Unlock instant, AI-driven research and patent intelligence for your innovation.

A Multi-Layered Cooperative Defense Model Adapted to Source-Network-Load Control Private Network

A collaborative defense and source-network-load technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve problems such as interruption and increase the difficulty of source-network-load control private network security prevention, etc., to achieve correct monitoring and improve security protection The effect of capacity, rapid response and disposition

Active Publication Date: 2022-04-12
JIANGSU ELECTRIC POWER CO +3
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Under the background of source-network-load interaction, industrial control systems are widely distributed in power supply companies, power plants, and substations, and continue to extend to the new energy power generation side and user side. There are risks of eavesdropping, tampering, and interruption during the collection, transmission, and execution of such operating information and control instructions. The access of a large number of distributed new energy power generation equipment and user interactive terminals increases the security of the source network load control private network. Prevention difficulty
At the same time, the existing network security defense measures mainly rely on the solidification strategy of a single device, such as intrusion detection, firewall, power-specific horizontal isolation, vertical encryption authentication, switching routing and other devices. These devices are generally based on different security points and are deployed relatively independently. application, it is easy to have security protection problems caused by single device failure or policy failure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Multi-Layered Cooperative Defense Model Adapted to Source-Network-Load Control Private Network
  • A Multi-Layered Cooperative Defense Model Adapted to Source-Network-Load Control Private Network
  • A Multi-Layered Cooperative Defense Model Adapted to Source-Network-Load Control Private Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The threat information found by each module through monitoring and can be reported layer by layer includes security events, abnormal operation, equipment failures, and personnel operations. Threat information levels are divided into general, important, and urgent from low to high; The security collaborative defense policies delivered by the collaborative defense module and the collaborative defense control module include access control, security access, and intrusion prevention. Threat events should adopt a high-priority collaborative protection strategy. Some threat information and security collaborative defense strategies are shown in Tables 1 and 2 below.

[0038] Table 1 Threat information reported by monitoring

[0039]

[0040]

[0041] Table 2 Security collaborative defense strategy

[0042]

[0043]

Embodiment 2

[0045] Among them, collaborative services are divided into three collaborative service modes: event-based collaborative judgment, security-based collaborative control, and threat-based collaborative blocking.

[0046] 1) Event-based collaborative judgment is based on the mutual verification of security event information discovered by multiple security collaborative devices through different monitoring methods, and complement each other to realize the collaborative judgment of network security events. For example, when a host launches a DDoS network traffic attack on the local network, the domain module where the host is located will simultaneously monitor the host abnormal operation behavior information sent by the host security monitoring software, the host flow abnormal information sent by the network device, and the network attack information sent by the security device wait for news. Through the mutual matching and verification of the source host network IP address, networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A multi-layer collaborative defense model adapted to the source network load control private network, based on the characteristics of the source network load multi-layer, distributed network structure, divided into core layer, convergence layer and access layer, the multi-layer collaborative defense The model includes autonomous domains, regional control autonomous domains, and master station autonomous domains. In the multi-layer collaborative defense model, autonomous domains conduct intra-domain self-defense, master station autonomous domains face regional autonomous domains, regional autonomous domains pair autonomous domains, and master station autonomous domains Cross-domain coordinated defense of autonomous domains. The present invention can cooperate with the defense actions of various levels of security, network and other equipment to solve security protection problems caused by single equipment failure or policy failure, realize effective and correct monitoring of security issues, fast response and disposal of security threats, and improve source network load. Control the security protection capabilities in network interaction scenarios.

Description

technical field [0001] The invention belongs to the technical field of power system network security, and proposes a multi-layer cooperative defense model suitable for a source network load control private network based on the characteristics of a source network load multi-layer and distributed network structure. Background technique [0002] The source-network-load interaction refers to the goal of improving the power dynamic balance capability of the power system more economically, efficiently and safely through various forms of interaction among the power supply, power grid and load. With the comprehensive construction of the UHV backbone network and the trend of large-scale active load access, the operating characteristics of the power grid have undergone profound changes. The interaction between the source network and the load is currently one of the important means to ensure the safe and stable operation of the large power grid at the receiving end. Among them, the con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/20H04L63/205H04L63/1408H04L63/1441
Inventor 缪巍巍苏大威张明王黎明裴培傅中兴朱红勤畅广辉王丹荣金萍王梓
Owner JIANGSU ELECTRIC POWER CO