CN109361650A - A kind of power information system monitoring method - Google Patents

A kind of power information system monitoring method Download PDF

Info

Publication number
CN109361650A
CN109361650A CN201811036009.2A CN201811036009A CN109361650A CN 109361650 A CN109361650 A CN 109361650A CN 201811036009 A CN201811036009 A CN 201811036009A CN 109361650 A CN109361650 A CN 109361650A
Authority
CN
China
Prior art keywords
data
information
safety
safe
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811036009.2A
Other languages
Chinese (zh)
Inventor
张高峰
解晓敏
胡同普
张志伟
王天俣
陈涛
冯志常
窦方琴
黄茗云
王焕
王艳东
任师超
孟祥光
曹凌宇
李治国
史家岭
陈猛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Heze Power Supply Co of State Grid Shandong Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Heze Power Supply Co of State Grid Shandong Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Heze Power Supply Co of State Grid Shandong Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201811036009.2A priority Critical patent/CN109361650A/en
Publication of CN109361650A publication Critical patent/CN109361650A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)

Abstract

The invention discloses a kind of power information system monitoring methods, comprising the following steps: step 1 obtains the safe cardinal data when overall operation of goal systems;Step 2, safe cardinal data configuration;Step 3, real time data imaging monitoring;Step 4, data transmission;Step 5, data storage and maintenance.The present invention passes through contrasting detection data; mainly each data in power information system are compared with the data in safe radix; to obtain the changing condition of each data; the data more than safe radix can be quickly detected; actually detected and adjusting is carried out to alternatively put to data; then the data for front and back of taking off are compared into preservation, it is convenient that the data of same problem are saved, to reinforce further protecting a certain security breaches emphatically.

Description

A kind of power information system monitoring method
Technical field
The present invention relates to software technology field, in particular to a kind of power information system monitoring method.
Background technique
Safety be information system need most be also the smallest safety assurance, be the most basic safety requirements of information system.Letter Fast-developing modern society of breathization society needs to carry out detection work to information system often, guarantees testing staff and equipment Also data are avoided to be stolen by ambient systems while safe.
Therefore, it is necessary to solve the above problems to invent a kind of power information system monitoring method.
Summary of the invention
The purpose of the present invention is to provide a kind of power information system monitoring methods, mainly will be each in power information system A data are compared with the data in safe radix, to obtain the changing condition of each data, can be quickly detected super Cross the data of safe radix, thus to data alternatively put carry out actually detected and adjusting, then by take off front and back data into Row comparison saves, convenient to save to the data of same problem, to reinforce carrying out into one a certain security breaches emphatically Step protection, to solve the problems mentioned in the above background technology.
To achieve the above object, the invention provides the following technical scheme: a kind of power information system monitoring method, including with Lower step:
Safe cardinal data when obtaining the overall operation of goal systems: step 1 takes the safe radix of goal systems Data, main includes the first personal secure data, the second equipment safety data, third finance correlation data, the 4th host data Library data and the 5th line security data, and data comparison table is established according to each data, daily data variation is carried out Comparison, it is convenient that entire goal systems is monitored;
Step 2, safe cardinal data configuration: in each data in one that take steps, principal security safety device, peace Total state and security breaches, wherein safety device includes operating system security, equipment management safety, personal safety and route peace Entirely, safe condition includes that port security, process safety, Host Security and data daily update safety, and security breaches include system Loophole, database loophole, network hole and property loophole;
Step 3, real time data imaging monitoring: in step 2 obtain data information after, need to carry out information calculate and Processing, detects the changing condition of each route by way of monitoring and the monitoring video of each equipment safety, needs It wants personnel that equipment is taken off and observed often, in personal safety, needs for the work clothes of worker's allocation criterion, work Clothes need the Vital status by Multiple detection, avoided the occurrence of, and the data situation inside network and host then needs to pass through Visual examination system was checked and is overhauled to the problem of company property;
Step 4, data transmission: when being acquired to data, communicating terminal by monitoring information transmission to information terminal, into And acquisition information is inputted to host by access interface, the information after host receives is arrived after multi-enciphering using optical cable transmission Information is transferred to communication by the encrypted form of wireless network after being monitored by monitoring personnel to information by monitoring information master station Terminal, so that communicating terminal is controlled and be detected by staff;
Step 5, data storage and maintenance: needing to store the data of transmission before transmitting data, main logical Crossing the external equipment that do not network will store after data receiver, and carry out multiple duplication, and be divided in real time storage information Class, and storage information check every a week and is surveyed.
Preferably, main information security is divided into personal safety and system safety, mainly not in the step 2 The all parts of power information system are detected and checked under conditions of injury human health.
Preferably, when passing through image transmission, poisoning intrusion is easy to carry out shadow to transmission data in the step 3 It rings, to make to transmit corrupted data, is unable to real-time detection field conditions, needs to arrange testing staff, equipment and data are carried out Transmission and investigation.
Preferably, reducing data diffusion effect by way of encryption in the step 4, electric power letter also can increase Cease the secrecy effect of data.
Technical effect and advantage of the invention:
1, the present invention, mainly will be in each data and safe radix in power information system by contrasting detection data Data compare, to obtain the changing condition of each data, can quickly detect the data more than safe radix, thus Data are alternatively put and carry out actually detected and adjusting, the data for front and back of taking off then are compared into preservation, it is convenient to identical The data of problem are saved, to reinforce further protecting a certain security breaches emphatically;
2, the present invention needs to store the data of transmission by protection transmission data before transmitting data, main It will be stored after data receiver by the external equipment that do not network, and carry out multiple duplication, utilize encryption and number of not networking Reinforce data protection effect according to two kinds of forms of transmission, increases the data protection to power information system, avoid hacker from network Steal data information.
Specific embodiment
Below in conjunction with the embodiment of the present invention, technical scheme in the embodiment of the invention is clearly and completely described, Obviously, described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based in the present invention Embodiment, every other embodiment obtained by those of ordinary skill in the art without making creative efforts, all Belong to the scope of protection of the invention.
Below with reference to embodiment, the present invention is further described.
Embodiment 1
A kind of power information system monitoring method, comprising the following steps:
Safe cardinal data when obtaining the overall operation of goal systems: step 1 takes the safe radix of goal systems Data, main includes the first personal secure data, the second equipment safety data, third finance correlation data, the 4th host data Library data and the 5th line security data, and data comparison table is established according to each data, daily data variation is carried out Comparison, it is convenient that entire goal systems is monitored;
Step 2, safe cardinal data configuration: in each data in one that take steps, principal security safety device, peace Total state and security breaches, wherein safety device includes operating system security, equipment management safety, personal safety and route peace Entirely, safe condition includes that port security, process safety, Host Security and data daily update safety, and security breaches include system Loophole, database loophole, network hole and property loophole;
Step 3, real time data imaging monitoring: in step 2 obtain data information after, need to carry out information calculate and Processing, detects the changing condition of each route by way of monitoring and the monitoring video of each equipment safety, needs It wants personnel that equipment is taken off and observed often, in personal safety, needs for the work clothes of worker's allocation criterion, work Clothes need the Vital status by Multiple detection, avoided the occurrence of, and the data situation inside network and host then needs to pass through Visual examination system was checked and is overhauled to the problem of company property;
Step 4, data transmission: when being acquired to data, communicating terminal by monitoring information transmission to information terminal, into And acquisition information is inputted to host by access interface, the information after host receives is arrived after multi-enciphering using optical cable transmission Information is transferred to communication by the encrypted form of wireless network after being monitored by monitoring personnel to information by monitoring information master station Terminal, so that communicating terminal is controlled and be detected by staff;
Step 5, data storage and maintenance: needing to store the data of transmission before transmitting data, main logical Crossing the external equipment that do not network will store after data receiver, and carry out multiple duplication, and be divided in real time storage information Class, and storage information check every a week and is surveyed.
The effect of the embodiment technical solution are as follows: mainly will be in each data and safe radix in power information system Data compare, to obtain the changing condition of each data, can quickly detect the data more than safe radix, thus Data are alternatively put and carry out actually detected and adjusting, the data for front and back of taking off then are compared into preservation, it is convenient to identical The data of problem are saved, to reinforce further protecting a certain security breaches emphatically.
Embodiment 2
In the step 2, main information security is divided into personal safety and system safety, mainly not injure human body strong The all parts of power information system are detected and checked under conditions of health, increase the advantage of the inspection of line, reduce reparation The economic loss of personal safety.
In the step 3, when passing through image transmission, poisoning intrusion is easy to influence transmission data, to make to transmit Corrupted data is unable to real-time detection field conditions, needs to arrange testing staff, and equipment and data are transmitted and checked, and increases The working effect of oil (gas) filling device can guarantee the service life of equipment.
In the step 4, reduce data diffusion effect by way of encryption, also can increase the guarantor of power information data Close effect, mainly using encryption and two kinds of forms of networked data transmission do not reinforce data protection effects when data are transmitted, and increase pair The data protection of power information system, avoids hacker from stealing data information from network.
Working principle of the present invention: mainly each data in power information system and the data in safe radix are carried out pair Than to obtain the changing condition of each data, the data more than safe radix can be quickly detected, thus to data variation Place carries out actually detected and adjusting, and the data for front and back of taking off then are compared preservation, the convenient data to same problem It is saved, to reinforce further protecting a certain security breaches emphatically;Data transmit when mainly using encryption and Two kinds of forms of networked data transmission do not reinforce data protection effect, increase the data protection to power information system, avoid hacker Data information is stolen from network.
Finally, it should be noted that the foregoing is only a preferred embodiment of the present invention, it is not intended to restrict the invention, Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features, All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention Within protection scope.

Claims (4)

1. a kind of power information system monitoring method, which comprises the following steps:
Step 1, safe cardinal data when obtaining the overall operation of goal systems: taking the safe cardinal data of goal systems, Main includes the first personal secure data, the second equipment safety data, third finance correlation data, the 4th host data base data With the 5th line security data, and data comparison table is established according to each data, daily data variation is compared, side Just entire goal systems is monitored;
Step 2, safe cardinal data configuration: in each data in one that take steps, principal security safety device, safe shape State and security breaches, wherein safety device includes operating system security, equipment management safety, personal safety and line security, peace Total state includes that port security, process safety, Host Security and data daily update safety, security breaches include system vulnerability, Database loophole, network hole and property loophole;
Real time data imaging monitoring: step 3 after obtaining data information in step 2, needs to calculate information and located Reason, detects the changing condition of each route by way of monitoring and the monitoring video of each equipment safety, needs Personnel take off and observe to equipment often, in personal safety, need for the work clothes of worker's allocation criterion, work clothes The Vital status for needing, by Multiple detection, to avoid the occurrence of is filled, and the data situation inside network and host is then needed by outer Portion checks that system was checked and overhauled to the problem of company property;
Step 4, data transmission: when being acquired to data, communicating terminal is by monitoring information transmission to information terminal, Jin Ertong It crosses access interface and inputs acquisition information to host, the information after host receives utilizes optical cable transmission to monitoring after multi-enciphering Information is transferred to communication eventually by the encrypted form of wireless network after being monitored by monitoring personnel to information by central information facility End, so that communicating terminal is controlled and be detected by staff;
Step 5, data storage and maintenance: needing to store the data of transmission before transmitting data, main by not The external equipment of networking will store after data receiver, and carry out multiple duplication, and carry out real-time grading to storage information, and Storage information check every a week and is surveyed.
2. a kind of power information system monitoring method according to claim 1, it is characterised in that: main in the step 2 The information security wanted is divided into personal safety and system safety, mainly to power information system under conditions of not injuring human health All parts detected and checked.
3. a kind of power information system monitoring method according to claim 1, it is characterised in that: in the step 3, lead to When crossing image transmission, poisoning intrusion is easy to influence transmission data, to make to transmit corrupted data, it is existing to be unable to real-time detection Field situation, needs to arrange testing staff, equipment and data is transmitted and checked.
4. a kind of power information system monitoring method according to claim 1, it is characterised in that: in the step 4, lead to The mode for crossing encryption reduces data diffusion effect, also can increase the secrecy effect of power information data.
CN201811036009.2A 2018-09-06 2018-09-06 A kind of power information system monitoring method Pending CN109361650A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811036009.2A CN109361650A (en) 2018-09-06 2018-09-06 A kind of power information system monitoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811036009.2A CN109361650A (en) 2018-09-06 2018-09-06 A kind of power information system monitoring method

Publications (1)

Publication Number Publication Date
CN109361650A true CN109361650A (en) 2019-02-19

Family

ID=65350364

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811036009.2A Pending CN109361650A (en) 2018-09-06 2018-09-06 A kind of power information system monitoring method

Country Status (1)

Country Link
CN (1) CN109361650A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014178926A1 (en) * 2013-04-29 2014-11-06 Enernoc, Inc. Building management system false-positive fault indications reduction mechanism
CN105785895A (en) * 2016-03-30 2016-07-20 国网山东省电力公司荣成市供电公司 Intelligent transformer station monitoring system
CN107689954A (en) * 2017-08-21 2018-02-13 国家电网公司 Power information system monitoring method and device
CN108418302A (en) * 2018-02-01 2018-08-17 广东聚晨知识产权代理有限公司 A kind of power distribution network platform based on big data analysis

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014178926A1 (en) * 2013-04-29 2014-11-06 Enernoc, Inc. Building management system false-positive fault indications reduction mechanism
CN105785895A (en) * 2016-03-30 2016-07-20 国网山东省电力公司荣成市供电公司 Intelligent transformer station monitoring system
CN107689954A (en) * 2017-08-21 2018-02-13 国家电网公司 Power information system monitoring method and device
CN108418302A (en) * 2018-02-01 2018-08-17 广东聚晨知识产权代理有限公司 A kind of power distribution network platform based on big data analysis

Similar Documents

Publication Publication Date Title
CN111770108A (en) Network safety system based on artificial intelligence
CN104495549A (en) Elevator maintenance monitoring system and monitoring method
CN105573291B (en) A kind of threat detection method and safety device based on key parameter fusion verification
CN104063987B (en) Master control room of nuclear power station back-up disk alarm method and system thereof
CN112437041B (en) Industrial control safety audit system and method based on artificial intelligence
CN107508831A (en) A kind of intrusion detection method based on bus
CN107122685A (en) A kind of big data method for secure storing and equipment
CN114266081A (en) Operation and maintenance computer safety protection system and method of power monitoring system
CN111147521B (en) Enterprise private network security event management system
CN111176153A (en) Machine room moving ring alarm system
CN114741255A (en) Fault self-healing technology based on automatic execution of service scene
CN109361650A (en) A kind of power information system monitoring method
CN116720836A (en) Intelligent campus safety management alarm system
CN109308062A (en) A kind of production equipment monitoring network integrated system
CN108924095A (en) A kind of government website security monitoring alarm platform
CN111343276A (en) Safety production education and training system frame
CN107277070A (en) A kind of computer network instrument system of defense and intrusion prevention method
CN110912869A (en) Big data-based monitoring and reminding method
CN115037536B (en) Security information management is with preventing early warning platform that data is lost based on big data
CN106254163B (en) Monitor the method and device of the USB port of computer in local area network
CN109510312A (en) A kind of safety utilization of electric power monitoring system
CN107968777A (en) Network Security Monitor System
CN113704061A (en) Secret-related computer protection system
CN114398642A (en) Enterprise economic management information safety system
CN112995220A (en) Security data security system for computer network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190219

RJ01 Rejection of invention patent application after publication