Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Active defense method for power industry network security

A technology of active defense and network security, applied in the field of information security, it can solve the problem that network administrators have no way of knowing, and achieve the effect of diversifying protection methods, improving protection capabilities, and reducing false negatives

Inactive Publication Date: 2020-02-28
STATE GRID HUNAN ELECTRIC POWER +2
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, network administrators have no way of knowing whether hackers are conducting malicious activities under the seemingly normal network traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active defense method for power industry network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The active defense method of the electric power industry network security provided by the present invention comprises the following steps:

[0037] S1. Acquiring and analyzing the accessing behavior of the user; specifically, acquiring the accessing behavior of the user and analyzing it: if the user’s accessing behavior is a normal accessing behavior, no processing will be done and the access will be released; if the user’s accessing behavior is an attacking behavior, then Carry out subsequent active defense steps;

[0038] S2. According to the analysis results of step S1, define and explain the behavior of the accessing user; specifically, to obtain the attacking behavior of the user, and compare it with the data in the pre-established knowledge base: if the comparison is successful, the knowledge will be directly triggered The execution behavior in the library, and execute the corresponding defense strategy;

[0039] S3. According to the analysis result of step S1, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an active defense method for power industry network security. The method comprises the steps of obtaining and analyzing behaviors of access users; and defining and explaining behaviors of the access user according to an analysis result, and performing active defense by adopting a firewall, a honeypot and a WAF. The invention provides an active defense method for power industry network security. An existing defense strategy is utilized, meanwhile, a spoofing defense method is creatively added, safety three-dimensional defense of the whole power business system is carriedout under regulation and control of the unified defense strategy, and the protection capacity of the network environment of the power industry is improved to the maximum extent. Moreover, the methodcan construct a system capable of quickly detecting, reducing missing reports and immediately blocking malicious behaviors, and is high in protection capability, diversified in protection means and relatively good in protection effect.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an active defense method for network security in the electric power industry. Background technique [0002] With the development of economy and technology and the improvement of people's living standards, electric energy has become an indispensable secondary energy source in people's production and life, bringing endless convenience to people's production and life. Therefore, ensuring its own stable and reliable operation has become one of the most important tasks of the power system. [0003] With the advent of today's big data era, the power system has also been integrated into the Internet; and the integration of the Internet has also made the power system more intelligent. However, while the Internet brings convenience to the power system, it also brings serious security threats. [0004] At present, hackers, viruses, and Trojan horses have shown explosive gr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1416H04L63/1441
Inventor 孙毅臻陈中伟田峥戴大维李树曾少华贺泽华姚施情何宜校黄佳
Owner STATE GRID HUNAN ELECTRIC POWER
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More