Power grid information security evaluation method and apparatus based on AHP and big data

A technology of security assessment and information security, applied in the field of information security, can solve the problems of inability to assess the security of vertically encrypted authentication devices, security risks, etc., and achieve the effects of improving accuracy, ensuring comprehensiveness, and ensuring accuracy

Active Publication Date: 2018-10-23
STATE GRID CORP OF CHINA +1
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing power grid information security assessment system cannot accurately as

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power grid information security evaluation method and apparatus based on AHP and big data
  • Power grid information security evaluation method and apparatus based on AHP and big data
  • Power grid information security evaluation method and apparatus based on AHP and big data

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0028]According to the applicant's research, it is found that the existing power grid information security assessment technology cannot perform accurate assessment based on the importance of each parameter in the vertical encryption and authentication device for electric power when performing security assessment on the data flow in the vertical encryption and authentication device for electric power. Security Risk Assessment. The current information security risk assessment can be summarized into three categories: quantitative risk assessment methods, qualitative risk assessment methods, and qualitative and quantitative assessment methods. Quantitative assessment methods often simplify and blur complex issues for the purpose of quantification, and some risk factors may be misunderstood after being quantified. Qualitative evaluation methods are too subjective and have high requirements for the evaluators themselves. The existing qualitative and quantitative comprehensive evalu...

no. 2 example

[0081] In order to cooperate with the grid information security assessment method based on AHP and big data provided in the first embodiment of the present invention, the second embodiment of the present invention also provides a power grid information security assessment device 100 based on AHP and big data.

[0082] Please refer to Figure 4 , Figure 4 A block diagram of a power grid information security evaluation device based on AHP and big data provided by the second embodiment of the present invention.

[0083] The security assessment device 100 includes a weight vector determination module 110 , a difference vector determination module 120 and a security risk determination module 130 .

[0084] The weight vector determination module 110 is configured to obtain the weight vector corresponding to the judgment matrix of the risk assessment parameter in the electric power-specific vertical encryption authentication device by using the analytic hierarchy process (AHP).

...

no. 3 example

[0091] Please refer to Figure 5 , Figure 5 The third embodiment of the present invention provides a structural block diagram of an electronic device applicable to the embodiments of the present application. The electronic device 200 provided in this embodiment may include a security assessment apparatus 100 , a memory 201 , a storage controller 202 , a processor 203 , a peripheral interface 204 , an input and output unit 205 , an audio unit 206 , and a display unit 207 .

[0092] The memory 201, storage controller 202, processor 203, peripheral interface 204, input and output unit 205, audio unit 206, and display unit 207 are electrically connected to each other directly or indirectly to realize data transmission or interact. For example, these components can be electrically connected to each other through one or more communication buses or signal lines. The security assessment device 100 includes at least one software function module that can be stored in the memory 201 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a power grid information security evaluation method and apparatus based on AHP and big data, and relates to the technical field of information security. The security evaluationmethod comprises the following steps: obtaining a weight vector corresponding to a judgment matrix of a risk evaluation parameter in a power-specific longitudinal encryption authentication device by using an analytic hierarchy process AHP; determining a specific numerical value of the risk evaluation parameter based on a normal distribution table, and converting the specific numerical value into adifference vector; and obtaining a product of the weight vector and the difference vector, and determining a security risk of the power-specific longitudinal encryption authentication device based onthe product. According to the security evaluation method, the analytic hierarchy process is combined with big data to analyze the risk evaluation parameter, so that the accuracy and comprehensivenessof the security evaluation result of the power-specific longitudinal encryption authentication device is improved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method and device for evaluating power grid information security based on AHP and big data. Background technique [0002] The power system is the foundation and pillar of national political and economic activities. Once the power system fails and has safety problems, it will seriously affect the development of the national economy and the normal order of people's lives. In extraordinary times, it may also cause national security and the safety of people's lives and property. serious loss. [0003] In order to ensure the safety of the power system, it is necessary to establish a power system safety evaluation system, establish an effective personnel and equipment management system, improve safety audit management, and clarify the safety responsibilities of personnel at all levels. At the same time, it is also necessary to make full use of modern scientific ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/14H04L41/147H04L63/0428H04L63/08H04L63/1425
Inventor 许洪强张晓李勃梁野高明慧张志军何纪成卢楷王玉涛王坤
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products