Electric power network security monitoring method and system based on ELK log collection and analysis

A power network, collection and analysis technology, applied to the file system, file system functions, computer security devices, etc., can solve the problems of difficult real-time monitoring of security events, insufficient log retention time, inconsistent log format, etc., to achieve real-time log Monitor and store, facilitate real-time monitoring of network security events, and query efficient results

Inactive Publication Date: 2019-02-22
YUNNAN POWER GRID
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a power network security monitoring method and system based on ELK log collection and analysis, which solves the problem of insufficient retention time of security equipment logs such as firewalls, IDS, IPS, and security audit logs, difficulty in viewing inconsistent log formats, and complicated log information. And difficult to understand, difficult to achieve real-time monitoring of security events and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power network security monitoring method and system based on ELK log collection and analysis
  • Electric power network security monitoring method and system based on ELK log collection and analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] This application provides a power network security monitoring method and system based on ELK log collection and analysis, which solves the problem of insufficient retention time of security equipment logs such as firewalls, IDS, IPS, and security audit logs, difficulty in viewing inconsistent log formats, and complicated log information. Moreover, it is difficult to understand and realize real-time monitoring of security events.

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0032] attached figure 1 It is a structural flowchart of the power network security monitoring method based on ELK log collection and analysis. as attached figu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a power network security monitoring method and system based on ELK log collection and analysis. The method comprises the following steps: adopting a centralized log management method to collect a network security equipment log of a power monitoring system; Filtering, normalizing and storing the collected network security equipment logs of the power monitoring system; Using the distributed log retrieval method, the stored logs are retrieved and counted; displaying the log data in a summarized manner. The electric power network security monitoring method and system based on ELK log collection and analysis provided by the application adopts a cluster mode, data storage, query is efficient and fast, realizes real-time log monitoring and storage, and meets log storage requirements; and through the visualization mode for log display, friendly interface, simple and easy to use, log analysis rules can be customized to facilitate staff real-time monitoring of network security events, improve the network security monitoring level of power monitoring system.

Description

technical field [0001] The present application relates to the technical field of power system information security, in particular to a power network security monitoring method and system based on ELK log collection and analysis. Background technique [0002] The power monitoring system adopts general network and information technology, which inevitably introduces information security issues. Although the production control area of ​​the power monitoring system is separated from the management information area through network isolation technology, making the power monitoring system in a relatively closed and safe environment; The attention to system information security issues has enriched the product information acquisition channels of control systems, including power monitoring systems, and increased opportunities for attackers to learn various control system software, firmware, and communication protocols. For example, with the outbreak of ransomware, the power monitoring...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/56G06F16/17
CPCG06F21/552G06F21/56
Inventor 蒋亚坤王彬筌赵明李晓耕韩校王国平丁士明
Owner YUNNAN POWER GRID
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products