CN109033825B - Anti-attack power network system based on block chain - Google Patents
Anti-attack power network system based on block chain Download PDFInfo
- Publication number
- CN109033825B CN109033825B CN201810563913.2A CN201810563913A CN109033825B CN 109033825 B CN109033825 B CN 109033825B CN 201810563913 A CN201810563913 A CN 201810563913A CN 109033825 B CN109033825 B CN 109033825B
- Authority
- CN
- China
- Prior art keywords
- data
- module
- power network
- electrically connected
- center
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/556—Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses an anti-attack power network system based on a block chain, which comprises a data receiving module and a power network, wherein the output end of the data receiving module is unidirectionally and electrically connected with the input end of a data dynamic behavior analysis module, and the output end of the data receiving module is unidirectionally and electrically connected with the input end of an alarm module. According to the invention, the data receiving module is arranged to achieve the effect of receiving data, the alarm is used for prompting people to enter data, the dynamic data behavior analysis module is used for analyzing and detecting the running state of the data, the comparison module is used for comparing the data, the filter unit is triggered to achieve the effect of filtering the data, the protection processor is used for protecting the power network, and the interception and defense module is used for achieving the effect of intercepting and defending the invasion of hackers.
Description
Technical Field
The invention relates to the technical field of power networks, in particular to an anti-attack power network system based on a block chain.
Background
The power network is a part of the power system except for generating equipment and power utilization equipment, and comprises three links of power transmission, power transformation and power distribution, wherein power plants and users distributed in a wide region are connected into a whole, concentrated electric energy is transmitted to thousands of households, the structure power network mainly comprises a power line and a substation converter station which are divided according to functions and comprise a power transmission line, a regional power grid, a contact and power distribution network, when a block chain is used, the power network is required to be used for providing energy, and when the existing power network is used, hackers cannot be effectively prevented from attacking, so that an anti-attack power network system based on the block chain is provided.
Disclosure of Invention
The invention aims to provide an anti-attack power network system based on a block chain, which has the advantage of effectively preventing hackers from attacking and solves the problem that the hackers cannot be effectively prevented from attacking.
In order to achieve the purpose, the invention provides the following technical scheme: an anti-attack power network system based on a block chain comprises a data receiving module and a power network, wherein the output end of the data receiving module is unidirectionally and electrically connected with the input end of a data dynamic behavior analysis module, the output end of the data receiving module is unidirectionally and electrically connected with the input end of an alarm module, the output end of the data receiving module is unidirectionally and electrically connected with the input end of a comparison module, the output end of the comparison module is unidirectionally and electrically connected with the input end of a trigger filtering unit, the output end of the trigger filtering unit is unidirectionally and electrically connected with the input end of a camouflage data center, the camouflage data center is bidirectionally and electrically connected with the power network, the camouflage data center is bidirectionally and electrically connected with a camouflage behavior analysis center, the camouflage behavior analysis center is bidirectionally and electrically connected with a camouflage behavior processing center, and the input end of the power network is unidirectionally and electrically connected with the output end of a protection processor, the input end of the power network is electrically connected with the output end of the interception defense module in a one-way mode.
Preferably, the trigger filtering unit comprises a threat detector and a threat evaluator.
Preferably, the guard processor comprises a guard module.
Preferably, the disguised data center includes a dummy terminal.
Preferably, the method for preventing the attack of the power network comprises: the method comprises the steps of firstly receiving data through a data receiving module, informing a client of data entry through an alarm, tracking and analyzing data dynamics through a data dynamic behavior analysis module, comparing the data through a comparison module to determine the security of the data, then enabling the data to enter a trigger filter unit, detecting and evaluating the risk of the data through a threat detector and a threat evaluation device to confirm the security of the data, enabling the data to enter a disguised data center, enabling the data to enter an electric power network through the disguised data center to facilitate the use of the electric power network by people, protecting the electric power network through a protection module in a protection processor, and intercepting and defending the intrusion of hackers and defending the electric power network through an intercepting and defending module.
Preferably, the working principle of the disguised data center is as follows: firstly, when data is detected to enter an electric network system through a data receiving module, the electric network is disguised through a false terminal, the disguise state of the false terminal is analyzed and processed through a disguise behavior analysis center and a disguise behavior processing center, and the poured data is also analyzed and processed.
Compared with the prior art, the invention has the following beneficial effects:
according to the invention, the data receiving module is arranged to achieve the effect of receiving data, the alarm is used to prompt people to enter data, the dynamic data behavior analysis module is used to achieve the effect of analyzing and detecting the running state of the data, the comparison module is used to achieve the effect of comparing the data, the filter unit is triggered to achieve the effect of filtering the data, the protection processor is used to achieve the effect of protecting the power network, the interception and defense module is used to achieve the effect of intercepting and defending the invasion of hackers, the data center is used to disguise the power network, and the power network is used to provide energy for a block chain.
Drawings
FIG. 1 is a schematic diagram of the system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an anti-attack power network system based on a block chain includes a data receiving module and a power network, an output terminal of the data receiving module is unidirectionally and electrically connected with an input terminal of a data dynamic behavior analysis module, an output terminal of the data receiving module is unidirectionally and electrically connected with an input terminal of an alarm module, an output terminal of the data receiving module is unidirectionally and electrically connected with an input terminal of a comparison module, an output terminal of the comparison module is unidirectionally and electrically connected with an input terminal of a trigger filter unit, the trigger filter unit includes a threat detector and a threat evaluator, an output terminal of the trigger filter unit is unidirectionally and electrically connected with an input terminal of a disguised data center, the disguised data center includes a fake terminal, the disguised data center is bidirectionally and electrically connected with the power network, the disguised data center is bidirectionally and electrically connected with a disguised behavior analysis center, the disguised behavior analysis center is bidirectionally and electrically connected with a disguised behavior processing center, the input end of the power network is unidirectionally and electrically connected with the output end of the protection processor, the protection processor comprises a protection module, the input end of the power network is unidirectionally and electrically connected with the output end of the interception and defense module, when hackers are poured in, the disguised data center can be disguised as a power network and can be used for analyzing the hackers through the disguised analysis center and the disguised processing center, the intrusion of the hacker is processed, meanwhile, the protection module in the protection processor protects the power network, the interception defense module intercepts the intrusion of the hacker, meanwhile, the power network is defended, hackers are prevented from invading the power network, the data received by the data receiving module is dynamically analyzed through the data dynamic behavior analysis module, when the virus is detected to enter, the threat detector detects the virus, and the threat evaluation device evaluates the virus, so that people can conveniently process the virus, and the anti-attack method of the power network comprises the following steps: the data receiving module receives data, the alarm can inform a client that data enter, the dynamic data behavior analysis module tracks and analyzes the dynamic data, the comparison module compares the data to determine the security of the data, the data enter the trigger filter unit, the threat detector and the threat evaluation device detect and evaluate the risk of the data to confirm the security of the data, the data enter the disguised data center, the data enter the power network through the disguised data center to facilitate the use of the power network by people, the protection module in the protection processor protects the power network, the interception and defense module intercepts the intrusion of hackers and defends the power network, and the working principle of the disguised data center is as follows: firstly, when detecting that data does not enter an electric network system through a data receiving module, disguising the electric network through a false terminal, analyzing and processing the disguising state of the false terminal through a disguising behavior analysis center and a disguising behavior processing center, analyzing and processing the poured data, achieving the effect of receiving the data through the data receiving module, achieving the effect of prompting people to have data to enter through an alarm, achieving the effect of analyzing and detecting the running state of the data through a data dynamic behavior analysis module, achieving the effect of comparing the data through a comparison module, achieving the effect of filtering the data through triggering a filtering unit, achieving the effect of protecting the electric network through a protection processor, and achieving the effect of intercepting and defending hackers from invading and defending through an intercepting and defending module, the data center is disguised, so that the effect of disguising the power network is achieved, the power network can provide energy for the block chain, and the power network system can effectively prevent hackers from attacking and is convenient for people to use.
During the use, through setting up the data receiving module, reach the effect to data reception, through the alarm, reach the effect that the suggestion people have data to get into, through data dynamic behavior analysis module, reach the effect to data running state analysis and detection, through contrast module, reach the effect to data contrast, through triggering the filter unit, reach the effect to data filtration, through the protection treater, reach the effect to the power network protection, through interception defense module, reach the effect to hacker's invasion interception and defense, through disguising data center, reach the effect of disguising power network, through power network, can provide the energy to the block chain, this power network system can effectually prevent that hacker from attacking, make things convenient for people to use.
In summary, the following steps: according to the block chain-based anti-attack power network system, the problem that a hacker cannot be effectively prevented from attacking is solved through the cooperation of the data receiving module, the alarm, the data dynamic behavior analysis module, the comparison module, the trigger filtering unit, the protection processor, the interception and defense module and the power network.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (1)
1. An anti-attack power network system based on a block chain comprises a data receiving module and a power network, and is characterized in that: the output end of the data receiving module is unidirectionally and electrically connected with the input end of the data dynamic behavior analysis module, the output end of the data receiving module is unidirectionally and electrically connected with the input end of the alarm module, the output end of the data receiving module is unidirectionally and electrically connected with the input end of the comparison module, the output end of the comparison module is unidirectionally and electrically connected with the input end of the trigger filtering unit, the output end of the trigger filtering unit is unidirectionally and electrically connected with the input end of the camouflage data center, the disguised data center is electrically connected with the power network in a bidirectional way, the disguised data center is electrically connected with the disguised behavior analysis center in a bidirectional way, the disguise behavior analysis center is electrically connected with the disguise behavior processing center in a bidirectional mode, the input end of the power network is electrically connected with the output end of the protection processor in a unidirectional mode, and the input end of the power network is electrically connected with the output end of the interception defense module in a unidirectional mode; the trigger filtering unit comprises a threat detector and a threat evaluator; the guard processor comprises a guard module; the disguised data center comprises a fake terminal; the system comprises the following steps: the method comprises the steps that firstly, data are received through a data receiving module, a client side can be informed of data entering through an alarm, the dynamic state of the data is tracked and analyzed through a data dynamic behavior analysis module, then the data are compared through a comparison module to determine the safety of the data, then the data enter a trigger filtering unit, the danger of the data is detected and evaluated through a threat detector and a threat evaluation device to confirm the safety of the data, then the data enter a disguised data center, the data enter an electric power network through the disguised data center to facilitate the use of the electric power network by people, finally the electric power network is protected through a protection module in a protection processor, and the intrusion of a hacker is intercepted through an interception and defense module to defend the electric power network; the working principle of the disguised data center is as follows: firstly, when data is detected to enter an electric network system through a data receiving module, the electric network is disguised through a false terminal, the disguise state of the false terminal is analyzed and processed through a disguise behavior analysis center and a disguise behavior processing center, and the poured data is also analyzed and processed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810563913.2A CN109033825B (en) | 2018-06-04 | 2018-06-04 | Anti-attack power network system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810563913.2A CN109033825B (en) | 2018-06-04 | 2018-06-04 | Anti-attack power network system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109033825A CN109033825A (en) | 2018-12-18 |
CN109033825B true CN109033825B (en) | 2021-07-30 |
Family
ID=64612067
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810563913.2A Expired - Fee Related CN109033825B (en) | 2018-06-04 | 2018-06-04 | Anti-attack power network system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109033825B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109033825B (en) * | 2018-06-04 | 2021-07-30 | 温州市图盛科技有限公司 | Anti-attack power network system based on block chain |
CN113783901B (en) * | 2021-11-15 | 2022-02-08 | 湖南宸瀚信息科技有限责任公司 | Multi-communication-node cooperative anti-attack network system based on block chain |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103139184A (en) * | 2011-12-02 | 2013-06-05 | 中国电信股份有限公司 | Intelligent network firewall device and network attack protection method |
CN103561004A (en) * | 2013-10-22 | 2014-02-05 | 西安交通大学 | Cooperative type active defense system based on honey nets |
CN104507079A (en) * | 2014-12-16 | 2015-04-08 | 南京邮电大学 | Sensor network positioning defense method on basis of multiple false identities |
CN107241338A (en) * | 2017-06-29 | 2017-10-10 | 北京北信源软件股份有限公司 | Network anti-attack devices, systems, and methods, computer-readable recording medium and storage control |
CN107360133A (en) * | 2017-06-08 | 2017-11-17 | 全球能源互联网研究院 | A kind of network attack emulation mode and system towards electric network information physical system |
CN107688944A (en) * | 2017-07-21 | 2018-02-13 | 杭州云象网络技术有限公司 | A kind of power system method of commerce based on block chain |
WO2018032372A1 (en) * | 2016-08-13 | 2018-02-22 | 深圳市樊溪电子有限公司 | Trusted power grid transaction platform based on block chain technology |
CN107819785A (en) * | 2017-11-28 | 2018-03-20 | 东南大学 | A kind of double-deck defence method towards power system false data injection attacks |
CN109033825A (en) * | 2018-06-04 | 2018-12-18 | 温州市图盛科技有限公司 | A kind of attack protection electric power network system based on block chain |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102761122B (en) * | 2012-07-06 | 2014-10-29 | 华北电力大学 | Defense method of false data injection attack of power state estimation system |
CN107634949B (en) * | 2017-09-21 | 2020-02-07 | 明阳智慧能源集团股份公司 | Power network architecture security defense module, physical node thereof and network defense method |
CN108076148A (en) * | 2017-12-15 | 2018-05-25 | 成都链网络科技有限公司 | Storage system based on block chain |
-
2018
- 2018-06-04 CN CN201810563913.2A patent/CN109033825B/en not_active Expired - Fee Related
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103139184A (en) * | 2011-12-02 | 2013-06-05 | 中国电信股份有限公司 | Intelligent network firewall device and network attack protection method |
CN103561004A (en) * | 2013-10-22 | 2014-02-05 | 西安交通大学 | Cooperative type active defense system based on honey nets |
CN104507079A (en) * | 2014-12-16 | 2015-04-08 | 南京邮电大学 | Sensor network positioning defense method on basis of multiple false identities |
WO2018032372A1 (en) * | 2016-08-13 | 2018-02-22 | 深圳市樊溪电子有限公司 | Trusted power grid transaction platform based on block chain technology |
CN107360133A (en) * | 2017-06-08 | 2017-11-17 | 全球能源互联网研究院 | A kind of network attack emulation mode and system towards electric network information physical system |
CN107241338A (en) * | 2017-06-29 | 2017-10-10 | 北京北信源软件股份有限公司 | Network anti-attack devices, systems, and methods, computer-readable recording medium and storage control |
CN107688944A (en) * | 2017-07-21 | 2018-02-13 | 杭州云象网络技术有限公司 | A kind of power system method of commerce based on block chain |
CN107819785A (en) * | 2017-11-28 | 2018-03-20 | 东南大学 | A kind of double-deck defence method towards power system false data injection attacks |
CN109033825A (en) * | 2018-06-04 | 2018-12-18 | 温州市图盛科技有限公司 | A kind of attack protection electric power network system based on block chain |
Non-Patent Citations (2)
Title |
---|
Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks;Gaoqi Liang 等;《IEEE Transactions on Smart Grid》;20180327;全文 * |
阮嘉祺 等.电力系统最小虚假数据攻击向量的建模与分析.《智能电网》.2017,第153-160页. * |
Also Published As
Publication number | Publication date |
---|---|
CN109033825A (en) | 2018-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khan et al. | Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid | |
CN110881049B (en) | Computer network safety intelligent control system | |
CN105208000B (en) | The method and Network Security Device of network analysis attack backtracking | |
CN109246108B (en) | Simulated honeypot fingerprint obfuscation system and SDN network architecture thereof | |
CN110855697A (en) | Active defense method for network security in power industry | |
CN107347067B (en) | Network risk monitoring method and system and security network system | |
CN109033825B (en) | Anti-attack power network system based on block chain | |
Jain et al. | Defending against internet worms using honeyfarm | |
CN108259472A (en) | Dynamic joint defence mechanism based on attack analysis realizes system and method | |
CN111865974A (en) | Network security defense system and method | |
CN102026199B (en) | The apparatus and method of a kind of WiMAX system and defending DDoS (Distributed Denial of Service) attacks thereof | |
CN103581104A (en) | Active trapping method based on behavior capturing | |
CN104954864B (en) | Bi-directional set-top box intruding detection system and its detection method | |
CN113794714A (en) | Network safety system for intelligent power plant architecture | |
CN102637332B (en) | Illegal invasion detection system and illegal invasion detection method | |
CN115694980A (en) | Method for carrying out network security protection on Internet of things system | |
CN115563613A (en) | File security detection system and method | |
CN107277070A (en) | A kind of computer network instrument system of defense and intrusion prevention method | |
CN111885020A (en) | Network attack behavior real-time capturing and monitoring system with distributed architecture | |
CN111083704A (en) | 5G network security defense system | |
Mysore | Strategic Integration of Cybersecurity in Power Transmission Systems for Enhanced Grid Resilience | |
CN106209867A (en) | A kind of Advanced threat defence method and system | |
Sharma | Security and Privacy Aspects of Cyber Physical Systems | |
Chen et al. | Development and implementation of anti phishing wi-fi and information security protection app based on android | |
Kumar et al. | Identifying and blocking high and low rate DDOS ICMP flooding |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210730 |
|
CF01 | Termination of patent right due to non-payment of annual fee |