Gene similarity intrusion detection method based on electric power network IEC protocol

A power network and intrusion detection technology, applied in data exchange networks, electrical components, instruments, etc., can solve problems such as inability to resist vulnerable passwords, protocol attacks, unsuitable for power system requirements, complex functions, etc., and achieve real-time blocking of the network Effects of attacking, avoiding the expansion of the situation, preventing paralysis and loss of control

Inactive Publication Date: 2019-04-09
沈阳安信合科技有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, passive protection technology cannot resist attacks such as vulnerable passwords, protocol attacks, Trojan horses, and network sniffers. For access control, intruders can also use system vulnerabilities and vulnerable programs to bypass access control or elevate user rights.
At the same time, network intrusion detection products in the market have problems such as complex functions, high prices, and unsuitability for power system needs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Gene similarity intrusion detection method based on electric power network IEC protocol
  • Gene similarity intrusion detection method based on electric power network IEC protocol
  • Gene similarity intrusion detection method based on electric power network IEC protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0037] Such as figure 1 Shown is the overall flowchart of the gene similarity intrusion detection method based on the electric network IEC protocol of the present invention, and the method at least includes the following steps:

[0038] S1: Receive the communication messages to be parsed from the power network, plant network and di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a gene similarity intrusion detection method based on an electric power network IEC protocol. The method comprises the following steps of carrying out information collection onkey nodes of an electric power monitoring system, performing protocol analysis on the acquired IEC message; establishing three levels of mapping models of behavior, events and relations; solving the relationship aggregation between events through automatic discovery of reasoning rules and depth relationship mining; merging of events, carrying out multi-dimensional relationship association, establishing a power network abnormal behavior gene feature library, discovery hidden attacks through gene similarity comparison based on a mean value and deviation model, achieving active defense of security events through multi-mode combination alarm, and blocking network attacks in real time. Local monitoring system paralysis and out-of-control are prevented, hazard spreading is prevented, and situation development is avoided.

Description

technical field [0001] The present invention relates to the technical field of transmission detection of digital information of electric communication technology, in particular to a gene similarity intrusion detection method based on IEC protocol of electric power network. Background technique [0002] The large-scale power outage in Ukraine in 2015 reflected that the power system in the network era has become the preferred target of international cyber warfare, and the power monitoring system and its network security situation is becoming increasingly severe. [0003] At present, the security model of network intrusion detection products in the market mainly adopts passive identity authentication and access control to ensure the security of the system. However, passive protection technology cannot resist attacks such as vulnerable passwords, protocol attacks, Trojan horses, and network sniffers. For access control, intruders can also use system vulnerabilities and vulnerabl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/26G06K9/62
CPCH04L41/0631H04L41/142H04L41/145H04L43/16H04L63/1416H04L63/1425G06F18/23213
Inventor 高德龙孙国军
Owner 沈阳安信合科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products