Information security system and method with anti-attack function

An information security system, anti-attack technology, applied in the direction of transmission systems, electrical components, etc., can solve problems such as accident consequences, and achieve the effect of information security

Pending Publication Date: 2021-02-23
SHENZHEN POWER SUPPLY BUREAU
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The information system and the physical system are interactive. Due to the tight coupling between the two, any problem in any link may lead to serious accident consequences.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The preferred embodiments of the present invention are described in detail below, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0025] An information security system with anti-attack, equipped with a physical hardware detection module to detect whether there is any abnormality in hardware configuration information in real time;

[0026] Set the network connection status detection module to detect the real-time network connection status of each device;

[0027] A static network comparison module is set up to detect and compare the real-time network connection status to determine whether it is abnormal;

[0028] An attack information collection module is set up to actively collect attack information inside the system and outside the network;

[0029] A simulated operation system is set up to simulate the operation of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An information security system with an anti-attack function is provided with a physical hardware detection module, a network connection state detection module, a static network comparison module, an attack information collection module and a simulation operation system. The method comprises the following specific steps: 1, collecting equipment operation data in real time through a hardware detection module, comparing the equipment operation data with an equipment operation database, if no abnormality exists, entering the next step, and otherwise, giving an alarm; 2, detecting the network connection state of each device in real time; 3, comparing with a network static connection database, if the data is consistent, entering the next step, and if the data is inconsistent, abnormal, blockingthe connection and sending an alarm; 4, storing the attack information into an attack information base, collecting the attack information on the Internet regularly, and perfecting the attack information base; and 5, enabling the attack information base to select an attack instruction, attack equipment in the simulation system, formulate a blocking strategy according to an attack process, and update an actual operation system according to the blocking strategy.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an information security system and method capable of preventing attacks. Background technique [0002] With the continuous development of computer science, information technology, information security, power system and other related fields, the construction of smart grid has introduced new technologies such as cloud computing, big data, mobile Internet, Internet of Things, etc., grid information acquisition methods, New changes will occur in storage forms, transmission channels, and processing methods, and the basic network environment will also undergo corresponding changes. The power system has developed into a complex system with deep integration of information and physics, and its stable operation cannot be separated from the real-time scheduling of its information system. At present, unstable factors such as terrorist threats and military conflicts frequently appea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1416H04L63/1425H04L63/1466
Inventor 黄萍刘威邓巍
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products