Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power station automation system data network security monitoring method

An automation system and data network technology, which is applied in the field of data network security monitoring of power station automation systems, can solve the problem that the massive data transmission of the power station network cannot be effectively controlled, the non-important data occupies limited bandwidth resources, and the real-time important data transmission is affected, etc. problem, to achieve the effect of less vulnerable to attack, short delay, and fast processing speed

Inactive Publication Date: 2010-06-09
CHONGQING UNIV +1
View PDF1 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Power plant automation systems usually use a dedicated operating system, and the user interface for the new system is basically based on Windows or Unix systems. Therefore, security holes will be exposed to attackers, especially for a large number of application software using Windows operating systems. is very obvious
[0011] 4) Mass data transmission problem
[0012] The massive data transmission suffered by the power station network cannot be effectively controlled, and the power data has not been effectively filtered, resulting in non-important data occupying limited bandwidth resources and affecting the transmission of important data with high real-time performance
[0013] To sum up, the current network data security loopholes in the power system are very obvious, and there is no electronic security certification capability, there are great hidden dangers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power station automation system data network security monitoring method
  • Power station automation system data network security monitoring method
  • Power station automation system data network security monitoring method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0044]A power station automation system data network security monitoring method, which uses the Snort detection engine to monitor the power station automation data network on the existing power system computer network system. The protocols embedded in the engine include CDT, IEC-60870-101 and IEC - The communication protocol including 61850 uses the frame format of the protocol itself to establish engine matching conditions. The operating platform of the monitoring device used in the present invention adopts Sis550CPU as the processor, selects Vortex6082 of ICOP Company as the integrated main board, the memory configuration is 128MB onboard, and the hard disk selects 32MB DOM electronic disk for use. The device uses a streamlined Linux operating system and uses the Snort intrusion detection system (IDS) to complete the detection of il...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a power station automation system data network security monitoring method. An Snort detecting engine is utilized to realize the monitoring for a power station automation system data network on a traditional electric power system computer network system, an inserted rule of the engine comprises communication rules including CDT, IEC-60870-101 and IEC-61850, and the frame format of the rule is utilized to establish an engine matched condition; the monitoring for network security is realized through the following two modes: a. monitoring the data frame content transmitted on the work, using a rule format transmitted by power station data as a reference, permitting the information satisfying the rule format to continuously circulate, and isolating the information unsatisfying the rule format; b. monitoring the real-time flow of a power station data acquisition network, and if finding abnormal network flows, then indicating that abnormal data is transferred, and giving warning information by a power station automation system data network security monitoring device.

Description

technical field [0001] The invention belongs to the technical field of power electronics, and in particular relates to a data network security monitoring method for a power station automation system. technical background [0002] With the development of computer technology, communication technology and network technology, there are more and more data exchanges between substations, power plants, power grid dispatching centers, users, etc. Modern power systems consider the safety and reliability of basic power facilities. , it is increasingly necessary to strengthen the consideration of information security. The improvement of the automation level of electric power production has led to a large number of event communications such as remote control and monitoring, which poses new severe challenges to the security, reliability, and real-time performance of power control systems and data networks. [0003] The power system computer network system is divided into four safe work a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H02J13/00
Inventor 熊小伏陈星田李小秋
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products