Active defense method for power industry network security

A technology of active defense and network security, applied in the field of information security, it can solve the problem that network administrators have no way of knowing, and achieve the effect of diversifying protection methods, improving protection capabilities, and reducing false negatives

Inactive Publication Date: 2020-02-28
STATE GRID HUNAN ELECTRIC POWER +2
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, network administrators have no way of knowing whether hackers are

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active defense method for power industry network security

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0036] The active defense method for network security in the power industry provided by the present invention includes the following steps:

[0037] S1. Obtain and analyze the behavior of the access user; specifically, obtain and analyze the user's access behavior: if the user's access behavior is a normal access behavior, no processing will be performed and the user will be released; if the user's access behavior is an offensive behavior, then Follow-up active defense steps;

[0038] S2. According to the analysis result of step S1, define and explain the behavior of the visiting user; specifically, obtain the user's attack behavior, and compare it with the data in the knowledge base established in advance: if the comparison is successful, the knowledge is directly triggered Execution behavior in the library, and execute the corresponding defense strategy;

[0039] S3. According to the analysis result of step S1, adopt firewall, honeypot and WAF to carry out active defense; s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an active defense method for power industry network security. The method comprises the steps of obtaining and analyzing behaviors of access users; and defining and explaining behaviors of the access user according to an analysis result, and performing active defense by adopting a firewall, a honeypot and a WAF. The invention provides an active defense method for power industry network security. An existing defense strategy is utilized, meanwhile, a spoofing defense method is creatively added, safety three-dimensional defense of the whole power business system is carriedout under regulation and control of the unified defense strategy, and the protection capacity of the network environment of the power industry is improved to the maximum extent. Moreover, the methodcan construct a system capable of quickly detecting, reducing missing reports and immediately blocking malicious behaviors, and is high in protection capability, diversified in protection means and relatively good in protection effect.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an active defense method for network security in the electric power industry. Background technique [0002] With the development of economy and technology and the improvement of people's living standards, electric energy has become an indispensable secondary energy source in people's production and life, bringing endless convenience to people's production and life. Therefore, ensuring its own stable and reliable operation has become one of the most important tasks of the power system. [0003] With the advent of today's big data era, the power system has also been integrated into the Internet; and the integration of the Internet has also made the power system more intelligent. However, while the Internet brings convenience to the power system, it also brings serious security threats. [0004] At present, hackers, viruses, and Trojan horses have shown explosive gr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1416H04L63/1441
Inventor 孙毅臻陈中伟田峥戴大维李树曾少华贺泽华姚施情何宜校黄佳
Owner STATE GRID HUNAN ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products