CN109033825B - Anti-attack power network system based on block chain - Google Patents

Anti-attack power network system based on block chain Download PDF

Info

Publication number
CN109033825B
CN109033825B CN201810563913.2A CN201810563913A CN109033825B CN 109033825 B CN109033825 B CN 109033825B CN 201810563913 A CN201810563913 A CN 201810563913A CN 109033825 B CN109033825 B CN 109033825B
Authority
CN
China
Prior art keywords
data
module
power network
electrically connected
center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810563913.2A
Other languages
Chinese (zh)
Other versions
CN109033825A (en
Inventor
蔡怡挺
徐盛
郑立
陈梦娴
朱犇
池晓金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenzhou Tusheng Science & Technology Co ltd
Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Wenzhou Tusheng Science & Technology Co ltd
Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou Tusheng Science & Technology Co ltd, Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Wenzhou Tusheng Science & Technology Co ltd
Priority to CN201810563913.2A priority Critical patent/CN109033825B/en
Publication of CN109033825A publication Critical patent/CN109033825A/en
Application granted granted Critical
Publication of CN109033825B publication Critical patent/CN109033825B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses an anti-attack power network system based on a block chain, which comprises a data receiving module and a power network, wherein the output end of the data receiving module is unidirectionally and electrically connected with the input end of a data dynamic behavior analysis module, and the output end of the data receiving module is unidirectionally and electrically connected with the input end of an alarm module. According to the invention, the data receiving module is arranged to achieve the effect of receiving data, the alarm is used for prompting people to enter data, the dynamic data behavior analysis module is used for analyzing and detecting the running state of the data, the comparison module is used for comparing the data, the filter unit is triggered to achieve the effect of filtering the data, the protection processor is used for protecting the power network, and the interception and defense module is used for achieving the effect of intercepting and defending the invasion of hackers.

Description

Anti-attack power network system based on block chain
Technical Field
The invention relates to the technical field of power networks, in particular to an anti-attack power network system based on a block chain.
Background
The power network is a part of the power system except for generating equipment and power utilization equipment, and comprises three links of power transmission, power transformation and power distribution, wherein power plants and users distributed in a wide region are connected into a whole, concentrated electric energy is transmitted to thousands of households, the structure power network mainly comprises a power line and a substation converter station which are divided according to functions and comprise a power transmission line, a regional power grid, a contact and power distribution network, when a block chain is used, the power network is required to be used for providing energy, and when the existing power network is used, hackers cannot be effectively prevented from attacking, so that an anti-attack power network system based on the block chain is provided.
Disclosure of Invention
The invention aims to provide an anti-attack power network system based on a block chain, which has the advantage of effectively preventing hackers from attacking and solves the problem that the hackers cannot be effectively prevented from attacking.
In order to achieve the purpose, the invention provides the following technical scheme: an anti-attack power network system based on a block chain comprises a data receiving module and a power network, wherein the output end of the data receiving module is unidirectionally and electrically connected with the input end of a data dynamic behavior analysis module, the output end of the data receiving module is unidirectionally and electrically connected with the input end of an alarm module, the output end of the data receiving module is unidirectionally and electrically connected with the input end of a comparison module, the output end of the comparison module is unidirectionally and electrically connected with the input end of a trigger filtering unit, the output end of the trigger filtering unit is unidirectionally and electrically connected with the input end of a camouflage data center, the camouflage data center is bidirectionally and electrically connected with the power network, the camouflage data center is bidirectionally and electrically connected with a camouflage behavior analysis center, the camouflage behavior analysis center is bidirectionally and electrically connected with a camouflage behavior processing center, and the input end of the power network is unidirectionally and electrically connected with the output end of a protection processor, the input end of the power network is electrically connected with the output end of the interception defense module in a one-way mode.
Preferably, the trigger filtering unit comprises a threat detector and a threat evaluator.
Preferably, the guard processor comprises a guard module.
Preferably, the disguised data center includes a dummy terminal.
Preferably, the method for preventing the attack of the power network comprises: the method comprises the steps of firstly receiving data through a data receiving module, informing a client of data entry through an alarm, tracking and analyzing data dynamics through a data dynamic behavior analysis module, comparing the data through a comparison module to determine the security of the data, then enabling the data to enter a trigger filter unit, detecting and evaluating the risk of the data through a threat detector and a threat evaluation device to confirm the security of the data, enabling the data to enter a disguised data center, enabling the data to enter an electric power network through the disguised data center to facilitate the use of the electric power network by people, protecting the electric power network through a protection module in a protection processor, and intercepting and defending the intrusion of hackers and defending the electric power network through an intercepting and defending module.
Preferably, the working principle of the disguised data center is as follows: firstly, when data is detected to enter an electric network system through a data receiving module, the electric network is disguised through a false terminal, the disguise state of the false terminal is analyzed and processed through a disguise behavior analysis center and a disguise behavior processing center, and the poured data is also analyzed and processed.
Compared with the prior art, the invention has the following beneficial effects:
according to the invention, the data receiving module is arranged to achieve the effect of receiving data, the alarm is used to prompt people to enter data, the dynamic data behavior analysis module is used to achieve the effect of analyzing and detecting the running state of the data, the comparison module is used to achieve the effect of comparing the data, the filter unit is triggered to achieve the effect of filtering the data, the protection processor is used to achieve the effect of protecting the power network, the interception and defense module is used to achieve the effect of intercepting and defending the invasion of hackers, the data center is used to disguise the power network, and the power network is used to provide energy for a block chain.
Drawings
FIG. 1 is a schematic diagram of the system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an anti-attack power network system based on a block chain includes a data receiving module and a power network, an output terminal of the data receiving module is unidirectionally and electrically connected with an input terminal of a data dynamic behavior analysis module, an output terminal of the data receiving module is unidirectionally and electrically connected with an input terminal of an alarm module, an output terminal of the data receiving module is unidirectionally and electrically connected with an input terminal of a comparison module, an output terminal of the comparison module is unidirectionally and electrically connected with an input terminal of a trigger filter unit, the trigger filter unit includes a threat detector and a threat evaluator, an output terminal of the trigger filter unit is unidirectionally and electrically connected with an input terminal of a disguised data center, the disguised data center includes a fake terminal, the disguised data center is bidirectionally and electrically connected with the power network, the disguised data center is bidirectionally and electrically connected with a disguised behavior analysis center, the disguised behavior analysis center is bidirectionally and electrically connected with a disguised behavior processing center, the input end of the power network is unidirectionally and electrically connected with the output end of the protection processor, the protection processor comprises a protection module, the input end of the power network is unidirectionally and electrically connected with the output end of the interception and defense module, when hackers are poured in, the disguised data center can be disguised as a power network and can be used for analyzing the hackers through the disguised analysis center and the disguised processing center, the intrusion of the hacker is processed, meanwhile, the protection module in the protection processor protects the power network, the interception defense module intercepts the intrusion of the hacker, meanwhile, the power network is defended, hackers are prevented from invading the power network, the data received by the data receiving module is dynamically analyzed through the data dynamic behavior analysis module, when the virus is detected to enter, the threat detector detects the virus, and the threat evaluation device evaluates the virus, so that people can conveniently process the virus, and the anti-attack method of the power network comprises the following steps: the data receiving module receives data, the alarm can inform a client that data enter, the dynamic data behavior analysis module tracks and analyzes the dynamic data, the comparison module compares the data to determine the security of the data, the data enter the trigger filter unit, the threat detector and the threat evaluation device detect and evaluate the risk of the data to confirm the security of the data, the data enter the disguised data center, the data enter the power network through the disguised data center to facilitate the use of the power network by people, the protection module in the protection processor protects the power network, the interception and defense module intercepts the intrusion of hackers and defends the power network, and the working principle of the disguised data center is as follows: firstly, when detecting that data does not enter an electric network system through a data receiving module, disguising the electric network through a false terminal, analyzing and processing the disguising state of the false terminal through a disguising behavior analysis center and a disguising behavior processing center, analyzing and processing the poured data, achieving the effect of receiving the data through the data receiving module, achieving the effect of prompting people to have data to enter through an alarm, achieving the effect of analyzing and detecting the running state of the data through a data dynamic behavior analysis module, achieving the effect of comparing the data through a comparison module, achieving the effect of filtering the data through triggering a filtering unit, achieving the effect of protecting the electric network through a protection processor, and achieving the effect of intercepting and defending hackers from invading and defending through an intercepting and defending module, the data center is disguised, so that the effect of disguising the power network is achieved, the power network can provide energy for the block chain, and the power network system can effectively prevent hackers from attacking and is convenient for people to use.
During the use, through setting up the data receiving module, reach the effect to data reception, through the alarm, reach the effect that the suggestion people have data to get into, through data dynamic behavior analysis module, reach the effect to data running state analysis and detection, through contrast module, reach the effect to data contrast, through triggering the filter unit, reach the effect to data filtration, through the protection treater, reach the effect to the power network protection, through interception defense module, reach the effect to hacker's invasion interception and defense, through disguising data center, reach the effect of disguising power network, through power network, can provide the energy to the block chain, this power network system can effectually prevent that hacker from attacking, make things convenient for people to use.
In summary, the following steps: according to the block chain-based anti-attack power network system, the problem that a hacker cannot be effectively prevented from attacking is solved through the cooperation of the data receiving module, the alarm, the data dynamic behavior analysis module, the comparison module, the trigger filtering unit, the protection processor, the interception and defense module and the power network.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (1)

1. An anti-attack power network system based on a block chain comprises a data receiving module and a power network, and is characterized in that: the output end of the data receiving module is unidirectionally and electrically connected with the input end of the data dynamic behavior analysis module, the output end of the data receiving module is unidirectionally and electrically connected with the input end of the alarm module, the output end of the data receiving module is unidirectionally and electrically connected with the input end of the comparison module, the output end of the comparison module is unidirectionally and electrically connected with the input end of the trigger filtering unit, the output end of the trigger filtering unit is unidirectionally and electrically connected with the input end of the camouflage data center, the disguised data center is electrically connected with the power network in a bidirectional way, the disguised data center is electrically connected with the disguised behavior analysis center in a bidirectional way, the disguise behavior analysis center is electrically connected with the disguise behavior processing center in a bidirectional mode, the input end of the power network is electrically connected with the output end of the protection processor in a unidirectional mode, and the input end of the power network is electrically connected with the output end of the interception defense module in a unidirectional mode; the trigger filtering unit comprises a threat detector and a threat evaluator; the guard processor comprises a guard module; the disguised data center comprises a fake terminal; the system comprises the following steps: the method comprises the steps that firstly, data are received through a data receiving module, a client side can be informed of data entering through an alarm, the dynamic state of the data is tracked and analyzed through a data dynamic behavior analysis module, then the data are compared through a comparison module to determine the safety of the data, then the data enter a trigger filtering unit, the danger of the data is detected and evaluated through a threat detector and a threat evaluation device to confirm the safety of the data, then the data enter a disguised data center, the data enter an electric power network through the disguised data center to facilitate the use of the electric power network by people, finally the electric power network is protected through a protection module in a protection processor, and the intrusion of a hacker is intercepted through an interception and defense module to defend the electric power network; the working principle of the disguised data center is as follows: firstly, when data is detected to enter an electric network system through a data receiving module, the electric network is disguised through a false terminal, the disguise state of the false terminal is analyzed and processed through a disguise behavior analysis center and a disguise behavior processing center, and the poured data is also analyzed and processed.
CN201810563913.2A 2018-06-04 2018-06-04 Anti-attack power network system based on block chain Expired - Fee Related CN109033825B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810563913.2A CN109033825B (en) 2018-06-04 2018-06-04 Anti-attack power network system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810563913.2A CN109033825B (en) 2018-06-04 2018-06-04 Anti-attack power network system based on block chain

Publications (2)

Publication Number Publication Date
CN109033825A CN109033825A (en) 2018-12-18
CN109033825B true CN109033825B (en) 2021-07-30

Family

ID=64612067

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810563913.2A Expired - Fee Related CN109033825B (en) 2018-06-04 2018-06-04 Anti-attack power network system based on block chain

Country Status (1)

Country Link
CN (1) CN109033825B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109033825B (en) * 2018-06-04 2021-07-30 温州市图盛科技有限公司 Anti-attack power network system based on block chain
CN113783901B (en) * 2021-11-15 2022-02-08 湖南宸瀚信息科技有限责任公司 Multi-communication-node cooperative anti-attack network system based on block chain

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139184A (en) * 2011-12-02 2013-06-05 中国电信股份有限公司 Intelligent network firewall device and network attack protection method
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets
CN104507079A (en) * 2014-12-16 2015-04-08 南京邮电大学 Sensor network positioning defense method on basis of multiple false identities
CN107241338A (en) * 2017-06-29 2017-10-10 北京北信源软件股份有限公司 Network anti-attack devices, systems, and methods, computer-readable recording medium and storage control
CN107360133A (en) * 2017-06-08 2017-11-17 全球能源互联网研究院 A kind of network attack emulation mode and system towards electric network information physical system
CN107688944A (en) * 2017-07-21 2018-02-13 杭州云象网络技术有限公司 A kind of power system method of commerce based on block chain
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN107819785A (en) * 2017-11-28 2018-03-20 东南大学 A kind of double-deck defence method towards power system false data injection attacks
CN109033825A (en) * 2018-06-04 2018-12-18 温州市图盛科技有限公司 A kind of attack protection electric power network system based on block chain

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761122B (en) * 2012-07-06 2014-10-29 华北电力大学 Defense method of false data injection attack of power state estimation system
CN107634949B (en) * 2017-09-21 2020-02-07 明阳智慧能源集团股份公司 Power network architecture security defense module, physical node thereof and network defense method
CN108076148A (en) * 2017-12-15 2018-05-25 成都链网络科技有限公司 Storage system based on block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139184A (en) * 2011-12-02 2013-06-05 中国电信股份有限公司 Intelligent network firewall device and network attack protection method
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets
CN104507079A (en) * 2014-12-16 2015-04-08 南京邮电大学 Sensor network positioning defense method on basis of multiple false identities
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN107360133A (en) * 2017-06-08 2017-11-17 全球能源互联网研究院 A kind of network attack emulation mode and system towards electric network information physical system
CN107241338A (en) * 2017-06-29 2017-10-10 北京北信源软件股份有限公司 Network anti-attack devices, systems, and methods, computer-readable recording medium and storage control
CN107688944A (en) * 2017-07-21 2018-02-13 杭州云象网络技术有限公司 A kind of power system method of commerce based on block chain
CN107819785A (en) * 2017-11-28 2018-03-20 东南大学 A kind of double-deck defence method towards power system false data injection attacks
CN109033825A (en) * 2018-06-04 2018-12-18 温州市图盛科技有限公司 A kind of attack protection electric power network system based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks;Gaoqi Liang 等;《IEEE Transactions on Smart Grid》;20180327;全文 *
阮嘉祺 等.电力系统最小虚假数据攻击向量的建模与分析.《智能电网》.2017,第153-160页. *

Also Published As

Publication number Publication date
CN109033825A (en) 2018-12-18

Similar Documents

Publication Publication Date Title
Khan et al. Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid
CN110881049B (en) Computer network safety intelligent control system
CN105208000B (en) The method and Network Security Device of network analysis attack backtracking
CN109246108B (en) Simulated honeypot fingerprint obfuscation system and SDN network architecture thereof
CN110855697A (en) Active defense method for network security in power industry
CN107347067B (en) Network risk monitoring method and system and security network system
CN109033825B (en) Anti-attack power network system based on block chain
Jain et al. Defending against internet worms using honeyfarm
CN108259472A (en) Dynamic joint defence mechanism based on attack analysis realizes system and method
CN111865974A (en) Network security defense system and method
CN102026199B (en) The apparatus and method of a kind of WiMAX system and defending DDoS (Distributed Denial of Service) attacks thereof
CN103581104A (en) Active trapping method based on behavior capturing
CN104954864B (en) Bi-directional set-top box intruding detection system and its detection method
CN113794714A (en) Network safety system for intelligent power plant architecture
CN102637332B (en) Illegal invasion detection system and illegal invasion detection method
CN115694980A (en) Method for carrying out network security protection on Internet of things system
CN115563613A (en) File security detection system and method
CN107277070A (en) A kind of computer network instrument system of defense and intrusion prevention method
CN111885020A (en) Network attack behavior real-time capturing and monitoring system with distributed architecture
CN111083704A (en) 5G network security defense system
Mysore Strategic Integration of Cybersecurity in Power Transmission Systems for Enhanced Grid Resilience
CN106209867A (en) A kind of Advanced threat defence method and system
Sharma Security and Privacy Aspects of Cyber Physical Systems
Chen et al. Development and implementation of anti phishing wi-fi and information security protection app based on android
Kumar et al. Identifying and blocking high and low rate DDOS ICMP flooding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210730

CF01 Termination of patent right due to non-payment of annual fee