Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Active security defense system and method of power secondary system

A power secondary system, active security technology, applied in the field of security defense systems, can solve the problems of excessive security protection reaction affecting normal business, prone to security loopholes, security protection goals, strategies and systems are not sound enough, etc., to improve active defense. effect of ability

Inactive Publication Date: 2014-01-29
SHANGHAI DIANJI UNIV
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, although a lot of research on the safety of the power secondary system has been carried out at home and abroad and some achievements have been made, there is still a long way to go to meet the requirements of ensuring the safety of the power system.
Through the analysis of the application status and security requirements of the secondary power system, it is found that the current safety construction of the secondary power system mainly has the following problems: the goals, strategies and systems of security protection are not perfect enough, and the overreaction of security protection will affect the normal business instead. A security protection system that is consistent with threats and asset protection; in addition, some security measures currently adopted by the power secondary system are mostly passive protection, figure 1 It is a general structure diagram of the security defense system of the electric power secondary system in the prior art
[0022] It can be seen that in the security defense system of the electric power secondary system in the prior art, some are only single-point defense, and there is no complete system, although some have a complete system, such as figure 1 , but most of the security measures it adopts are passive protection, which are prone to security loopholes. Therefore, in view of the growing network attack technology, it is necessary to further improve the security protection system of the power secondary system and establish a more effective active defense system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active security defense system and method of power secondary system
  • Active security defense system and method of power secondary system
  • Active security defense system and method of power secondary system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The implementation of the present invention is described below through specific examples and in conjunction with the accompanying drawings, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific examples, and various modifications and changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0047] figure 2 It is a system architecture diagram of an active safety defense system of a power secondary system according to the present invention. Such as figure 2 As shown, the present invention is an active security defense system for a secondary power system. On the basis of the existing security defense system for a secondary power system, the active security defense system for a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an active security defense system and method of a power secondary system. On the basis of an existing security defense system of the power secondary system, the active security defense system of the power secondary system further comprises an intrusion knowledge acquisition module, an intrusion knowledge use module and an intrusion prevention system, wherein intrusion knowledge of an internal network of an electric power enterprise and intrusion knowledge of the external network of an electric power enterprise are obtained by the intrusion knowledge acquisition module through a trap network, the intrusion knowledge use module is arranged in the internal network of the electric power enterprise, and is used for using the obtained intrusion knowledge to carry out defense on the internal network of the electric power enterprise, and the intrusion prevention system is deployed at the position of the junction between the internal network and the external network, and is used for improving the active security defense capability of the power secondary system. According to the active security defense system and method of the power secondary system, the capacity of the power secondary system for resisting the internal risk and the external risk can be improved, and passive protection is changed into active defense.

Description

technical field [0001] The invention relates to a safety defense system and method of an electric power system, in particular to an active safety defense system and method of a power secondary system. Background technique [0002] The power system includes primary and secondary systems, and the safety protection of the power secondary system is a power safety protection system that has only been proposed in the past ten years. With the wide application of network technology in various fields of power system, the security of power secondary system is closely related to the security of the network involved. The specific technology mainly involves the security partition of the power secondary system, the security protection between each partition and the security protection between the internal and external networks, especially the field of active defense technology. [0003] At present, the safety protection of the power secondary system at home and abroad is in the process o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 冯兆红贾铁军陈玉晶梅晓娟戴志军张玉公维祥高志伟
Owner SHANGHAI DIANJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products