Transformer station network intrusion detection and analysis method based on character fingerprint

A substation network and feature fingerprint technology, applied in the field of network information security, can solve problems such as single detection and analysis, low efficiency, and false negatives

Inactive Publication Date: 2017-04-05
STATE GRID JIANGXI ELECTRIC POWER CO LTD RES INST +1
View PDF6 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional network intrusion detection methods based on traffic analysis can accurately detect large-traffic attacks and attacks with obvious characteristics, but attacks with indistinct traffic characteristics are often missed; protocol-based network intrusion detection requires deep packet inspection of packets , there is a problem of low efficiency; based on the detection of device status and configuration, it is not easy to find the specific location of the device
On the whole, the current research is mostly a single detection and analysis, lacking a comprehensive detection and analysis method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transformer station network intrusion detection and analysis method based on character fingerprint
  • Transformer station network intrusion detection and analysis method based on character fingerprint
  • Transformer station network intrusion detection and analysis method based on character fingerprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The specific embodiments of the method for detecting and analyzing network intrusion in substations based on characteristic fingerprints involved in the present invention will be described in detail below with reference to the accompanying drawings.

[0038] like figure 1 As shown, this embodiment establishes a flow chart of network intrusion detection based on feature fingerprint database. The network intrusion detection process is to obtain network intrusion information from the substation communication network through data collection, then extract characteristic fingerprints from the network intrusion information, establish a hierarchical characteristic fingerprint database, quantify the collected characteristic fingerprints, and then intrusion on the collected characteristic fingerprints. If it is abnormal, an abnormal alarm will be issued.

[0039] like figure 2 As shown, this embodiment establishes a frame diagram of a typical substation. The process layer inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A transformer station network intrusion detection and analysis method based on a character fingerprint is configured to detect and analyze the transformer station industrial control network intrusion. The method comprises the following steps: (1) establishing a transformer station network topology structure chart through analysis of the transformer station communication network; (2) establishing a character fingerprint bank layering model through the stratification analysis method; (3) performing extraction and analysis of the flow through adoption of the DPI and DFI technologies, extracting the character fingerprint and improving the character fingerprint bank; and (4) establishing a character fingerprint bank assessment system based on the established character fingerprint bank, and performing detection and analysis of the network character fingerprint. The transformer station network intrusion detection and analysis method based on the character fingerprint can perform comprehensive detection and analysis of the transformer station industrial control network intrusion and can rapidly determine the abnormal nodes.

Description

technical field [0001] The invention relates to a substation network intrusion detection and analysis method based on characteristic fingerprints, and belongs to the field of network information security. Background technique [0002] With the vigorous development of information technology, the industrial control system has also achieved rapid development, and the integration between substations and information technology has become more and more close, which has brought a lot of convenience to the operation of the entire substation system, but it is also very important. To a certain extent, the possibility of substations facing security threats is greatly increased. [0003] Due to the increasing use of information and data in digital substations, its role is also more important. Many important functions in digital substations have achieved automatic control, which needs to be achieved through information communication between various devices. The communication is based on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06H04L12/26
CPCH04L41/12H04L41/0631H04L41/065H04L41/145H04L43/08H04L63/1408H04L69/02
Inventor 杨浩李轶鹏肖勇才林楠章玲玲欧阳文华
Owner STATE GRID JIANGXI ELECTRIC POWER CO LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products