Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power monitoring active defense method and system based on virtualization dynamic deployment

An active defense and power monitoring technology, applied in the field of network information security, can solve problems such as insufficient network information security defense of the power system, achieve the effect of increasing cost difficulty and timeliness, and improving security assurance capabilities

Inactive Publication Date: 2020-02-11
STATE GRID HENAN ELECTRIC POWER ELECTRIC POWER SCI RES INST +2
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is: in order to solve the problem of insufficient defense of power system network information security in the prior art, thereby providing an active defense method and system for power monitoring based on virtualization dynamic deployment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power monitoring active defense method and system based on virtualization dynamic deployment
  • Power monitoring active defense method and system based on virtualization dynamic deployment
  • Power monitoring active defense method and system based on virtualization dynamic deployment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] This embodiment provides an active defense method for power monitoring based on virtualization dynamic deployment, such as figure 1 shown, including the following steps:

[0045] Step 1, deploy the virtual honeynet system

[0046] Deploy a virtual honeynet system for the real business system of the power network, and perform network configuration on the virtual honeynet system, so that the virtual honeynet system is consistent with the network configuration of the real business system of the power network, and simulate a power network with loopholes.

[0047] Step 2, create a knowledge base

[0048] A knowledge base is created, and information on malicious attacks on the power network by external networks is stored in the knowledge base.

[0049] Step 3, honeynet trapping

[0050] If there is an abnormal data flow accessing the real business system, since the deployed virtual honeynet system is sufficiently realistic to simulate the business system of the power netwo...

Embodiment 2

[0058] This embodiment provides an active defense system for power monitoring based on virtualized dynamic deployment. This embodiment simulates a power network with loopholes by building a distributed cloud honeynet and cloud sandbox. This embodiment adopts a layered system architecture Design, including:

[0059] (1) Business management subsystem:

[0060] The business management subsystem includes a cloud honey network management module and a cloud sandbox management module. Among them, the cloud honey network management module is used to simulate the honeypot type, the number of honeypot deployments, network scenarios, real-time data display, historical trend analysis, Manage analysis reports, honeypot groups, user groups, etc.;

[0061] The cloud sandbox management module is used to manage sandbox types, number of sandbox deployments, sandbox operation logs, analysis reports, etc.

[0062] (2) Threat analysis and protection subsystem:

[0063] The threat analysis and p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a power monitoring active defense method and system based on virtualization dynamic deployment, and the method comprises the steps: (1), building a virtual honeynet system, and simulating a real business system of a power network; (2) monitoring the state of the virtual machine in real time, and carrying out honeynet trapping to obtain an abnormal behavior track when an abnormal data flow is monitored; and (3) analyzing whether the behavior is a malicious attack behavior or not, and carrying out blocking response. The active defense system adopting the honeypot and sandbox technology can reduce the possibility that a real service network of the power system is detected, increase the attack cost difficulty and timeliness of attackers, and effectively complement passive protection measures existing in the power system.

Description

technical field [0001] The present application belongs to the technical field of network information security, and in particular relates to an active defense method and system for power monitoring based on virtualization dynamic deployment. Background technique [0002] With the blurring of network borders brought about by the development of power system informatization and intelligence, the security risks of smart grids have gradually increased, and information security governance is facing major challenges. [0003] Compared with the traditional industrial control system, the power monitoring system does not allow excessive delays and system shocks. It is necessary to detect various network threats (including unknown threats) in time to ensure the accuracy and speed of power dispatching. Active defense technology can effectively solve the problems in power information network security, and has received great attention. [0004] At present, active defense technology has ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1433H04L63/145H04L63/1466H04L63/1483H04L63/1491
Inventor 李斌王丹韩伟宋闯吴坡薛盖超李翔硕周冰徐小传
Owner STATE GRID HENAN ELECTRIC POWER ELECTRIC POWER SCI RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products