CN109687586A - A kind of power monitoring Host Security inspection system - Google Patents
A kind of power monitoring Host Security inspection system Download PDFInfo
- Publication number
- CN109687586A CN109687586A CN201811624084.0A CN201811624084A CN109687586A CN 109687586 A CN109687586 A CN 109687586A CN 201811624084 A CN201811624084 A CN 201811624084A CN 109687586 A CN109687586 A CN 109687586A
- Authority
- CN
- China
- Prior art keywords
- portable
- data
- acquisition tool
- test object
- data acquisition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007689 inspection Methods 0.000 title claims abstract description 111
- 238000012544 monitoring process Methods 0.000 title claims abstract description 29
- 238000012360 testing method Methods 0.000 claims abstract description 44
- 238000004458 analytical method Methods 0.000 claims abstract description 17
- 238000004891 communication Methods 0.000 claims description 12
- 230000003612 virological effect Effects 0.000 claims description 12
- 241001269238 Data Species 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 9
- 241000700605 Viruses Species 0.000 claims description 8
- 238000007781 pre-processing Methods 0.000 claims description 7
- 238000013480 data collection Methods 0.000 claims description 5
- 238000005070 sampling Methods 0.000 claims description 4
- 201000010099 disease Diseases 0.000 claims description 2
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 claims description 2
- 238000000034 method Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 206010011409 Cross infection Diseases 0.000 description 1
- 206010029803 Nosocomial infection Diseases 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000013210 evaluation model Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J13/00—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
- H02J13/00001—Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by the display of information or by user interaction, e.g. supervisory control and data acquisition systems [SCADA] or graphical user interfaces [GUI]
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01R—MEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
- G01R31/00—Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
- G01R31/50—Testing of electric apparatus, lines, cables or components for short-circuits, continuity, leakage current or incorrect line connections
-
- H02J13/0013—
Abstract
This application provides a kind of power monitoring Host Securities to check system, comprising: safety inspection terminal and portable data acquisition tool;Portable data acquisition tool is configured as: after portable data acquisition tool and test object, which are established, to be communicated to connect, being obtained corresponding inspection item data from test object according to preset data acquisition instructions and is saved;Safety inspection terminal is configured as: after safety inspection terminal and portable data acquisition tool, which are established, to be communicated to connect, it reads and checks item data, and Data Matching and model analysis are carried out by preset feature database and risk model, export the safety inspection result of test object.The application is directly accessed test object by portable data acquisition tool, preset check item instruction is executed, host configuration information is obtained and will check data write-in USB flash disk tool, it solves existing distributed transformer substation and needs to be carry bulky inspection equipment progress site inspection by staff, check the not convenient technical problem of work.
Description
Technical field
This application involves equipment operation management fields more particularly to a kind of power monitoring Host Security to check system and inspection
Method.
Background technique
In recent years, electric power monitoring system is along networking, Intellectualized Tendency fast development, comes for power monitoring work belt
Huge convenience.Important component of the Windows host as electric power monitoring system is now widely used for substation's prison
Control backstage, main station monitoring backstage, main website server etc..In order to ensure the normal operation of system, need periodically to windows host
Configuration, virus do emphasis inspection and loophole investigation work.
There are the long-range checking tool of general Host Security and technologies for current industry, but this technology is to obtain number based on network
According to the long-range inspection for being suitable for centralized-control type architecture system, and the distributed transformer substation of network is not built for network condition difference or,
It then needs to be carry bulky inspection equipment by staff and carries out site inspection, result in existing distributed transformer substation inspection
Work not convenient technical problem.
Summary of the invention
This application provides a kind of power monitoring Host Securities to check system, for solving existing distributed transformer substation inspection
Look into the not convenient technical problem of work.
In view of this, this application provides a kind of power monitoring Host Security check system, comprising: safety inspection terminal and
Portable data acquisition tool;
The portable data acquisition tool is configured as: when the portable data acquisition tool and test object are established
After communication connection, corresponding inspection item data is obtained from the test object according to preset data acquisition instructions and is saved;
The safety inspection terminal is configured as: when the safety inspection terminal and the portable data acquisition tool are built
After vertical communication connection, the inspection item data is read, and Data Matching and mould are carried out by preset feature database and risk model
Type analysis exports the safety inspection result of the test object.
Preferably, the portable data acquisition tool specifically includes: portable configuration metadata acquisition tool, Portable disease
Malicious metadata acquisition tool and portable loophole metadata acquisition tool.
Preferably, the portable configuration metadata acquisition tool is specifically configured to:
After the portable configuration metadata acquisition tool and test object, which are established, to be communicated to connect, according to preset configuration number
Corresponding each configuration inspection item data is obtained one by one from the test object according to acquisition instructions, when having obtained all inspections
After item data, all inspection item datas are uniformly written in the portable configuration metadata acquisition tool and are saved.
Preferably, the portable viral metadata acquisition tool is specifically configured to:
When the portable viral metadata acquisition tool and test object are established after communication connection, according to preset viral number
Corresponding each virus checking item data is obtained one by one from the test object according to acquisition instructions, when having obtained all inspections
After item data, all inspection item datas are uniformly written in the portable viral metadata acquisition tool and are saved.
Preferably, the portable loophole metadata acquisition tool is specifically configured to:
After the portable loophole metadata acquisition tool and test object, which are established, to be communicated to connect, according to preset loophole number
It obtains corresponding each loophole one by one from the test object according to acquisition instructions and checks item data, when having obtained all inspections
After item data, all inspection item datas are uniformly written in the portable loophole metadata acquisition tool and are saved.
Preferably, the safety inspection terminal specifically includes: data acquisition module and comprehensive analysis module;
The data acquisition module is specifically configured to: when the data acquisition module and the portable data acquisition work
After tool establishes communication connection, the inspection item data saved in the portable data acquisition tool is read;
The comprehensive analysis module is specifically configured to: according to the inspection item data read, from the check item
Data extract corresponding data characteristics, and carry out Data Matching by the data characteristics and preset feature database, export institute
State the safety inspection result of test object.
Preferably, the safety inspection terminal further include: preprocessing module;
The preprocessing module is specifically configured to: being formatted processing and sequence to the data characteristics extracted
Change processing.
Preferably, the safety inspection terminal further include: display module;
The display module is configured as: the safety inspection result is shown according to preset displaying condition.
Preferably, the preset feature database specifically includes: baseline characteristic library, malicious code feature database and system vulnerability are special
Levy library.
Preferably, the portable data acquisition tool is specially portable data acquisition USB flash disk.
Preferably, the safety inspection terminal is specially portable PC machine.
As can be seen from the above technical solutions, the application has the following advantages:
This application provides a kind of power monitoring Host Securities to check system, comprising: safety inspection terminal and portable number
According to sampling instrument;The portable data acquisition tool is configured as: when the portable data acquisition tool and test object
After establishing communication connection, corresponding inspection item data is obtained from the test object according to preset data acquisition instructions and is protected
It deposits;The safety inspection terminal is configured as: being established and is led to when the safety inspection terminal and the portable data acquisition tool
After letter connection, the inspection item data is read, and Data Matching and model point are carried out by preset feature database and risk model
Analysis, exports the safety inspection result of the test object.
The application is held as metadata acquisition tool by being directly accessed test object by portable data acquisition tool
The preset check item instruction of row obtains host configuration information and will check that USB flash disk tool is written in data, to execute subsequent safety
Analytical procedure solves existing distributed transformer substation and needs to be carry the bulky live inspection of inspection equipment progress by staff
It looks into, checks the not convenient technical problem of work.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application without any creative labor, may be used also for those of ordinary skill in the art
To obtain other attached drawings according to these attached drawings.
Fig. 1 is the system architecture of one embodiment that a kind of power monitoring Host Security provided by the present application checks system
Figure;
Fig. 2 is the structure of the safety inspection terminal in a kind of power monitoring Host Security inspection system provided by the present application
Figure;
Fig. 3 is the framework of the safety inspection terminal in a kind of power monitoring Host Security inspection system provided by the present application
Figure.
Specific embodiment
The embodiment of the present application provides a kind of power monitoring Host Security inspection system, for solving existing distributed change
Power station checks the not convenient technical problem of work.
To enable present invention purpose, feature, advantage more obvious and understandable, below in conjunction with the application
Attached drawing in embodiment, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that disclosed below
Embodiment be only some embodiments of the present application, and not all embodiment.Based on the embodiment in the application, this field
Those of ordinary skill's all other embodiment obtained without making creative work belongs to the application protection
Range.
It please refers to Fig.1 to Fig.3, this application provides a kind of power monitoring Host Securities to check system, comprising: safety inspection
Terminal 1 and portable data acquisition tool 2;
The portable data acquisition tool 2 is configured as: when the portable data acquisition tool 2 is built with test object
After vertical communication connection, corresponding inspection item data is obtained from the test object according to preset data acquisition instructions and is protected
It deposits;
The safety inspection terminal 1 is configured as: when the safety inspection terminal 1 and the portable data acquisition tool
After 2 establish communication connection, read the inspection item data, and by preset feature database and risk model carry out Data Matching with
Model analysis exports the safety inspection result of the test object.
It should be noted that the present embodiment passes through the electricity that is made of portable data acquisition tool 2 and safety inspection terminal 1
Power monitoring host computer safety check system, wherein the portable data acquisition tool 2 of the present embodiment be a kind of storage equipment (such as USB flash disk,
Storage card etc.), inside structure includes the area ROM and the area DATA, and wherein the area ROM is stored with preset data acquisition instructions, works as institute
It states portable data acquisition tool 2 and test object is established after communicating to connect, portable data acquisition tool 2 starts to execute preset
Data acquisition instructions, corresponding inspection item data is obtained from the test object according to preset data acquisition instructions and is write
Enter the area DATA to portable data acquisition tool 2.
More specifically, the process that the portable data acquisition tool 2 of the application acquires data is specific as follows:
1) USB flash disk, the inspection program of booting ROM, in addition, starting are being checked by the USB interface insertion of assessment object
After checking program, operation interface can also be provided by program for inspection personnel's configuration management assessment project, and confirm assessment work
Make;
2) start the check item in the reading area ROM, and obtain inspection order;
3) it executes and checks order;
4) inspection result is obtained;
5) buffer area is written into inspection result, for the generation of subsequent examination result;
6) determine to check whether completion, if do not completed, read next check item;If completion entirely checked
Journey then opens the write-in of the region DATA;
7) region DATA is opened;
8) data that the result and acquisition that check are read in from buffer area generate report, and the region DATA are written in report;
9) region DATA is closed, the data acquisition of USB flash disk tool is completed and is checked.
The present embodiment can be filled by using the data of portable 2 acquisition testing object of portable data acquisition tool
The pocket for entering clothing, is carried, and bulky inspection can only be carry eventually by staff by overcoming traditional test mode
End, by checking terminal and the direct-connected acquisition data of test object, the caused technical problem for checking that work is not convenient.
In addition, the portable data acquisition tool 2 of the present embodiment accesses measurand using USB port, in measurand
It enables and checks program, item is executed by configurable interface selection, execute inspection, the data such as acquisition configuration, virus and loophole, and
Safety zone finally is written into collection result, wherein what the realization of safety zone was realized by custom interface API, i.e., by fixed
USB flash disk sampling instrument storage region is divided into the area ROM and the area DATA by API processed.Wherein the area ROM, which is used to store, executes the executable of inspection
Program can only be written by specific software;The area DATA storage acquisition data, can only be written the region by executable program.It is logical
The Read-write Catrol malicious code that can effectively prevent U mouthfuls and checked between each host, and occur in the area Guo Dui ROM, the area DATA
Cross-infection problem.
Then the check item for being stored in the area portable data acquisition tool 2DATA is read out by safety inspection terminal 1 again
Data, and analyzed by property data base built in safety inspection terminal 1 and risk analysis model, obtain test object
Safety inspection result.
More specifically, the portable data acquisition tool 2 is specially portable data acquisition USB flash disk.
More specifically, the safety inspection terminal 1 is specially portable PC machine, wherein safety inspection terminal 1 includes multiple
USB interface, network interface and serial ports, hardware are the three proofings notebook of specific customization, and feature is waterproof, shatter-resistant, dust-proof;Software is
Electric power monitoring system safety inspection software.
More specifically, the portable data acquisition tool 2 specifically includes: portable configuration metadata acquisition tool, portable
Formula virus metadata acquisition tool and portable loophole metadata acquisition tool.
More specifically, the portable configuration metadata acquisition tool is specifically configured to:
After the portable configuration metadata acquisition tool and test object, which are established, to be communicated to connect, according to preset configuration number
Corresponding each configuration inspection item data is obtained one by one from the test object according to acquisition instructions, when having obtained all inspections
After item data, all inspection item datas are uniformly written in the portable configuration metadata acquisition tool and are saved.
More specifically, the portable viral metadata acquisition tool is specifically configured to:
When the portable viral metadata acquisition tool and test object are established after communication connection, according to preset viral number
Corresponding each virus checking item data is obtained one by one from the test object according to acquisition instructions, when having obtained all inspections
After item data, all inspection item datas are uniformly written in the portable viral metadata acquisition tool and are saved.
More specifically, the portable loophole metadata acquisition tool is specifically configured to:
After the portable loophole metadata acquisition tool and test object, which are established, to be communicated to connect, according to preset loophole number
It obtains corresponding each loophole one by one from the test object according to acquisition instructions and checks item data, when having obtained all inspections
After item data, all inspection item datas are uniformly written in the portable loophole metadata acquisition tool and are saved.
More specifically, the safety inspection terminal 1 specifically includes: data acquisition module 101 and comprehensive analysis module 103;
The data acquisition module 101 is specifically configured to: when the data acquisition module and the portable data are adopted
After collection tool 2 establishes communication connection, the inspection item data saved in the portable data acquisition tool 2 is read;
The comprehensive analysis module 103 is specifically configured to: according to the inspection item data read, from the inspection
Item data extracts corresponding data characteristics, and carries out Data Matching, output by the data characteristics and preset feature database
The safety inspection result of the test object.
More specifically, the safety inspection terminal 1 further include: preprocessing module 102;
The preprocessing module 102 is specifically configured to: to the data characteristics extracted be formatted processing and
Serializing processing.
Preferably, safety inspection terminal 1 further include: display module 104;
Display module 104 is configured as: the safety inspection result is shown according to preset displaying condition.
More specifically, the preset feature database specifically includes: baseline characteristic library, malicious code feature database and system vulnerability
Feature database.
It should be noted that please refer to Fig. 2 and Fig. 3, the software architecture of the safety inspection terminal 1 of the present embodiment from bottom to
Upper layer is divided into data collection layer, pretreatment layer, comprehensive analysis layer and presentation layer.
The data acquisition module of data collection layer, that is, above-mentioned, including configuration information acquisition submodule, virus characteristic acquisition
Module and loophole collection apparatus submodule, each module are respectively portable configuration acquisition USB flash disk tool, virus collection USB flash disk tool, leakage
Hole acquisition USB flash disk tool is adapted to, and the data from the 3 class Portable U disk sampling instrument are received.
The preprocessing module of pretreatment layer, that is, above-mentioned is responsible for carrying out the configuration of acquisition, malicious code and loophole feature pre-
Acquisition data are carried out serializing and formatting are handled, meet the matching condition of feature database by processing.
The comprehensive analysis module of comprehensive analysis layer, that is, above-mentioned, data collected are counted for binding characteristic library,
Analysis and processing specifically carry out modeling analysis to acquisition data according to risk evaluation model, while according to power industry grade
The requirement of protection carries out processing to data and secure match is analyzed, and exports the safety inspection result of the test object.
Wherein, the feature database of the present embodiment includes Configuration baseline library, malicious code library and vulnerability database, and wherein baseline library is row
Baseline library is advised in the electric power monitoring system conjunction of industry, enterprise, it is desirable that meets the inspection requirements of industry and enterprise;Malicious code feature database and
Vulnerability database is based on China national information security vulnerability database (CNNVD), in conjunction with the malicious code feature database of enterprise itself and leakage
Cave depot is updated and safeguards.
Presentation layer, that is, above-mentioned display module is mainly wrapped for safety inspection result to be shown according to prerequisite
Include the displaying of conjunction rule item, irregularity item is shown, different assessment object lateral comparisons are shown and identical assessment object longitudinal comparison displaying.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The description of the present application and term " first " in above-mentioned attached drawing, " second ", " third ", " the 4th " etc. are (if deposited
) it is to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that use in this way
Data are interchangeable under appropriate circumstances, so that embodiments herein described herein for example can be in addition to illustrating herein
Or the sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that
Cover it is non-exclusive include, for example, containing the process, method, system, product or equipment of a series of steps or units need not limit
In step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, produce
The other step or units of product or equipment inherently.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before
Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of power monitoring Host Security checks system characterized by comprising safety inspection terminal and portable data are adopted
Collection tool;
The portable data acquisition tool is configured as: when the portable data acquisition tool is communicated with test object foundation
After connection, corresponding inspection item data is obtained from the test object according to preset data acquisition instructions and is saved;
The safety inspection terminal is configured as: being established and is led to when the safety inspection terminal and the portable data acquisition tool
After letter connection, the inspection item data is read, and Data Matching and model point are carried out by preset feature database and risk model
Analysis, exports the safety inspection result of the test object.
2. a kind of power monitoring Host Security according to claim 1 checks system, which is characterized in that the portable number
It is specifically included according to sampling instrument: portable configuration metadata acquisition tool, portable viral metadata acquisition tool and portable leakage
Hole metadata acquisition tool.
3. a kind of power monitoring Host Security according to claim 2 checks system, which is characterized in that described portable to match
Metadata acquisition tool is set to be specifically configured to:
After the portable configuration metadata acquisition tool and test object, which are established, to be communicated to connect, adopted according to preset configuration data
Collection instruction obtains corresponding each configuration inspection item data one by one from the test object, when having obtained all inspection item numbers
According to rear, all inspection item datas are uniformly written in the portable configuration metadata acquisition tool and are saved.
4. a kind of power monitoring Host Security according to claim 2 checks system, which is characterized in that the Portable disease
Malicious metadata acquisition tool is specifically configured to:
After the portable viral metadata acquisition tool and test object establish communication connection, adopted according to preset viral data
Collection instruction obtains corresponding each virus checking item data one by one from the test object, when having obtained all inspection item numbers
According to rear, all inspection item datas are uniformly written in the portable viral metadata acquisition tool and are saved.
5. a kind of power monitoring Host Security according to claim 2 checks system, which is characterized in that the portable leakage
Hole metadata acquisition tool is specifically configured to:
After the portable loophole metadata acquisition tool and test object, which are established, to be communicated to connect, adopted according to preset loophole data
Collection instruction obtains corresponding each loophole one by one from the test object and checks item data, when having obtained all inspection item numbers
According to rear, all inspection item datas are uniformly written in the portable loophole metadata acquisition tool and are saved.
6. a kind of power monitoring Host Security according to claim 1 checks system, which is characterized in that the safety inspection
Terminal specifically includes: data acquisition module and comprehensive analysis module;
The data acquisition module is specifically configured to: when the data acquisition module and the portable data acquisition tool are built
After vertical communication connection, the inspection item data saved in the portable data acquisition tool is read;
The comprehensive analysis module is specifically configured to: according to the inspection item data read, from the inspection item data
Corresponding data characteristics is extracted, and Data Matching is carried out by the data characteristics and preset feature database, exports the inspection
Survey the safety inspection result of object.
7. a kind of power monitoring Host Security according to claim 6 checks system, which is characterized in that the safety inspection
Terminal further include: preprocessing module;
The preprocessing module is specifically configured to: being formatted at processing and serializing to the data characteristics extracted
Reason.
8. a kind of power monitoring Host Security according to claim 6 checks system, which is characterized in that the safety inspection
Terminal further include: display module;
The display module is configured as: the safety inspection result is shown according to preset displaying condition.
9. a kind of power monitoring Host Security according to claim 1 checks system, which is characterized in that the preset spy
Sign library specifically includes: baseline characteristic library, malicious code feature database and system vulnerability feature database.
10. checking system to a kind of power monitoring Host Security described in 9 any one according to claim 1, which is characterized in that
The safety inspection terminal is specially portable PC machine;
The portable data acquisition tool is specially portable data acquisition USB flash disk.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811624084.0A CN109687586A (en) | 2018-12-28 | 2018-12-28 | A kind of power monitoring Host Security inspection system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811624084.0A CN109687586A (en) | 2018-12-28 | 2018-12-28 | A kind of power monitoring Host Security inspection system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109687586A true CN109687586A (en) | 2019-04-26 |
Family
ID=66190855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811624084.0A Pending CN109687586A (en) | 2018-12-28 | 2018-12-28 | A kind of power monitoring Host Security inspection system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109687586A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111414394A (en) * | 2020-03-31 | 2020-07-14 | 上海观安信息技术股份有限公司 | Power grid company compliance checking and tracking method and system |
CN115118481A (en) * | 2022-06-22 | 2022-09-27 | 深圳星云智联科技有限公司 | Host information acquisition method, device, equipment and medium |
CN116723123A (en) * | 2023-07-13 | 2023-09-08 | 浙江齐安信息科技有限公司 | Method, terminal and storage medium for checking and managing safety configuration of industrial control host |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107578345A (en) * | 2017-09-08 | 2018-01-12 | 南方电网科学研究院有限责任公司 | Power system security detection method, device, storage medium and computer equipment |
CN108133148A (en) * | 2017-12-22 | 2018-06-08 | 北京明朝万达科技股份有限公司 | Data safety inspection method and system |
-
2018
- 2018-12-28 CN CN201811624084.0A patent/CN109687586A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107578345A (en) * | 2017-09-08 | 2018-01-12 | 南方电网科学研究院有限责任公司 | Power system security detection method, device, storage medium and computer equipment |
CN108133148A (en) * | 2017-12-22 | 2018-06-08 | 北京明朝万达科技股份有限公司 | Data safety inspection method and system |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111414394A (en) * | 2020-03-31 | 2020-07-14 | 上海观安信息技术股份有限公司 | Power grid company compliance checking and tracking method and system |
CN115118481A (en) * | 2022-06-22 | 2022-09-27 | 深圳星云智联科技有限公司 | Host information acquisition method, device, equipment and medium |
CN115118481B (en) * | 2022-06-22 | 2023-11-21 | 深圳星云智联科技有限公司 | Host information acquisition method, device, equipment and medium |
CN116723123A (en) * | 2023-07-13 | 2023-09-08 | 浙江齐安信息科技有限公司 | Method, terminal and storage medium for checking and managing safety configuration of industrial control host |
CN116723123B (en) * | 2023-07-13 | 2024-03-08 | 浙江齐安信息科技有限公司 | Method, terminal and storage medium for checking and managing safety configuration of industrial control host |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109687586A (en) | A kind of power monitoring Host Security inspection system | |
CN108734012A (en) | Malware recognition methods, device and electronic equipment | |
CN107341399A (en) | Assess the method and device of code file security | |
CN106327720A (en) | Book drifting cabinet | |
CN108596759A (en) | loan application information detecting method and server | |
CN113192564B (en) | Management system and method for high-safety stem cell storage | |
CN103955429B (en) | Determine the method and device of regression test scope | |
CN110377522A (en) | The test method for scene of trading, calculates equipment and medium at device | |
CN110609908A (en) | Case serial-parallel method and device | |
CN108021788A (en) | The method and apparatus of deep sequencing data extraction biomarker based on cell free DNA | |
CN108710644A (en) | One kind is about government affairs big data processing method | |
CN110009480A (en) | The recommended method in judicial collection path, device, medium, electronic equipment | |
CN107944866B (en) | Transaction record duplication elimination method and computer-readable storage medium | |
CN106844131A (en) | A kind of computer motherboard detection method based on soar platform and kylin operating system | |
CN111931047A (en) | Artificial intelligence-based black product account detection method and related device | |
CN105978722B (en) | User property method for digging and device | |
CN106528566A (en) | Log file output method, server and client | |
Foster et al. | Needed: more reliable bioeffects studies at “high band” 5G frequencies | |
CN109800797A (en) | File black and white judgment method, device and equipment based on AI | |
Punyasena et al. | Bioinformatic and biometric methods in plant morphology | |
CN108734010A (en) | The method, apparatus of file detection | |
CN114566247B (en) | Automatic CRF generation method and device, electronic equipment and storage medium | |
CN110189141A (en) | Verification method, device and the computer equipment of invoice | |
CN109242548A (en) | A kind of sales lead recognition methods of knowledge based map and device | |
CN115310091A (en) | Target security level identification method and device based on fusion model and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190426 |
|
RJ01 | Rejection of invention patent application after publication |