Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Electric power Web application mimicry defense system

A defense system and web application technology, applied in the field of electric power information security, can solve the problems of asymmetric attack and defense, difficult to guarantee the security of key web applications in electric power enterprises, and difficult to defend, so as to achieve the effect of enhancing network security

Pending Publication Date: 2020-05-22
STATE GRID TIANJIN ELECTRIC POWER +1
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Currently widely used or deployed in the firewall, security gateway, intrusion detection system, virus killing, user authentication, access control and other technologies or equipment of the State Grid Corporation of China and its affiliated power companies to improve the network security defense system of system security, its essence is A passive security protection system based on prior knowledge (including characteristics, behaviors, fingerprints, etc. of known attackers), which has genetic defects in dealing with uncertain threats, has only "acquired immunity" and can only "non-stop Find loopholes and keep patching", "keep losing sheep, keep patching up", there is no effective way to detect and prevent pre-installed backdoors, and it is impossible to defend against unknown attacks of unknown vulnerabilities and unknown backdoors
Under the situation that network attacks tend to be automated, intelligent, combined, and software and hardware synergy, the above-mentioned traditional passive defense system is more difficult to effectively resist attacks using unknown vulnerabilities, and it is difficult to defend against potential attacks using various unknown backdoors
Under such circumstances, the State Grid Corporation of China has a serious attack-defense asymmetry of "easy to attack and difficult to defend". application security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power Web application mimicry defense system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0025] Such as figure 1 As shown, a power web application mimic defense system includes information fragment randomization transmission module, request distribution balance module, response redundancy voter, non-similar web virtual machine pool, dynamic executive scheduler and database instruction isomerization module .

[0026] The non-similar Web virtual machine pool is a real provider of Web services, and is composed of multiple non-similar Web virtual machine sub-pools, and each non-similar Web virtual machine sub-pool consists of multiple heterogeneous, diverse, redundant Web Composition of service executives; each of the non-similar web virtual machine sub-pools is physically independent and isolated from each other, and each of the web service executives and each of the heterogeneous redundant web service executives are also i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electric power Web application mimicry defense system. The system comprises an information fragment randomized transmission module, a request distribution balancing module,a response redundancy voter, a non-similar Web virtual machine pool, a dynamic executor scheduler and a database instruction isomerization module; the dynamic executor scheduler is used for controlling the state of each Web service executor; the information fragment randomized transmission module fragments and randomizes Web service requests; and the request distribution balancing module dynamically distributes each Web service request to a plurality of heterogeneous redundant Web service executors, processes the same Web service request in a non-cooperative manner, and returns response information to the response redundancy voter for voting. According to the electric power Web application mimicry defense system, the uncertainty of the system is increased, the vulnerability utilization feasibility on which attacks depend is destroyed, and the probability that the system is successfully attacked is reduced; through the design of a voting mechanism, abnormal feedback information of attacks is detected and filtered, so that the system is prevented from being threatened by unknown vulnerabilities.

Description

technical field [0001] The invention belongs to the field of electric power information security, and in particular relates to a power web application mimic defense system. Background technique [0002] With the popularization of electric power information systems and the continuous accumulation of data, electric power production, scheduling, and marketing are increasingly dependent on information systems, and more and more Web application systems based on B / S architecture have been built and put into use. Accompanied by this, the attack methods based on the application layer show an explosive growth trend and are constantly being updated, which brings serious hidden dangers to the security of the business system. The main risks of the power enterprise Web application system come from the loopholes and flaws in the operating system and the system itself. Attackers can use these loopholes and flaws to attack the application system. The current major Web application security l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F9/455G06F9/50G06K9/62
CPCG06F21/55G06F9/45558G06F9/5083G06F2009/45587G06F2009/4557G06F18/25G06F18/259
Inventor 何金赵迪席泽生张波董阳陈亮张国强李洁
Owner STATE GRID TIANJIN ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products