks of industrial control network caused by human factors. This function dynamically improves the security protection efficiency of devices, driven by cyclic interaction of threat features.
The reason why the internal security closed-loop defense system of the industrial Internet can form a closed-loop is inseparable from the innovation of three key links: the key technologies and systems of the first real interactive industrial Internet simulation exercise, the Industrial Internet threat trapping active protection honeynet system for advanced network attacks, and the Industrial Internet trans-regional network security joint protection platform.
As the core technology of closed-loop defense system, the key technology and system of real interactive industrial Internet simulation exercise can be described as the first in the industry. This technology greatly reduces the problem of high-threat network security incidents caused by human factors, and can effectively deal with potential network security risks. Combined with the standardized model of industrial field facilities, the system innovatively designed a closed-loop autonomous controllable simulation and rehearsal system, which ensured the security of the industrial Internet from multiple angles and reached the international leading level. At present, the technology has become an important part of a national laboratory network technology simulation platform, which serves the development of national scientific research and manufacturing industry, and also provides a new and real shooting range platform support for the ability training of industrial network information security talents in China.
The Industrial Internet threat trapping active protection honeynet system built in the closed-loop defense system for advanced network attacks effectively solves the requirements of both security and stability of industrial Internet enterprises, and realizes the need for high deterrence protection against network attacks by constructing the security protection barrier of the industrial Internet. Among them, in response to the need for a large number of honeynet data interaction needs, through the design of a number of innovative patented technologies, the data transmitted by the threat trapping and active protection system can be more secure and reliable in the form of dynamic data stream encryption transmission. At present, it has been promoted and applied, covering more than half of the key industrial enterprises in the country.
The industrial Internet cross-regional network security joint protection platform plays a role of interconnection in the closed-loop defense system. Using advanced technologies such as security baseline control and big data analysis, combined with the honey network system data set, a dynamic internal network joint prevention and control system of industrial Internet enterprises has been built, effectively protecting a large number of critical infrastructures with weak security protection capabilities in China. It facilitates the secure operation of the open industrial Internet for 5G. This innovation point provides continuous support for the construction of national information security vulnerability database and security guarantee tasks during major national events.