CN108665400A - A kind of planning of urban and rural management case system - Google Patents
A kind of planning of urban and rural management case system Download PDFInfo
- Publication number
- CN108665400A CN108665400A CN201810404703.9A CN201810404703A CN108665400A CN 108665400 A CN108665400 A CN 108665400A CN 201810404703 A CN201810404703 A CN 201810404703A CN 108665400 A CN108665400 A CN 108665400A
- Authority
- CN
- China
- Prior art keywords
- urban
- information
- module
- network
- rural
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Abstract
The invention belongs to planning management technical fields, disclose a kind of planning of urban and rural management case system.The system is provided with that urban and rural areas geographic classification module, case class Modules, information retrieval, information are consulted in region.The urban and rural areas geographic classification module is located at first layer order.Case class Modules are located to walk under the geographic classification module of urban and rural areas and carry out in the region, can be divided into several cases.Described information retrieval module is located in region to be walked under case class Modules.Described information access module, which is located under information searching module, to be walked.The invention will manage case storage orderly by case class Modules in urban and rural areas geographic classification module, region in the urban and rural areas of region.Related objective case can be quickly consulted by information retrieval, information access module.Successively from top to bottom, the retrieval storage CROSS REFERENCE that can clearly understand facilitates access to arrange for the invention.
Description
Technical field
The invention belongs to planning management technical field more particularly to a kind of planning of urban and rural management case systems.
Background technology
Currently, legal construction paces are accelerated, in order to preferably annotate the practice operation of laws and regulations, propose by putting into practice case
Example guides planning of urban and rural management.Numerous urban and rural planning cases is needed to analyze most suitable scheme on this basis.
In conclusion problem of the existing technology is:Existing planning of urban and rural management case system realm divides unobvious
And case is not matched with existing laws and regulations, is unfavorable for consulting.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of planning of urban and rural management case systems.
The invention is realized in this way a kind of planning of urban and rural management case system, the planning of urban and rural management case system
It is provided with that urban and rural areas geographic classification module, case class Modules, information retrieval, information are consulted in region.The urban and rural areas
Geographic classification module is located at first layer order.Case class Modules are located under the geographic classification module of urban and rural areas and walk in the region
It carries out, several cases can be divided into.Described information retrieval module is located in region to be walked under case class Modules.Described information consults mould
Block, which is located under information searching module, to be walked.
Described information retrieval is expanded under noise correlation circumstance in information filter, including:
Non-linear Gaussian system model:
xk+1=fk(xk)+ωK+1, k,
Zk=hk(xk)+υk,
Wherein k is discrete-time series, xk∈Rn×1It is the state vector of system, zk∈Rm×1Be measure vector, f () and
H () is known nonlinear state transfer function with measurement function and in xkLocate continuously differentiable, process noise sequence ωK+1, kWith
Measure noise sequence υkIt is Gaussian sequence, wherein mean value is E (ωK+1, k)=qk, E (υk)=rk, variance QK+1, kAnd Rk
Meet following condition:
Wherein ωK+1, kFor process noise, υkTo measure noise, QK+1, kFor process-noise variance, RkFor measuring noise square difference,δkjIt is Kronecker functions;
Original state x0With ωK+1, k、υkIt is unrelated, and meet:
For non-linear Gaussian system model, if process noise sequence ωK+1, kWith measurement noise sequence υkIt is that mean value is
It is as follows to obtain the relevant extending Kalman filtering of noise for zero Gaussian sequence:
Wherein:
Obtain noise related expanding information update matrixWith information update vectorIt is as follows:
WhereinIt is contributed for information matrix,It is contributed for information vector;Wherein,
Newly to cease vector,
Described information inspection channel carry out penetration testing concrete methods of realizing be:
Network test is connected, penetration testing engineer uses Wired access mode, by industrial switch by testing tool
Access industrial Control System NetWork uses wireless access way, by searching wireless network signal, access industrial control system
System network;
Wireless network strength is tested, penetration testing engineer by the wireless crack tools of BT, to WEP, WPA, WPA2, AES,
DES is cracked, and obtains encryption key, and then with legal identity access industrial Control System NetWork;
The test of network equipment loophole is collected, penetration testing engineer is by checking the network equipment, such as consolidating for industrial switch
Part checks whether as latest edition, and is searched by the safety-related professional forum of www.scadahacker.com industry controls newest
Vulnerability information;
Network equipment detection is controlled, penetration testing engineer attempts to log in by using the mode of weak passwurd and Brute Force
Administrator's account is modified the configuration information of the network equipment by obtaining administrator right;Such as change port information, net
Section isolation information, device address reach and interrupt session, main website is pretended to be to test;
Message test is monitored, penetration testing engineering uses SNIFFER ingress-only packet sniffing softwares capture data link layer, network
Layer, transport layer, application layer net obtain terminal transmission data, check packet content using specialized protocol analyzer and send address
With destination address;
Message test is changed, the data packet that penetration testing project analysis obtains changes transmission address, the destination of data packet
Location, data content, then again send out data packet,
Refuse service testing, for penetration testing engineer by sending a large amount of broadcasting packet, the data for filling slave station are slow
Area is rushed, makes slave station that can not normally receive the data of main website transmission, or restart the network equipment, network session is interrupted, causes net
Network refusal service.
Further, the urban and rural areas geographic classification module is located at first layer order.
Further, case class Modules are located at step progress under the geographic classification module of urban and rural areas in the region, can be divided into
Several cases.
Further, described information retrieval module is located in region walks under case class Modules.
Further, described information access module, which is located under information searching module, walks.
Advantages of the present invention and good effect are:Successively from top to bottom, the retrieval storage that can clearly understand is related for the invention
Case facilitates access to arrange.The security risk analysis work that the present invention can be used for before planning of urban and rural management, to there are security risks
Completion problem is rectified and improved and repetition measurement work provides guidance, with strong points, test scope is wide, can be very big compared to traditional penetration test mode
Shorten the testing time, reduces after equipment is reached the standard grade because safety problem failure carries out the generation of offline maintenance event, not only meet city
Township's planning management Information Security Risk penetration testing, while being National Industrial also in radiation-curable industry with the outer industrial control system of industry
Control system security assurance information provides important support.
Description of the drawings
Fig. 1 is the structural schematic diagram of planning of urban and rural management case system provided in an embodiment of the present invention;
In figure:1, urban and rural areas geographic classification module;2, case class Modules in region;3, information searching module;4, believe
Breath consults module.
Specific implementation mode
In order to further understand the content, features and effects of the present invention, the following examples are hereby given, and coordinate attached drawing
Detailed description are as follows.
The structure of the present invention is explained in detail below in conjunction with the accompanying drawings.
As shown in Figure 1, planning of urban and rural management case system provided in an embodiment of the present invention is distinguished with being provided with urban and rural areas
Case class Modules 2, information searching module 3, information consult module 4 in generic module 1, region.The urban and rural areas geographic classification
Module 1 is located at first layer order.Case class Modules 2 are located at 1 time step of urban and rural areas geographic classification module and carry out in the region,
Several cases can be divided into.Described information retrieval module 3 is located at 2 times steps of case class Modules in region.Described information consults module 4
Positioned at 3 times steps of information searching module.
Urban and rural areas geographic classification module position 1 is in first layer order.Case class Modules position 2 is in town and country area in the region
Geographic classification module 1 time step in domain carries out, and can be divided into several cases.Described information retrieval module 3 is located at case classification mould in region
2 times steps of block.Described information consults module 4 and is located at 3 times steps of information searching module.
Described information retrieval is expanded under noise correlation circumstance in information filter, including:
Non-linear Gaussian system model:
xk+1=fk(xk)+ωK+1, k,
Zk=hk(xk)+υk
Wherein k is discrete-time series, xk∈Rn×1It is the state vector of system, zk∈Rm×1Be measure vector, f () and
H () is known nonlinear state transfer function with measurement function and in xkLocate continuously differentiable, process noise sequence ωK+1, kWith
Measure noise sequence υkIt is Gaussian sequence, wherein mean value is E (ωK+1, k)=qk, E (υk)=rk, variance QK+1, kAnd Rk
Meet following condition:
Wherein ωK+1, kFor process noise, υkTo measure noise, QK+1, kFor process-noise variance, RkFor measuring noise square difference,δkjIt is Kronecker functions;
Original state x0With ωK+1, k、υkIt is unrelated, and meet:
For non-linear Gaussian system model, if process noise sequence ωK+1, kWith measurement noise sequence υkIt is that mean value is
It is as follows to obtain the relevant extending Kalman filtering of noise for zero Gaussian sequence:
Wherein:
Obtain noise related expanding information update matrixWith information update vectorIt is as follows:
WhereinIt is contributed for information matrix,It is contributed for information vector;Wherein,
Newly to cease vector,
Described information inspection channel carry out penetration testing concrete methods of realizing be:
Network test is connected, penetration testing engineer uses Wired access mode, by industrial switch by testing tool
Access industrial Control System NetWork uses wireless access way, by searching wireless network signal, access industrial control system
System network;
Wireless network strength is tested, penetration testing engineer by the wireless crack tools of BT, to WEP, WPA, WPA2, AES,
DES is cracked, and obtains encryption key, and then with legal identity access industrial Control System NetWork;
The test of network equipment loophole is collected, penetration testing engineer is by checking the network equipment, such as consolidating for industrial switch
Part checks whether as latest edition, and is searched by the safety-related professional forum of www.scadahacker.com industry controls newest
Vulnerability information;
Network equipment detection is controlled, penetration testing engineer attempts to log in by using the mode of weak passwurd and Brute Force
Administrator's account is modified the configuration information of the network equipment by obtaining administrator right;Such as change port information, net
Section isolation information, device address reach and interrupt session, main website is pretended to be to test;
Message test is monitored, penetration testing engineering uses SNIFFER ingress-only packet sniffing softwares capture data link layer, network
Layer, transport layer, application layer net obtain terminal transmission data, check packet content using specialized protocol analyzer and send address
With destination address;
Message test is changed, the data packet that penetration testing project analysis obtains changes transmission address, the destination of data packet
Location, data content, then again send out data packet,
Refuse service testing, for penetration testing engineer by sending a large amount of broadcasting packet, the data for filling slave station are slow
Area is rushed, makes slave station that can not normally receive the data of main website transmission, or restart the network equipment, network session is interrupted, causes net
Network refusal service.
The present invention will be in the urban and rural areas of region by case class Modules in urban and rural areas geographic classification module, region
It is orderly to manage case storage.Related objective case can be quickly consulted by information retrieval, information access module.The invention successively from
On down, the retrieval that can clearly understand storage CROSS REFERENCE facilitates access to arrange.
The above is only the preferred embodiments of the present invention, and is not intended to limit the present invention in any form,
Every any simple modification made to the above embodiment according to the technical essence of the invention, equivalent variations and modification, belong to
In the range of technical solution of the present invention.
Claims (5)
1. a kind of planning of urban and rural management case system, which is characterized in that the planning of urban and rural management case system is provided with town and country
Case class Modules, information searching module, information consult module in regions and areas's sort module, region;The urban and rural areas
It distinguishes generic module and is located at first layer order;Case class Modules are located at stepping under the geographic classification module of urban and rural areas in the region
Row, can be divided into several cases;Described information retrieval module is located in region to be walked under case class Modules;Described information consults module
It is walked under information searching module;
Described information retrieval is expanded under noise correlation circumstance in information filter, including:
Non-linear Gaussian system model:
xk+1=fk(xk)+ωK+1, k,
zk=hk(xk)+υk,
Wherein k is discrete-time series, xk∈Rn×1It is the state vector of system, zk∈Rm×1It is to measure vector, f () and h
() is known nonlinear state transfer function with measurement function and in xkLocate continuously differentiable, process noise sequence ωK+1, kWith
Measure noise sequence υkIt is Gaussian sequence, wherein mean value is E (ωK+1, k)=qk, E (υk)=rk, variance QK+1, kAnd Rk
Meet following condition:
Wherein ωK+1, kFor process noise, υkTo measure noise, QK+1, kFor process-noise variance, RkFor measuring noise square difference,δkjIt is Kronecker functions;
Original state x0With ωK+1, k、υkIt is unrelated, and meet:
For non-linear Gaussian system model, if process noise sequence ωK+1, kWith measurement noise sequence υkBe mean value it is zero
It is as follows to obtain the relevant extending Kalman filtering of noise for Gaussian sequence:
Wherein:
Obtain noise related expanding information update matrixWith information update vectorIt is as follows:
WhereinIt is contributed for information matrix,It is contributed for information vector;Wherein,
Newly to cease vector,
Described information inspection channel carry out penetration testing concrete methods of realizing be:
Network test is connected, and penetration testing engineer uses Wired access mode, testing tool accessed by industrial switch
Industrial control system network uses wireless access way, by searching wireless network signal, access industrial control system net
Network;
Wireless network strength is tested, and penetration testing engineer is by the wireless crack tools of BT, to WEP, WPA, WPA2, AES, DES
It is cracked, obtains encryption key, and then with legal identity access industrial Control System NetWork;
The test of network equipment loophole is collected, penetration testing engineer, such as the firmware of industrial switch, looks by checking the network equipment
See whether be latest edition, and newest leakage is searched by the safety-related professional forum of www.scadahacker.com industry controls
Hole information;
Network equipment detection is controlled, penetration testing engineer attempts to log in management by using the mode of weak passwurd and Brute Force
Member's account is modified the configuration information of the network equipment by obtaining administrator right;Such as change port information, the network segment every
From information, device address, reaches and interrupt session, main website is pretended to be to test;
Monitor message test, penetration testing engineering using SNIFFER ingress-only packet sniffing softwares capture data link layer, network layer,
Transport layer, application layer net obtain terminal transmission data, using specialized protocol analyzer check packet content and send address and
Destination address;
Change message test, the data packet that penetration testing project analysis obtains, change the transmission address of data packet, destination address,
Then data content again sends out data packet,
Refusing service testing, penetration testing engineer fills the data buffer zone of slave station by a large amount of broadcasting packet of transmission,
Make slave station that can not normally receive the data of main website transmission, or restart the network equipment, interrupts network session, network is caused to be refused
Service.
2. planning of urban and rural management case system as described in claim 1, which is characterized in that the urban and rural areas geographic classification module
Positioned at first layer order.
3. planning of urban and rural management case system as described in claim 1, which is characterized in that in the region case class Modules position
It walks and carries out under the geographic classification module of urban and rural areas, several cases can be divided into.
4. planning of urban and rural management case system as described in claim 1, which is characterized in that described information retrieval module is located at region
It is walked under interior case class Modules.
5. planning of urban and rural management case system as described in claim 1, which is characterized in that described information consults module and is located at information
It is walked under retrieval module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810404703.9A CN108665400A (en) | 2018-04-28 | 2018-04-28 | A kind of planning of urban and rural management case system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810404703.9A CN108665400A (en) | 2018-04-28 | 2018-04-28 | A kind of planning of urban and rural management case system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108665400A true CN108665400A (en) | 2018-10-16 |
Family
ID=63781571
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810404703.9A Pending CN108665400A (en) | 2018-04-28 | 2018-04-28 | A kind of planning of urban and rural management case system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108665400A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103312297A (en) * | 2013-06-13 | 2013-09-18 | 北京航空航天大学 | Iterated extended increment Kalman filtering method |
CN104468267A (en) * | 2014-11-24 | 2015-03-25 | 国家电网公司 | Information safety penetration testing method for distribution automation system |
CN105737828A (en) * | 2016-05-09 | 2016-07-06 | 郑州航空工业管理学院 | Combined navigation method of joint entropy extended Kalman filter based on strong tracking |
CN107886058A (en) * | 2017-10-31 | 2018-04-06 | 衢州学院 | Noise related two benches volume Kalman filter method of estimation and system |
-
2018
- 2018-04-28 CN CN201810404703.9A patent/CN108665400A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103312297A (en) * | 2013-06-13 | 2013-09-18 | 北京航空航天大学 | Iterated extended increment Kalman filtering method |
CN104468267A (en) * | 2014-11-24 | 2015-03-25 | 国家电网公司 | Information safety penetration testing method for distribution automation system |
CN105737828A (en) * | 2016-05-09 | 2016-07-06 | 郑州航空工业管理学院 | Combined navigation method of joint entropy extended Kalman filter based on strong tracking |
CN107886058A (en) * | 2017-10-31 | 2018-04-06 | 衢州学院 | Noise related two benches volume Kalman filter method of estimation and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104468267B (en) | A kind of electrical power distribution automatization system information security penetration testing method | |
CN109660502A (en) | Detection method, device, equipment and the storage medium of abnormal behaviour | |
CN102523218B (en) | Network safety protection method, equipment and system thereof | |
CN100448239C (en) | Method for testing safety switch-in protocol conformity to identify service entity and system thereof | |
CN102594783B (en) | Network security emergency responding method | |
US9455999B2 (en) | Method and system for protective distribution system (PDS) and infrastructure protection and management | |
CN104540135B (en) | A kind of wireless network safety access method, device and terminal | |
CN103903187A (en) | Fast detection method for potential safety hazards of power distribution automation system information | |
CN105262722A (en) | Terminal malicious traffic rule updating method, cloud server and security gateway | |
CN108011873B (en) | Illegal connection judgment method based on set coverage | |
JP2019021095A (en) | Attack monitoring system and attack monitoring method | |
CN105825129A (en) | Converged communication malicious software identification method and system | |
CN108234525A (en) | A kind of information leakage preventing theft protection management system in computer network security | |
CN113315767A (en) | Electric power Internet of things equipment safety detection system and method | |
CN106453256A (en) | Password feature library system with automatic learning function and learning method thereof | |
CN107124715B (en) | Safety protection performance evaluation method suitable for electric power wireless private network terminal | |
CN103458453B (en) | Network analysis method, apparatus and system | |
CN108665400A (en) | A kind of planning of urban and rural management case system | |
WO2013055037A1 (en) | System and method for controlling location information-based authentication | |
JP5007043B2 (en) | Cable position information management system, apparatus, method and program | |
CN105142150A (en) | Wireless device loophole scanning method and system based on BS mode | |
CN102905220B (en) | Test file acquisition methods, device, test terminal and server | |
KR101137694B1 (en) | Total security management system for ddos detection-analysis and ddos detection-display method using total security management system | |
CN104410971A (en) | Security operation method of wireless local area network | |
CN112150306B (en) | Power data network security test method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181016 |
|
RJ01 | Rejection of invention patent application after publication |