Network security active defense resource configuration method and system

A technology of active defense and network security, applied in the field of energy Internet, it can solve the problems of inability to deal with new attack methods, network security defense is easy to attack but difficult to defend, asymmetry and other problems

Active Publication Date: 2021-09-14
SOUTHEAST UNIV
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the current increasingly complex energy Internet environment, passive protection methods cannot cope with new types of attacks th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security active defense resource configuration method and system
  • Network security active defense resource configuration method and system
  • Network security active defense resource configuration method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0027] A network security active defense resource configuration method and system, comprising the following steps:

[0028] S1, based on the multi-level network architecture of the Energy Internet, combined with the multi-type construction objects of network deception, analyzes the multi-type active defense resources of energy Internet network security based on network deception;

[0029] For example, based on the multi-level network architecture of the Energy Internet, network security active defense resources can be divided into perception layer deception, network layer deception, platform layer deception, and application layer deception;

[0030] For example, comb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of production devices, in particular to a network security active defense resource configuration method and system, and provides the following scheme that the method comprises the following steps: establishing a risk transfer model of a network security node, and taking a network overall transfer risk as a target function of network security active defense resource configuration; and establishing constraint conditions of network security active defense resource configuration, and configuring network security active defense resources according to the target function and the constraint conditions in combination with node features and service features of a deployment environment. According to the method, the multi-node and multi-service characteristics of the real deployment environment are combined, reasonable optimal configuration of the energy internet network security active defense resources of the actual intelligent park system is realized, and the blindness problem of development of defense resource configuration based on experience in the prior art is avoided.

Description

technical field [0001] The invention relates to the field of energy Internet, in particular to a network security active defense resource allocation method and system. Background technique [0002] With the continuous integration of smart grid and "Internet +" technology, Energy Internet has become a current research hotspot. While realizing the integration of "information flow, energy flow, and business flow", the multi-level network structure of the Energy Internet involves various cutting-edge technologies, covers various types of machinery and equipment, and integrates multiple complex applications, which increases the system's exposure to cyber attacks. possibility. [0003] The energy Internet network security defense system in the prior art is a passive protection system composed of firewalls, anti-virus software, encryption algorithms, intrusion detection systems and other technologies, which are mainly used to block known threats and repair system vulnerabilities. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/20H04L63/1441Y04S40/20
Inventor 孙维佳王琦赵阿南汤奕
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products