Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security defense method and device for power grid plant station host, equipment and medium

A security defense and station host technology, applied in the field of network security, can solve problems such as insufficient security of the power grid, weak security prevention of edge nodes, etc., and achieve the effect of improving security

Pending Publication Date: 2022-04-08
SHENZHEN COMTOP INFORMATION TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the penetration of the industrial control system of the power grid often starts from the edge nodes of the entire network architecture (that is, the host node of the plant station system), the security prevention of the edge nodes is still relatively weak, resulting in the insecurity of the entire power grid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security defense method and device for power grid plant station host, equipment and medium
  • Security defense method and device for power grid plant station host, equipment and medium
  • Security defense method and device for power grid plant station host, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0039] The security defense method for the mainframe of the power grid station provided by the embodiment of the present application can be applied to such as figure 1 shown in the application environment. Among them, the plant station system refers to a plant station network, which includes a plurality of plant station host nodes 101; the plant station system can communicate with the master station (or called master station system) 102; the host node 101 includes a substation Business host; the master station 102 can be used to uniformly manage each host node 101 . The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security defense method and device for a power grid plant station host, computer equipment, a storage medium and a computer program product. According to the invention, security defense of an edge node (i.e., a plant station host) level in the power network can be realized, and the security of the power network is further improved. The method comprises the steps of collecting input and output logs; performing static network security feature recognition on the input and output logs to obtain a static feature recognition result; performing dynamic behavior analysis on the input and output logs to obtain a dynamic behavior analysis result; and sending the static feature recognition result and the dynamic behavior analysis result to a master station system.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a security defense method, device, computer equipment, storage medium and computer program product for power grid plant hosts. Background technique [0002] With the development of information technology, network security has been paid more and more attention. In the power network, if the power network is attacked by hackers, it may cause the collapse of the power grid in an entire area, causing huge economic losses. [0003] The industrial control network is the network part of the industrial control system. It is a communication network that organizes various production processes and automation control systems in the factory through various communication devices. For the power grid, the communication network in the power grid is the industrial control network. The power grid industrial control network also includes multiple plant station systems. The plant s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
Inventor 陈善锋姜渭鹏胡朝辉陈海光彭伯庄罗强胡钊杨逸岳
Owner SHENZHEN COMTOP INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products