Threat-driven power monitoring system network security deep protection method and system

A power monitoring and system network technology, applied in transmission systems, information technology support systems, electrical components, etc., can solve problems such as difficult to effectively defend against APT attacks, and achieve the effect of improving overall security protection capabilities and improving protection capabilities

Active Publication Date: 2020-07-17
CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it is difficult to effectively defend against APT attacks with systemic attack characteristics

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat-driven power monitoring system network security deep protection method and system
  • Threat-driven power monitoring system network security deep protection method and system
  • Threat-driven power monitoring system network security deep protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, specific implementations of the present invention are now described. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention, that is, the described embodiments are only some of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0049] This embodiment provides a threat-driven power monitoring system network security in-depth protection method and system, specifically including the following:

[0050] (1) Threat-driven power monitoring system security defense-in-depth model

[0051] For a long time, the isolated stacking of mu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of power monitoring systems. The invention discloses a threat-driven power monitoring system network security deep protection method and a threat-driven power monitoring system network security deep protection system. The system comprises a longitudinal protection function unit, a transverse protection function unit, an intranet vulnerability detection function unit and an extranet threat situation awareness function unit, wherein the intranet vulnerability detection function unit and the extranet threat situation awareness function unit cooperatively complete threat detection of an intranet and an extranet of the power monitoring system, the longitudinal protection function unit and the transverse protection function unit cooperatively complete deep security protection, and the threat detection guides deep security protection. The core content of the invention is that threat detection and security protection of the power monitoring system are innovatively proposed, and network security dynamic protection is guided by threat discovery. And longitudinal encryption authentication security resources and transverse security protection resources are combined to realize cooperative protection, so that the directional protection problem driven and guided by threats in the power monitoring system is solved.

Description

technical field [0001] The invention relates to the field of power monitoring systems, in particular to a threat-driven power monitoring system network security deep protection method and system. Background technique [0002] The isolated stacking of multi-type network security devices in the power monitoring system cannot effectively defend against new network attacks on the power system. In recent years, power system network attacks have occurred continuously at home and abroad, indicating that the network security protection capabilities of power monitoring systems need to be improved. In recent years, during the construction of the security protection of the power monitoring system, local over-protection, lack of local protection, and the ambiguity of emergency response targets for sudden attacks need to be improved. not there. [0003] At present, there is a lack of literature on network security of power monitoring systems and literature on threat-driven power monito...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H02J13/00
CPCH04L63/20H04L63/1416H04L69/22H04L63/1425Y04S40/20
Inventor 兰昆唐林王文胜邹大均宗琪张宇光朱治丞
Owner CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products