Safety protection method for ubiquitous power Internet of Things terminal in specific attack scene

A power Internet of Things and attack scenario technology, applied in the field of power information security, can solve problems such as inability to attack monitoring, achieve the actual value of large projects, and ensure the effect of network security

Inactive Publication Date: 2020-07-10
NANJING ELECTRIC POWER ENG DESIGN +2
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, existing network security protection methods cannot effectively monitor such attacks, and it is urgent to study network attack detection methods to monitor specific network attacks that may be suffered by massive terminals in the ubiquitous power Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method for ubiquitous power Internet of Things terminal in specific attack scene
  • Safety protection method for ubiquitous power Internet of Things terminal in specific attack scene
  • Safety protection method for ubiquitous power Internet of Things terminal in specific attack scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings of the specification.

[0024] The development of the ubiquitous power Internet of Things emphasizes the integration of energy flow and information flow, and achieving information sharing and interconnection, network security is particularly important. The present invention proposes a security protection method for ubiquitous power Internet of Things terminal in a specific attack scenario, which protects the data of the power terminal according to the development needs of ubiquitous power Internet of Things, and helps to further improve the panoramic perception ability of the power grid. . The security protection methods for ubiquitous power IoT terminals in specific attack scenarios proposed in this article mainly include the following steps, such as figure 1 Shown.

[0025] Step 1, Ubiquitous power IoT terminal data collection. The perce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A safety protection method for a ubiquitous power Internet of Things terminal in a specific attack scene comprises the steps: firstly, forming a sensor network by combining a high-speed transmission technology with sensors, and collecting and uploading information such as temperature and humidity; secondly, preprocessing the acquired information; analyzing a data packet layer by layer to extract amessage instruction-level field, and detecting abnormal data; then, analyzing two attack scenes of a distributed denial service attack and a data tampering attack, associating abnormal events generated by the attacks, finding potential threats in time, and recognizing the attack scenes effectively; and finally, isolating and blocking the attacked terminal by using a power terminal attack blockingand isolating technology, so that the security of the ubiquitous power Internet of Things terminal is ensured. According to the method, specific attack scenes such as distributed denial of service attacks and distributed data tampering attacks which may be suffered can be effectively identified, measures such as blocking and isolation are taken to ensure the network security of the power terminal, and the method has relatively high engineering practical value.

Description

Technical field [0001] The invention belongs to the field of power information security, and specifically relates to a security protection method for a ubiquitous power Internet of Things terminal in a specific attack scenario. Background technique [0002] In 2019, the State Grid Corporation of China proposed to build a ubiquitous power Internet of Things, which is considered to be the key to building an energy Internet. The construction of the energy internet is inseparable from the support of data. The future energy interconnection emphasizes the integration of energy flow and data flow. The ubiquitous power Internet of Things requires massive amounts of electric power data as its development basis, collecting and analyzing the above-mentioned massive edge data, and realizing the interconnection and intercommunication of all links of the power system. In the face of massive amounts of power data, data security is particularly important. Once a network attack occurs, the grid ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/00G06K9/62
CPCH04L63/1416H04L63/1425G06N3/006H04L63/1458G06F18/23213G06F18/2433
Inventor 周霞李一晨谢宏福张腾飞赵宏大谢珍建王哲杨俊义陈琛朱铭霞邹盛
Owner NANJING ELECTRIC POWER ENG DESIGN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products