Grid network security analysis method and system based on graph database

A network security analysis and network security technology, applied in the field of computer information processing, can solve problems such as being less than ideal in actively and effectively responding to various security incidents, and limiting the ability of network security administrators to make optimal response decisions. The effect of improving attack link traceability and high deployment flexibility

Pending Publication Date: 2022-08-02
NARI INFORMATION & COMM TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These technologies try to discover possible security problems in the network from different angles, but they are not ideal in terms of proactively and effectively responding to various security incidents, which limits the ability of network security administrators to make optimal response decisions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Grid network security analysis method and system based on graph database
  • Grid network security analysis method and system based on graph database
  • Grid network security analysis method and system based on graph database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] like Figure 1-2 As shown, the present invention provides a grid network security analysis method based on a graph database, comprising the following steps:

[0037] S1. Collect various power grid network security data, perform denoising and deduplication processing on the security data, and store them in the database mysql;

[0038] S101. Collecting various power grid network security data includes acquiring alarm logs, host login logs, host information logs, and threat intelligence logs through webservice and UDP.

[0039] The alarm log includes the attack source, the attacked target, the system it belongs to, the operation and maintenance unit, and geographic information; the threat intelligence log includes the threat intelligence data; the host information log includes the operating system and the mac address; the host login log includes the host login data.

[0040] S102, performing deduplication and denoising processing on the security data includes:

[0041] D...

Embodiment 2

[0155] The embodiment of the present invention provides a grid network security analysis system based on a graph database, the system includes:

[0156]The data preparation module is used to collect various power grid network security data, denoise and deduplicate the security data and store it in the database mysql;

[0157] The data loading module is used to load each data table in the database mysql into the memory collection through a separate thread in a multi-threaded parallel manner;

[0158] The relationship graph module is used to construct various nodes and relationships in the memory collection to form Neo4jCypher statements;

[0159] The knowledge graph module is used to build a knowledge graph in full and incrementally through the graph database based on Neo4jCypher statements;

[0160] The method deployment module is used to write a DockerFile file to package the above steps into an image, and run it into a docker container to achieve rapid deployment.

[0161]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a power grid network security analysis method and system based on a graph database, and the method comprises the steps: collecting various power grid network security data, carrying out the de-noising and de-duplication processing of the security data, and storing the data in a database mysql; loading each data table in the database mysql to a memory set through an independent thread by adopting a multi-thread parallel mode; constructing various nodes and relationships in the memory set to form a Neo4jCypher statement; based on a Neo4jCypher statement, constructing a knowledge graph through the total amount and the increment of a graph database Neo4j; writing a Docker File file, packaging the steps into a mirror image, and running the mirror image into a docker container to realize rapid deployment; according to the method, the attack link traceability and the deployment flexibility and expansibility can be improved.

Description

technical field [0001] The invention relates to a power grid network security analysis method and system based on a graph database, and belongs to the technical field of computer information processing. Background technique [0002] The continuous development of the Internet infrastructure and the continuous emergence of new applications make the network scale gradually expand, the topology structure becomes increasingly complex, and the difficulty of network security management continues to increase. In order to deal with the increasingly complex and hidden network threats, various detection technologies have emerged one after another, such as vulnerability detection technology, malicious code detection technology, intrusion detection technology, etc. These technologies try to discover possible security problems in the network from different perspectives, but are not ideal in terms of whether to actively and effectively respond to various security incidents, which limits th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L41/069H04L67/1095G06F16/36G06F16/901G06F9/455
CPCH04L63/1416H04L63/0876H04L63/1441H04L63/1425H04L41/069H04L67/1095G06F16/367G06F16/9024G06F9/45558G06F2009/45575Y04S40/20
Inventor 徐胜国鲁国亮王晔郭靓张付存姜训吴道林王朝兴王志勇洪昊刘剑屠正伟
Owner NARI INFORMATION & COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products