期刊文献+

一种3层结构带自保护的电力信息网络容入侵系统 被引量:9

A Tri-level Self-protected Intrusion Tolerant System for Electric Power Information Network System
下载PDF
导出
摘要 基于计算机技术的信息技术在电力系统生产、管理中广泛应用的同时,也带来了负面作用。原因是人类的思维特征与好奇心影响信息系统的可靠性、可用性及系统的信任度,进而影响电力系统的安全。文中结合华中电网有限公司信息网络系统的实际情况,在总结了现有安全措施的基础上,提出了一个基于测、控相结合的3层结构容入侵系统模型,论述了相关的原理和功能模块。为了保障容入侵系统本身的安全,提出了利用心跳信息监控各组成部件,并利用表决器诊断技术判断系统是否正常。 With the wide application of the computer technology based information technologies in the production and management of the power system, they also bring many negative effects to the system at the same time. The reason is that human being's thinking character and curiosity influences the reliability, availability and dependence of information systems, furthermore it influences the security of the power system. According to the case of the information network system of China Central Power Grid Limited Company and its existing security measures, this paper presents a tri-level self-protected intrusion tolerant system based on intrusion detection technology and control technology. The relative principles and function modules are discussed. For ensuring the self-security of the intrusion tolerant system, the heartbeat information is used to monitor the system components, and the system's state is judged by using voter technique.
出处 《电力系统自动化》 EI CSCD 北大核心 2005年第10期69-72,共4页 Automation of Electric Power Systems
关键词 电力信息系统 网络安全 容入侵系统 electric power information system network security intrusion tolerant system
  • 相关文献

参考文献8

  • 1王先培,熊平,李文武.防火墙和入侵检测系统在电力企业信息网络中的应用[J].电力系统自动化,2002,26(5):60-63. 被引量:58
  • 2朱天清,王先培,熊平.IDS中的模糊关联规则挖掘与响应[J].计算机工程与应用,2004,40(15):148-150. 被引量:7
  • 3SINGHAL M. Research in High-confidence Distributed Information Systems. In: Proceedings of 20th IEEE Symposium on Reliable Distributed Systems. New Orleans (LA): 2001.76-77.
  • 4SASTRY S, GILL H, KOOB G. High Confidence Software &Systems. Report to PITAC. 2001.
  • 5STAVRIDOU V, DUTERTER B, RIEMENSCHNEIDER R A et al. Intrusion Tolerant Software Architectures. In:Proceedings of DARPA Information Survivability Conference &Exposition Ⅱ, DISCEX ' 01, Vol 2. Anaheim (CA) : 2001.230-241.
  • 6WANG Xian-pei, XU Hua, ZHANG Sheng et al. Evidential Reasoning Research on Intrusion Detection. In: Proceedings of SPIE Vol 5253: Fifth International Symposium on Instrumentation and Control Technology. Beijing ( China ):2003. 930-934.
  • 7WANG Xian-pei, CHEN Ya-lin, DAI Z Y et al. Modified Target Recognition Based on Rough Sets. In. Proceedings of SPIE Vol 5253: Fifth International Symposium on Instrumentation and Control Technology. Beijing (China) : 2003. 905-909.
  • 8BUCHHEIM T, ERLINGER M, FEINSTEIN B et al.Implementing the Intrusion Detection Exchange Protocol. In:Proceedings of 17th Annual Computer Security Applications Conference, ACSAC 2001. New Orleans (LA) : 2001. 32-41.

二级参考文献10

  • 1R Heady,G Luger,A Maccabe et al.The Architecture of a Network level Intrusion Detection System[R].Technical report,CS90-20,Dept of ComputerScience,University of New Mexico,Albuquerque,NM87131
  • 2Stefan Axelsson.Intrusion detection systems:A survey and taxonomy[R]. Technical Report No 99-15,Dept of Computer Engineering,ChalmersUniversity of Technology,Sweden,2000-03
  • 3Wenke Lee.Mining audit data to build intrusion detection models[C].In:Proc Int Conf Knowledge Discovery and Data Mining(KDD'98),1998:66~72
  • 4Lee W,Stolfo S,ChanPK et al. Real Time Data Mining-based Intrusion Detection[C].In :Proceedings of DISCEX II,2001
  • 5Kuok C,A Fu,M Wong. Mining fuzzy association rules in databases.SIGMOD Record, 1998; 17 ( 1 ) :41
  • 6Debar H,Dacier M, Wepspi A.A Revised Taxonomy for IntrusionDetection Systems[R].Technical Report Computer Science/Mathematics, 1999
  • 7Dipankar Dasgupta,Fabio A Gonzalez. An Intelligent Decision Support System for Intrusion Detection and Response MMM-ACNS.St Petersburg, Russia, 2001 -05
  • 8WengdongWang. G enetic Algorithm Optimization of Membership Functions for Mining Fuzzy Association Rules[C].In:International Joint Conference on Information Systems,Fuzzy Theory and Technology Conference, 2000-03
  • 9侯子良.中国火电厂自动化发展趋势及对策[J].中国电力,1999,32(10):41-45. 被引量:46
  • 10金波,林家骏,王行愚.入侵检测技术评述[J].华东理工大学学报(自然科学版),2000,26(2):191-197. 被引量:41

共引文献63

同被引文献137

引证文献9

二级引证文献187

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部