Alarm method, device, computer equipment and storage medium for network security threats

A network security and network technology, applied in the field of network security, can solve problems such as insufficient timely processing, and achieve the effect of improving timely processing capabilities

Active Publication Date: 2020-11-03
CHINA SOUTHERN POWER GRID COMPANY +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a network security threat alarm method, device, Computer Equipment and Storage Media

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm method, device, computer equipment and storage medium for network security threats
  • Alarm method, device, computer equipment and storage medium for network security threats
  • Alarm method, device, computer equipment and storage medium for network security threats

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0059] A method for alerting network security threats provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the power monitoring system 110 communicates with the alarm platform 120 through the network. Wherein, the alarm platform 120 can be realized by an independent server or a server cluster composed of multiple servers.

[0060] In one embodiment, such as figure 2 As shown, a method for alerting network security threats is provided, including the following steps:

[0061] Step 210, monitor hierarchical network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network security threat alarm method and device, a computer device and a storage medium. The method comprises the following steps: monitoring hierarchical network data, anddetermining a threat event type of an electric power monitoring system; wherein the hierarchical network data are network data corresponding to each hierarchy in the power monitoring system; performing network traceability analysis on the threat event type, and generating a network threat alarm aiming at the threat event type; sending the network threat alarm to a target alarm level; wherein the target alarm level is a level where threat events exist in the power monitoring system; wherein the network threat alarm is used for reminding a manager that a network security threat exists in the target alarm level. By adopting the method, the timely processing capability of the power monitoring system to network security threats can be improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an alarm method, device, computer equipment and storage medium for network security threats. Background technique [0002] The power monitoring system uses computers, communication equipment, and measurement and control units as basic tools to provide a basic platform for real-time data collection, switch status detection, and remote control of power transformation and distribution systems. It can form an arbitrarily complex monitoring system with detection and control equipment. It plays a central role in power transformation and distribution monitoring, which can help enterprises eliminate isolated islands, reduce operating costs, improve production efficiency, and speed up the abnormal response speed in the power transformation and distribution process. [0003] However, with the development of network technology, the ways of network security threats emerge ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/20
Inventor 苏扬陶文伟张文哲易思瑶梁志宏胡朝辉陈刚吴金宇陈鹏郑伟文彭伯庄王金贺
Owner CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products