Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Power grid Web application mimicry defense system

A defense system and web application technology, applied in transmission systems, electrical components, electrical digital data processing, etc., can solve problems such as difficult attacks, asymmetric attack and defense, and unknown attacks that cannot be defended, so as to reduce the probability of successful attacks and improve The effect of robustness

Pending Publication Date: 2020-07-31
STATE GRID FUJIAN ELECTRIC POWER CO LTD
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Currently widely used or deployed in the firewall, security gateway, intrusion detection system, virus killing, user authentication, access control and other technologies or equipment of the State Grid Corporation of China and its affiliated power companies to improve the network security defense system of system security, its essence is A passive security protection system based on prior knowledge (including characteristics, behaviors, fingerprints, etc. of known attackers), which has genetic defects in dealing with uncertain threats, has only "acquired immunity" and can only "non-stop Find loopholes and keep patching", "keep losing sheep, keep patching up", there is no effective way to detect and prevent pre-installed backdoors, and it is impossible to defend against unknown attacks of unknown vulnerabilities and unknown backdoors
Under the situation that network attacks tend to be automated, intelligent, combined, and software and hardware synergy, the above-mentioned traditional passive defense system is more difficult to effectively resist attacks using unknown vulnerabilities, and it is difficult to defend against potential attacks using various unknown backdoors
Under such circumstances, the State Grid Corporation of China has a serious attack-defense asymmetry of "easy to attack and difficult to defend". application security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power grid Web application mimicry defense system
  • Power grid Web application mimicry defense system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described below in conjunction with the drawings and embodiments.

[0019] It should be pointed out that the following detailed descriptions are all illustrative and are intended to provide further explanations for the application. Unless otherwise indicated, all technical and scientific terms used herein have the same meaning as commonly understood by those of ordinary skill in the technical field to which this application belongs.

[0020] It should be noted that the terms used here are only for describing specific implementations, and are not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly indicates otherwise, the singular form is also intended to include the plural form. In addition, it should also be understood that when the terms "comprising" and / or "including" are used in this specification, they indicate There are features, steps, operations, device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a power grid Web application mimicry defense system. A heterogeneous virtual Web server pool which is equivalent in function, diversified and dynamic is constructed, technologies such as redundancy voting, dynamic executor scheduling and database instruction isomerization are adopted, an attack chain is blocked, the utilization difficulty of vulnerabilities or backdoors isincreased, and the availability and safety of Web services are guaranteed. A dynamic environment is realized through active change of software and hardware elements of different layers such as a network, a platform, a system, software and an application, and therefore, the dependency condition of the network attack on the determinacy and continuity of the operating environment is destroyed, controllable active defense is realized in the toxic bacteria-carrying software and hardware element environment with the vulnerability and the backdoor, the unknown attack defense problem by using the unknown vulnerability and the unknown backdoor is solved, and the network security of the key Web application system in the power industry is effectively enhanced.

Description

Technical field [0001] The invention relates to the field of electric power information security, in particular to a mimic defense system for power grid Web applications. Background technique [0002] With the popularization of power information systems and the continuous accumulation of data, power production, dispatch, and marketing are increasingly dependent on information systems, and more and more Web application systems based on the B / S architecture have been continuously built and put into use. Accompanied by this is the explosive growth of application layer-based attack methods and continuous renovation, which brings serious hidden dangers to the security of business systems. The main risks of the Web application system of electric power enterprises are derived from the operating system vulnerabilities and the vulnerabilities and defects in the system's own development. Attackers can use these vulnerabilities and defects to attack the application system. The current main ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06F21/55G06F21/57
CPCH04L67/02H04L63/1441H04L63/145H04L63/1458H04L63/1466H04L63/1483G06F21/577G06F21/55H04L67/1001H04L67/63
Inventor 纪文胡宗富王怡婷粟仁杰傅杰徐海东张和琳林晨晗刘佳高董英
Owner STATE GRID FUJIAN ELECTRIC POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products