Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power monitoring system network security policy arrangement and disposal method and system

A power monitoring and system network technology, applied in circuit devices, information technology support systems, genetic rules, etc., can solve the problems of effective alarm flooding, low efficiency, lack of standardized response, and processing procedures, etc., to improve clarity and real-time performance , to ensure the effect of accuracy

Pending Publication Date: 2022-05-17
STATE GRID ELECTRIC POWER RES INST +3
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] For the power monitoring system, the number of information assets is increasing day by day, and the relevance and complexity of the system are increasing. There are still challenges in transformation: too many network security event alarms, effective alarms are submerged, and cannot effectively help security operation and maintenance and research and judgment personnel; lack of professional security attack and defense, analysis capabilities, and disposal personnel have experience in security analysis, research and judgment Difficult to solidify; safety response and disposal time is too long and inefficient; lack of standardized response and disposal process; lack of quantifiable indicators for safety operation and disposal efficiency; lack of overall design and planning, limited linkage between equipment and platforms, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power monitoring system network security policy arrangement and disposal method and system
  • Power monitoring system network security policy arrangement and disposal method and system
  • Power monitoring system network security policy arrangement and disposal method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment 1: An electric power monitoring system network security policy arrangement and disposal system, including an attack identification engine (i.e. an attack identification module), a policy adaptive arrangement engine (i.e. a strategy adaptive arrangement module), a visual arrangement engine (i.e. a visual arrangement module) and A disposition engine (i.e. a disposition module) that performs tasks such as figure 1 The self-adaptive orchestration and disposal process of the security policy shown includes:

[0045] Step 1. The attack identification engine monitors the internal equipment security events of the power monitoring system.

[0046] Monitor the security events of each device in the power monitoring system collected by the network security monitoring device, realize the analysis of security events, and clarify the data source and data type.

[0047]The types of collection objects and the content of security events mainly include: server and workstation e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power monitoring system network security policy arrangement and disposal method and system. The method comprises the following steps: monitoring security events of internal equipment of a power monitoring system; matching the security event with a preset strategy library, if matching succeeds, obtaining a security disposal strategy corresponding to the security event from the preset strategy library, and if matching fails, calculating a strategy approximate solution based on a genetic algorithm; a security disposal strategy corresponding to the security event is visually arranged according to the strategy approximate solution; and realizing safe disposal based on the obtained safe disposal strategy. According to the invention, behavior analysis and monitoring early warning of internal equipment of the power monitoring system are realized, an approximate disposal strategy is efficiently calculated from massive alarms based on a matching method of a genetic algorithm, and active defense of the power monitoring system is truly realized; the main security threat faced by the current power monitoring system is solved from the angles of monitoring early warning and emergency disposal.

Description

technical field [0001] The invention relates to a method and a system for arranging and handling network security policies of a power monitoring system, and belongs to the field of network security control. Background technique [0002] For the power monitoring system, the number of information assets is increasing day by day, and the relevance and complexity of the system are increasing. There are still challenges in transformation: too many network security event alarms, effective alarms are submerged, and cannot effectively help security operation and maintenance and research and judgment personnel; lack of professional security attack and defense, analysis capabilities, and disposal personnel have experience in security analysis, research and judgment Difficult to fix; security response and disposal time is too long, low efficiency; lack of standardized response and disposal process; lack of quantifiable indicators for security operation and disposal efficiency; lack of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q50/06G06Q50/26H02J13/00G06N3/12
CPCG06Q10/0637H02J13/00002H02J13/00001G06N3/126G06Q50/06G06Q50/265Y04S40/20
Inventor 张鸿鹏祁龙云刘苇杨维永孙阳盛肖飞魏兴慎金明辉杨康乐闫珺朱世顺胡友琳孙连文张骞李向南孙柏颜吕小亮徐志超刘春志
Owner STATE GRID ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products