Network security threat tracing technology of power monitoring system
Author:
Affiliation:

Clc Number:

TM732;TP391.1

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    On the basis of the research results of domestic and foreign threat tracing methods, in order to solve the problem of network security threat defense in power monitoring system. This paper combines with the requirements of power monitoring system security protection and the characteristics of power secondary system security protection by establishing the source of event location chain attack. The method firstly models the alarm log tree, constructs an event generation tree, and then aggregates the occurrence tree to obtain an initial event generation chain set. Finally, after the chain breaking process, the final event generation chain set is obtained. The method can automatically analyze the alarm data of the power monitoring system, extract the attack event, and process the original alarm into an attack map that can be visually displayed, thereby effectively capturing the associated host, and helping the network manager to monitor network security status in real time. So that timely safety measures are taken to ensure the safety of the network, data and equipment.

    Reference
    Related
    Cited by
Get Citation
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:October 08,2019
  • Revised:November 19,2019
  • Adopted:December 13,2019
  • Online: April 13,2020
  • Published: March 28,2020
Article QR Code