CN115037490B - Cross-network communication system for detecting malicious codes of transformer substation - Google Patents

Cross-network communication system for detecting malicious codes of transformer substation Download PDF

Info

Publication number
CN115037490B
CN115037490B CN202111340916.8A CN202111340916A CN115037490B CN 115037490 B CN115037490 B CN 115037490B CN 202111340916 A CN202111340916 A CN 202111340916A CN 115037490 B CN115037490 B CN 115037490B
Authority
CN
China
Prior art keywords
malicious code
platform
malicious
proxy
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111340916.8A
Other languages
Chinese (zh)
Other versions
CN115037490A (en
Inventor
徐红泉
金学奇
郑翔
张晓�
张亮
金皓纯
孔飘红
金琦
黄银强
王海园
方超
江杰
潘秋明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Quzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Quzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Quzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Quzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority to CN202111340916.8A priority Critical patent/CN115037490B/en
Publication of CN115037490A publication Critical patent/CN115037490A/en
Application granted granted Critical
Publication of CN115037490B publication Critical patent/CN115037490B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a cross-network communication system for detecting malicious codes of a transformer substation, which comprises a master station and a plurality of transformer substations, wherein the master station is provided with a malicious code platform, the transformer substation is provided with a malicious code terminal and a malicious code proxy platform, a secure communication link is established between the malicious code platform and the plurality of malicious code proxy platforms by using an SSL protocol, data interacted between the malicious code platform and the plurality of malicious code proxy platforms are encrypted by using an encryption algorithm, and the malicious code proxy platform and the malicious code terminal realize network intercommunication through a switch. According to the invention, the master station is communicated with all the substations through the intermediate proxy platform, information fusion and master station of all the substations are realized, malicious code detection and malicious code installation and upgrading prevention are uniformly carried out on all the substations by the master station, the upgrading efficiency is high, the real-time performance is realized, and all the substations are effectively protected.

Description

Cross-network communication system for detecting malicious codes of transformer substation
Technical Field
The invention relates to the technical field of malicious code detection, in particular to a cross-network communication system for detecting malicious codes of a transformer substation.
Background
With the widespread use of computer and network communication technologies in power monitoring systems, the network security threat situation of the power industry is becoming more and more severe, and the large-scale outage event caused by hacking attacks due to several causes of exposure in the last two years is also corroborated. Moreover, from the moment, the electric power industry is vulnerable when facing security threat, and the influence range is wide once the electric power industry is in the middle of the market, so that the security management of the electric power monitoring system is enhanced, attack and infringement of hackers, malicious codes and the like on the electric power monitoring system are prevented, the safe and stable operation of the electric power system is ensured, network security products in the electric power industry are also widely popularized, the network security is mainly protected from two dimensions of active and passive, active vulnerability scanning is active, and the protection products such as firewalls are passive. In practical application, direct communication cannot be realized between a malicious code platform of a master station and a malicious code terminal of a transformer substation, the master station cannot issue detection instructions to the transformer substations, each transformer substation is like a sealed information island, malicious codes detected by one transformer substation cannot inform other transformer substations at the same time, other transformer substations are updated in time, the same malicious codes can invade other transformer substations, protection information cannot be unified, each transformer substation independently carries out malicious code updating, certain hysteresis exists, and the updating efficiency is low.
Disclosure of Invention
The invention solves the problems of non-intercommunication of information of transformer substations, certain hysteresis of malicious code upgrading and low upgrading efficiency in the prior art, and provides a cross-network communication system for detecting the malicious codes of the transformer substations.
In order to achieve the above purpose, the following technical scheme is provided:
the utility model provides a cross-network communication system for malicious code detection of transformer substation, includes master website and a plurality of transformer substation, the master website is equipped with malicious code platform, the transformer substation is equipped with malicious code terminal and malicious code proxy platform, use SSL protocol to establish safe communication link between malicious code platform and the malicious code proxy platform to use encryption algorithm to encrypt the data of interaction between malicious code platform and the malicious code proxy platform, malicious code proxy platform and malicious code terminal pass through the switch and realize the network intercommunication.
According to the invention, the malicious code proxy platform is arranged to realize information intercommunication between the master station and a plurality of substations, meanwhile, the SSL protocol is used to establish a secure communication link between the malicious code platform and a plurality of malicious code proxy platforms, so that the security of data transmission is ensured, and in addition, the malicious code proxy platform and the malicious code terminals realize network intercommunication through the switch, so that the information leakage of the malicious code terminals is avoided. The malicious code information of the transformer substations is fused through the master station, and after the transformer substations detect the found malicious codes, the upgrade package aiming at the malicious codes is sent to other transformer substations, so that the upgrade efficiency is high, the real-time performance is realized, and each transformer substation is effectively protected.
Preferably, the encryption algorithm is an SM2 asymmetric algorithm. The SM2 asymmetric algorithm is based on an ECC elliptic curve cryptography theory, a 256-bit curve is recommended as a standard curve in the general rule of the cryptographic industry standard GMT 0003.1-2012SM2, and a digital signature algorithm, a key exchange protocol and a public key encryption algorithm all generate a key pair according to a finite field and an elliptic curve selected by the general rule of SM 2; a safer mechanism is adopted in the aspects of digital signature and key exchange, and the calculation amount and complexity are improved.
Preferably, the malicious code platform is used for issuing a malicious code detection instruction and an upgrade instruction, the malicious code detection instruction and the upgrade instruction are transmitted to a malicious code terminal through the malicious code proxy platform, the malicious code terminal executes malicious code detection operation or upgrade operation, an operation result is finally fed back to the malicious code proxy platform, and the malicious code proxy platform transmits the operation result to the malicious code platform.
Through the system provided by the invention, the master station can uniformly issue malicious code detection instructions to all substations, the detection efficiency is high, and once a certain malicious code is found, an upgrade package aiming at the malicious code can be directly sent to all substations by the master station, so that all substations are uniformly upgraded, the upgrade efficiency is high, and the real-time performance is strong.
Preferably, the process of establishing the secure communication link using SSL protocol is as follows:
s1, a malicious code agent platform submits a socket request and sends the socket request to a malicious code platform;
s2, the malicious code platform responds to the socket request and sends the public key of the certificate to the malicious code proxy platform;
s3, the malicious code agent platform verifies whether the public key of the certificate is valid, if yes, the malicious code platform negotiates with the malicious code agent platform to generate an SM2 key, and S4 is entered; if not, not operating;
s4, judging whether negotiation is successful, if so, establishing an SSL protocol security channel between the malicious code platform and the malicious code proxy platform, encrypting by using an SM2 algorithm, and if not, not operating.
Preferably, the malicious code platform issues the malicious code detection instruction as follows:
SA, malicious code platform encrypts detection task information by SM2 asymmetric algorithm;
SB, the malicious code platform sends the encrypted data to the malicious code agent platform;
the SC, after receiving the data, the malicious code agent platform decrypts the received data to obtain detection task details;
the SD, malicious code agent platform sends the operation task to the corresponding malicious code terminal according to the detection task details;
SE, the malicious code terminal executes malicious code detection according to the operation task and returns the detection result to the malicious code agent platform;
and the SF, the malicious code agent platform collates the collected detection results and encrypts the detection results by an SM2 asymmetric algorithm, and then reports the detection results to the malicious code platform.
Preferably, the malicious code platform issues the upgrade instruction as follows:
sa, the malicious code platform issues the upgrade package to the malicious code agent platform;
sb, the malicious code agent platform receives the upgrade package and issues upgrade instructions to all malicious code terminals;
sc, the malicious code terminal receives the upgrade instruction and actively initiates a request for downloading an upgrade package from the malicious code proxy platform;
sd, after the malicious code terminal is upgraded, the running log is reported to the malicious code agent platform at regular time;
se, the malicious code agent platform reports the running log to the malicious code platform.
The beneficial effects of the invention are as follows: according to the invention, the malicious code proxy platform is arranged to realize information intercommunication between the master station and a plurality of substations, meanwhile, the SSL protocol is used to establish a secure communication link between the malicious code platform and a plurality of malicious code proxy platforms, so that the security of data transmission is ensured, and in addition, the malicious code proxy platform and the malicious code terminals realize network intercommunication through the switch, so that the information leakage of the malicious code terminals is avoided. The malicious code information of the transformer substations is fused through the master station, and after the transformer substations detect the found malicious codes, the upgrade package aiming at the malicious codes is sent to other transformer substations, so that the upgrade efficiency is high, the real-time performance is realized, and each transformer substation is effectively protected.
Drawings
FIG. 1 is a system configuration diagram of an embodiment;
figure 2 is a process diagram of an embodiment negotiating the generation of keys for SM2 asymmetric algorithms;
FIG. 3 is a diagram of an embodiment SM2 asymmetric algorithm encryption process;
fig. 4 is a diagram of an embodiment SM2 asymmetric algorithm decryption process.
Detailed Description
Examples:
the embodiment provides a cross-network communication system for detecting malicious codes of a transformer substation, referring to fig. 1, the cross-network communication system comprises a master station and a plurality of transformer substations, wherein the master station is provided with a malicious code platform, the transformer substation is provided with a malicious code terminal and a malicious code proxy platform, a secure communication link is established between the malicious code platform and the plurality of malicious code proxy platforms by using an SSL protocol, data interacted between the malicious code platform and the plurality of malicious code proxy platforms is encrypted by using an SM2 asymmetric algorithm, and network intercommunication between the malicious code proxy platform and the malicious code terminal is realized through a switch. The SM2 asymmetric algorithm is based on an ECC elliptic curve cryptography theory, a 256-bit curve is recommended as a standard curve in the general rule of the cryptographic industry standard GMT 0003.1-2012SM2, and a digital signature algorithm, a key exchange protocol and a public key encryption algorithm all generate a key pair according to a finite field and an elliptic curve selected by the general rule of SM 2; a safer mechanism is adopted in the aspects of digital signature and key exchange, and the calculation amount and complexity are improved.
The process of establishing a secure communication link using the SSL protocol is as follows:
s1, a malicious code agent platform submits a socket request and sends the socket request to a malicious code platform;
s2, the malicious code platform responds to the socket request and sends the public key of the certificate to the malicious code proxy platform;
s3, the malicious code agent platform verifies whether the public key of the certificate is valid, if yes, the malicious code platform negotiates with the malicious code agent platform to generate an SM2 key, and referring to FIG. 2, S4 is entered; if not, not operating;
s4, judging whether negotiation is successful, if so, establishing an SSL protocol security channel between the malicious code platform and the malicious code proxy platform, encrypting by using an SM2 algorithm, and if not, not operating.
According to the invention, the malicious code proxy platform is arranged to realize information intercommunication between the master station and a plurality of substations, meanwhile, the SSL protocol is used to establish a secure communication link between the malicious code platform and a plurality of malicious code proxy platforms, so that the security of data transmission is ensured, and in addition, the malicious code proxy platform and the malicious code terminals realize network intercommunication through the switch, so that the information leakage of the malicious code terminals is avoided. The malicious code information of the transformer substations is fused through the master station, and after the transformer substations detect the found malicious codes, the upgrade package aiming at the malicious codes is sent to other transformer substations, so that the upgrade efficiency is high, the real-time performance is realized, and each transformer substation is effectively protected.
The malicious code platform is used for issuing malicious code detection instructions and upgrading instructions, the malicious code detection instructions and the upgrading instructions are transmitted to the malicious code terminal through the malicious code proxy platform, the malicious code terminal executes malicious code detection operation or upgrading operation, an operation result is finally fed back to the malicious code proxy platform, and the malicious code proxy platform transmits the operation result to the malicious code platform. Through the system provided by the invention, the master station can uniformly issue malicious code detection instructions to all substations, the detection efficiency is high, and once a certain malicious code is found, an upgrade package aiming at the malicious code can be directly sent to all substations by the master station, so that all substations are uniformly upgraded, the upgrade efficiency is high, and the real-time performance is strong.
The malicious code platform issues a malicious code detection instruction as follows:
SA, malicious code platform encrypts detection task information by SM2 asymmetric algorithm, refer to figure 3;
SB, the malicious code platform sends the encrypted data to the malicious code agent platform;
SC, after receiving the data, the malicious code agent platform decrypts the received data, and obtains detection task details by referring to FIG. 4;
the SD, malicious code agent platform sends the operation task to the corresponding malicious code terminal according to the detection task details;
SE, the malicious code terminal executes malicious code detection according to the operation task and returns the detection result to the malicious code agent platform;
and the SF, the malicious code agent platform collates the collected detection results and encrypts the detection results by an SM2 asymmetric algorithm, and then reports the detection results to the malicious code platform.
The process of issuing the upgrade instruction by the malicious code platform is as follows:
sa, the malicious code platform issues the upgrade package to the malicious code agent platform;
sb, the malicious code agent platform receives the upgrade package and issues upgrade instructions to all malicious code terminals;
sc, the malicious code terminal receives the upgrade instruction and actively initiates a request for downloading an upgrade package from the malicious code proxy platform;
sd, after the malicious code terminal is upgraded, the running log is reported to the malicious code agent platform at regular time;
se, the malicious code agent platform reports the running log to the malicious code platform.

Claims (3)

1. The cross-network communication system for detecting the malicious codes of the transformer substation is characterized by comprising a master station and a plurality of transformer substations, wherein the master station is provided with a malicious code platform, the transformer substations are provided with malicious code terminals and malicious code proxy platforms, secure communication links are established between the malicious code platform and the plurality of malicious code proxy platforms by using an SSL protocol, data interacted between the malicious code platform and the plurality of malicious code proxy platforms are encrypted by using an encryption algorithm, the malicious code proxy platforms and the malicious code terminals are communicated with each other through a switch, malicious code information of the transformer substations is fused through the master station, and after the malicious codes detected by the transformer substations are detected, an upgrade packet aiming at the malicious codes is sent to other transformer substations; the encryption algorithm is an SM2 asymmetric algorithm; the malicious code platform is used for issuing malicious code detection instructions and upgrading instructions, the malicious code detection instructions and upgrading instructions are transmitted to the malicious code terminal through the malicious code proxy platform, the malicious code terminal executes malicious code detection operation or upgrading operation, an operation result is finally fed back to the malicious code proxy platform, and the malicious code proxy platform transmits the operation result to the malicious code platform; the process of establishing a secure communication link using SSL protocol is as follows:
s1, a malicious code agent platform submits a socket request and sends the socket request to a malicious code platform;
s2, the malicious code platform responds to the socket request and sends the public key of the certificate to the malicious code proxy platform;
s3, the malicious code agent platform verifies whether the public key of the certificate is valid, if yes, the malicious code platform negotiates with the malicious code agent platform to generate an SM2 key, and S4 is entered; if not, not operating;
s4, judging whether negotiation is successful, if so, establishing an SSL protocol security channel between the malicious code platform and the malicious code proxy platform, encrypting by using an SM2 algorithm, and if not, not operating.
2. The cross-network communication system for detecting malicious codes of transformer substations according to claim 1, wherein the malicious code platform issues the malicious code detection instruction as follows:
SA, malicious code platform encrypts detection task information by SM2 asymmetric algorithm;
SB, the malicious code platform sends the encrypted data to the malicious code agent platform;
the SC, after receiving the data, the malicious code agent platform decrypts the received data to obtain detection task details;
the SD, malicious code agent platform sends the operation task to the corresponding malicious code terminal according to the detection task details;
SE, the malicious code terminal executes malicious code detection according to the operation task and returns the detection result to the malicious code agent platform;
and the SF, the malicious code agent platform collates the collected detection results and encrypts the detection results by an SM2 asymmetric algorithm, and then reports the detection results to the malicious code platform.
3. The cross-network communication system for detecting malicious codes of a transformer substation according to claim 1, wherein the process of issuing the upgrade instruction by the malicious code platform is as follows:
sa, the malicious code platform issues the upgrade package to the malicious code agent platform;
sb, the malicious code agent platform receives the upgrade package and issues upgrade instructions to all malicious code terminals;
sc, the malicious code terminal receives the upgrade instruction and actively initiates a request for downloading an upgrade package from the malicious code proxy platform;
sd, after the malicious code terminal is upgraded, the running log is reported to the malicious code agent platform at regular time;
se, the malicious code agent platform reports the running log to the malicious code platform.
CN202111340916.8A 2021-11-12 2021-11-12 Cross-network communication system for detecting malicious codes of transformer substation Active CN115037490B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111340916.8A CN115037490B (en) 2021-11-12 2021-11-12 Cross-network communication system for detecting malicious codes of transformer substation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111340916.8A CN115037490B (en) 2021-11-12 2021-11-12 Cross-network communication system for detecting malicious codes of transformer substation

Publications (2)

Publication Number Publication Date
CN115037490A CN115037490A (en) 2022-09-09
CN115037490B true CN115037490B (en) 2023-12-15

Family

ID=83118157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111340916.8A Active CN115037490B (en) 2021-11-12 2021-11-12 Cross-network communication system for detecting malicious codes of transformer substation

Country Status (1)

Country Link
CN (1) CN115037490B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006214767A (en) * 2005-02-01 2006-08-17 Kansai Electric Power Co Inc:The Measurement apparatus, measurement method, measurement program, and computer-readable storage medium storing measurement program
JP2012234540A (en) * 2011-05-04 2012-11-29 Nhn Business Platform Corp Malicious code detection system and malicious code detection method
CN104038481A (en) * 2014-05-22 2014-09-10 国家电网公司 Communication method of power asset management master station system and RFID (radio frequency identification device) terminal
CN106787163A (en) * 2016-11-10 2017-05-31 国家电网公司 A kind of centralized configuration and long distance control system for substation network communication device
CN107241224A (en) * 2017-06-09 2017-10-10 珠海市鸿瑞软件技术有限公司 The network risks monitoring method and system of a kind of transformer station
CN108964264A (en) * 2018-06-22 2018-12-07 国电南瑞科技股份有限公司 The wireless realization of debugging method of intelligent substation site device
CN208227074U (en) * 2018-02-09 2018-12-11 鼎信信息科技有限责任公司 Electric power monitoring system network security monitors terminal
CN109842624A (en) * 2019-02-01 2019-06-04 南京国电南自软件工程有限公司 A kind of interchanger security agency communication method and system
CN112153031A (en) * 2020-09-15 2020-12-29 深圳供电局有限公司 Network security risk monitoring system and method of power monitoring system
CN112422560A (en) * 2020-11-17 2021-02-26 中国电力科学研究院有限公司 Lightweight substation secure communication method and system based on secure socket layer

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6996841B2 (en) * 2001-04-19 2006-02-07 Microsoft Corporation Negotiating secure connections through a proxy server
US20120203874A1 (en) * 2011-02-08 2012-08-09 General Electric Company Smart substation management

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006214767A (en) * 2005-02-01 2006-08-17 Kansai Electric Power Co Inc:The Measurement apparatus, measurement method, measurement program, and computer-readable storage medium storing measurement program
JP2012234540A (en) * 2011-05-04 2012-11-29 Nhn Business Platform Corp Malicious code detection system and malicious code detection method
CN104038481A (en) * 2014-05-22 2014-09-10 国家电网公司 Communication method of power asset management master station system and RFID (radio frequency identification device) terminal
CN106787163A (en) * 2016-11-10 2017-05-31 国家电网公司 A kind of centralized configuration and long distance control system for substation network communication device
CN107241224A (en) * 2017-06-09 2017-10-10 珠海市鸿瑞软件技术有限公司 The network risks monitoring method and system of a kind of transformer station
CN208227074U (en) * 2018-02-09 2018-12-11 鼎信信息科技有限责任公司 Electric power monitoring system network security monitors terminal
CN108964264A (en) * 2018-06-22 2018-12-07 国电南瑞科技股份有限公司 The wireless realization of debugging method of intelligent substation site device
CN109842624A (en) * 2019-02-01 2019-06-04 南京国电南自软件工程有限公司 A kind of interchanger security agency communication method and system
CN112153031A (en) * 2020-09-15 2020-12-29 深圳供电局有限公司 Network security risk monitoring system and method of power monitoring system
CN112422560A (en) * 2020-11-17 2021-02-26 中国电力科学研究院有限公司 Lightweight substation secure communication method and system based on secure socket layer

Also Published As

Publication number Publication date
CN115037490A (en) 2022-09-09

Similar Documents

Publication Publication Date Title
CN104158653B (en) A kind of safety communicating method based on the close algorithm of business
CN106789015B (en) Intelligent power distribution network communication safety system
CN112104604B (en) System and method for realizing secure access service based on electric power Internet of things management platform
CN102685119A (en) Data transmitting/receiving method, data transmitting/receiving device, transmission method, transmission system and server
CN102111273B (en) Pre-sharing-based secure data transmission method for electric load management system
CN104811427B (en) A kind of safe industrial control system communication means
CN108900540B (en) Service data processing method of power distribution terminal based on double encryption
CN112118106B (en) Lightweight end-to-end secure communication authentication method based on identification password
CN104219217A (en) SA (security association) negotiation method, device and system
CN111711625A (en) Power system information security encryption system based on power distribution terminal
CN103441983A (en) Information protection method and device based on link layer discovery protocol
CN111756627A (en) Cloud platform security access gateway of electric power monitored control system
Premnath et al. Application of NTRU cryptographic algorithm for SCADA security
KR101448866B1 (en) Security apparatus for decrypting data encrypted according to the web security protocol and operating method thereof
CN100376092C (en) Firewall and invasion detecting system linkage method
CN112202773B (en) Computer network information security monitoring and protection system based on internet
CN115037490B (en) Cross-network communication system for detecting malicious codes of transformer substation
CN105187453A (en) Security encryption communication method of fault indicator
CN112995140B (en) Safety management system and method
CN111935112B (en) Cross-network data security ferrying device and method based on serial
CN103888438A (en) Train data communication system using information safety technology
CN113472539A (en) Method for carrying out national encryption by using RDMA R _ Key
KR20220036141A (en) Security device and method for power control system
Mohamed et al. Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis
CN111212018A (en) Multi-link transmission method and system based on link selection and fragmentation recombination

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant