Internal apt attack detection and early warning system of power system based on network architecture
A power system and network architecture technology, applied in the field of information security, can solve the problems of lagging information management, inadequate construction of information institutions, infection attacks, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0064] The present invention will be further described below in conjunction with drawings and embodiments.
[0065] Although there are various means of internal APT attacks in electric power, they still have stages. The attack process can be divided into five stages: detection period, intrusion period, latent diffusion period, data mining period and exit period:
[0066] During the detection period, attackers use technical and social engineering methods to collect a large amount of key information about system business processes and usage. The data comes from social networking sites, blogs, and company websites, and even purchase relevant information through some channels and process the collected content. Research to confirm the attack direction and attack method.
[0067] During the intrusion, after the attacker determines the attack target, he will try to break through the defense line of the attack target in various ways. Common penetration and breakthrough methods include...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
