Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power Internet of Things network security risk prediction method

A power Internet of Things and network security technology, applied to electrical components, transmission systems, etc., can solve problems such as poor long-term prediction results, and achieve the effect of facilitating mid- and long-term predictions and enriching the causal library

Pending Publication Date: 2021-12-31
INFORMATION & TELECOMM COMPANY SICHUAN ELECTRIC POWER
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on the above problems, the present invention provides a network security risk prediction method of the electric power Internet of Things, which solves the problem of poor mid- and long-term prediction effect of the existing technology on the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power Internet of Things network security risk prediction method
  • Power Internet of Things network security risk prediction method
  • Power Internet of Things network security risk prediction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described below in conjunction with the accompanying drawings. Embodiments of the present invention include, but are not limited to, the following examples.

[0034] like figure 1 The shown power Internet of Things network security risk prediction method includes an acquisition module, a filter module, a prediction module and a display module, and includes the following steps:

[0035] Step 1. Build a causal database.

[0036] Among them, a single alarm event in the power Internet of Things specifically includes the attack source IP, attack behavior, attack IP, start time and end time, and the attack source IP, attack behavior, and attack IP in a single alarm event are regarded as a valid alarm information.

[0037] In addition, all alarm information is obtained through the acquisition module, and a causal database is constructed for each alarm information. Advance forward, take the six alarm events that are closest to the start ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of network security prediction, in particular to a power internet of things network security risk prediction method. Comprising an acquisition module, a filtering module, a prediction module and a display module. The method specifically comprises the following steps: firstly, taking an attack source IP, an attack behavior and an attack target IP in a single alarm event as effective alarm information; obtaining all alarm information through an acquisition module; for each piece of alarm information, taking the current alarm event as a result, and searching six closest alarm events before the occurrence time of the alarm event as causes, thus building a piece of causal data; and storing the causal data in a database to form a causal database; secondly, filtering low-frequency causal data in the causal database through a filtering module; then, predicting the alarm event through a prediction module adopting a Levenshtein distance algorithm; and finally, displaying effective alarm information of the predicted alarm event and the risk size and risk degree of the predicted alarm event in real time through a display module. The problem of poor long-term prediction effect in the system in the prior art is solved.

Description

technical field [0001] The invention relates to the field of network security prediction, in particular to a network security risk prediction method of the electric power Internet of Things. Background technique [0002] When the scale of the power Internet of Things network gradually increases, the number of accompanying network attack events also gradually increases. The research on network security is very necessary. The traditional protection methods represented by intrusion detection technology and firewall have been difficult to meet the needs of large-scale network attacks. Security protection requirements. Network security protection is based on security situation analysis and security risk prediction. The risk prediction link is in the final stage of the network security situation awareness system. Only by predicting possible alarm events can we do To prevent problems before they happen, and better maintain the network security situation. [0003] Accurately predic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1408H04L63/1416H04L63/0227H04L63/1441H04L67/12
Inventor 吕磊杨茜刘萧黄林王卓许珂蒋天宇谌文杰常健李嘉周
Owner INFORMATION & TELECOMM COMPANY SICHUAN ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products