This paper builds a self-adaptive management process in the power system dispatching area, aiming to effectively monitor the grid operation, dynamically adjust control strategy, optimize working process and ensure the...This paper builds a self-adaptive management process in the power system dispatching area, aiming to effectively monitor the grid operation, dynamically adjust control strategy, optimize working process and ensure the continuous improvement of operational performance. By building a negative feedback and dynamic balanced management mechanism, ECPRCB (East China Power Regulation Center Branch) is able to keenly sense the internal and external changes, efficiently coordinate all kinds of resources and improve the operational performance. As a result, self-adaptive management effectively boosts ECPRCB to reach the goal of being a world-class dispatching center with high operational performance, competent internal operation, adequate resources support and strong growth motion.展开更多
The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from h...The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. A boundlessness of methods for misuse detection as well as anomaly detection has been applied. Intrusion Prevention Systems (IPS) evolved after that to resolve am-biguities in passive network monitoring by placing detection systems on the line of attack. IPS in other words is IDS that are able to give prevention commands to firewalls and access control changes to routers. IPS can be seen as an improvement upon firewall technologies. It can make access control decisions based on application content, rather than IP address or ports as traditional firewalls do. The next innovation is the combination of IDS and IPS known as Intrusion Detection and Prevention Systems (IDPS) capable of de-tecting and preventing attacks from happening. This paper presents an overview of IDPS followed by their classifications and applications. A new signature based IDPS architecture named HawkEye Solutions has been proposed by the authors. Authors have presented the basic building blocks of the IDS, which include mechanisms for carrying out TCP port scans, Traceroute scan, ping scan and packet sniffing to monitor net-work health detect various types of attacks. Real time implementation results of the system have been pre-sented. Finally a comparative analysis of various existing IDS/IPS solutions with HawkEye Solutions em-phasizes its significance.展开更多
文摘This paper builds a self-adaptive management process in the power system dispatching area, aiming to effectively monitor the grid operation, dynamically adjust control strategy, optimize working process and ensure the continuous improvement of operational performance. By building a negative feedback and dynamic balanced management mechanism, ECPRCB (East China Power Regulation Center Branch) is able to keenly sense the internal and external changes, efficiently coordinate all kinds of resources and improve the operational performance. As a result, self-adaptive management effectively boosts ECPRCB to reach the goal of being a world-class dispatching center with high operational performance, competent internal operation, adequate resources support and strong growth motion.
文摘The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. A boundlessness of methods for misuse detection as well as anomaly detection has been applied. Intrusion Prevention Systems (IPS) evolved after that to resolve am-biguities in passive network monitoring by placing detection systems on the line of attack. IPS in other words is IDS that are able to give prevention commands to firewalls and access control changes to routers. IPS can be seen as an improvement upon firewall technologies. It can make access control decisions based on application content, rather than IP address or ports as traditional firewalls do. The next innovation is the combination of IDS and IPS known as Intrusion Detection and Prevention Systems (IDPS) capable of de-tecting and preventing attacks from happening. This paper presents an overview of IDPS followed by their classifications and applications. A new signature based IDPS architecture named HawkEye Solutions has been proposed by the authors. Authors have presented the basic building blocks of the IDS, which include mechanisms for carrying out TCP port scans, Traceroute scan, ping scan and packet sniffing to monitor net-work health detect various types of attacks. Real time implementation results of the system have been pre-sented. Finally a comparative analysis of various existing IDS/IPS solutions with HawkEye Solutions em-phasizes its significance.