Cooperative protection system of security of electric power wide area Internet and protection method thereof

A protection system and Internet technology, applied in the electric power wide-area Internet security collaborative protection system and its protection field, can solve the problems of inability to guarantee the safety of electric power intelligent terminals, blurred network boundaries, and increased exposure of power grid information security

Active Publication Date: 2017-06-30
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One is the access of a large number of smart terminal devices, using a large number of wireless communication methods such as WIFI, 3G / 4G, etc., the basic environment of the power network has also changed, and the network boundary has become increasingly blurred. The traditional border security protection scope can no longer guarantee the security of power smart terminals.
Second, new changes have taken place in the acquisition methods, storage forms, transmission channels, and processing methods of power-related information. Application virtualization, data assetization, and terminal mobility will all introduce new information network security risks. Exposure is increasing rapidly
At the same time, new attack methods represented by advanced persistent network attacks (APT) are also constantly evolving, all of which pose severe challenges to the security protection of power information networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cooperative protection system of security of electric power wide area Internet and protection method thereof
  • Cooperative protection system of security of electric power wide area Internet and protection method thereof
  • Cooperative protection system of security of electric power wide area Internet and protection method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] The main types of security services in the power wide-area interconnection network include: security data monitoring (including Events, Notification), remote security control, data security processing, and combination with traditional security communication services and other security services.

[0048] Considering that the secure data transmission type of the ubiquitous network is different from the Internet of Things, which focuses on secure data collection (one-way upload), the security data transmission types of the ubiquitous network include: secure data collection (uplink), secure broadcast (downlink) and secure transport / bridging classes (bidirectional) like figure 1 In (a), (b), (c) shown.

[0049] The present invention provides an electric power wide-area Internet security collaborative protection system, by adding two main functional entities of fusion security access gateway (abbreviated as security access gateway) and virtual reconstruction security control ...

Embodiment 2

[0061] Since the power wide-area Internet system has distributed, hierarchical, heterogeneous spatial characteristics and dynamic evolution time characteristics, security also has dynamic and heterogeneous spatio-temporal characteristics, and its security life cycle is divided into: protection, detection, prediction, Four stages of response. The present invention formally defines security policies, related concepts, relations and operations of policy trees in Z mode, proposes construction methods of security policies, correctness verification of abstract descriptions, proves security policy consistency theorem, and designs automatic check of policy consistency method.

[0062] The invention provides a protection method for a power wide-area Internet security collaborative protection system. The protection method includes four sub-strategies of construction protection, detection, prediction and response;

[0063] The four sub-strategies are taken as sub-steps in each stage of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cooperative protection system of security of an electric power wide area Internet and a protection method thereof. A hardware system of cooperative protection is constituted by increasing two main functional entities, namely a fusion security access gateway and a virtual reconstruction security control server, a software logic system of cooperative protection is realized by policy subscription, an evidence synthesis approximation algorithm is researched, an evidence projection decomposition method is designed, and a credibility transfer formula is deduced. Therefore, various peripheral networks in the electric power wide area Internet can securely access to a security service platform located in an IP core network through the existing heterogeneous access networks through the security access gateway, and security service commands and data can also be sent to frontier nodes.

Description

technical field [0001] The invention relates to a network security protection system, in particular to a power wide-area Internet security collaborative protection system and a protection method thereof. Background technique [0002] At present, the international network security situation is becoming more and more severe. Cyberspace has become the fifth territory of the country after the four territories of land, sea, air, and space. The trend of network attacks being grouped and nationalized is increasingly obvious. Due to the complex and diverse structure of the power system, wide distribution, high importance and integrated wide-area interconnection, once the power system is paralyzed and has a huge impact, it is very easy to become the first choice for hostile forces to attack. In recent years, with the introduction of a large number of "Internet +" technologies represented by cloud computing, Internet of Things, and big data, and the access of a large number of smart t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/0227H04L63/1416H04L63/1433H04L63/1441
Inventor 张波马媛媛石聪聪何高峰陈璐管小娟黄秀丽李尼格华晔郭骞邵志鹏费稼轩戴造建席泽生
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products