Internet threat monitoring and defending method based on dynamic joint defense

A technology of dynamic joint defense and dynamic defense, applied in the field of network security, can solve the problems of heavy workload, high labor cost, misoperation, etc., and achieve the effect of preventing threat attacks and avoiding omissions.

Active Publication Date: 2019-11-26
GUANGDONG POWER GRID CO LTD INFORMATION CENT
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the effect is not ideal. There are still a large number of network attacks that cannot be effectively intercepted in the first place, resulting in attacks on the internal system of the network, which in turn affects the safety of electricity consumption in various industries in society.
At present, the information center has to invest a lot of manual work to carry out monitoring and disposal work every day, which is costly. According to the existing mechanism, relevant personnel conduct inspections every 2 hours, and the defense mechanism will generate budget during normal working hours on weekdays. The incident response time is 2 hours, and the response time during non-working hours such as evenings and weekends can reach up to 48 hours. It is difficult to improve the timeliness of security protection
And if a lot of work is done manually, mistakes will inevitably occur and affect the quality of protection
[0004] Therefore, the power network security has problems such as an unsound automatic defense system for Internet threats; threat protection methods and technical tools are too traditional; heavy workload, labor-intensive, long event response time, and the risk of misoperation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet threat monitoring and defending method based on dynamic joint defense
  • Internet threat monitoring and defending method based on dynamic joint defense
  • Internet threat monitoring and defending method based on dynamic joint defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The method of the present invention is applied in the existing safety monitoring platform, the existing safety monitoring platform such as figure 1 Schematic diagram of functional modules, including display layer, functional layer, application extension layer, data layer, and data acquisition module. Among them, the function layer is provided with the new automatic blocking module of the present invention, and the real-time operation of the automatic blocking module is displayed through the display layer, such as figure 2 As shown, the interface display of the automatic blocking module provides operators with man-machine interface operation input interface, and provides IPS source statistical display, WAF source statistical display and SOC source statistical display, and the statistical source is consistent with IPS, WAF and SOC systems Number of black names.

[0032] Add a dynamic defense module to the existing security monitoring platform, and the dynamic defense mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an internet threat monitoring and defending method based on dynamic joint defense. The method comprises the following steps that an automatic blocking module is connected withinternet boundary blocking equipment through an application layer interface to achieve data transmission; wherein the automatic blocking module is configured to monitor each functional event processed by the functional layer in real time, and send the event, reaching a set threat level, in a monitoring result to the internet boundary blocking equipment. The internet boundary blocking equipment filters the IP address, the MAC address and the terminal name in the threat event by adopting an ADS blacklist protection strategy. As long as the source IP address of the data packet is matched with acertain address in the blacklist, the ADS equipment blocks the address and does not perform other detection any more, and the ADS equipment receives the black IP information, completes the blocking action and returns to the blocking state. According to the internet threat monitoring and defending method based on dynamic joint defense, manual operation can be replaced by adding an automatic defending mechanism, careless omission of the manual operation is avoided, power network equipment and software are protected, and threat attacks are effectively prevented.

Description

technical field [0001] The invention relates to network security, in particular to an Internet threat monitoring and defense method based on dynamic joint defense. Background technique [0002] In recent years, the network security situation of my country's key information infrastructure has become increasingly severe. Among them, power companies, as an important key information infrastructure unit in the country, are responsible for the management and operation of many important external applications, and are often targeted by hackers. At present, the number of cyber attacks against the power industry is also increasing. In order to ensure the security of the power network environment and block various attacks from the Internet, the long-term practice of the network security department is basically to carry out daily monitoring and inspection by investing a lot of manpower and material resources. Work. In order to protect the security of the Internet exit, the information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/101H04L63/1416H04L63/30
Inventor 黄巨涛陈守明梁运德高尚温柏坚王甜黄敬志陈敏王飞鸣刘冯政卢妍倩
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products