期刊文献+

电力二次系统内网安全监视功能的研究与实现 被引量:6

Research and Implementation of Power System Secondary Network Security Monitoring
下载PDF
导出
摘要 电力二次系统安全监视功能通过对安全防护设备的日志实现标准化采集,实现对安全设备的实时告警与运行状态监测,及时发现安全体系中存在的各类安全隐患和异常访问行为。通过研究日志采集技术,形成电力二次系统安全日志采集规范;通过研究上下级调度中心监视功能的级联通信,实现功能分级部署;通过研究调度主站D5000主机的安全状态,实现对D5000的安全监视。 Through standardize the sampling of data of safety equipment, power system secondary security monitoring can achieve real-time warning and operating status monitoring for the safety equipment, and detect the presence of various types of security system risks and abnormal access behavior. With the studying of log collection technology, a norm for power system secondary security log collection is formed. With the research of cascade communications between upper and lower dispatch monitor center, a hierarchical deployment of functions is achieved. Through studying the security state of D5000 host in dispatch center, the security monitoring on D5000 is achieved.
出处 《江苏电机工程》 2014年第3期31-34,共4页 Jiangsu Electrical Engineering
关键词 内网监视 网络安全 D5000 关联分析 network security monitoring network security D5000 correlation analysis
  • 相关文献

参考文献6

二级参考文献36

  • 1李澄,黄伟,吴钢.数字化变电站新技术特点及应用[J].江苏电机工程,2007,26(z1):8-10. 被引量:4
  • 2黄家林,程暄.基于syslog的数据采集引擎在IDS中的研究[J].网络安全技术与应用,2007(4):59-61. 被引量:1
  • 3沈昌祥.用信息安全工程理论规范信息安全建设[J].计算机世界,2001,(34):01-01. 被引量:1
  • 4马东平.设计企业信息系统的安全体系[J].计算机世界,2001,(34):08-08. 被引量:1
  • 5DoD. Information Assurance Technical Framework V 3. 0.http://www. iatf. net, 1996. 被引量:1
  • 6SSE-CMM Project. Systems Security Engineering Capability Maturity Model Version 2.0. http://www. sse-cmm. org, 1999-04-01. 被引量:1
  • 7Herrmann P, Krumm H. Object-oriented Security Analysis and Modeling. In: Proc 9th International Conference on Telecommunication Systems— Modeling and Analysis. Dallas(US): 2001. 21-32. 被引量:1
  • 8Lowman T, Mosier D. Applying the DoD Goal Security Architecture as a Methodology for the Development of System and Enterprise Security Architectures. New York: IEEE, 1997. 被引量:1
  • 9ISO/IEC TR 13335-5. Information Technology — Guidelines for the Management of IT Security, Part 5: Management Guidance on Network Security (First Edition). 2001. 被引量:1
  • 10Kienzle D M. Practical Computer Security Analysis (Thesis).Charlottesville: University of Virginia, 1998. 被引量:1

共引文献82

同被引文献47

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部