CN114268457A - Multi-protocol multi-service public network security access method - Google Patents

Multi-protocol multi-service public network security access method Download PDF

Info

Publication number
CN114268457A
CN114268457A CN202111394957.5A CN202111394957A CN114268457A CN 114268457 A CN114268457 A CN 114268457A CN 202111394957 A CN202111394957 A CN 202111394957A CN 114268457 A CN114268457 A CN 114268457A
Authority
CN
China
Prior art keywords
server
file
module
instruction
protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111394957.5A
Other languages
Chinese (zh)
Inventor
胡厚鹏
张丽娟
李慧娟
母天石
赖宇阳
吴昊
王依云
邓建锋
肖艳红
欧家祥
陈泽瑞
邓玥丹
李航峰
高正浩
吴欣
何沛林
董天强
吴才远
余云昊
宋强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Power Grid Co Ltd
Southern Power Grid Digital Grid Research Institute Co Ltd
Original Assignee
Guizhou Power Grid Co Ltd
Southern Power Grid Digital Grid Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Power Grid Co Ltd, Southern Power Grid Digital Grid Research Institute Co Ltd filed Critical Guizhou Power Grid Co Ltd
Priority to CN202111394957.5A priority Critical patent/CN114268457A/en
Publication of CN114268457A publication Critical patent/CN114268457A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The invention relates to the technical field of public network security access, in particular to a multi-protocol multi-service public network security access method; the power station system is divided into a centralized control center system and a power plant equipment system according to functions, and encryption equipment, a service server, a data acquisition server, a switch, load balancing equipment, a core firewall, a database auditing system, an anti-virus gateway, an intrusion detection system, a public network front server, a forward isolation device, a reverse isolation device, a protocol conversion server and a fortress machine are arranged in the centralized control center system and the power plant equipment system; the invention can effectively solve the problem that the prior art can not meet the requirement of multi-protocol multi-service safety access of a power grid system to a public network.

Description

Multi-protocol multi-service public network security access method
Technical Field
The invention relates to the technical field of public network security access, in particular to a multi-protocol multi-service public network security access method.
Background
The conventional security access area is mainly used for a system with a single service and a single protocol and is usually deployed on a data acquisition side, but in a wind power centralized control system, network security protection is required to be performed on a centralized control side and a station side, namely, the security access area system is required to be installed, and obviously, the conventional security access area system cannot meet the requirements. In addition, when the data in the security access area passes through the isolation device, the original data packet needs to be converted into a private protocol, however, the problems that the wind power centralized control service servers are numerous and protocols of the service servers are inconsistent are solved, and the conventional security access area system needs to convert the private protocol of the service data in each service server, so that the original communication protocol is changed, and the networking mode becomes complicated.
Disclosure of Invention
Solves the technical problem
Aiming at the defects in the prior art, the invention provides a multi-protocol multi-service public network security access method, which can effectively solve the problem that the prior art can not meet the requirement of multi-protocol multi-service security access of a power grid system to a public network.
Technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme:
a multi-protocol multi-service public network security access method comprises the following steps:
the method comprises the following steps that (1) a power station system is divided into a centralized control center system and a power generation field equipment system according to functions;
step (2), configuring a first encryption device, a first service server, a first data acquisition server, a first switch, a first load balancing device, a first core firewall, a first database auditing system, a first antivirus gateway, a first intrusion detection system, a first public network front-end server, a first forward isolation device, a first reverse isolation device and a first protocol conversion server in the centralized control center system, connecting the first service server and the first data acquisition server to the first switch in a parallel manner, connecting the first switch to the rear end of the first protocol conversion server, connecting the front end of the first protocol conversion server to the first forward isolation device and the first reverse isolation device in a parallel relationship respectively, connecting the front ends of the first forward isolation device and the first reverse isolation device in a parallel relationship to the rear end of the first public network front-end server respectively, connecting the front end of the first public network front-end server to first encryption equipment, arranging first load balancing equipment at two ends of the first switch, arranging a first core firewall at the rear end of the first encryption equipment, arranging a first antivirus gateway at the front end of the first encryption equipment, and arranging a first database auditing system and a first intrusion detection system in the first service server, the first data acquisition server, the first public network front-end server and the first protocol conversion server;
step (3), configuring a second encryption device, a second service server, a second data acquisition server, a second switch, a second load balancing device, a second core firewall, a second database auditing system, a second antivirus gateway, a second intrusion detection system, a second public network front-end server, a second forward isolation device, a second reverse isolation device and a second protocol conversion server in the power plant equipment system, connecting the second service server and the second data acquisition server to the second switch in parallel, connecting the second switch to the rear end of the second protocol conversion server, connecting the front end of the second protocol conversion server to the second forward isolation device and the second reverse isolation device in parallel respectively, connecting the front ends of the second forward isolation device and the second reverse isolation device in parallel to the rear end of the second public network front-end server respectively, connecting the front end of the second public network front-end server to second encryption equipment, arranging second load balancing equipment at two ends of the second switch, arranging a second core firewall at the rear end of the second encryption equipment, arranging a second antivirus gateway at the front end of the second encryption equipment, and arranging a second database auditing system and a second intrusion detection system in the second service server, the second data acquisition server, the second public network front-end server and the second protocol conversion server;
step (4), a channel selection module for connecting a plurality of channels of the power station system is further arranged on the second switch;
and (5) a plurality of fourth encryption devices are connected to the channel selection module in parallel, a near-end router is further arranged at the rear end of each fourth encryption device, a far-end router is arranged at the rear end of each near-end router, a third encryption device is arranged at the rear end of each far-end router, a third switch is arranged at the rear end of each third encryption device, and a third service server and a third data acquisition server are connected to the rear end of each third switch in parallel.
Furthermore, in the step (1), a public network data communication channel is arranged between the centralized control center system and the power generation field equipment system.
Furthermore, in the step (2) and the step (3), the first protocol conversion server is further connected with a control module; a first instruction receiving module, a first file generating module and a first file sending module which are connected in sequence are arranged in the first protocol conversion server; a first file receiving module, a first analysis module and a first instruction sending module which are connected in sequence are arranged in the first public network front server; a second instruction receiving module, a second file generating module and a second file sending module which are connected in sequence are arranged in the second public network front server; and a second file receiving module, a second analysis module and a second instruction sending module which are connected in sequence are arranged in the second protocol conversion server.
Furthermore, the control module generates a control instruction and sends the control instruction to the first instruction receiving module, then the first file generating module generates an instruction file based on the control instruction received by the first instruction receiving module, then the first file sending module sends the instruction file to the first file receiving module through the first forward isolation device, then the first parsing module generates a standard remote control message based on the instruction file received by the first file receiving module, then the first instruction sending module sends the remote control message to the second instruction receiving module through the first encryption device and the second encryption device, then the second file generating module generates the instruction file based on the remote control message received by the second instruction receiving module, then the second file sending module sends the instruction message to the second file receiving module through the second reverse isolation device, and then the second parsing module parses and extracts the instruction file based on the instruction file received by the second file receiving module And finally, the second instruction sending module distributes the control instruction extracted by the second analysis module to corresponding equipment according to a standard protocol.
Furthermore, the second file receiving module receives external data, the second parsing module parses and converts the external data into a private protocol based on the instruction file received by the second file receiving module, the second instruction sending module sends the private protocol to the second instruction receiving module through the second forward isolation device, the second file generating module converts the private protocol received by the second instruction receiving module into the previous standard protocol data based on the private protocol received by the second instruction receiving module, the second file sending module sends the standard protocol data to the first file receiving module through the first encryption device and the second encryption device, the first parsing module converts the standard protocol data received by the first file receiving module into the private protocol based on the first file receiving module, and the first instruction sending module sends the private protocol to the first instruction receiving module through the first reverse isolation device, and finally, the first file sending module distributes the protocol file to a corresponding first service server or a corresponding first data acquisition server.
Furthermore, in the step (5), a power grid data network channel is arranged between the far-end router and the near-end router.
Furthermore, bastion machines are arranged in the centralized control center system and the power plant equipment system.
Further, the fort machines each comprise a prime machine and a standby machine.
Advantageous effects
Compared with the known public technology, the technical scheme provided by the invention has the following beneficial effects:
the power station system is separated in a modularization mode, so that communication between all service servers in the power station system does not need to be subjected to data conversion independently, data transmission between a centralized control center system and a power generation field equipment system is realized through a standard communication protocol used by the power station system, in addition, a channel selection module for connecting a plurality of channels of the power station system is further arranged on the second switch, a user can expand a newly-added service server through the channel selection module, bidirectional identity verification is realized through encryption equipment, and meanwhile, the system is monitored, protected and adjusted in real time through load balancing equipment, a core firewall, a database auditing system, an anti-virus gateway and an intrusion detection system, so that the power grid system can realize access public network with multi-protocol and multi-service safety.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
FIG. 1 is a schematic diagram of a control relationship connection according to the present invention;
FIG. 2 is a flow chart of data download in the present invention;
fig. 3 is a flowchart of data upload in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The present invention will be further described with reference to the following examples.
Examples
A secure access method for a multi-protocol multi-service public network according to this embodiment is described with reference to fig. 1 to 3: the method comprises the following steps:
the method comprises the following steps that (1) a power station system is divided into a centralized control center system and a power generation field equipment system according to functions; and a public network data communication channel is arranged between the centralized control center system and the power generation field equipment system.
Step (2), configuring a first encryption device, a first service server, a first data acquisition server, a first switch, a first load balancing device, a first core firewall, a first database auditing system, a first antivirus gateway, a first intrusion detection system, a first public network front-end server, a first forward isolation device, a first reverse isolation device and a first protocol conversion server in a centralized control center system, connecting the first service server and the first data acquisition server to the first switch in a parallel manner, connecting the first switch to the rear end of the first protocol conversion server, connecting the front end of the first protocol conversion server to the first forward isolation device and the first reverse isolation device in a parallel relationship respectively, connecting the front ends of the first forward isolation device and the first reverse isolation device in a parallel relationship to the rear end of the first public network front-end server respectively, the front end of a first public network front-end server is connected to first encryption equipment, first load balancing equipment is arranged at two ends of a first switch, a first core firewall is arranged at the rear end of the first encryption equipment, a first anti-virus gateway is arranged at the front end of the first encryption equipment, and a first database auditing system and a first intrusion detection system are arranged in a first service server, a first data acquisition server, the first public network front-end server and a first protocol conversion server.
Step (3), configuring a second encryption device, a second service server, a second data acquisition server, a second switch, a second load balancing device, a second core firewall, a second database auditing system, a second antivirus gateway, a second intrusion detection system, a second public network front-end server, a second forward isolation device, a second reverse isolation device and a second protocol conversion server in the power plant equipment system, connecting the second service server and the second data acquisition server to the second switch in a parallel manner, connecting the second switch to the rear end of the second protocol conversion server, connecting the second forward isolation device and the second reverse isolation device in a parallel relationship to the front end of the second protocol conversion server respectively, connecting the front ends of the second forward isolation device and the second reverse isolation device in a parallel relationship to the rear end of the second public network front-end server respectively, the front end of the second public network front server is connected to a second encryption device, second load balancing devices are arranged at two ends of a second switch, a second core firewall is arranged at the rear end of the second encryption device, a second antivirus gateway is arranged at the front end of the second encryption device, and a second database auditing system and a second intrusion detection system are arranged in a second service server, a second data acquisition server, the second public network front server and a second protocol conversion server.
It is worth noting that: the first protocol conversion server is also connected with a control module; a first instruction receiving module, a first file generating module and a first file sending module which are connected in sequence are arranged in the first protocol conversion server; a first file receiving module, a first analysis module and a first instruction sending module which are connected in sequence are arranged in the first public network front server; a second instruction receiving module, a second file generating module and a second file sending module which are connected in sequence are arranged in the front server of the second public network; and a second file receiving module, a second analysis module and a second instruction sending module which are connected in sequence are arranged in the second protocol conversion server.
Wherein, the first core firewall and the second core firewall have the functions of: fine-grained (IP address, TCP/UDP port, ICMP type, etc.) control is carried out on the network data flow, legal network data transmission is allowed, and illegal network communication is refused; explicit allow/deny access to data streams may be provided based on session state information; the control port and the connection are terminated after the session is inactive for a certain time or the session is finished; limiting the number of connections and concurrency of a certain IP; illegal detection and access can be prevented; and the internal port is shielded, and scanning detection and illegal attack from an external network are prevented.
Wherein the first load balancing device and the second load balancing device act as: managing the access server and the flow returned by the server, and intelligently distributing the flow of the access server to the optimal server through various static and dynamic load sharing algorithms; the flow can be gradually distributed to the newly accessed server, thereby avoiding the situation that the system resource occupation is too high due to the fact that some processes of the server are not loaded completely or the application response is slow, and realizing the smooth access of the server; the running state of the server is regularly detected in real time, and when a server fault is found, the server is moved out of the queue shared by the flow, so that the running stability of the server is ensured. The acceleration and the unloading of the SSL protocol greatly improve the service processing capacity of the server and can not bring performance bottleneck to the service.
The first database auditing system and the second database auditing system have the functions of: the method ensures that the service system and the network information data are not damaged, divulged and stolen by users, and various technical means are used for monitoring the database operation behavior, the network behavior and the communication content in the network environment in real time so as to be convenient for centralized collection, analysis, alarm and processing; the global control and scheduling capability of the information resources of the service system can be comprehensively realized; constantly monitoring for access to important resources; after a security event occurs, an attacker can be traced step by step according to detailed audit and database audit records; finding out the real reasons causing the safety event and the performance fluctuation; the method helps users strengthen network behavior supervision and meet compliance requirements of internal control or external policies and the like.
Wherein, the first anti-virus gateway and the second anti-virus gateway are used for: fine-grained (IP address, TCP/UDP port, ICMP type, etc.) control is carried out on the network data flow, legal network data transmission is allowed, and illegal network communication is refused; explicit allow/deny access to data streams may be provided based on session state information; the control port and the connection are terminated after the session is inactive for a certain time or the session is finished; shielding the internal port to prevent scanning detection and illegal attack from the external network; and intercepting the virus attack event, recording the source and destination information of the event one by one, and assisting a user to know the virus attack details by a visualization technology.
Wherein, the first intrusion detection system and the second intrusion detection system have the following functions: the method comprises the steps of monitoring network transmission in real time, automatically detecting suspicious behaviors, analyzing intrusion signals from the outside and the inside of the network, sending out a warning before the system is damaged, responding to an attack in real time, providing remedial measures and providing safety guarantee for the network system to the greatest extent. The intrusion detection system consists of two parts: the system comprises a detector and a safety control center, wherein the safety control center is installed on a server, and the detector is independent hardware. The detector is responsible for intercepting and capturing data streams on the network, performing real-time protocol analysis and realizing safety rules. The safety control center is responsible for controlling the detector, generating safety rules, receiving alarm and log information and providing a network safety audit report. Attack behavior can be monitored: port scanning, brute force attack, Trojan backdoor attack, denial of service attack, cache overflow attack, IP fragment attack, network worm attack and the like; when an attack behavior is detected, recording an attack source IP, an attack type, an attack purpose and attack time, and providing an alarm when serious invasion occurs; abundant reports can be generated regularly, so that people can further know the safety state of the whole network; the total flow in the current network and the clockwise flow in a certain time period can be known in real time.
Among them, the first forward direction isolation device (second forward direction isolation device) possesses the following functions: 1) the safe data exchange in a non-network mode between the two safe areas is realized, and the internal and external processing systems of the safety isolation device are ensured not to be communicated at the same time; 2) a transparent working mode, namely, virtualizing an IP address and hiding an MAC address of a host; 3) comprehensive message filtering and access control based on MAC, IP, transmission protocol, transmission port and communication direction; 4) support for NAT; 5) penetration resistant TCP connections: the TCP connection is forbidden to be directly established between the two application gateways of the internal network and the external network, the internal network card and the external network card of the isolation device are in non-network connection inside the device, and only the unidirectional transmission of data is allowed to be realized in a physical mode.
Wherein, the first reverse isolation device (second reverse isolation device) has all functions of the first forward isolation device (second forward isolation device) and also has the following functions: firstly, a data sending end in a safety area III signs a signature on data needing to be sent and then sends the signature to a reverse special isolating device; after receiving the data, the special isolation device performs signature verification, and performs content filtering, validity checking and other processing on the data; and thirdly, the processed data is forwarded to a receiving program in the safety zone I/II.
And (4) a channel selection module for connecting a plurality of channels of the power station system is further arranged on the second switch.
Step (5), a plurality of fourth encryption devices are connected to the channel selection module in parallel, a near-end router is further arranged at the rear end of each fourth encryption device, a far-end router is arranged at the rear end of each near-end router, a third encryption device is arranged at the rear end of each far-end router, a third switch is arranged at the rear end of each third encryption device, and a third service server and a third data acquisition server are connected to the rear end of each third switch in parallel; and a power grid data network channel is arranged between the far-end router and the near-end router.
It is worth noting that: and bastion machines are arranged in the centralized control center system and the power plant equipment system.
(ii) a And the fort machines comprise a main force machine and a standby machine, namely, the standby machine can automatically take over service only when the main machine fails, so that the operation reliability of the power station system is improved.
The process that the centralized control center system issues data to the power plant equipment system comprises the following steps:
step1, the control module generates a control command and sends the control command to the first command receiving module.
And Step2, the first file generation module generates an instruction file based on the control instruction received by the first instruction receiving module.
Step3, the first file sending module sends the instruction file to the first file receiving module through the first forward isolating device.
And Step4, the first parsing module generates a remote control message of a standard protocol based on the instruction file received by the first file receiving module.
And Step5, the first instruction sending module sends the remote control message to the second instruction receiving module through the first encryption device and the second encryption device.
And Step6, the second file generating module generates an instruction file based on the remote control message received by the second instruction receiving module.
And Step7, the second file sending module sends the instruction message to the second file receiving module through the second reverse isolation device.
And Step8, the second parsing module parses the command file received by the second file receiving module and extracts the control command.
And Step9, the second instruction sending module distributes the control instruction extracted by the second parsing module to the corresponding device according to the standard specification.
The process of uploading data from the power plant equipment system to the centralized control center system comprises the following steps:
step1, the second file receiving module receives the external data.
And Step2, the second parsing module parses the instruction file received by the second file receiving module and converts the instruction file into a private protocol.
Step3, the second instruction sending module sends the private protocol to the second instruction receiving module via the second forward isolation device.
Step4, the second file generation module converts the private protocol received by the second instruction receiving module into the previous standard protocol data.
And Step5, the second file sending module sends the standard protocol data to the first file receiving module through the first encryption device and the second encryption device.
Step6, the first parsing module converts the standard protocol data received by the first file receiving module into a private protocol.
Step7, the first instruction sending module sends the private protocol to the first instruction receiving module through the first reverse isolation device.
Step8, the first file generation module converts the private protocol received by the first instruction receiving module into a corresponding protocol file.
Step10, the first file sending module distributes the protocol file to the corresponding first service server or first data acquisition server.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", and the like, indicate orientations and positional relationships based on those shown in the drawings, and are used only for convenience of description and simplicity of description, and do not indicate or imply that the equipment or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be considered as limiting the present invention.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (8)

1. A multi-protocol multi-service public network security access method is characterized in that: the method comprises the following steps:
the method comprises the following steps that (1) a power station system is divided into a centralized control center system and a power generation field equipment system according to functions;
step (2), configuring a first encryption device, a first service server, a first data acquisition server, a first switch, a first load balancing device, a first core firewall, a first database auditing system, a first antivirus gateway, a first intrusion detection system, a first public network front-end server, a first forward isolation device, a first reverse isolation device and a first protocol conversion server in the centralized control center system, connecting the first service server and the first data acquisition server to the first switch in a parallel manner, connecting the first switch to the rear end of the first protocol conversion server, connecting the front end of the first protocol conversion server to the first forward isolation device and the first reverse isolation device in a parallel relationship respectively, connecting the front ends of the first forward isolation device and the first reverse isolation device in a parallel relationship to the rear end of the first public network front-end server respectively, connecting the front end of the first public network front-end server to first encryption equipment, arranging first load balancing equipment at two ends of the first switch, arranging a first core firewall at the rear end of the first encryption equipment, arranging a first antivirus gateway at the front end of the first encryption equipment, and arranging a first database auditing system and a first intrusion detection system in the first service server, the first data acquisition server, the first public network front-end server and the first protocol conversion server;
step (3), configuring a second encryption device, a second service server, a second data acquisition server, a second switch, a second load balancing device, a second core firewall, a second database auditing system, a second antivirus gateway, a second intrusion detection system, a second public network front-end server, a second forward isolation device, a second reverse isolation device and a second protocol conversion server in the power plant equipment system, connecting the second service server and the second data acquisition server to the second switch in parallel, connecting the second switch to the rear end of the second protocol conversion server, connecting the front end of the second protocol conversion server to the second forward isolation device and the second reverse isolation device in parallel respectively, connecting the front ends of the second forward isolation device and the second reverse isolation device in parallel to the rear end of the second public network front-end server respectively, connecting the front end of the second public network front-end server to second encryption equipment, arranging second load balancing equipment at two ends of the second switch, arranging a second core firewall at the rear end of the second encryption equipment, arranging a second antivirus gateway at the front end of the second encryption equipment, and arranging a second database auditing system and a second intrusion detection system in the second service server, the second data acquisition server, the second public network front-end server and the second protocol conversion server;
step (4), a channel selection module for connecting a plurality of channels of the power station system is further arranged on the second switch;
and (5) a plurality of fourth encryption devices are connected to the channel selection module in parallel, a near-end router is further arranged at the rear end of each fourth encryption device, a far-end router is arranged at the rear end of each near-end router, a third encryption device is arranged at the rear end of each far-end router, a third switch is arranged at the rear end of each third encryption device, and a third service server and a third data acquisition server are connected to the rear end of each third switch in parallel.
2. The multi-protocol multi-service public network security access method according to claim 1, wherein in step (1), a public network data communication channel is provided between the centralized control center system and the power generation field equipment system.
3. The multi-protocol multi-service public network security access method according to claim 1, wherein in the steps (2) and (3), the first protocol conversion server is further connected with a control module;
a first instruction receiving module, a first file generating module and a first file sending module which are connected in sequence are arranged in the first protocol conversion server;
a first file receiving module, a first analysis module and a first instruction sending module which are connected in sequence are arranged in the first public network front server;
a second instruction receiving module, a second file generating module and a second file sending module which are connected in sequence are arranged in the second public network front server;
and a second file receiving module, a second analysis module and a second instruction sending module which are connected in sequence are arranged in the second protocol conversion server.
4. The method according to claim 3, wherein the control module generates a control command and sends the control command to the first command receiving module,
then the first file generation module generates an instruction file based on the control instruction received by the first instruction receiving module,
then the first file sending module sends the instruction file to the first file receiving module through the first forward isolating device,
then the first analysis module generates a remote control message of a standard protocol based on the instruction file received by the first file receiving module,
then the first command sending module sends the remote control message to the second command receiving module through the first encryption device and the second encryption device,
then the second file generating module generates an instruction file based on the remote control message received by the second instruction receiving module,
then the second file sending module sends the instruction message to the second file receiving module through the second reverse isolation device,
then the second analysis module analyzes and extracts the control instruction based on the instruction file received by the second file receiving module,
and finally, the second instruction sending module distributes the control instruction extracted by the second analysis module to corresponding equipment according to a standard protocol.
5. The method of claim 3, wherein said second file receiving module receives external data,
then the second analysis module analyzes and converts the instruction file received by the second file receiving module into a private protocol,
then the second instruction sending module sends the private protocol to the second instruction receiving module through the second forward isolation device,
the second file generation module then converts the private protocol received by the second instruction receiving module into the previous standard protocol data,
then the second file sending module sends the standard protocol data to the first file receiving module through the first encryption device and the second encryption device,
the first parsing module then converts to a private protocol based on the standard protocol data received by the first file receiving module,
then the first instruction sending module sends the private protocol to the first instruction receiving module through the first reverse isolation device,
the first file generation module then converts the private protocol received by the first instruction receiving module into a corresponding protocol file,
and finally, the first file sending module distributes the protocol file to the corresponding first service server or the corresponding first data acquisition server.
6. The method according to claim 1, wherein in step (5), a grid data network channel is provided between the far-end router and the near-end router.
7. The method of claim 1, wherein bastion machines are installed in both the centralized control center system and the power plant facility system.
8. The method of claim 7, wherein the bastion machines each comprise a prime mover and a standby mover.
CN202111394957.5A 2021-11-23 2021-11-23 Multi-protocol multi-service public network security access method Pending CN114268457A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111394957.5A CN114268457A (en) 2021-11-23 2021-11-23 Multi-protocol multi-service public network security access method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111394957.5A CN114268457A (en) 2021-11-23 2021-11-23 Multi-protocol multi-service public network security access method

Publications (1)

Publication Number Publication Date
CN114268457A true CN114268457A (en) 2022-04-01

Family

ID=80825494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111394957.5A Pending CN114268457A (en) 2021-11-23 2021-11-23 Multi-protocol multi-service public network security access method

Country Status (1)

Country Link
CN (1) CN114268457A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115296935A (en) * 2022-10-08 2022-11-04 华诺网络科技有限公司 Information security data processing method and system
CN115802341A (en) * 2023-01-30 2023-03-14 北京亚信兴源科技有限公司 Communication method and device for 5G system, electronic device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110020122A1 (en) * 2009-07-24 2011-01-27 Honeywell International Inc. Integrated condition based maintenance system for wind turbines
CN111901372A (en) * 2020-06-11 2020-11-06 北京华电天仁电力控制技术有限公司 Access device of centralized wind power monitoring system
CN213661660U (en) * 2020-09-29 2021-07-09 华能大理风力发电有限公司 Multi-protocol multi-service public network security access area system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110020122A1 (en) * 2009-07-24 2011-01-27 Honeywell International Inc. Integrated condition based maintenance system for wind turbines
CN111901372A (en) * 2020-06-11 2020-11-06 北京华电天仁电力控制技术有限公司 Access device of centralized wind power monitoring system
CN213661660U (en) * 2020-09-29 2021-07-09 华能大理风力发电有限公司 Multi-protocol multi-service public network security access area system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李涛: "某风电工控网络安全防护设计", 网络安全技术与应用, no. 5, pages 2 - 3 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115296935A (en) * 2022-10-08 2022-11-04 华诺网络科技有限公司 Information security data processing method and system
CN115296935B (en) * 2022-10-08 2022-12-20 华诺网络科技有限公司 Information security data processing method and system
CN115802341A (en) * 2023-01-30 2023-03-14 北京亚信兴源科技有限公司 Communication method and device for 5G system, electronic device and storage medium

Similar Documents

Publication Publication Date Title
US11271778B2 (en) Multi-perimeter firewall in the cloud
US10530831B2 (en) Threat protection for real-time communications gateways
US8874766B2 (en) System and method for flexible network access control policies in a network environment
EP2036305B1 (en) Communication network application activity monitoring and control
US10091167B2 (en) Network traffic analysis to enhance rule-based network security
US9015855B2 (en) Secure tunneling platform system and method
CN103607399B (en) Private IP network network safety monitoring system and method based on darknet
CN111385326B (en) Rail transit communication system
MXPA05002559A (en) System and method for remotely monitoring wirless networks.
CN114268457A (en) Multi-protocol multi-service public network security access method
WO2016202007A1 (en) Device operation and maintenance method and system
US20210152529A1 (en) System and method for creating a secure hybrid overlay network
EP3811590A1 (en) System and method for creating a secure hybrid overlay network
Neu et al. Lightweight IPS for port scan in OpenFlow SDN networks
TW202137735A (en) Programmable switching device for network infrastructures
CN112383573B (en) Security intrusion playback equipment based on multiple attack stages
KR101881061B1 (en) 2-way communication apparatus capable of changing communication mode and method thereof
Khosravifar et al. An experience improving intrusion detection systems false alarm ratio by using honeypot
JP2006099590A (en) Access controller, access control method and access control program
CN205510295U (en) Multi -region section video surveillance management system
CN110581843B (en) Mimic Web gateway multi-application flow directional distribution method
CN111131793A (en) Video network access safety device
EP2781071A1 (en) Secure tunneling platform system and method
KR102174421B1 (en) Software-defined network based network security functions for effective mitigation of DDoS attack
US20230300141A1 (en) Network security management method and computer device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination