A power wide-area Internet security collaborative protection system and its protection method

A protection system and Internet technology, applied in the power wide-area Internet security collaborative protection system and its protection field, can solve the problems of inability to guarantee the security of power intelligent terminals, blurred network boundaries, and increased exposure of power grid information security, so as to achieve security risks. Identify and solve heterogeneity problems with small errors

Active Publication Date: 2022-03-18
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One is the access of a large number of smart terminal devices, using a large number of wireless communication methods such as WIFI, 3G / 4G, etc., the basic environment of the power network has also changed, and the network boundary has become increasingly blurred. The traditional border security protection scope can no longer guarantee the security of power smart terminals.
Second, new changes have taken place in the acquisition methods, storage forms, transmission channels, and processing methods of power-related information. Application virtualization, data assetization, and terminal mobility will all introduce new information network security risks. Exposure is increasing rapidly
At the same time, new attack methods represented by advanced persistent network attacks (APT) are also constantly evolving, all of which pose severe challenges to the security protection of power information networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A power wide-area Internet security collaborative protection system and its protection method
  • A power wide-area Internet security collaborative protection system and its protection method
  • A power wide-area Internet security collaborative protection system and its protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] The main types of security services in the power wide-area interconnection network include: security data monitoring (including Events, Notification), remote security control, data security processing, and combination with traditional security communication services and other security services.

[0048] Considering that the secure data transmission type of the ubiquitous network is different from the Internet of Things, which focuses on secure data collection (one-way upload), the security data transmission types of the ubiquitous network include: secure data collection (uplink), secure broadcast (downlink) and secure transport / bridging classes (bidirectional) like figure 1 In (a), (b), (c) shown.

[0049] The present invention provides an electric power wide-area Internet security collaborative protection system, by adding two main functional entities of fusion security access gateway (abbreviated as security access gateway) and virtual reconstruction security control ...

Embodiment 2

[0061] Since the power wide-area Internet system has distributed, hierarchical, heterogeneous spatial characteristics and dynamic evolution time characteristics, security also has dynamic and heterogeneous spatio-temporal characteristics, and its security life cycle is divided into: protection, detection, prediction, Four stages of response. The present invention formally defines security policies, related concepts, relations and operations of policy trees in Z mode, proposes construction methods of security policies, correctness verification of abstract descriptions, proves security policy consistency theorem, and designs automatic check of policy consistency method.

[0062] The invention provides a protection method for a power wide-area Internet security collaborative protection system. The protection method includes four sub-strategies of construction protection, detection, prediction and response;

[0063] The four sub-strategies are taken as sub-steps in each stage of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a power wide-area Internet security collaborative protection system and its protection method. A hardware system for collaborative protection is formed by adding two main functional entities, a fusion security access gateway and a virtual reconfiguration security control server, and is realized through policy subscription. The software logic system of collaborative protection, and research evidence synthesis approximation algorithm, design evidence projection decomposition method, and push it to the credibility transfer formula. In this way, all kinds of peripheral networks in the power wide area Internet can be safely connected to the security service platform located in the IP core network by using the existing heterogeneous access network through the secure access gateway, and the security service command can also be and send data to the end node.

Description

technical field [0001] The invention relates to a network security protection system, in particular to a power wide-area Internet security collaborative protection system and a protection method thereof. Background technique [0002] At present, the international network security situation is becoming more and more severe. Cyberspace has become the fifth territory of the country after the four territories of land, sea, air, and space. The trend of network attacks being grouped and nationalized is increasingly obvious. Due to the complex and diverse structure of the power system, wide distribution, high importance and integrated wide-area interconnection, once the power system is paralyzed and has a huge impact, it is very easy to become the first choice for hostile forces to attack. In recent years, with the introduction of a large number of "Internet +" technologies represented by cloud computing, Internet of Things, and big data, and the access of a large number of smart t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0209H04L63/0227H04L63/1416H04L63/1433H04L63/1441
Inventor 张波马媛媛石聪聪何高峰陈璐管小娟黄秀丽李尼格华晔郭骞邵志鹏费稼轩戴造建席泽生
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products