CN104135475A - Safety protection method of electric power information for mobile Internet - Google Patents

Safety protection method of electric power information for mobile Internet Download PDF

Info

Publication number
CN104135475A
CN104135475A CN201410344556.2A CN201410344556A CN104135475A CN 104135475 A CN104135475 A CN 104135475A CN 201410344556 A CN201410344556 A CN 201410344556A CN 104135475 A CN104135475 A CN 104135475A
Authority
CN
China
Prior art keywords
data
safety
user
security
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410344556.2A
Other languages
Chinese (zh)
Other versions
CN104135475B (en
Inventor
潘留兴
李夫宝
刘刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Jiangsu Electric Power Information Technology Co Ltd
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Jiangsu Electric Power Information Technology Co Ltd
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Jiangsu Electric Power Information Technology Co Ltd, Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201410344556.2A priority Critical patent/CN104135475B/en
Publication of CN104135475A publication Critical patent/CN104135475A/en
Application granted granted Critical
Publication of CN104135475B publication Critical patent/CN104135475B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a safety protection method of electric power information for mobile Internet. The safety protection method is characterized in that safety protection is enhanced from two aspects: service resource safety protection and active defense, through utilizing safety protection mechanisms, such as a safety sandbox, an isolation region, a one-way access channel and a content filtering, data safety interaction of the mobile Internet is implemented, and the network security level is improved and perfected. According to the safety protection method, personal privacy of an electricity customer under the environment of the mobile Internet is effectively protected, the active defense is implemented based on a user behavior model, the integral level of mobile marketing service is improved, and a safe and reliable ecological environment for electricity service is built.

Description

A kind of security information for power system means of defence towards mobile Internet
 
Technical field
The invention belongs to electrical network in mobile internet environment safety protection field, specifically a kind of security information for power system means of defence towards mobile Internet.
Background technology
Along with the development of mobile Internet and popularizing of mobile application, the demand that user obtains power information by mobile network increases severely day by day, more and more higher for the requirement of mobile Internet network safety.At present the structure of grid company a set of basic network framework, build information Intranet and information outer net by the safety protection facility such as fire compartment wall, spacer assembly, information Intranet store data storehouse, information outer net has been built the bridge of Intranet and internet data exchange.Information outer net is divided into DMZ district and place of safety, disposes respectively fire compartment wall in information Intranet and information outer net, DMZ district and place of safety, in place of safety application deployment, and DMZ district configuration front-end server.Although current network design is safer; existing network configuration has met basic security protection requirement; but lack the security protection system of application layer; as lack application programs safety verification; the protection of information outer net Service Source; easily cause Service Source information leakage, cause occurring the network security accidents such as Denial of Service attack.
Summary of the invention
The object of this invention is to provide a kind of security information for power system means of defence towards mobile Internet, the method is by utilizing the Security mechanisms such as security sandbox, isolated area, unidirectional access path, information filtering, realize mobile Internet data secure interactive, promote and improve network security level.
Object of the present invention is achieved through the following technical solutions:
Towards a security information for power system means of defence for mobile Internet, it is characterized in that: the method strengthens security protection from Service Source security protection and two aspects of Initiative Defense, and concrete grammar is as follows:
1) Service Source safety protecting method:
(1-1) application program runs on security sandbox, deposit data isolated area
Based on Sandbox design concept, set up security sandbox, realize application program operation container, this security sandbox encapsulates all system interfaces, avoids applying the safety problem of directly calling and cause; Set up Virtual File System, all application separate, stored, use independently data space, restriction application access path, and application only can be accessed the path of own place file, and application and data are storage encryption respectively, prevents from maliciously distorting;
(1-2) based on Handshake Protocol, transferring content is encrypted, build Security Data Transmission passage
Between client and server, adopt symmetry and asymmetric two kinds of Hybrid Encryption modes to realize mutual safety; The use asymmetric-key encryption that connects, after connecting, adopts symmetric key encryption; The PKI of client storage unsymmetrical key, server is preserved asymmetric privacy keys;
(1-3) resolve http request content, filter non-security request, protection Service Source
By the mode of defined instruction collection, system is only processed request and the addressable Service Source of this application in this instruction set; Utilize regular expression to filter spcial character, prevent cross site scripting network attack;
(1-4) utilize unidirectional access path, effectively ensure Service Source
Unidirectional access path can dwindle network attack scope, the Service Source of effective guarantee place of safety.Place of safety is by initiatively connecting DMZ district, DMZ district is connected and monitors with outer net place of safety, DangDMZ district listens to after user's request, request is carried out to http protocol analysis, control between socket DMZ district and place of safety and connect, resolve request msg place of safety, connects intranet data, and carry out transfer of data;
2) active defense method:
(2-1) extract User action log, set up user behavior data storehouse and user's abnormal behaviour model
Apply the key point such as frequency of utilization, user's mobile device replacement frequency and device location information change of download, user application for user and carry out log recording, and filter web crawlers visit data in journal file, extract user behavior valid data, set up user behavior data storehouse.By using the data mining algorithms such as decision Tree algorithms, neural network algorithm, the data in user behavior data storehouse are carried out to degree of depth excavation, identification abnormal behaviour, extracts abnormal access rule, sets up abnormal access and finds model;
(2-2) real-time analysis user behavior, realizes Initiative Defense
Utilize multi-level buffer, user's real time data is carried out to record, and by abnormal behaviour model, user behavior is monitored, the attack that notes abnormalities early, and reponse system administrative staff and user.
The present invention, by utilizing the Security mechanisms such as security sandbox, isolated area, unidirectional access path, information filtering, realizes mobile Internet data secure interactive, promotes and improve network security level.The present invention can effectively protect the individual privacy of electricity consumption client under mobile internet environment, and based on user behavior model, realizes Initiative Defense, promotes marketing Information Mobile Service integral level, builds the electricity consumption service biological environment of " safe and reliable ".
Brief description of the drawings
Fig. 1 is Service Source security protection figure.
Embodiment
Taking the Service Source request process operating procedure concrete as example illustrates:
Towards a security information for power system means of defence for mobile Internet, concrete grammar is as follows:
1) apply by security sandbox to server request resource
Application program runs on security sandbox, deposit data isolated area; Based on Sandbox design concept, set up security sandbox, realize application program operation container, this security sandbox encapsulates all system interfaces, avoids applying the safety problem of directly calling and cause; Set up Virtual File System, all application separate, stored, use independently data space, restriction application access path, and application only can be accessed the path of own place file, and application and data are storage encryption respectively, prevents from maliciously distorting;
2) security sandbox connects by Security Data Transmission passage and service end resource, and transmits data.
Based on Handshake Protocol, transferring content is encrypted, build Security Data Transmission passage; Between client and server, adopt symmetry and asymmetric two kinds of Hybrid Encryption modes to realize mutual safety; The use asymmetric-key encryption that connects, after connecting, adopts symmetric key encryption; The PKI of client storage unsymmetrical key, server is preserved asymmetric privacy keys;
3) DMZ district service end is carried out application authorization and information filtering, and passes to place of safety application service by unidirectional access path.
Resolve http request content, filter non-security request, protection Service Source; By the mode of defined instruction collection, system is only processed request and the addressable Service Source of this application in this instruction set; Utilize regular expression to filter spcial character, prevent cross site scripting network attack;
Utilize unidirectional access path, effectively ensure Service Source; Unidirectional access path can dwindle network attack scope, the Service Source of effective guarantee place of safety.Place of safety is by initiatively connecting DMZ district, DMZ district is connected and monitors with outer net place of safety, DangDMZ district listens to after user's request, request is carried out to http protocol analysis, control between socket DMZ district and place of safety and connect, resolve request msg place of safety, connects intranet data, and carry out transfer of data;
4), according to the service request of current accessed and this user's historical operation record, based on abnormal behaviour model and confidence level space, determine whether abnormal operation.
Extract User action log, set up user behavior data storehouse and user's abnormal behaviour model; Apply the key point such as frequency of utilization, user's mobile device replacement frequency and device location information change of download, user application for user and carry out log recording, and filter web crawlers visit data in journal file, extract user behavior valid data, set up user behavior data storehouse.By using the data mining algorithms such as decision Tree algorithms, neural network algorithm, the data in user behavior data storehouse are carried out to degree of depth excavation, identification abnormal behaviour, extracts abnormal access rule, sets up abnormal access and finds model;
5) if this request is normal running, obtain intranet data by spacer assembly, and be back to mobile client application according to the former road of above process.
If this request is abnormal operation, carries out early warning, and inform user.

Claims (2)

1. towards a security information for power system means of defence for mobile Internet, it is characterized in that: the method strengthens security protection from Service Source security protection and two aspects of Initiative Defense, and concrete grammar is as follows:
1) Service Source safety protecting method:
(1-1) application program runs on security sandbox, deposit data isolated area
Based on Sandbox design concept, set up security sandbox, realize application program operation container, this security sandbox encapsulates all system interfaces, avoids applying the safety problem of directly calling and cause; Set up Virtual File System, all application separate, stored, use independently data space, restriction application access path, and application only can be accessed the path of own place file, and application and data are storage encryption respectively, prevents from maliciously distorting;
(1-2) based on Handshake Protocol, transferring content is encrypted, build Security Data Transmission passage
Between client and server, adopt symmetry and asymmetric two kinds of Hybrid Encryption modes to realize mutual safety; The use asymmetric-key encryption that connects, after connecting, adopts symmetric key encryption; The PKI of client storage unsymmetrical key, server is preserved asymmetric privacy keys;
(1-3) resolve http request content, filter non-security request, protection Service Source
By the mode of defined instruction collection, system is only processed request and the addressable Service Source of this application in this instruction set; Utilize regular expression to filter spcial character, prevent cross site scripting network attack;
(1-4) utilize unidirectional access path, effectively ensure Service Source
Unidirectional access path can dwindle network attack scope, the Service Source of effective guarantee place of safety;
Place of safety is by initiatively connecting DMZ district, DMZ district is connected and monitors with outer net place of safety, DangDMZ district listens to after user's request, request is carried out to http protocol analysis, control between socket DMZ district and place of safety and connect, resolve request msg place of safety, connects intranet data, and carry out transfer of data;
2) active defense method:
(2-1) extract User action log, set up user behavior data storehouse and user's abnormal behaviour model
Apply frequency of utilization, user's mobile device replacement frequency and the device location information change of download, user's application for user and carry out log recording, and filter web crawlers visit data in journal file, extract user behavior valid data, set up user behavior data storehouse; By usage data mining algorithm, the data in user behavior data storehouse are carried out to degree of depth excavation, identification abnormal behaviour, extracts abnormal access rule, sets up abnormal access and finds model;
(2-2) real-time analysis user behavior, realizes Initiative Defense
Utilize multi-level buffer, user's real time data is carried out to record, and by abnormal behaviour model, user behavior is monitored, the attack that notes abnormalities early, and reponse system administrative staff and user.
2. the security information for power system means of defence towards mobile Internet according to claim 1, is characterized in that: in step (2-1), data mining algorithm comprises decision Tree algorithms, neural network algorithm.
CN201410344556.2A 2014-07-18 2014-07-18 Safety protection method of electric power information for mobile Internet Active CN104135475B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410344556.2A CN104135475B (en) 2014-07-18 2014-07-18 Safety protection method of electric power information for mobile Internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410344556.2A CN104135475B (en) 2014-07-18 2014-07-18 Safety protection method of electric power information for mobile Internet

Publications (2)

Publication Number Publication Date
CN104135475A true CN104135475A (en) 2014-11-05
CN104135475B CN104135475B (en) 2017-05-24

Family

ID=51807997

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410344556.2A Active CN104135475B (en) 2014-07-18 2014-07-18 Safety protection method of electric power information for mobile Internet

Country Status (1)

Country Link
CN (1) CN104135475B (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104484444A (en) * 2014-12-24 2015-04-01 北京奇虎科技有限公司 Indexing method and indexing device of off-limit files
WO2016106510A1 (en) * 2014-12-29 2016-07-07 华为技术有限公司 Security protection method and device
CN105991568A (en) * 2015-02-09 2016-10-05 苏州精易会信息技术有限公司 Proxy realizing device
CN107147637A (en) * 2017-05-05 2017-09-08 腾讯科技(深圳)有限公司 A kind of tasks carrying request processing method, device and computer-readable storage medium
CN107196968A (en) * 2017-07-12 2017-09-22 深圳市活力天汇科技股份有限公司 A kind of reptile recognition methods
CN107239573A (en) * 2017-06-28 2017-10-10 环球智达科技(北京)有限公司 Data filtering method
CN108021806A (en) * 2017-11-24 2018-05-11 北京奇虎科技有限公司 A kind of recognition methods of malice installation kit and device
CN108040110A (en) * 2017-12-11 2018-05-15 国网宁夏电力有限公司信息通信公司 A kind of mobile data safety means of defence based on security sandbox
CN108449351A (en) * 2018-03-27 2018-08-24 许昌学院 A kind of information security Initiative Defense and monitoring system
CN108737332A (en) * 2017-04-17 2018-11-02 南京邮电大学 A kind of man-in-the-middle attack prediction technique based on machine learning
CN109033851A (en) * 2018-07-02 2018-12-18 北京科东电力控制系统有限责任公司 The mobile application protecting information safety method and apparatus of electric power transaction platform
CN109917761A (en) * 2019-03-13 2019-06-21 浙江浙能长兴天然气热电有限公司 A kind of method and system improving DCS of Power Plant security protection
CN110311901A (en) * 2019-06-21 2019-10-08 南京尓嘉网络科技有限公司 A kind of lightweight network sandbox setting method based on container technique
CN111509850A (en) * 2020-04-23 2020-08-07 广东电网有限责任公司东莞供电局 Power grid dispatching information interaction method, platform and system
CN113407990A (en) * 2021-05-26 2021-09-17 杭州安恒信息技术股份有限公司 Data circulation processing method, device, system, electronic device and storage medium
CN114363092A (en) * 2022-03-17 2022-04-15 万商云集(成都)科技股份有限公司 Gateway and method for cloud container engine micro-service deployment
CN114661114A (en) * 2022-05-24 2022-06-24 四川华东电气集团有限公司 Real-time monitoring device for electric power operation and maintenance service based on cloud service platform
CN116722970A (en) * 2023-08-09 2023-09-08 中国科学院长春光学精密机械与物理研究所 Anti-attack gateway security system based on hardware implementation
CN117857158A (en) * 2023-12-25 2024-04-09 慧之安信息技术股份有限公司 Data isolation method and system based on container technology

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107644165A (en) * 2017-08-29 2018-01-30 国家电网公司 Security protection platform and safety protecting method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127454A (en) * 2006-08-18 2008-02-20 北京国智恒电力管理科技有限公司 Power monitoring information security access device
CN101355427A (en) * 2008-07-22 2009-01-28 中国移动通信集团江苏有限公司 Internally-control safety method for information gateway-service support system
CN101854269A (en) * 2010-04-06 2010-10-06 珠海市鸿瑞信息技术有限公司 Information safety operation and maintenance supervising platform of electric power secondary system
US20110085816A1 (en) * 2009-10-12 2011-04-14 Samsung Electronics Co., Ltd. Electric power relaying unit and image forming apparatus having the same
CN102333022A (en) * 2011-05-31 2012-01-25 广东省电力调度中心 Method for interacting cross-safety protection region information in power communication network and protection system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127454A (en) * 2006-08-18 2008-02-20 北京国智恒电力管理科技有限公司 Power monitoring information security access device
CN101355427A (en) * 2008-07-22 2009-01-28 中国移动通信集团江苏有限公司 Internally-control safety method for information gateway-service support system
US20110085816A1 (en) * 2009-10-12 2011-04-14 Samsung Electronics Co., Ltd. Electric power relaying unit and image forming apparatus having the same
CN101854269A (en) * 2010-04-06 2010-10-06 珠海市鸿瑞信息技术有限公司 Information safety operation and maintenance supervising platform of electric power secondary system
CN102333022A (en) * 2011-05-31 2012-01-25 广东省电力调度中心 Method for interacting cross-safety protection region information in power communication network and protection system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵江华,杨双吉,贾海锋: "县级供电企业信息网络安全的探讨", 《华北水利水电学院学报》 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104484444A (en) * 2014-12-24 2015-04-01 北京奇虎科技有限公司 Indexing method and indexing device of off-limit files
WO2016106510A1 (en) * 2014-12-29 2016-07-07 华为技术有限公司 Security protection method and device
CN105991568A (en) * 2015-02-09 2016-10-05 苏州精易会信息技术有限公司 Proxy realizing device
CN108737332A (en) * 2017-04-17 2018-11-02 南京邮电大学 A kind of man-in-the-middle attack prediction technique based on machine learning
CN107147637A (en) * 2017-05-05 2017-09-08 腾讯科技(深圳)有限公司 A kind of tasks carrying request processing method, device and computer-readable storage medium
CN107239573A (en) * 2017-06-28 2017-10-10 环球智达科技(北京)有限公司 Data filtering method
CN107196968A (en) * 2017-07-12 2017-09-22 深圳市活力天汇科技股份有限公司 A kind of reptile recognition methods
CN108021806A (en) * 2017-11-24 2018-05-11 北京奇虎科技有限公司 A kind of recognition methods of malice installation kit and device
CN108040110A (en) * 2017-12-11 2018-05-15 国网宁夏电力有限公司信息通信公司 A kind of mobile data safety means of defence based on security sandbox
CN108040110B (en) * 2017-12-11 2020-10-27 国网宁夏电力有限公司信息通信公司 Mobile data security protection method based on security sandbox
CN108449351A (en) * 2018-03-27 2018-08-24 许昌学院 A kind of information security Initiative Defense and monitoring system
CN109033851A (en) * 2018-07-02 2018-12-18 北京科东电力控制系统有限责任公司 The mobile application protecting information safety method and apparatus of electric power transaction platform
CN109917761A (en) * 2019-03-13 2019-06-21 浙江浙能长兴天然气热电有限公司 A kind of method and system improving DCS of Power Plant security protection
CN110311901A (en) * 2019-06-21 2019-10-08 南京尓嘉网络科技有限公司 A kind of lightweight network sandbox setting method based on container technique
CN110311901B (en) * 2019-06-21 2022-03-08 北京雅客云安全科技有限公司 Lightweight network sandbox setting method based on container technology
CN111509850A (en) * 2020-04-23 2020-08-07 广东电网有限责任公司东莞供电局 Power grid dispatching information interaction method, platform and system
CN113407990A (en) * 2021-05-26 2021-09-17 杭州安恒信息技术股份有限公司 Data circulation processing method, device, system, electronic device and storage medium
CN114363092A (en) * 2022-03-17 2022-04-15 万商云集(成都)科技股份有限公司 Gateway and method for cloud container engine micro-service deployment
CN114363092B (en) * 2022-03-17 2022-05-17 万商云集(成都)科技股份有限公司 Gateway and method for cloud container engine micro-service deployment
CN114661114A (en) * 2022-05-24 2022-06-24 四川华东电气集团有限公司 Real-time monitoring device for electric power operation and maintenance service based on cloud service platform
CN114661114B (en) * 2022-05-24 2022-08-23 四川华东电气集团有限公司 Real-time monitoring device for electric power operation and maintenance service based on cloud service platform
CN116722970A (en) * 2023-08-09 2023-09-08 中国科学院长春光学精密机械与物理研究所 Anti-attack gateway security system based on hardware implementation
CN116722970B (en) * 2023-08-09 2023-11-14 中国科学院长春光学精密机械与物理研究所 Anti-attack gateway security system based on hardware implementation
CN117857158A (en) * 2023-12-25 2024-04-09 慧之安信息技术股份有限公司 Data isolation method and system based on container technology

Also Published As

Publication number Publication date
CN104135475B (en) 2017-05-24

Similar Documents

Publication Publication Date Title
CN104135475A (en) Safety protection method of electric power information for mobile Internet
Gou et al. Construction and strategies in IoT security system
CN102857486B (en) Application firewall system of future generation and defence method
CN111431862B (en) Network security deep protection method and system for threat-driven power monitoring system
Ghorbani et al. Security challenges in internet of things: survey
CN104184735A (en) Electric marketing mobile application safe protection system
Al-Salman et al. A review Cyber of Industry 4.0 (Cyber-Physical Systems (CPS), the Internet of Things (IoT) and the Internet of Services (IoS)): Components, and Security Challenges.
CN104539598A (en) Tor-improved safety anonymous network communication system and method
Lu et al. A new multilevel framework for cyber-physical system security
Tyagi et al. A review on security and privacy issues in internet of things
CN103942637A (en) Electric-micro-grid power distribution method based on cloud computation
CN106295323A (en) Senior measuring system malware detection method based on cloud security
CN205354036U (en) Data encryption cloud storage system based on multimode biological identification technique
CN102404324A (en) System for sensing safety of node data of Internet of things
Mathias The Smart Grid and Its Security Challenges
Ajiboye et al. Privacy and security of advanced metering infrastructure (AMI) data and network: a comprehensive review
Mani Sekhar et al. Security and privacy in 5G-enabled internet of things: a data analysis perspective
Lu et al. Safety Risk Analysis and Safety Protection Measures of Power Distribution Internet of Things
Chaudhary Privacy and security issues in Internet of Things
CN109450644A (en) Home energy source management system protecting information safety scheme Internet-based
CN110233735A (en) A kind of grid-connected power station industrial control system comprehensive safety protecting method and system
Purohit et al. Cybersecurity Investment Analysis for Electric Vehicle Charging Infrastructures
CN107360141A (en) Big data cloud platform safety protecting method for electric power private data
Sun et al. A security scheme research of the Internet of Things based on the SA/NIA architecture
CN117217848B (en) Energy storage transaction method, device and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant