Security access assessment method and device for power terminal equipment

A power terminal and secure access technology, applied in the field of communication security, can solve problems such as not combining the behavior characteristics of end users

Pending Publication Date: 2021-11-02
STATE GRID ELECTRIC POWER RES INST +3
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the power Internet of Things scenario, the traditional access control model generally combines the network structure, adopts a static deployment, modular design method, does not combine the business process of the application and the behavior characteristics of the end user, mainly adopts "one authentication, one authorization, long-term Effective” protection measures, once the network is breached, attackers will infiltrate internal applications to perform malicious operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security access assessment method and device for power terminal equipment
  • Security access assessment method and device for power terminal equipment
  • Security access assessment method and device for power terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0061] An embodiment of the present invention provides a security access control evaluation method for power terminal equipment, such as figure 1 As shown, including the following process:

[0062] S1. Deploy the acquisition probe on the power terminal equipment to collect the security status information of the terminal equipment, and use the expert system to evaluate the security status of the terminal equipment according to the collected static configuration and dynamic operating status, and calculate that the terminal equipment is under attack The probability of the power terminal being attacked is related to its vulnerability, and also related to whether the dynamic behavior of the applicat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security access assessment method and device for power terminal equipment, and the method is used for continuously assessing the credibility and security threat of the terminal equipment in a zero-trust network, and comprises the steps: installing an acquisition probe on the terminal equipment, and collecting the security state of the terminal; constructing a network topological graph based on a network connection relationship of servers on a power business system, and converting the constructed network topological graph into an R-hop weighted attack tree by adopting a WL subtree accounting method; calculating a risk value in a server node R-hop for the accessed terminal equipment, and pruning the weighted attack tree to obtain a final safe and accessible power service system. The method not only considers the security state of the terminal equipment, but also considers the access authority of the terminal equipment at the cloud, the security protection capability of the service system and the like, and finally gives the minimum security service set which can be safely accessed by the terminal.

Description

technical field [0001] The invention belongs to the technical field of communication security, and in particular relates to a security access evaluation method and device for power terminal equipment. Background technique [0002] In the power Internet of Things scenario, the traditional access control model generally combines the network structure, adopts a static deployment, modular design method, does not combine the business process of the application and the behavior characteristics of the end user, mainly adopts "one authentication, one authorization, long-term Effective” protection measures, once the network is breached, attackers will infiltrate internal applications to perform malicious operations. Contents of the invention [0003] The purpose of the present invention is to provide a security access assessment method and device for electric power terminal equipment, so that the business system can quickly assess security threats based on collected data, realize s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L63/1408H04L63/1416H04L63/1433H04L41/12H04L63/20
Inventor 魏兴慎吴超张勃陈连栋曹永健王海清高鹏祁龙云马增洲葛国栋赵林丛杨维永刘苇朱世顺
Owner STATE GRID ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products