Power grid intranet security management and vulnerability automatic verification method and system

An automatic verification and security management technology, applied in the field of computer applications, can solve problems such as the insecurity of the power grid intranet

Pending Publication Date: 2020-05-12
STATE GRID CORP OF CHINA +1
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In order to solve the problems existing in the prior art, the present invention provides an artificial intelligence-based power grid intra

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power grid intranet security management and vulnerability automatic verification method and system
  • Power grid intranet security management and vulnerability automatic verification method and system
  • Power grid intranet security management and vulnerability automatic verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to better explain the present invention and facilitate understanding, the present invention will be described in detail below in conjunction with the accompanying drawings and through specific embodiments.

[0064] Such as figure 1 As shown, the present invention provides a kind of artificial intelligence-based power grid intranet security management and vulnerability automatic verification method, the method comprises the following steps:

[0065] Step S01, read threat intelligence from a server. The step S010 specifically includes the following steps:

[0066] Step S01-1, ensure the security of the data stored in the server through the symmetric encryption method, and ensure the security of cloud data access through the attribute encryption method based on the ciphertext policy. The step S01-1 specifically includes the following steps:

[0067] Initialize, run Setup_CA(1 λ ); select security parameter 1 λ , and choose the order as a prime number p to gen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a power grid intranet security management and vulnerability automatic verification method and system. The method comprises the following steps: 1) reading threat information from a server; 2) analyzing information based on a natural language processing NLTK library, and performing information classification by using a CNN-based convolutional neural network; 3) introducingan ID3 decision tree and a Boltzmann neural network algorithm, quantitatively evaluating the security threat of the intelligence, and early warning a high-risk event in advance; 4) establishing a vulnerability management knowledge base based on power grid intranet security risk closed-loop management driven by intranet asset identification and extranet intelligence, and 5) performing threat intelligence information sharing between the power grid intranet and the server. The problem of insecurity of the power grid intranet is solved.

Description

technical field [0001] The present invention relates to the field of computer application technology, and more specifically, relates to an artificial intelligence-based power grid intranet security management and vulnerability automatic verification method and system thereof. Background technique [0002] With the development of the Internet, the problem of network security has become more and more serious. Today, the problem of internal network vulnerabilities is becoming more and more common, and network security risks continue to increase. Especially for information-based enterprises, the internal network security risks are very high, which is reflected in the following aspects: 1) Enterprises IT assets continue to increase. With the continuous development of enterprise informatization, virtualization has become the foundation of enterprise IT, and there are more and more IT assets. 2) A large amount of vulnerability information is reduced to security noise. The number ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/57H04L29/06H04L29/08
CPCG06F21/577G06F21/55H04L67/12H04L63/1433
Inventor 杨衫袁慧董亮周正贺欣邓国如查志勇廖荣涛张成柯旺松
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products