[go: up one dir, main page]

CN118200019B - Network event safety monitoring method and system - Google Patents

Network event safety monitoring method and system Download PDF

Info

Publication number
CN118200019B
CN118200019B CN202410443479.XA CN202410443479A CN118200019B CN 118200019 B CN118200019 B CN 118200019B CN 202410443479 A CN202410443479 A CN 202410443479A CN 118200019 B CN118200019 B CN 118200019B
Authority
CN
China
Prior art keywords
data
node
network
power network
defense
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410443479.XA
Other languages
Chinese (zh)
Other versions
CN118200019A (en
Inventor
卢萍
张勇
冯浩
郭峰
邱爽
焦翰琳
张先飞
张�雄
童永飞
张晨燕
周煜廷
黄诚轩
廖荣涛
刘芬
王逸兮
罗弦
叶宇轩
董亮
黄俊东
余铮
冯伟东
代静
袁慧
詹伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information and Telecommunication Branch of State Grid Hubei Electric Power Co Ltd
Original Assignee
Information and Telecommunication Branch of State Grid Hubei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information and Telecommunication Branch of State Grid Hubei Electric Power Co Ltd filed Critical Information and Telecommunication Branch of State Grid Hubei Electric Power Co Ltd
Priority to CN202410443479.XA priority Critical patent/CN118200019B/en
Publication of CN118200019A publication Critical patent/CN118200019A/en
Application granted granted Critical
Publication of CN118200019B publication Critical patent/CN118200019B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/16Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Medical Informatics (AREA)
  • Evolutionary Computation (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to the field of data security technologies, and in particular, to a network event security monitoring method and system. The method comprises the following steps: acquiring power network node data; acquiring power network information data according to the power network node data, thereby acquiring node flow original data; carrying out distributed flow identification on the node flow original data to generate distributed flow identification data; abnormal node detection is carried out on the distributed flow identification data, and abnormal node data of the power network are generated; and carrying out potential threat detection analysis on the power network abnormal node data to generate a power network potential threat event. The invention improves the comprehensiveness and adaptability of network security protection by carrying out abnormal node identification and multi-level attack type defense strategy construction on the network event.

Description

一种网络事件安全监测方法及系统A network event security monitoring method and system

技术领域Technical Field

本发明涉及数据安全技术领域,尤其涉及一种网络事件安全监测方法及系统。The present invention relates to the field of data security technology, and in particular to a network event security monitoring method and system.

背景技术Background Art

随着电力系统的扩张,高压输电线路和发电厂的建设成为发展的重点。这一阶段安全检测方法开始涉及电力系统的稳定性和短路保护,以确保系统在异常情况下能够稳定运行。随着数据挖掘和人工智能技术的不断发展,电力系统安全检测迈入新阶段。基于数据驱动的方法逐渐成为主流,包括使用机器学习和深度学习技术。这些方法可以从大量的实时数据中识别模式和异常,提高了检测的准确性和效率。物联网技术的应用使得电力系统能够更好地实现设备之间的互联互通。边缘计算技术的发展使得数据处理更加迅速和有效。安全检测方法逐渐向实时、分布式方向发展,能够在系统各个节点上进行事件检测和响应。然而目前传统方法在异常节点检测和威胁分析上往往使用静态规则或基于历史数据的方法,容易受限于固定的规则和模式,无法有效应对新型威胁,同时对于威胁事件判别和策略防御上常常缺乏全面性和及时性,导致网络的整体防护能力不足。With the expansion of the power system, the construction of high-voltage transmission lines and power plants has become a development focus. At this stage, security detection methods began to involve the stability and short-circuit protection of the power system to ensure that the system can operate stably under abnormal conditions. With the continuous development of data mining and artificial intelligence technology, power system security detection has entered a new stage. Data-driven methods have gradually become mainstream, including the use of machine learning and deep learning technologies. These methods can identify patterns and anomalies from a large amount of real-time data, improving the accuracy and efficiency of detection. The application of Internet of Things technology enables the power system to better realize the interconnection between devices. The development of edge computing technology makes data processing faster and more efficient. Security detection methods are gradually developing in the direction of real-time and distributed, and can detect and respond to events at each node of the system. However, traditional methods often use static rules or methods based on historical data for abnormal node detection and threat analysis, which are easily limited by fixed rules and patterns and cannot effectively respond to new threats. At the same time, they often lack comprehensiveness and timeliness in threat event identification and strategy defense, resulting in insufficient overall network protection capabilities.

发明内容Summary of the invention

基于此,有必要提供一种网络事件安全监测方法及系统,以解决至少一个上述技术问题。Based on this, it is necessary to provide a network event security monitoring method and system to solve at least one of the above technical problems.

为实现上述目的,一种网络事件安全监测方法,所述方法包括以下步骤:To achieve the above object, a network event security monitoring method is provided, the method comprising the following steps:

步骤S1:获取电力网络节点数据;根据电力网络节点数据进行电力网络信息数据采集,从而获取节点流量原始数据;对节点流量原始数据进行分布式流量标识,生成分布式流量标识数据;Step S1: acquiring power network node data; collecting power network information data according to the power network node data, thereby acquiring node flow original data; performing distributed flow identification on the node flow original data, and generating distributed flow identification data;

步骤S2:对分布式流量标识数据进行异常节点检测,生成电力网络异常节点数据;对电力网络异常节点数据进行潜在威胁检测分析,生成电力网络潜在威胁事件;Step S2: performing abnormal node detection on the distributed flow identification data to generate abnormal node data of the power network; performing potential threat detection and analysis on the abnormal node data of the power network to generate potential threat events of the power network;

步骤S3:对电力网络潜在威胁事件进行威胁事件判别,生成电力网络威胁判别事件,其中电力网络威胁判别事件包括恶意软件攻击事件、网络钓鱼事件、Ddos攻击事件、网络入侵事件和零日漏洞攻击事件;对电力网络威胁判别事件进行策略防御,生成恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略;Step S3: Perform threat event identification on potential threat events of the power network and generate power network threat identification events, wherein the power network threat identification events include malware attack events, phishing events, Ddos attack events, network intrusion events and zero-day vulnerability attack events; perform strategy defense on the power network threat identification events and generate malware defense strategy, phishing defense strategy, Ddos attack defense strategy, network intrusion defense strategy and zero-day vulnerability attack defense strategy;

步骤S4:对恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略进行防御日志采集,得到安全防御日志数据;对安全防御日志数据进行智能防御决策,生成智能防御决策方案。Step S4: Collect defense logs for malware defense strategies, phishing defense strategies, DDoS attack defense strategies, network intrusion defense strategies, and zero-day vulnerability attack defense strategies to obtain security defense log data; make intelligent defense decisions on the security defense log data to generate intelligent defense decision plans.

本发明通过获取节点流量原始数据并进行分布式流量标识,可以实现对电力网络的实时监测和检测,有助于及时发现异常节点和潜在威胁事件,提高网络的安全性。在步骤S2中对分布式流量标识数据进行异常节点检测,可以有效识别出电力网络中的异常行为节点,有助于及时发现存在的攻击或异常情况。根据异常节点数据进行潜在威胁检测分析,能够识别出电力网络潜在的威胁事件,有助于提前预警网络安全威胁,为进一步的防御做好准备。对潜在威胁事件进行判别,并生成相应的电力网络威胁判别事件,例如恶意软件攻击、网络钓鱼、DDoS攻击、网络入侵和零日漏洞攻击等。同时,根据这些事件生成相应的防御策略,有针对性地应对各类安全威胁。对安全防御日志数据进行智能防御决策,可以基于实时数据和历史数据,通过机器学习或人工智能技术生成智能防御决策方案,有助于自动化和优化安全防御流程,提高网络安全的响应速度和效率。通过生成恶意软件防御策略、网络钓鱼防御策略、DDoS攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略,形成了多层次的安全防御体系,多维度的防御能力能够有效降低网络受到各类威胁的风险。对防御策略进行防御日志采集,有助于记录安全事件和响应过程,为后续的安全审计和改进提供数据支持。因此,本发明通过对网络事件进行异常节点标识以及多层次攻击类型防御策略构建,提高了网络安全防护的全面性和适应性。The present invention can realize real-time monitoring and detection of the power network by acquiring the original data of node flow and performing distributed flow identification, which is helpful to timely discover abnormal nodes and potential threat events and improve the security of the network. In step S2, abnormal node detection is performed on the distributed flow identification data, which can effectively identify abnormal behavior nodes in the power network, and help to timely discover existing attacks or abnormal situations. Potential threat detection and analysis are performed based on abnormal node data, which can identify potential threat events of the power network, help to warn network security threats in advance, and prepare for further defense. Potential threat events are distinguished, and corresponding power network threat identification events are generated, such as malware attacks, phishing, DDoS attacks, network intrusions and zero-day vulnerability attacks. At the same time, corresponding defense strategies are generated according to these events to deal with various security threats in a targeted manner. Intelligent defense decisions are made on security defense log data, and intelligent defense decision plans can be generated based on real-time data and historical data through machine learning or artificial intelligence technology, which helps to automate and optimize security defense processes and improve the response speed and efficiency of network security. By generating malware defense strategies, phishing defense strategies, DDoS attack defense strategies, network intrusion defense strategies, and zero-day vulnerability attack defense strategies, a multi-level security defense system is formed, and the multi-dimensional defense capabilities can effectively reduce the risk of the network being threatened by various types of threats. Collecting defense logs for defense strategies helps to record security events and response processes, and provide data support for subsequent security audits and improvements. Therefore, the present invention improves the comprehensiveness and adaptability of network security protection by identifying abnormal nodes for network events and constructing multi-level attack type defense strategies.

在本说明书中,提供了一种网络事件安全检测系统,用于执行上述的网络事件安全检测方法,该网络事件安全检测系统包括:In this specification, a network event security detection system is provided, which is used to execute the above-mentioned network event security detection method. The network event security detection system includes:

分布式标识模块,用于获取电力网络节点数据;根据电力网络节点数据进行电力网络信息数据采集,从而获取节点流量原始数据;对节点流量原始数据进行分布式流量标识,生成分布式流量标识数据;The distributed identification module is used to obtain power network node data; collect power network information data according to the power network node data, thereby obtaining the original node flow data; perform distributed flow identification on the original node flow data to generate distributed flow identification data;

潜在威胁分析模块,用于对分布式流量标识数据进行异常节点检测,生成电力网络异常节点数据;对电力网络异常节点数据进行潜在威胁检测分析,生成电力网络潜在威胁事件;The potential threat analysis module is used to detect abnormal nodes on the distributed flow identification data and generate abnormal node data of the power network; perform potential threat detection and analysis on the abnormal node data of the power network and generate potential threat events of the power network;

策略防御模块,用于对电力网络潜在威胁事件进行威胁事件判别,生成电力网络威胁判别事件,其中电力网络威胁判别事件包括恶意软件攻击事件、网络钓鱼事件、Ddos攻击事件、网络入侵事件和零日漏洞攻击事件;对电力网络威胁判别事件进行策略防御,生成恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略;The strategy defense module is used to identify potential threat events of the power network and generate power network threat identification events, where the power network threat identification events include malware attack events, phishing events, Ddos attack events, network intrusion events and zero-day vulnerability attack events; perform strategy defense on the power network threat identification events and generate malware defense strategies, phishing defense strategies, Ddos attack defense strategies, network intrusion defense strategies and zero-day vulnerability attack defense strategies;

智能决策模块,用于对恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略进行防御日志采集,得到安全防御日志数据;对安全防御日志数据进行智能防御决策,生成智能防御决策方案。The intelligent decision-making module is used to collect defense logs for malware defense strategies, phishing defense strategies, Ddos attack defense strategies, network intrusion defense strategies and zero-day vulnerability attack defense strategies to obtain security defense log data; make intelligent defense decisions on the security defense log data and generate intelligent defense decision plans.

本发明的有益效果在于通过对分布式流量标识数据进行异常节点检测和潜在威胁分析,可以发现电力网络中存在的异常节点和潜在威胁事件,有助于及早发现潜在的攻击或异常情况,提高网络安全的监控和响应能力。针对电力网络潜在威胁事件,进行威胁事件判别并生成相应的威胁判别事件,有助于对不同类型的威胁进行分类和识别,从而能够采取特定的防御策略和措施,如恶意软件防御策略、网络钓鱼防御策略、DDoS攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略。通过防御日志采集和智能防御决策,可以利用安全防御日志数据进行智能化的防御决策,有助于根据实时的安全日志和网络状态,自动生成具有针对性和智能化的防御方案,以及应对威胁事件的决策建议。因此,本发明通过对网络事件进行异常节点标识以及多层次攻击类型防御策略构建,提高了网络安全防护的全面性和适应性。The beneficial effect of the present invention is that by performing abnormal node detection and potential threat analysis on the distributed traffic identification data, abnormal nodes and potential threat events in the power network can be found, which helps to detect potential attacks or abnormal situations as early as possible and improve the monitoring and response capabilities of network security. For potential threat events in the power network, threat event discrimination is performed and corresponding threat discrimination events are generated, which helps to classify and identify different types of threats, so that specific defense strategies and measures can be taken, such as malware defense strategies, phishing defense strategies, DDoS attack defense strategies, network intrusion defense strategies and zero-day vulnerability attack defense strategies. Through defense log collection and intelligent defense decision-making, security defense log data can be used to make intelligent defense decisions, which helps to automatically generate targeted and intelligent defense plans and decision-making suggestions for dealing with threat events based on real-time security logs and network status. Therefore, the present invention improves the comprehensiveness and adaptability of network security protection by performing abnormal node identification on network events and constructing multi-level attack type defense strategies.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1为一种网络事件安全监测方法的步骤流程示意图;FIG1 is a schematic diagram of a process flow of a network event security monitoring method;

图2为图1中步骤S2的详细实施步骤流程示意图;FIG2 is a schematic diagram of a detailed implementation process of step S2 in FIG1 ;

图3为图2中步骤S24的详细实施步骤流程示意图;FIG3 is a schematic diagram of a detailed implementation process of step S24 in FIG2 ;

图4为图1中步骤S3的详细实施步骤流程示意图;FIG4 is a schematic diagram of a detailed implementation process of step S3 in FIG1 ;

本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The realization of the purpose, functional features and advantages of the present invention will be further explained in conjunction with embodiments and with reference to the accompanying drawings.

具体实施方式DETAILED DESCRIPTION

下面结合附图对本发明专利的技术方法进行清楚、完整的描述,显然,所描述的实施例是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域所属的技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following is a clear and complete description of the technical method of the present invention in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by technicians in this field without creative work are within the scope of protection of the present invention.

此外,附图仅为本发明的示意性图解,并非一定是按比例绘制。图中相同的附图标记表示相同或类似的部分,因而将省略对它们的重复描述。附图中所示的一些方框图是功能实体,不一定必须与物理或逻辑上独立的实体相对应。可以采用软件形式来实现功能实体,或在一个或多个硬件模块或集成电路中实现这些功能实体,或在不同网络和/或处理器方法和/或微控制器方法中实现这些功能实体。In addition, the accompanying drawings are only schematic illustrations of the present invention and are not necessarily drawn to scale. The same reference numerals in the figures represent the same or similar parts, and their repeated description will be omitted. Some of the block diagrams shown in the accompanying drawings are functional entities and do not necessarily correspond to physically or logically independent entities. The functional entities can be implemented in software form, or implemented in one or more hardware modules or integrated circuits, or implemented in different networks and/or processor methods and/or microcontroller methods.

应当理解的是,虽然在这里可能使用了术语“第一”、“第二”等等来描述各个单元,但是这些单元不应当受这些术语限制。使用这些术语仅仅是为了将一个单元与另一个单元进行区分。举例来说,在不背离示例性实施例的范围的情况下,第一单元可以被称为第二单元,并且类似地第二单元可以被称为第一单元。这里所使用的术语“和/或”包括其中一个或更多所列出的相关联项目的任意和所有组合。It should be understood that, although the terms "first", "second", etc. may be used herein to describe various units, these units should not be limited by these terms. These terms are used only to distinguish one unit from another unit. For example, without departing from the scope of the exemplary embodiments, the first unit may be referred to as the second unit, and similarly the second unit may be referred to as the first unit. The term "and/or" used herein includes any and all combinations of one or more of the listed associated items.

为实现上述目的,请参阅图1至图4,一种网络事件安全监测方法,所述方法包括以下步骤:To achieve the above purpose, please refer to Figures 1 to 4, a network event security monitoring method, the method includes the following steps:

步骤S1:获取电力网络节点数据;根据电力网络节点数据进行电力网络信息数据采集,从而获取节点流量原始数据;对节点流量原始数据进行分布式流量标识,生成分布式流量标识数据;Step S1: acquiring power network node data; collecting power network information data according to the power network node data, thereby acquiring node flow original data; performing distributed flow identification on the node flow original data, and generating distributed flow identification data;

步骤S2:对分布式流量标识数据进行异常节点检测,生成电力网络异常节点数据;对电力网络异常节点数据进行潜在威胁检测分析,生成电力网络潜在威胁事件;Step S2: performing abnormal node detection on the distributed flow identification data to generate abnormal node data of the power network; performing potential threat detection and analysis on the abnormal node data of the power network to generate potential threat events of the power network;

步骤S3:对电力网络潜在威胁事件进行威胁事件判别,生成电力网络威胁判别事件,其中电力网络威胁判别事件包括恶意软件攻击事件、网络钓鱼事件、Ddos攻击事件、网络入侵事件和零日漏洞攻击事件;对电力网络威胁判别事件进行策略防御,生成恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略;Step S3: Perform threat event identification on potential threat events of the power network and generate power network threat identification events, wherein the power network threat identification events include malware attack events, phishing events, Ddos attack events, network intrusion events and zero-day vulnerability attack events; perform strategy defense on the power network threat identification events and generate malware defense strategy, phishing defense strategy, Ddos attack defense strategy, network intrusion defense strategy and zero-day vulnerability attack defense strategy;

步骤S4:对恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略进行防御日志采集,得到安全防御日志数据;对安全防御日志数据进行智能防御决策,生成智能防御决策方案。Step S4: Collect defense logs for malware defense strategies, phishing defense strategies, DDoS attack defense strategies, network intrusion defense strategies, and zero-day vulnerability attack defense strategies to obtain security defense log data; make intelligent defense decisions on the security defense log data to generate intelligent defense decision plans.

本发明通过获取节点流量原始数据并进行分布式流量标识,可以实现对电力网络的实时监测和检测,有助于及时发现异常节点和潜在威胁事件,提高网络的安全性。在步骤S2中对分布式流量标识数据进行异常节点检测,可以有效识别出电力网络中的异常行为节点,有助于及时发现存在的攻击或异常情况。根据异常节点数据进行潜在威胁检测分析,能够识别出电力网络潜在的威胁事件,有助于提前预警网络安全威胁,为进一步的防御做好准备。对潜在威胁事件进行判别,并生成相应的电力网络威胁判别事件,例如恶意软件攻击、网络钓鱼、DDoS攻击、网络入侵和零日漏洞攻击等。同时,根据这些事件生成相应的防御策略,有针对性地应对各类安全威胁。对安全防御日志数据进行智能防御决策,可以基于实时数据和历史数据,通过机器学习或人工智能技术生成智能防御决策方案,有助于自动化和优化安全防御流程,提高网络安全的响应速度和效率。通过生成恶意软件防御策略、网络钓鱼防御策略、DDoS攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略,形成了多层次的安全防御体系,多维度的防御能力能够有效降低网络受到各类威胁的风险。对防御策略进行防御日志采集,有助于记录安全事件和响应过程,为后续的安全审计和改进提供数据支持。因此,本发明通过对网络事件进行异常节点标识以及多层次攻击类型防御策略构建,提高了网络安全防护的全面性和适应性。The present invention can realize real-time monitoring and detection of the power network by acquiring the original data of node flow and performing distributed flow identification, which is helpful to timely discover abnormal nodes and potential threat events and improve the security of the network. In step S2, abnormal node detection is performed on the distributed flow identification data, which can effectively identify abnormal behavior nodes in the power network, and help to timely discover existing attacks or abnormal situations. Potential threat detection and analysis are performed based on abnormal node data, which can identify potential threat events of the power network, help to warn network security threats in advance, and prepare for further defense. Potential threat events are distinguished, and corresponding power network threat identification events are generated, such as malware attacks, phishing, DDoS attacks, network intrusions and zero-day vulnerability attacks. At the same time, corresponding defense strategies are generated according to these events to deal with various security threats in a targeted manner. Intelligent defense decisions are made on security defense log data, and intelligent defense decision plans can be generated based on real-time data and historical data through machine learning or artificial intelligence technology, which helps to automate and optimize security defense processes and improve the response speed and efficiency of network security. By generating malware defense strategies, phishing defense strategies, DDoS attack defense strategies, network intrusion defense strategies, and zero-day vulnerability attack defense strategies, a multi-level security defense system is formed, and the multi-dimensional defense capabilities can effectively reduce the risk of the network being threatened by various types of threats. Collecting defense logs for defense strategies helps to record security events and response processes, and provide data support for subsequent security audits and improvements. Therefore, the present invention improves the comprehensiveness and adaptability of network security protection by identifying abnormal nodes for network events and constructing multi-level attack type defense strategies.

本发明实施例中,参考图1所述,为本发明一种网络事件安全监测方法的步骤流程示意图,在本实例中,所述一种网络事件安全监测方法包括以下步骤:In the embodiment of the present invention, referring to FIG. 1 , a schematic diagram of a step flow chart of a network event security monitoring method of the present invention is shown. In this example, the network event security monitoring method includes the following steps:

步骤S1:获取电力网络节点数据;根据电力网络节点数据进行电力网络信息数据采集,从而获取节点流量原始数据;对节点流量原始数据进行分布式流量标识,生成分布式流量标识数据;Step S1: Acquire power network node data; collect power network information data according to the power network node data, thereby acquiring node flow original data; perform distributed flow identification on the node flow original data, and generate distributed flow identification data;

本发明实施例中,通过确定电力网络的拓扑结构,包括各个节点的位置、连接关系等。收集电力网络设备和传感器的信息,如变电站、配电站、电力线路等。获取电力网络的实时监测数据,如电流、电压、功率等。部署数据采集设备或传感器来收集电力网络的实时数据。配置和管理数据采集设备,确保其能够准确和稳定地采集到节点的数据。使用传统的通信协议(如Modbus、DNP3等)或现代化的通信技术(如物联网、通信卫星等)进行数据采集。利用分布式流量标识技术,将节点流量数据进行标记和识别,以便后续的异常检测和分析。使用合适的算法和方法,将节点流量数据划分为合理的区块或流量片段,并为每个区块或流量片段生成唯一的标识符。确保分布式流量标识的准确性和有效性,以便后续的异常检测和安全分析能够基于标识数据进行。In an embodiment of the present invention, the topological structure of the power network is determined, including the location and connection relationship of each node. Information of power network equipment and sensors, such as substations, distribution stations, power lines, etc., is collected. Real-time monitoring data of the power network, such as current, voltage, power, etc., is obtained. Data acquisition equipment or sensors are deployed to collect real-time data of the power network. Data acquisition equipment is configured and managed to ensure that it can accurately and stably collect node data. Data collection is performed using traditional communication protocols (such as Modbus, DNP3, etc.) or modern communication technologies (such as the Internet of Things, communication satellites, etc.). Node flow data is marked and identified using distributed flow identification technology for subsequent anomaly detection and analysis. Appropriate algorithms and methods are used to divide node flow data into reasonable blocks or flow segments, and a unique identifier is generated for each block or flow segment. The accuracy and effectiveness of distributed flow identification are ensured so that subsequent anomaly detection and security analysis can be performed based on identification data.

步骤S2:对分布式流量标识数据进行异常节点检测,生成电力网络异常节点数据;对电力网络异常节点数据进行潜在威胁检测分析,生成电力网络潜在威胁事件;Step S2: performing abnormal node detection on the distributed flow identification data to generate abnormal node data of the power network; performing potential threat detection and analysis on the abnormal node data of the power network to generate potential threat events of the power network;

本发明实施例中,通过使用合适的异常检测算法,如基于统计方法、机器学习方法或深度学习方法等,来检测电力网络中的异常节点。基于分布式流量标识数据,对每个节点的流量特征进行分析,以识别与正常行为不符的异常节点。设置适当的阈值或规则,用于判断哪些节点被标识为异常节点。对异常节点数据进行库分析,与已知的威胁库或攻击模式进行比对,以确定潜在的威胁类型。利用威胁情报和安全专家的知识,进行行为分析和模式识别,以发现未知或新兴的潜在威胁。进行网络拓扑分析,找出异常节点与其他节点之间的关联,以确定潜在的威胁传播路径。基于检测到的异常节点和潜在威胁分析的结果,将相关的异常节点和威胁类型整合,生成电力网络的潜在威胁事件。对潜在威胁事件进行综合评估,包括评估威胁的严重程度、影响范围和紧急性,以确定响应和防御措施。In an embodiment of the present invention, abnormal nodes in the power network are detected by using a suitable anomaly detection algorithm, such as a statistical method, a machine learning method, or a deep learning method. Based on the distributed flow identification data, the flow characteristics of each node are analyzed to identify abnormal nodes that do not conform to normal behavior. Appropriate thresholds or rules are set to determine which nodes are identified as abnormal nodes. Library analysis is performed on the abnormal node data, and the data is compared with known threat libraries or attack patterns to determine potential threat types. Using threat intelligence and the knowledge of security experts, behavioral analysis and pattern recognition are performed to discover unknown or emerging potential threats. Network topology analysis is performed to find the association between abnormal nodes and other nodes to determine potential threat propagation paths. Based on the results of the detected abnormal nodes and potential threat analysis, the relevant abnormal nodes and threat types are integrated to generate potential threat events for the power network. A comprehensive assessment is performed on potential threat events, including assessing the severity, scope of impact, and urgency of the threat to determine response and defense measures.

步骤S3:对电力网络潜在威胁事件进行威胁事件判别,生成电力网络威胁判别事件,其中电力网络威胁判别事件包括恶意软件攻击事件、网络钓鱼事件、Ddos攻击事件、网络入侵事件和零日漏洞攻击事件;对电力网络威胁判别事件进行策略防御,生成恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略;Step S3: Perform threat event identification on potential threat events of the power network and generate power network threat identification events, wherein the power network threat identification events include malware attack events, phishing events, Ddos attack events, network intrusion events and zero-day vulnerability attack events; perform strategy defense on the power network threat identification events and generate malware defense strategy, phishing defense strategy, Ddos attack defense strategy, network intrusion defense strategy and zero-day vulnerability attack defense strategy;

本发明实施例中,通过基于潜在威胁事件的特征和行为模式,使用机器学习、行为分析或规则引擎等方法来进行威胁事件判别。通过使用Yara规则库,用于识别恶意软件攻击事件、网络钓鱼事件、Ddos攻击事件、网络入侵事件和零日漏洞攻击事件等。结合实时监测和日志分析,对电力网络的流量、行为和事件进行实时验证和判断。将判别的威胁事件与步骤S2中生成的电力网络潜在威胁事件进行匹配和更新,以确保准确的威胁事件判别。针对不同的威胁判别事件,制定相应的防御策略,包括恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略。针对恶意软件攻击事件,实施安全防护措施,如使用杀毒软件、防火墙、反恶意软件工具等来检测、隔离和清除恶意软件。针对网络钓鱼事件,加强网络安全意识培训,使用反钓鱼技术和防钓鱼策略来识别和阻止钓鱼攻击。针对Ddos攻击事件,实施流量清洗、流量限制、入侵检测和负载均衡等防御措施,以减轻攻击的影响。针对网络入侵事件,部署入侵检测系统(IDS)和入侵防御系统(IPS),及时检测和阻止入侵行为,并及时更新安全补丁来修复漏洞。针对零日漏洞攻击事件,建立紧急响应团队,及时跟踪和应对新发现的漏洞,并实施补丁管理和漏洞修复工作。In an embodiment of the present invention, based on the characteristics and behavior patterns of potential threat events, threat event discrimination is performed using machine learning, behavior analysis or rule engines. By using the Yara rule library, it is used to identify malware attack events, phishing events, Ddos attack events, network intrusion events and zero-day vulnerability attack events. Combined with real-time monitoring and log analysis, the flow, behavior and events of the power network are verified and judged in real time. The identified threat events are matched and updated with the potential threat events of the power network generated in step S2 to ensure accurate threat event discrimination. For different threat discrimination events, corresponding defense strategies are formulated, including malware defense strategies, phishing defense strategies, Ddos attack defense strategies, network intrusion defense strategies and zero-day vulnerability attack defense strategies. For malware attack events, security protection measures are implemented, such as using anti-virus software, firewalls, anti-malware tools, etc. to detect, isolate and remove malware. For phishing events, network security awareness training is strengthened, and anti-phishing technology and anti-phishing strategies are used to identify and prevent phishing attacks. For Ddos attack events, defense measures such as traffic cleaning, traffic restriction, intrusion detection and load balancing are implemented to mitigate the impact of the attack. In response to network intrusion incidents, we deploy intrusion detection systems (IDS) and intrusion prevention systems (IPS) to detect and block intrusions in a timely manner, and update security patches to fix vulnerabilities in a timely manner. In response to zero-day vulnerability attacks, we establish an emergency response team to track and respond to newly discovered vulnerabilities in a timely manner, and implement patch management and vulnerability repair work.

步骤S4:对恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略进行防御日志采集,得到安全防御日志数据;对安全防御日志数据进行智能防御决策,生成智能防御决策方案。Step S4: Collect defense logs for malware defense strategies, phishing defense strategies, DDoS attack defense strategies, network intrusion defense strategies, and zero-day vulnerability attack defense strategies to obtain security defense log data; make intelligent defense decisions on the security defense log data to generate intelligent defense decision plans.

本发明实施例中,通过配置安全设备和系统,使其能够产生相应的防御日志数据,具体为防火墙、入侵检测系统(IDS)、入侵防御系统(IPS)、安全信息和事件管理系统(SIEM)等。确保设备和系统的日志功能已启用,并配置适当的日志级别和日志格式。设置日志采集服务器或中央日志管理系统,用于集中收集、存储和管理防御日志数据。针对采集到的安全防御日志数据,使用安全分析和决策支持技术进行智能分析和决策。通过使用Snort、Suricata等IDS系统以及恶意软件特征库,用于检测和分析恶意软件行为、网络钓鱼攻击、Ddos攻击、网络入侵和零日漏洞攻击等。基于分析结果,进行智能防御决策生成,包括自动化响应、警报生成、隔离恶意行为、封锁攻击源IP或协调人工干预等措施。结合业务需求和安全风险评估,制定合适的智能防御策略和决策方案,以提供有效的安全保护和响应。In the embodiment of the present invention, by configuring security devices and systems, it is possible to generate corresponding defense log data, specifically firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), security information and event management systems (SIEM), etc. Ensure that the log function of the devices and systems is enabled, and configure the appropriate log level and log format. Set up a log collection server or a central log management system for centralized collection, storage and management of defense log data. For the collected security defense log data, use security analysis and decision support technology for intelligent analysis and decision making. By using IDS systems such as Snort and Suricata and malware feature libraries, it is used to detect and analyze malware behavior, phishing attacks, Ddos attacks, network intrusions and zero-day vulnerability attacks. Based on the analysis results, intelligent defense decision generation is performed, including automated response, alarm generation, isolation of malicious behavior, blocking of attack source IP or coordination of manual intervention. Combined with business needs and security risk assessment, formulate appropriate intelligent defense strategies and decision plans to provide effective security protection and response.

优选的,步骤S1包括以下步骤:Preferably, step S1 comprises the following steps:

步骤S11:获取电力网络节点数据;Step S11: Acquire power network node data;

步骤S12:根据电力网络节点数据进行分布式感知节点部署,得到分布式电力网络感知节点;基于分布式电力网络感知节点进行电力网络信息数据采集,从而获取节点流量原始数据,其中电力网络信息数据采集包括数据包解析、数据包过滤和数据包嗅探;Step S12: deploy distributed sensing nodes according to the power network node data to obtain distributed power network sensing nodes; collect power network information data based on the distributed power network sensing nodes to obtain node flow raw data, wherein the power network information data collection includes data packet parsing, data packet filtering and data packet sniffing;

步骤S13:对节点流量原始数据进行数据预处理,生成标准节点流量原始数据,其中数据预处理包括数据清洗、数据缺失值填充和数据标准化;Step S13: preprocessing the node flow raw data to generate standard node flow raw data, wherein the data preprocessing includes data cleaning, data missing value filling and data standardization;

步骤S14:对标准节点流量原始数据进行分布式流量标识,生成分布式流量标识数据。Step S14: Perform distributed traffic identification on the original data of standard node traffic to generate distributed traffic identification data.

本发明通过在电力网络中部署分布式感知节点,可以实现对多个节点的数据采集与监测,可以提高电力网络的感知能力和数据覆盖范围。通过分布式电力网络感知节点进行信息数据采集,可以获取节点流量原始数据,原始数据包括了电力网络的实时信息,对于电力系统的监测和分析具有重要意义。对节点流量原始数据进行数据预处理,包括数据清洗、缺失值填充和数据标准化等步骤,预处理操作有助于提高数据的质量和准确性,为后续的分析和处理提供可靠的数据基础。对标准节点流量原始数据进行分布式流量标识,生成分布式流量标识数据,标识可以用于识别和跟踪电力网络中的流量特征,为网络性能分析、异常检测和故障诊断提供支持。The present invention can realize data collection and monitoring of multiple nodes by deploying distributed sensing nodes in the power network, and can improve the sensing ability and data coverage of the power network. By collecting information data through distributed power network sensing nodes, the original data of node flow can be obtained. The original data includes real-time information of the power network, which is of great significance for the monitoring and analysis of the power system. The original data of node flow is preprocessed, including steps such as data cleaning, missing value filling and data standardization. The preprocessing operation helps to improve the quality and accuracy of the data and provide a reliable data basis for subsequent analysis and processing. The standard node flow original data is distributedly identified to generate distributed flow identification data. The identification can be used to identify and track flow characteristics in the power network, providing support for network performance analysis, anomaly detection and fault diagnosis.

本发明实施例中,通过收集电力网络的拓扑结构和节点信息,例如变电站、发电厂、输电线路和配电设备等。获取节点的实时状态数据,如电流、电压、功率等。根据电力网络节点数据,确定分布式感知节点的部署位置,考虑覆盖范围和数据采集需求。部署感知节点并确保其连接到电力网络,确保数据的可靠采集。感知节点通过数据包解析、数据包过滤和数据包嗅探等技术,从电力网络中抓取并采集节点流量原始数据。进行数据清洗,包括去除异常值、噪声数据和重复数据等,确保数据的准确性和一致性。处理数据缺失值,可以采用插值方法填充策略,填充缺失的数据项。进行数据标准化,将节点流量数据转化为符合一定规范和范围的标准数据格式,便于后续的分析和处理。基于标准节点流量原始数据,采用Bloom Filter数据结构进行分布式流量标识的生成。分布式流量标识可包括流量特征、流量行为和流量属性等信息,用于对节点流量进行识别、分类和分析。In an embodiment of the present invention, the topological structure and node information of the power network, such as substations, power plants, transmission lines and distribution equipment, are collected. Real-time status data of the nodes, such as current, voltage, power, etc., are obtained. According to the power network node data, the deployment location of the distributed sensing node is determined, taking into account the coverage and data collection requirements. The sensing node is deployed and ensured to be connected to the power network to ensure reliable data collection. The sensing node captures and collects the original data of the node flow from the power network through technologies such as data packet parsing, data packet filtering and data packet sniffing. Data cleaning is performed, including removing outliers, noise data and duplicate data, etc., to ensure the accuracy and consistency of the data. To process missing data values, an interpolation method filling strategy can be used to fill in missing data items. Data standardization is performed to convert the node flow data into a standard data format that meets certain specifications and ranges, which is convenient for subsequent analysis and processing. Based on the standard node flow original data, the Bloom Filter data structure is used to generate distributed flow identification. The distributed flow identification may include information such as flow characteristics, flow behavior and flow attributes, which is used to identify, classify and analyze node flow.

优选的,步骤S14包括以下步骤:Preferably, step S14 includes the following steps:

步骤S141:对标准节点流量原始数据进行网络上传溯源,得到分布式电力流量传输上传节点数据;对分布式电力流量传输上传节点数据进行上传频率分析,得到分布式电力流量传输上传频率数据;Step S141: perform network upload tracing on the original data of standard node flow to obtain the node data of distributed power flow transmission upload; perform upload frequency analysis on the node data of distributed power flow transmission upload to obtain the frequency data of distributed power flow transmission upload;

步骤S142:根据分布式电力流量上传频率数据对标准节点流量原始数据进行相邻节点最短传输路径计算,得到相邻节点最短路径数据;根据相邻节点最短路径数据对标准节点流量原始数据进行传输闭环通路构建,生成节点传输闭环通路;Step S142: Calculate the shortest transmission path of adjacent nodes for the original data of standard node flow according to the frequency data of uploading the distributed power flow, and obtain the shortest path data of adjacent nodes; construct a transmission closed-loop path for the original data of standard node flow according to the shortest path data of adjacent nodes, and generate a node transmission closed-loop path;

步骤S143:基于节点传输闭环通路和分布式电力流量传输上传频率数据进行节点上传活跃度分析,生成节点上传活跃度分析数据;将节点上传活跃度分析数据和预设的节点上传活跃度阈值进行对比,当节点上传活跃度分析数据大于或等于预设的节点上传活跃度阈值时,则对相应的标准节点流量原始数据进行流量标识,生成分布式流量标识数据。Step S143: Perform node upload activity analysis based on the node transmission closed-loop path and the distributed power flow transmission upload frequency data to generate node upload activity analysis data; compare the node upload activity analysis data with a preset node upload activity threshold, and when the node upload activity analysis data is greater than or equal to the preset node upload activity threshold, perform flow identification on the corresponding standard node flow raw data to generate distributed flow identification data.

本发明通过对标准节点流量原始数据进行网络上传溯源,可以追踪电力流量的传输路径,有助于了解电力网络中的数据流动,发现潜在的传输问题或异常情况。对分布式电力流量传输上传节点数据进行上传频率分析,可以获取节点数据上传的频率信息。通过分析上传频率数据,可以了解节点的活跃度和数据传输模式,有助于监测节点的数据采集和传输状态。根据分布式电力流量上传频率数据,可以计算节点间的相邻节点最短传输路径。通过寻找最短传输路径,可以优化数据的传输效率,减少能耗和网络延迟。基于相邻节点最短路径数据,可以构建节点传输闭环通路。传输闭环通路的建立可以提高数据传输的可靠性和安全性,防止数据漏洞和传输异常的发生。基于节点传输闭环通路和分布式电力流量传输上传频率数据,进行节点上传活跃度的分析,可以帮助了解节点的上传行为和活跃程度,识别出主要的流量传输节点,用于后续的数据处理和分析。将节点上传活跃度分析数据与预设的节点上传活跃度阈值进行对比,当节点上传活跃度分析数据达到或超过阈值时,对相应的标准节点流量原始数据进行流量标识,可以用于标记重要的节点和流量数据,为后续的分析、监测和控制提供基础。The present invention can trace the transmission path of power flow by tracing the original data of standard node flow through network upload, which is helpful to understand the data flow in the power network and discover potential transmission problems or abnormal situations. The frequency information of node data upload can be obtained by analyzing the upload frequency of distributed power flow transmission upload node data. By analyzing the upload frequency data, the activity and data transmission mode of the node can be understood, which is helpful to monitor the data collection and transmission status of the node. According to the distributed power flow upload frequency data, the shortest transmission path of adjacent nodes between nodes can be calculated. By finding the shortest transmission path, the transmission efficiency of data can be optimized, and energy consumption and network delay can be reduced. Based on the shortest path data of adjacent nodes, a node transmission closed-loop path can be constructed. The establishment of a transmission closed-loop path can improve the reliability and security of data transmission and prevent the occurrence of data loopholes and transmission anomalies. Based on the node transmission closed-loop path and the distributed power flow transmission upload frequency data, the node upload activity is analyzed, which can help understand the upload behavior and activity of the node, identify the main traffic transmission nodes, and use them for subsequent data processing and analysis. The node upload activity analysis data is compared with the preset node upload activity threshold. When the node upload activity analysis data reaches or exceeds the threshold, the corresponding standard node traffic raw data is marked with traffic, which can be used to mark important nodes and traffic data, providing a basis for subsequent analysis, monitoring and control.

本发明实施例中,通过收集标准节点流量原始数据,并对其进行网络上传溯源分析。该分析可以使用网络监控工具或技术来确定数据流量的来源和路径。通过网络上传溯源分析,得到分布式电力流量传输上传节点数据。对分布式电力流量传输上传节点数据进行上传频率分析。可以使用统计方法或数据挖掘技术来分析节点数据上传的频率和模式,得到分布式电力流量传输上传频率数据。使用分布式电力流量上传频率数据,对标准节点流量原始数据进行相邻节点最短传输路径计算,可以使用图论算法,如最短路径算法,来找到节点之间的最短传输路径。根据相邻节点最短路径数据,对标准节点流量原始数据进行传输闭环通路构建,可以通过确定节点之间的闭环路径来建立传输闭环通路,以确保数据在网络中的循环传输。基于节点传输闭环通路和分布式电力流量传输上传频率数据,进行节点上传活跃度分析。可以使用统计分析方法来计算节点上传活跃度,并生成节点上传活跃度分析数据。对节点上传活跃度分析数据和预设的节点上传活跃度阈值进行对比。如果节点上传活跃度分析数据大于或等于预设的节点上传活跃度阈值,则对相应的标准节点流量原始数据进行流量标识。生成分布式流量标识数据,以标识高活跃度的节点和相应的流量数据。In an embodiment of the present invention, the original data of standard node traffic is collected and the network upload traceability analysis is performed on it. The analysis can use network monitoring tools or technologies to determine the source and path of data traffic. Through network upload traceability analysis, the node data of distributed power flow transmission upload is obtained. The upload frequency analysis of the node data of distributed power flow transmission upload is performed. The frequency and mode of node data upload can be analyzed by statistical methods or data mining techniques to obtain the distributed power flow transmission upload frequency data. The shortest transmission path of adjacent nodes is calculated for the original data of standard node traffic using the distributed power flow upload frequency data. A graph theory algorithm, such as the shortest path algorithm, can be used to find the shortest transmission path between nodes. According to the shortest path data of adjacent nodes, a transmission closed-loop path is constructed for the original data of standard node traffic. A transmission closed-loop path can be established by determining the closed-loop path between nodes to ensure the cyclic transmission of data in the network. Based on the node transmission closed-loop path and the distributed power flow transmission upload frequency data, the node upload activity analysis is performed. A statistical analysis method can be used to calculate the node upload activity and generate the node upload activity analysis data. The node upload activity analysis data is compared with the preset node upload activity threshold. If the node upload activity analysis data is greater than or equal to the preset node upload activity threshold, the corresponding standard node traffic raw data is subjected to traffic identification, and distributed traffic identification data is generated to identify high-activity nodes and corresponding traffic data.

优选的,步骤S2包括以下步骤:Preferably, step S2 comprises the following steps:

步骤S21:对分布式流量标识数据进行异常节点检测,生成电力网络异常节点数据;Step S21: performing abnormal node detection on the distributed flow identification data to generate abnormal node data of the power network;

步骤S22:根据电力网络异常节点数据进行异常关联关系探索,生成异常关联关系矩阵;Step S22: exploring abnormal correlation relationships based on abnormal node data of the power network to generate an abnormal correlation relationship matrix;

步骤S23:通过电力网络异常节点数据和异常关联关系矩阵进行复杂网络结构建模,生成电力网络复杂网络结构;对电力网络复杂网络结构进行低维向量空间嵌入,生成电力网络异常图谱;Step S23: Modeling a complex network structure through abnormal node data and abnormal correlation matrix of the power network to generate a complex network structure of the power network; embedding the complex network structure of the power network into a low-dimensional vector space to generate an abnormal map of the power network;

步骤S24:利用电力网络异常图谱对电力网络异常节点数据进行潜在威胁检测分析,生成电力网络潜在威胁事件。Step S24: Utilize the power network anomaly map to perform potential threat detection and analysis on the power network abnormal node data to generate a power network potential threat event.

本发明通过对分布式流量标识数据进行异常节点检测,可以有效地识别电力网络中存在异常或异常行为的节点,有助于及早发现并应对网络中的故障、攻击或其他异常情况,防止潜在的网络威胁。根据电力网络异常节点数据,可以通过分析节点之间的异常关联关系,建立异常关联关系矩阵,可以帮助了解电力网络中各节点之间的相互作用和依赖关系,进一步揭示潜在的异常或风险传播路径。通过使用电力网络异常节点数据和异常关联关系矩阵,可以构建电力网络的复杂网络结构,有助于更好地理解电力网络的整体结构和性质,识别出网络中的重要节点和关键路径,为网络管理和风险评估提供支持。对电力网络复杂网络结构进行低维向量空间嵌入,可以将网络中的节点映射到低维空间中,保留节点之间的关系和相似性。通过生成电力网络的异常图谱,可以更直观地展示网络中的异常节点、异常关联和威胁事件,帮助分析人员理解网络状态和威胁情况。利用电力网络异常图谱,可以对电力网络异常节点数据进行潜在威胁检测分析。通过识别网络中的潜在威胁事件,可以帮助网络管理者采取相应的措施来减轻风险、加强网络安全防护,并保障电力系统的正常运行。The present invention can effectively identify nodes with abnormal or abnormal behaviors in the power network by performing abnormal node detection on distributed flow identification data, which helps to discover and respond to faults, attacks or other abnormal situations in the network as early as possible, and prevent potential network threats. According to the abnormal node data of the power network, by analyzing the abnormal association relationship between nodes, an abnormal association relationship matrix can be established, which can help understand the interaction and dependency between nodes in the power network, and further reveal potential abnormal or risk propagation paths. By using the abnormal node data and abnormal association relationship matrix of the power network, a complex network structure of the power network can be constructed, which helps to better understand the overall structure and properties of the power network, identify important nodes and key paths in the network, and provide support for network management and risk assessment. By embedding the complex network structure of the power network into a low-dimensional vector space, the nodes in the network can be mapped to a low-dimensional space, and the relationship and similarity between the nodes can be retained. By generating an abnormal map of the power network, abnormal nodes, abnormal associations and threat events in the network can be more intuitively displayed, helping analysts understand the network status and threat situation. Using the abnormal map of the power network, potential threat detection and analysis can be performed on the abnormal node data of the power network. By identifying potential threat events in the network, network managers can take appropriate measures to mitigate risks, strengthen network security protection, and ensure the normal operation of the power system.

作为本发明的一个实例,参考图2所示,在本实例中所述步骤S2包括:As an example of the present invention, referring to FIG. 2 , in this example, step S2 includes:

步骤S21:对分布式流量标识数据进行异常节点检测,生成电力网络异常节点数据;Step S21: performing abnormal node detection on the distributed flow identification data to generate abnormal node data of the power network;

本发明实施例中,通过获取电力网络中的流量标识数据,数据包括电力设备的状态、功率、电压、电流等信息,数据可以通过传感器、监测设备或者智能电表等获取。对获取的数据进行预处理,包括数据清洗、去除噪声、缺失值处理等,有助于提高数据的质量和准确性。从预处理后的数据中提取有用的特征。特征具体为电力设备的各种指标,如功率因数、频率、谐波等。选择合适的特征可以提高异常节点检测的效果。选择适合电力网络的异常节点检测算法。常用的算法包括基于统计的方法(如均值、标准差)、基于机器学习的方法(如支持向量机、随机森林)以及基于深度学习的方法(如自编码器、深度神经网络)等。使用选定的异常节点检测算法对数据进行分析和处理,标识出电力网络中的异常节点。异常节点具体为存在故障的设备、电流、电压异常等。将得到的异常节点标识与原始数据进行匹配,生成电力网络异常节点数据,数据包括异常节点的位置、时间戳、异常类型等。In the embodiment of the present invention, by acquiring flow identification data in the power network, the data includes information such as the status, power, voltage, current, etc. of the power equipment, and the data can be acquired through sensors, monitoring equipment or smart meters. Preprocessing the acquired data, including data cleaning, noise removal, missing value processing, etc., helps to improve the quality and accuracy of the data. Useful features are extracted from the preprocessed data. The features are specifically various indicators of the power equipment, such as power factor, frequency, harmonics, etc. Selecting appropriate features can improve the effect of abnormal node detection. Select an abnormal node detection algorithm suitable for the power network. Common algorithms include statistical-based methods (such as mean, standard deviation), machine learning-based methods (such as support vector machines, random forests), and deep learning-based methods (such as autoencoders, deep neural networks), etc. The selected abnormal node detection algorithm is used to analyze and process the data to identify abnormal nodes in the power network. The abnormal nodes are specifically faulty equipment, current, voltage anomalies, etc. The obtained abnormal node identification is matched with the original data to generate abnormal node data of the power network, and the data includes the location, timestamp, abnormal type, etc. of the abnormal node.

步骤S22:根据电力网络异常节点数据进行异常关联关系探索,生成异常关联关系矩阵;Step S22: exploring abnormal correlation relationships based on abnormal node data of the power network to generate an abnormal correlation relationship matrix;

本发明实施例中,通过将步骤S21中生成的电力网络异常节点数据进行整理和准备。确保数据包含有关异常节点的信息,例如节点标识、异常类型、时间戳等。明确异常关联关系的定义。根据电力网络的特点和需求,定义异常节点之间的关联关系。关联关系可以是空间上的关联(如设备之间的物理连接)、时间上的关联(如同时发生的异常事件)、功能上的关联(如相邻设备之间的相互影响关系)等。确定用于衡量异常关联关系强度的指标,具体是统计指标,如相关系数、互信息等,以及基于机器学习或图论的指标,如图结构相似性、节点距离等。选择适当的指标可以量化异常关联关系的强度和相关性。选择相关性分析、聚类分析、关联规则挖掘等算法,算法可以帮助发现异常节点之间的关联模式和规律。根据异常关联关系的探索结果,构建异常关联关系矩阵。矩阵的行和列代表电力网络中的异常节点,矩阵的元素表示节点之间的关联强度。矩阵可以是二维矩阵或者稀疏矩阵,根据网络规模和计算需求进行选择。对生成的异常关联关系矩阵进行分析和解读。通过矩阵的可视化、统计分析和图论分析等方法,可以获取异常节点之间的关联模式、集群结构、异常传播路径等信息。In an embodiment of the present invention, the abnormal node data of the power network generated in step S21 is sorted and prepared. Ensure that the data contains information about the abnormal nodes, such as node identification, abnormal type, timestamp, etc. Clarify the definition of abnormal association relationships. Define the association relationships between abnormal nodes according to the characteristics and requirements of the power network. The association relationship can be a spatial association (such as a physical connection between devices), a temporal association (such as an abnormal event occurring at the same time), a functional association (such as a mutual influence relationship between adjacent devices), etc. Determine the indicators used to measure the strength of the abnormal association relationship, specifically statistical indicators, such as correlation coefficients, mutual information, etc., and indicators based on machine learning or graph theory, such as graph structure similarity, node distance, etc. Selecting appropriate indicators can quantify the strength and relevance of abnormal association relationships. Select algorithms such as correlation analysis, cluster analysis, and association rule mining, which can help discover association patterns and laws between abnormal nodes. According to the exploration results of abnormal association relationships, an abnormal association relationship matrix is constructed. The rows and columns of the matrix represent abnormal nodes in the power network, and the elements of the matrix represent the strength of association between nodes. The matrix can be a two-dimensional matrix or a sparse matrix, which is selected according to the network scale and computing requirements. The generated abnormal correlation matrix is analyzed and interpreted. Through matrix visualization, statistical analysis, graph theory analysis and other methods, the correlation pattern, cluster structure, abnormal propagation path and other information between abnormal nodes can be obtained.

步骤S23:通过电力网络异常节点数据和异常关联关系矩阵进行复杂网络结构建模,生成电力网络复杂网络结构;对电力网络复杂网络结构进行低维向量空间嵌入,生成电力网络异常图谱;Step S23: Modeling a complex network structure through abnormal node data and abnormal correlation matrix of the power network to generate a complex network structure of the power network; embedding the complex network structure of the power network into a low-dimensional vector space to generate an abnormal map of the power network;

本发明实施例中,通过根据电力网络的特点,将异常节点作为网络中的节点,每个节点代表一个异常事件或异常设备。利用异常关联关系矩阵中的关联强度信息,将节点之间的关联关系转化为网络中的边。可以根据关联强度的阈值设置一定的连接条件,仅保留关联强度大于阈值的边。根据实际需求,可以为网络中的节点和边定义一些属性,例如节点类型、边的权重等。对生成的电力网络复杂网络结构进行统计分析。可以计算网络的节点度分布、聚类系数、平均路径长度等指标,了解网络的拓扑特性和结构特征。利用社区发现算法,识别复杂网络中的社区结构。社区结构表示节点之间具有较高的内部连接强度,而节点之间的连接强度较低,可以帮助发现电力网络中的功能模块和异常传播路径。根据复杂网络结构,提取节点和边的特征。可以利用图论中的方法,如节点中心性、局部和全局特征等,来衡量节点和边在网络中的重要程度和相互关系。应用降维技术,例如主成分分析(PCA)或t-SNE,将高维特征映射到低维空间,可以减少数据的维度,并保留数据的关键结构信息。利用嵌入后的低维特征,将电力网络的异常节点和关联关系可视化为图谱。节点可以用不同的形状、颜色、大小表示,以反映节点的异常类型或属性。边的粗细和颜色可以表示关联强度。对生成的电力网络异常图谱进行分析和解读。通过观察图谱中节点的分布、集群结构、异常传播路径等,可以获取电力网络异常行为的整体情况和局部细节。In the embodiment of the present invention, according to the characteristics of the power network, the abnormal nodes are used as nodes in the network, and each node represents an abnormal event or abnormal equipment. The association strength information in the abnormal association relationship matrix is used to convert the association relationship between the nodes into edges in the network. Certain connection conditions can be set according to the threshold of the association strength, and only the edges with an association strength greater than the threshold are retained. According to actual needs, some attributes such as node type and edge weight can be defined for the nodes and edges in the network. The generated complex network structure of the power network is statistically analyzed. Indicators such as the node degree distribution, clustering coefficient, and average path length of the network can be calculated to understand the topological characteristics and structural characteristics of the network. The community structure in the complex network is identified using a community discovery algorithm. The community structure indicates that the internal connection strength between nodes is high, while the connection strength between nodes is low, which can help discover functional modules and abnormal propagation paths in the power network. According to the complex network structure, the features of nodes and edges are extracted. Methods in graph theory, such as node centrality, local and global features, etc., can be used to measure the importance and mutual relationship of nodes and edges in the network. Applying dimensionality reduction techniques, such as principal component analysis (PCA) or t-SNE, to map high-dimensional features to low-dimensional space can reduce the dimensionality of the data and retain the key structural information of the data. Using the embedded low-dimensional features, the abnormal nodes and associations of the power network are visualized as a graph. Nodes can be represented by different shapes, colors, and sizes to reflect the abnormal type or attribute of the node. The thickness and color of the edge can indicate the strength of the association. The generated power network anomaly graph is analyzed and interpreted. By observing the distribution of nodes, cluster structure, abnormal propagation path, etc. in the graph, the overall situation and local details of the abnormal behavior of the power network can be obtained.

步骤S24:利用电力网络异常图谱对电力网络异常节点数据进行潜在威胁检测分析,生成电力网络潜在威胁事件。Step S24: Utilize the power network anomaly map to perform potential threat detection and analysis on the power network abnormal node data to generate a power network potential threat event.

本发明实施例中,通过根据电力网络异常图谱中节点的位置和连接关系,识别具有异常特征的节点,节点是关键设备或系统中的异常节点。通过分析其在图谱中的位置和邻近节点的相互关系,可以评估其潜在的威胁程度。利用异常节点在低维向量空间中的特征向量,结合机器学习或深度学习方法,对异常节点进行分类和检测。可以使用监督学习算法,如支持向量机(SVM)或神经网络,训练模型来区分正常节点和异常节点。根据电力网络异常图谱中的边和连接关系,提取异常节点之间的关联路径,可以通过图论中的遍历算法,如深度优先搜索(DFS)或广度优先搜索(BFS),来获取异常节点之间的最短路径或路径特征。根据异常关联关系的强度,如边的权重或关联程度,对异常关联关系进行评估。可以设置阈值或使用统计方法,如聚类系数或相关系数,来衡量异常关联关系的重要程度。结合异常节点的特征和异常关联关系的分析结果,对电力网络进行威胁评估,具体为根据异常节点的重要性、关联关系的强度和关联路径的特征,评估潜在威胁事件的严重程度和潜在影响,并将评估结果转化为电力网络的潜在威胁事件,对潜在威胁事件进行分类、标记和描述,从而形成系统化的威胁事件库。事件库包括事件的起因、影响范围、后果以及建议的应对措施。In an embodiment of the present invention, a node with abnormal characteristics is identified according to the position and connection relationship of the node in the abnormal graph of the power network, and the node is an abnormal node in a key device or system. By analyzing its position in the graph and the relationship between neighboring nodes, its potential threat level can be evaluated. The abnormal nodes are classified and detected by using the feature vector of the abnormal node in the low-dimensional vector space, combined with machine learning or deep learning methods. A supervised learning algorithm, such as a support vector machine (SVM) or a neural network, can be used to train the model to distinguish normal nodes from abnormal nodes. According to the edges and connection relationships in the abnormal graph of the power network, the association paths between the abnormal nodes are extracted, and the shortest path or path features between the abnormal nodes can be obtained by the traversal algorithm in graph theory, such as depth-first search (DFS) or breadth-first search (BFS). The abnormal association relationship is evaluated according to the strength of the abnormal association relationship, such as the weight or association degree of the edge. A threshold can be set or a statistical method, such as a clustering coefficient or a correlation coefficient, can be used to measure the importance of the abnormal association relationship. Combined with the characteristics of abnormal nodes and the analysis results of abnormal associations, the threat assessment of the power network is carried out. Specifically, the severity and potential impact of potential threat events are assessed according to the importance of abnormal nodes, the strength of associations and the characteristics of association paths, and the assessment results are converted into potential threat events of the power network. Potential threat events are classified, marked and described to form a systematic threat event library. The event library includes the cause, scope of impact, consequences and recommended response measures of the event.

优选的,步骤S21包括以下步骤:Preferably, step S21 includes the following steps:

步骤S211:对分布式流量标识数据进行节点发送接收比率分析,得到节点发送接收比率数据;基于节点发送接收比率对分布式流量标识数据进行数据包大小分析,生成节点发送数据包大小比率数据;Step S211: performing a node sending/receiving ratio analysis on the distributed traffic identification data to obtain node sending/receiving ratio data; performing a data packet size analysis on the distributed traffic identification data based on the node sending/receiving ratio to generate node sending data packet size ratio data;

步骤S212:基于节点发送接收比率数据和节点发送数据包大小比率数据对分布式流量标识数据进行网络传输流量速率变化分析,生成节点传输流量速率变化比率数据;Step S212: performing network transmission flow rate change analysis on the distributed flow identification data based on the node sending and receiving ratio data and the node sending data packet size ratio data, and generating node transmission flow rate change ratio data;

步骤S213:利用节点流量特征比率计算公式对节点发送接收比率数据、节点发送数据包大小比率数据和节点传输流量速率变化比率数据进行节点流量特征比率计算,得到节点流量特征比率数据;Step S213: Calculate the node traffic characteristic ratio of the node sending and receiving ratio data, the node sending data packet size ratio data and the node transmission flow rate change ratio data using the node traffic characteristic ratio calculation formula to obtain the node traffic characteristic ratio data;

步骤S214:将节点流量特征比率数据和预设的标准节点流量特征比率进行对比,当节点流量特征比率数据大于或等于预设的标准节点流量特征比率时,则生成电力网络异常节点数据。Step S214: Compare the node flow characteristic ratio data with a preset standard node flow characteristic ratio. When the node flow characteristic ratio data is greater than or equal to the preset standard node flow characteristic ratio, abnormal power network node data is generated.

本发明通过对分布式流量标识数据进行节点发送接收比率分析,可以得到节点发送接收比率数据,可以帮助了解每个节点在电力网络中的数据发送和接收情况,识别出发送和接收比率异常的节点。通过基于节点发送接收比率对分布式流量标识数据进行数据包大小分析,可以进一步分析节点的数据包大小情况,有助于识别出数据包大小异常的节点。利用节点发送接收比率数据和节点发送数据包大小比率数据对分布式流量标识数据进行网络传输流量速率变化分析,可以帮助监测节点的传输流量速率变化情况,检测出流量速率异常的节点。通过分析传输流量速率的变化,可以及时发现异常情况,防止潜在的网络问题进一步扩大。利用节点流量特征比率计算公式对节点发送接收比率数据、节点发送数据包大小比率数据和节点传输流量速率变化比率数据进行节点流量特征比率计算,可以综合考虑节点在多个方面的流量特征,生成节点流量特征比率数据。通过计算节点的流量特征比率,可以更全面地评估节点的流量特征,发现潜在的异常。将节点流量特征比率数据与预设的标准节点流量特征比率进行对比,当节点流量特征比率数据大于或等于预设的标准节点流量特征比率时,会生成电力网络异常节点数据,可以自动化地识别出异常节点,减少了人工的主观判断,提高了异常节点的检测效率。通过及时发现和标识异常节点,可以采取相应的修复措施,防止异常节点对电力网络造成进一步的损害。The present invention can obtain node sending and receiving ratio data by performing node sending and receiving ratio analysis on distributed flow identification data, which can help understand the data sending and receiving situation of each node in the power network and identify nodes with abnormal sending and receiving ratios. By performing data packet size analysis on distributed flow identification data based on the node sending and receiving ratio, the data packet size of the node can be further analyzed, which helps to identify nodes with abnormal data packet size. Using node sending and receiving ratio data and node sending data packet size ratio data to perform network transmission flow rate change analysis on distributed flow identification data can help monitor the transmission flow rate change of the node and detect nodes with abnormal flow rate. By analyzing the change of transmission flow rate, abnormal situations can be discovered in time to prevent potential network problems from further expanding. Using the node flow characteristic ratio calculation formula to calculate the node flow characteristic ratio on the node sending and receiving ratio data, the node sending data packet size ratio data and the node transmission flow rate change ratio data, the node flow characteristic ratio data can be comprehensively considered to generate the node flow characteristic ratio data. By calculating the flow characteristic ratio of the node, the flow characteristics of the node can be more comprehensively evaluated and potential abnormalities can be discovered. The node flow characteristic ratio data is compared with the preset standard node flow characteristic ratio. When the node flow characteristic ratio data is greater than or equal to the preset standard node flow characteristic ratio, the power network abnormal node data will be generated, which can automatically identify abnormal nodes, reduce manual subjective judgment, and improve the detection efficiency of abnormal nodes. By timely discovering and identifying abnormal nodes, corresponding repair measures can be taken to prevent abnormal nodes from causing further damage to the power network.

本发明实施例中,通过收集分布式流量标识数据,包括节点的发送和接收数据量。使用适当的算法和工具对节点的发送接收比率进行分析,计算每个节点的发送接收比率数据。利用节点的发送接收比率数据,对分布式流量标识数据进行数据包大小分析,生成节点的发送数据包大小比率数据。基于节点的发送接收比率数据和发送数据包大小比率数据,对分布式流量标识数据进行网络传输流量速率变化分析。使用适当的算法和工具来计算节点的传输流量速率变化比率数据。根据预先定义的节点流量特征比率计算公式,结合节点的发送接收比率数据、发送数据包大小比率数据和传输流量速率变化比率数据,进行节点流量特征比率计算。确定计算公式中的权重和参数,以便准确地评估节点的流量特征。将节点流量特征比率数据与预设的标准节点流量特征比率进行对比。如果节点流量特征比率数据大于或等于预设的标准节点流量特征比率,则认为该节点是电力网络的异常节点。生成电力网络异常节点数据,可以保存在数据库中或以其他方式进行记录和处理。In an embodiment of the present invention, distributed flow identification data is collected, including the amount of data sent and received by the node. The send-receive ratio of the node is analyzed using appropriate algorithms and tools, and the send-receive ratio data of each node is calculated. The send-receive ratio data of the node is used to analyze the data packet size of the distributed flow identification data, and the send data packet size ratio data of the node is generated. Based on the send-receive ratio data and the send data packet size ratio data of the node, the distributed flow identification data is analyzed for network transmission flow rate changes. Appropriate algorithms and tools are used to calculate the transmission flow rate change ratio data of the node. According to the predefined node flow feature ratio calculation formula, the node flow feature ratio is calculated in combination with the send-receive ratio data, the send data packet size ratio data and the transmission flow rate change ratio data of the node. The weights and parameters in the calculation formula are determined to accurately evaluate the flow characteristics of the node. The node flow feature ratio data is compared with the preset standard node flow feature ratio. If the node flow feature ratio data is greater than or equal to the preset standard node flow feature ratio, the node is considered to be an abnormal node of the power network. The abnormal node data of the power network is generated, which can be stored in a database or recorded and processed in other ways.

优选的,步骤S213中的节点流量特征比率计算公式具体如下:Preferably, the node traffic characteristic ratio calculation formula in step S213 is as follows:

式中,R(t′)表示为节点在时间t′的流量特征比率,Fs(t′)表示为节点在时间t′的发送数据包大小占其最大发送数据包大小的比率,Ds(t′)表示为节点在时间t′的发送数据包传输流量速率变化占其最大传输流量速率的比率,Dmax表示为节点的最大传输流量速率,Ps(t′)表示为节点在时间t′的发送接收比率,Pmax表示为节点的最大发送接收比率,Fr(t′)表示为节点在时间t′的接收数据包大小占其最大接收数据包大小的比率,Dr(t′)表示为节点在时间t′的接收数据包传输流量速率变化占其最大传输流量速率的比率,t表示为节点检测时间上限,Pr(t′)表示为节点在时间t′的接收数据包发送接收比率,t′表示为时间点。Where R(t′) is the traffic characteristic ratio of the node at time t′, Fs (t′) is the ratio of the size of the sent data packet of the node at time t′ to its maximum sent data packet size, Ds (t′) is the ratio of the change of the transmission flow rate of the sent data packet of the node at time t′ to its maximum transmission flow rate, Dmax is the maximum transmission flow rate of the node, Ps (t′) is the send-receive ratio of the node at time t′, Pmax is the maximum send-receive ratio of the node, Fr (t′) is the ratio of the size of the received data packet of the node at time t′ to its maximum received data packet size, Dr (t′) is the ratio of the change of the transmission flow rate of the received data packet of the node at time t′ to its maximum transmission flow rate, t is the upper limit of the node detection time, Pr (t′) is the send-receive ratio of the received data packet of the node at time t′, and t′ is the time point.

本发明通过分析并整合了一种节点流量特征比率计算公式,公式中的描述了节点发送数据包大小比率Fs(t′)和发送数据包传输流量速率变化比率Ds(t′)对节点流量特征比率的影响。通过发送接收比率Ps(t′)权衡,确保节点的发送数据包大小比率和传输流量速率变化比率都得到适当的考虑。除法操作用于归一化传输流量速率变化比率,使其与发送数据包大小比率在计算上具有相同的权重。描述了节点接收数据包大小比率Fr(t′)和接收数据包传输流量速率变化比率Dr(t′)对节点流量特征比率的影响。通过接收数据包发送接收比率Pr(t′)权衡,确保节点的接收数据包大小比率和传输流量速率变化比率都得到适当的考虑。同样,除法操作用于归一化传输流量速率变化比率。时间的积分,表示了在时间范围内这两个项对节点流量特征比率的累积影响。公式考虑了节点在一段时间内的各种输入和状态变化对流量特征比率的综合影响,更贴近实际网络中节点的动态变化。在使用本领域常规的节点流量特征比率计算公式时,可以得到节点在时间t′的流量特征比率,通过应用本发明提供的节点流量特征比率计算公式,可以更加精确的计算出节点在时间t′的流量特征比率。公式综合考虑了节点的发送和接收数据包大小比率、传输流量速率变化比率以及发送接收比率的特征,从而提供了节点流量特征比率的综合评估。通过使用发送接收比率来权衡发送和接收数据包大小比率以及传输流量速率变化比率,确保每个因素在计算中得到了适当的考虑。通过除以各自的最大值,将传输流量速率变化比率归一化,使其在计算中具有相同的权重,避免了某一方面因素对结果产生过大的影响。通过时间积分,考虑了节点在一段时间内的状态变化,使得结果更加贴近实际网络中节点流量特征比率的变化趋势。The present invention analyzes and integrates a node traffic characteristic ratio calculation formula, where The influence of the node sending packet size ratio F s (t′) and the sending packet transmission traffic rate change ratio D s (t′) on the node traffic characteristic ratio is described. The sending and receiving ratio P s (t′) is used to balance to ensure that the node's sending packet size ratio and the transmission traffic rate change ratio are properly considered. The division operation is used to normalize the transmission traffic rate change ratio so that it has the same weight as the sending packet size ratio in calculation. The influence of the node received data packet size ratio F r (t′) and the received data packet transmission flow rate change ratio D r (t′) on the node flow characteristic ratio is described. By weighing the received data packet send-receive ratio P r (t′), it is ensured that the node's received data packet size ratio and the transmission flow rate change ratio are properly considered. Similarly, the division operation is used to normalize the transmission flow rate change ratio. The integral of time represents the cumulative impact of these two items on the node flow characteristic ratio within the time range. The formula takes into account the comprehensive impact of various inputs and state changes of the node over a period of time on the flow characteristic ratio, which is closer to the dynamic changes of nodes in the actual network. When using the conventional node flow characteristic ratio calculation formula in the field, the flow characteristic ratio of the node at time t′ can be obtained. By applying the node flow characteristic ratio calculation formula provided by the present invention, the flow characteristic ratio of the node at time t′ can be calculated more accurately. The formula comprehensively considers the characteristics of the node's sending and receiving data packet size ratio, the transmission flow rate change ratio, and the sending and receiving ratio, thereby providing a comprehensive evaluation of the node flow characteristic ratio. By using the send-receive ratio to weigh the ratio of the size of the sent and received packets and the ratio of the change in the transmission flow rate, we ensure that each factor is properly considered in the calculation. By dividing by their respective maximum values, we normalize the ratio of the change in the transmission flow rate so that it has the same weight in the calculation, thus avoiding excessive influence of one factor on the result. By integrating over time, we consider the state changes of the node over a period of time, making the result closer to the changing trend of the characteristic ratio of the node flow in the actual network.

优选的,步骤S24包括以下步骤:Preferably, step S24 includes the following steps:

步骤S241:利用电力网络异常图谱对电力网络异常节点数据进行威胁行为关联图构建,生成网络威胁行为图谱;对网络威胁行为图谱进行节点中心性分析,生成网络节点中心性指标,其中网络节点中心性指标包括节点度中心性、节点介数中心性和节点接近中心性;Step S241: construct a threat behavior association graph for abnormal node data of the power network using the power network anomaly graph to generate a network threat behavior graph; perform node centrality analysis on the network threat behavior graph to generate a network node centrality index, wherein the network node centrality index includes node degree centrality, node betweenness centrality and node proximity centrality;

步骤S242:根据节点度中心性、节点介数中心性和节点接近中心性对电力网络异常图谱进行威胁行为社区划分,生成网络威胁行为社区标识数据;基于网络威胁行为社区标识数据对电力网络异常节点数据进行相似行为聚类,生成异常节点行为聚类数据;Step S242: dividing the power network anomaly map into threat behavior communities according to node degree centrality, node betweenness centrality, and node proximity centrality to generate network threat behavior community identification data; clustering the power network abnormal node data into similar behaviors based on the network threat behavior community identification data to generate abnormal node behavior clustering data;

步骤S243:对异常节点行为聚类数据进行威胁路径识别,生成威胁行为路径识别数据;对威胁行为路径识别数据进行威胁行为强关联分析,生成威胁行为关键路径识别数据;Step S243: performing threat path identification on the abnormal node behavior clustering data to generate threat behavior path identification data; performing threat behavior strong correlation analysis on the threat behavior path identification data to generate threat behavior key path identification data;

步骤S244:根据威胁行为关键路径识别数据对电力网络异常节点数据进行潜在威胁关联分析,生成电力网络潜在威胁事件。Step S244: performing potential threat correlation analysis on abnormal node data of the power network according to the threat behavior key path identification data, and generating a potential threat event for the power network.

本发明通过构建威胁行为关联图和网络节点中心性分析,可以生成网络威胁行为图谱,有助于可视化和理解电力网络中的威胁行为,从而提高对异常节点的识别和分析能力。根据节点度中心性、节点介数中心性和节点接近中心性等指标,将电力网络异常图谱划分为威胁行为社区。然后,对每个社区内的异常节点进行相似行为聚类,可以更好地理解和分析不同节点集群的威胁行为,帮助发现隐藏的威胁模式和趋势。对异常节点行为聚类数据进行威胁路径识别,可以识别出潜在的威胁行为路径。随后,进行威胁行为强关联分析,找到关键路径,即具有重要影响力和高风险的威胁行为路径,有助于集中精力应对关键威胁,提高网络安全的响应效率和准确性。利用威胁行为关键路径识别数据,对电力网络异常节点数据进行潜在威胁关联分析,有助于发现异常节点之间存在的隐藏威胁关系,对潜在的威胁事件进行早期预警和预防。The present invention can generate a network threat behavior map by constructing a threat behavior association graph and a network node centrality analysis, which helps to visualize and understand the threat behavior in the power network, thereby improving the ability to identify and analyze abnormal nodes. According to indicators such as node degree centrality, node betweenness centrality, and node proximity centrality, the power network abnormal map is divided into threat behavior communities. Then, similar behaviors are clustered for abnormal nodes in each community, which can better understand and analyze the threat behaviors of different node clusters and help discover hidden threat patterns and trends. Threat path identification is performed on abnormal node behavior clustering data to identify potential threat behavior paths. Subsequently, a strong correlation analysis of threat behavior is performed to find the key path, that is, the threat behavior path with significant influence and high risk, which helps to focus on key threats and improve the response efficiency and accuracy of network security. Using threat behavior key path identification data, potential threat association analysis is performed on abnormal node data of the power network, which helps to discover hidden threat relationships between abnormal nodes and provide early warning and prevention of potential threat events.

作为本发明的一个实例,参考图3所示,在本实例中所述步骤S24包括:As an example of the present invention, referring to FIG. 3 , in this example, step S24 includes:

步骤S241:利用电力网络异常图谱对电力网络异常节点数据进行威胁行为关联图构建,生成网络威胁行为图谱;对网络威胁行为图谱进行节点中心性分析,生成网络节点中心性指标,其中网络节点中心性指标包括节点度中心性、节点介数中心性和节点接近中心性;Step S241: construct a threat behavior association graph for abnormal node data of the power network using the power network anomaly graph to generate a network threat behavior graph; perform node centrality analysis on the network threat behavior graph to generate a network node centrality index, wherein the network node centrality index includes node degree centrality, node betweenness centrality and node proximity centrality;

本发明实施例中,通过收集电力网络异常节点数据,可以通过监测设备、传感器或日志数据获取。然后,根据异常节点之间的关联关系,构建电力网络异常图谱。可以使用图论和网络分析的技术和算法,如图数据库或图分析工具,来表示和处理异常图谱。利用电力网络异常图谱,将异常节点之间的威胁行为关联关系加入到图谱中,可以通过将威胁行为表示为图的边(或连接)来完成。威胁行为包括恶意访问、攻击、数据篡改等。在图谱中,异常节点表示为图的节点,而威胁行为表示为节点之间的边。对生成的网络威胁行为图谱进行节点中心性分析,计算节点的中心性指标。常用的节点中心性指标包括:节点度中心性:度中心性是指节点在图中与其他节点相连的数量。具有较高度中心性的节点在网络中具有更多的连接,具有更多的影响力和关键性。节点介数中心性:介数中心性是指节点在网络中作为最短路径上的桥梁的次数。具有高介数中心性的节点在信息传播和影响传递方面起着重要的作用。节点接近中心性:接近中心性是指节点与其他节点之间的平均最短路径距离。具有较高接近中心性的节点更容易访问其他节点,在网络中具有更大的控制能力。In an embodiment of the present invention, by collecting data of abnormal nodes in the power network, data can be obtained through monitoring equipment, sensors or log data. Then, according to the association relationship between abnormal nodes, an abnormal graph of the power network is constructed. The abnormal graph can be represented and processed using graph theory and network analysis techniques and algorithms, such as graph databases or graph analysis tools. Using the abnormal graph of the power network, the threat behavior association relationship between abnormal nodes is added to the graph, which can be completed by representing the threat behavior as the edge (or connection) of the graph. Threat behaviors include malicious access, attacks, data tampering, etc. In the graph, abnormal nodes are represented as nodes of the graph, and threat behaviors are represented as edges between nodes. The generated network threat behavior graph is subjected to node centrality analysis to calculate the centrality index of the node. Commonly used node centrality indicators include: Node degree centrality: Degree centrality refers to the number of connections between a node and other nodes in the graph. Nodes with higher centrality have more connections in the network, and have more influence and criticality. Node betweenness centrality: Betweenness centrality refers to the number of times a node acts as a bridge on the shortest path in the network. Nodes with high betweenness centrality play an important role in information dissemination and influence transfer. Node proximity centrality: proximity centrality refers to the average shortest path distance between a node and other nodes. Nodes with higher proximity centrality are more likely to access other nodes and have greater control in the network.

步骤S242:根据节点度中心性、节点介数中心性和节点接近中心性对电力网络异常图谱进行威胁行为社区划分,生成网络威胁行为社区标识数据;基于网络威胁行为社区标识数据对电力网络异常节点数据进行相似行为聚类,生成异常节点行为聚类数据;Step S242: dividing the power network anomaly map into threat behavior communities according to node degree centrality, node betweenness centrality, and node proximity centrality to generate network threat behavior community identification data; clustering the power network abnormal node data into similar behaviors based on the network threat behavior community identification data to generate abnormal node behavior clustering data;

本发明实施例中,通过计算节点度中心性、节点介数中心性和节点接近中心性指标。根据之前生成的网络威胁行为图谱,使用合适的算法计算每个节点的度中心性、介数中心性和接近中心性。结合这些中心性指标,可以使用社区发现算法,如Louvain算法、谱聚类算法等,对电力网络异常图谱进行社区划分,算法能够将具有相似中心性特征的节点聚集到同一个社区中,从而形成威胁行为社区。在社区划分完成后,为每个社区分配一个唯一的标识,生成网络威胁行为社区标识数据,标识可以用于标识和区分不同的威胁行为社区。使用网络威胁行为社区标识数据来对电力网络异常节点数据进行聚类。将每个异常节点与其所属的威胁行为社区关联。选择适当的聚类算法,如K均值聚类、层次聚类、密度聚类等,根据异常节点的特征和相似性进行聚类。根据聚类结果,生成异常节点行为聚类数据。每个聚类包含具有相似行为特征的异常节点。In an embodiment of the present invention, the node degree centrality, node betweenness centrality and node proximity centrality indicators are calculated. According to the previously generated network threat behavior map, the degree centrality, betweenness centrality and proximity centrality of each node are calculated using a suitable algorithm. In combination with these centrality indicators, a community discovery algorithm, such as the Louvain algorithm, the spectral clustering algorithm, etc., can be used to divide the power network abnormality map into communities. The algorithm can cluster nodes with similar centrality characteristics into the same community, thereby forming a threat behavior community. After the community division is completed, a unique identifier is assigned to each community to generate network threat behavior community identification data, which can be used to identify and distinguish different threat behavior communities. The network threat behavior community identification data is used to cluster the abnormal node data of the power network. Each abnormal node is associated with the threat behavior community to which it belongs. Select an appropriate clustering algorithm, such as K-means clustering, hierarchical clustering, density clustering, etc., and cluster according to the characteristics and similarities of the abnormal nodes. According to the clustering results, abnormal node behavior clustering data is generated. Each cluster contains abnormal nodes with similar behavior characteristics.

步骤S243:对异常节点行为聚类数据进行威胁路径识别,生成威胁行为路径识别数据;对威胁行为路径识别数据进行威胁行为强关联分析,生成威胁行为关键路径识别数据;Step S243: performing threat path identification on the abnormal node behavior clustering data to generate threat behavior path identification data; performing threat behavior strong correlation analysis on the threat behavior path identification data to generate threat behavior key path identification data;

本发明实施例中,通过针对每个异常节点行为聚类,分析其中的行为序列或事件序列。使用合适的算法,如序列模式挖掘算法(如Apriori算法、GSP算法)、马尔可夫模型等,对异常节点行为聚类中的行为序列进行挖掘,以识别潜在的威胁行为路径。根据识别到的威胁行为路径,生成威胁行为路径识别数据,数据包含路径的起点、终点、中间经过的节点或行为,以及路径的频率或概率信息。使用威胁行为路径识别数据作为输入,采用关联规则挖掘算法,如Apriori算法、FP-Growth算法等,进行威胁行为强关联分析。对挖掘得到的关联规则,可以使用支持度和置信度等指标进行评估和筛选,选择具有较高关联性的规则。根据关联规则的评估结果,生成威胁行为关键路径识别数据,数据包含关键路径或关联规则的信息,如起点、终点、关联规则的条件与结果等。In an embodiment of the present invention, by clustering each abnormal node behavior, the behavior sequence or event sequence therein is analyzed. Use a suitable algorithm, such as a sequence pattern mining algorithm (such as an Apriori algorithm, a GSP algorithm), a Markov model, etc., to mine the behavior sequence in the abnormal node behavior cluster to identify potential threat behavior paths. According to the identified threat behavior path, threat behavior path identification data is generated, and the data includes the starting point, end point, intermediate nodes or behaviors of the path, and the frequency or probability information of the path. Using the threat behavior path identification data as input, an association rule mining algorithm, such as an Apriori algorithm, an FP-Growth algorithm, etc., is used to perform a strong association analysis of threat behavior. The association rules obtained by mining can be evaluated and screened using indicators such as support and confidence, and rules with higher correlation are selected. According to the evaluation results of the association rules, threat behavior critical path identification data is generated, and the data includes information of the critical path or association rules, such as the starting point, end point, conditions and results of the association rules, etc.

步骤S244:根据威胁行为关键路径识别数据对电力网络异常节点数据进行潜在威胁关联分析,生成电力网络潜在威胁事件。Step S244: performing potential threat correlation analysis on abnormal node data of the power network according to the threat behavior key path identification data, and generating a potential threat event for the power network.

本发明实施例中,通过收集电力网络异常节点数据,包括节点行为日志、事件记录等,数据记录了电力网络中的异常行为或事件。获取威胁行为关键路径识别数据,包括关键路径的起点、终点和关联规则等信息。根据威胁行为关键路径识别数据中的关键路径信息,将电力网络异常节点数据与关键路径进行匹配。对于匹配成功的异常节点数据,分析其与关键路径的关联性,并计算相应的关联度指标,如支持度、置信度等。基于关联度指标,筛选出具有较高关联度的异常节点数据,作为潜在威胁事件候选集。对潜在威胁事件候选集进行进一步的分析和筛选,考虑事件的属性、时序、频率等信息,排除误报或冗余事件。根据分析结果,生成电力网络潜在威胁事件列表,包括事件的描述、关联的异常节点或行为信息、事件发生的时间窗口等。In an embodiment of the present invention, by collecting abnormal node data of the power network, including node behavior logs, event records, etc., the data records abnormal behaviors or events in the power network. Acquire threat behavior critical path identification data, including information such as the starting point, end point and association rules of the critical path. According to the critical path information in the threat behavior critical path identification data, match the abnormal node data of the power network with the critical path. For the successfully matched abnormal node data, analyze its correlation with the critical path, and calculate the corresponding correlation index, such as support, confidence, etc. Based on the correlation index, filter out abnormal node data with a higher correlation as a candidate set of potential threat events. Further analyze and filter the candidate set of potential threat events, consider the attributes, timing, frequency and other information of the event, and exclude false alarms or redundant events. According to the analysis results, generate a list of potential threat events for the power network, including a description of the event, associated abnormal nodes or behavior information, and the time window of the event.

优选的,步骤S3包括以下步骤:Preferably, step S3 comprises the following steps:

步骤S31:对电力网络潜在威胁事件进行威胁事件判别,生成电力网络威胁判别事件,其中电力网络威胁判别事件包括恶意软件攻击事件、网络钓鱼事件、Ddos攻击事件、网络入侵事件和零日漏洞攻击事件;Step S31: Perform threat event identification on potential threat events of the power network to generate power network threat identification events, wherein the power network threat identification events include malware attack events, phishing events, DDoS attack events, network intrusion events and zero-day vulnerability attack events;

步骤S32:确认电力网络威胁判别事件为恶意软件攻击事件时,则对电力网络异常节点数据进行节点防火墙部署,得到异常节点防火墙;基于异常节点防火墙进行入侵检测以及入侵防御,得到网络流量数据和异常节点行为数据;根据网络流量数据和异常节点行为数据对电力网络异常节点进行最小网络控制权限调整,生成恶意软件防御策略;Step S32: when it is confirmed that the power network threat identification event is a malware attack event, node firewalls are deployed on the abnormal node data of the power network to obtain abnormal node firewalls; intrusion detection and intrusion prevention are performed based on the abnormal node firewalls to obtain network traffic data and abnormal node behavior data; the minimum network control authority of the abnormal nodes of the power network is adjusted according to the network traffic data and the abnormal node behavior data to generate a malware defense strategy;

步骤S33:确认电力网络威胁判别事件为网络钓鱼事件时,则对电力网络异常节点数据进行电子邮件过滤器设置,得到邮件过滤器配置规则数据;基于邮件过滤器配置规则数据对电力网络异常节点数据进行数据上传多因素认证强制,生成网络钓鱼防御策略;Step S33: When it is confirmed that the power network threat identification event is a phishing event, an email filter is set for the power network abnormal node data to obtain email filter configuration rule data; based on the email filter configuration rule data, multi-factor authentication is enforced for data upload of the power network abnormal node data to generate a phishing defense strategy;

步骤S34:确认电力网络威胁判别事件为Ddos攻击事件时,则对电力网络异常节点数据进行攻击时段分析,生成攻击密集时段数据;根据攻击密集时段数据对电力网络异常节点进行负载均衡,生成负载均衡数据;对负载均衡数据和预设的标准负载均衡阈值进行判别,当负载均衡数据大于预设的标准负载均衡阈值时,则对超出部分的电力网络异常节点数据进行路由黑洞,生成Ddos攻击防御策略;Step S34: When it is confirmed that the power network threat identification event is a Ddos attack event, the attack period analysis is performed on the power network abnormal node data to generate attack intensive period data; load balancing is performed on the power network abnormal nodes according to the attack intensive period data to generate load balancing data; the load balancing data and the preset standard load balancing threshold are distinguished, and when the load balancing data is greater than the preset standard load balancing threshold, a routing black hole is performed on the excess power network abnormal node data to generate a Ddos attack defense strategy;

步骤S35:确认电力网络威胁判别事件为网络入侵事件时,则对电力网络异常节点数据进行入侵区域分析,得到入侵区域分析数据;基于入侵区域分析数据进行网络隔离,生成网络隔离区域数据;利用网络隔离区域数据对入侵区域进行安全修复,生成网络入侵防御策略;Step S35: When the power network threat identification event is confirmed to be a network intrusion event, an intrusion area analysis is performed on the power network abnormal node data to obtain intrusion area analysis data; network isolation is performed based on the intrusion area analysis data to generate network isolation area data; and security repair is performed on the intrusion area using the network isolation area data to generate a network intrusion defense strategy;

步骤S36:确认电力网络威胁判别事件为零日漏洞攻击事件时,则对电力网络异常节点数据进行威胁情报分析,生成威胁情报分析数据;对威胁情报分析数据进行零日漏洞补丁应用,生成零日漏洞补丁数据;根据零日漏洞补丁数据对电力网络异常节点进行流量规则过滤,生成零日漏洞攻击防御策略。Step S36: When it is confirmed that the power network threat identification event is a zero-day vulnerability attack event, threat intelligence analysis is performed on the power network abnormal node data to generate threat intelligence analysis data; zero-day vulnerability patches are applied to the threat intelligence analysis data to generate zero-day vulnerability patch data; traffic rules are filtered on the power network abnormal nodes according to the zero-day vulnerability patch data to generate a zero-day vulnerability attack defense strategy.

本发明通过对电力网络潜在威胁事件进行威胁事件判别可以识别出不同类型的威胁事件,包括恶意软件攻击、网络钓鱼、Ddos攻击、网络入侵和零日漏洞攻击,有助于精确识别对电力网络安全造成威胁的事件。对于确认为恶意软件攻击事件的情况,部署异常节点防火墙并进行入侵检测和入侵防御,可以提高对恶意软件的防护能力。最小网络控制权限调整可以限制异常节点的网络访问权限,增强对恶意软件的防御策略。确定为网络钓鱼事件时,设置电子邮件过滤器和数据上传多因素认证强制,有助于防止电力网络中的网络钓鱼行为,防御策略可以有效减少恶意邮件的传递和遏制社交工程攻击。确认为Ddos攻击事件时,进行攻击时段分析和负载均衡可以平衡网络负载,减轻网络的压力。通过判别超过标准负载均衡阈值的部分节点并进行路由黑洞,可以有效防止Ddos攻击对电力网络的影响。确定为网络入侵事件时,进行入侵区域分析和网络隔离,有助于识别入侵区域并将其与其他网络隔离,遏制入侵的扩散。随后的安全修复措施可以修复入侵区域的漏洞,增强电力网络的防御能力。确认为零日漏洞攻击事件时,进行威胁情报分析和零日漏洞补丁应用,有助于监测和处理新出现的安全威胁。通过流量规则过滤,可以有效阻止利用零日漏洞的攻击,提高系统的安全性。The present invention can identify different types of threat events by distinguishing potential threat events of the power network, including malware attacks, phishing, DDoS attacks, network intrusions and zero-day vulnerability attacks, which helps to accurately identify events that threaten the security of the power network. For the case of confirmed malware attack events, deploying abnormal node firewalls and performing intrusion detection and intrusion defense can improve the protection capability against malware. The minimum network control authority adjustment can limit the network access rights of abnormal nodes and enhance the defense strategy against malware. When it is determined to be a phishing event, setting email filters and data upload multi-factor authentication enforcement can help prevent phishing behavior in the power network, and the defense strategy can effectively reduce the delivery of malicious emails and curb social engineering attacks. When it is confirmed to be a DDoS attack event, attack period analysis and load balancing can balance the network load and reduce the pressure on the network. By distinguishing some nodes that exceed the standard load balancing threshold and performing routing black holes, the impact of DDoS attacks on the power network can be effectively prevented. When it is determined to be a network intrusion event, performing intrusion area analysis and network isolation can help identify the intrusion area and isolate it from other networks to curb the spread of the intrusion. Subsequent security repair measures can repair the vulnerabilities in the intrusion area and enhance the defense capability of the power network. When a zero-day vulnerability attack is confirmed, threat intelligence analysis and zero-day vulnerability patch application will help monitor and handle new security threats. Traffic rule filtering can effectively prevent attacks that exploit zero-day vulnerabilities and improve system security.

作为本发明的一个实例,参考图4所示,在本实例中所述步骤S3包括:As an example of the present invention, referring to FIG. 4 , in this example, step S3 includes:

步骤S31:对电力网络潜在威胁事件进行威胁事件判别,生成电力网络威胁判别事件,其中电力网络威胁判别事件包括恶意软件攻击事件、网络钓鱼事件、Ddos攻击事件、网络入侵事件和零日漏洞攻击事件;Step S31: Perform threat event identification on potential threat events of the power network to generate power network threat identification events, wherein the power network threat identification events include malware attack events, phishing events, DDoS attack events, network intrusion events and zero-day vulnerability attack events;

本发明实施例中,通过收集电力网络的各项数据,包括网络流量、设备日志、安全事件日志等。通过分析这些数据,可以发现任何异常活动、异常流量模式或异常事件,并将它们标识为潜在的威胁事件。与威胁情报和漏洞数据库进行数据对比和匹配,以了解已知的威胁事件和漏洞攻击。通过将收集到的数据与已知的模式进行对比,可以快速识别出恶意软件攻击、网络钓鱼、Ddos攻击、网络入侵和零日漏洞攻击事件。利用机器学习和人工智能技术,构建模型和算法,对收集到的数据进行分析和处理,可以自动学习和识别出电力网络中的异常行为模式,并将其与已知的威胁模式进行比较,从而准确判断潜在的威胁事件。通过监测系统的异常节点、异常流量和异常行为,可以及时发现和识别恶意软件攻击、网络钓鱼、Ddos攻击、网络入侵和零日漏洞攻击事件。使用各种技术,如入侵检测系统(IDS)和行为分析系统(BAS),可以对电力网络中的节点和流量进行实时监测和检测。电力网络安全专家可以通过审查和分析数据,提供专业的意见和判断。他们可以根据自身的经验和知识对潜在的威胁事件进行评估,确定其是否为恶意软件攻击、网络钓鱼、Ddos攻击、网络入侵或零日漏洞攻击事件。In the embodiment of the present invention, various data of the power network are collected, including network traffic, device logs, security event logs, etc. By analyzing these data, any abnormal activities, abnormal traffic patterns or abnormal events can be found and identified as potential threat events. Data comparison and matching are performed with threat intelligence and vulnerability databases to understand known threat events and vulnerability attacks. By comparing the collected data with known patterns, malware attacks, phishing, Ddos attacks, network intrusions and zero-day vulnerability attacks can be quickly identified. By using machine learning and artificial intelligence technology, models and algorithms are built, and the collected data is analyzed and processed, which can automatically learn and identify abnormal behavior patterns in the power network and compare them with known threat patterns, so as to accurately judge potential threat events. By monitoring the abnormal nodes, abnormal traffic and abnormal behavior of the system, malware attacks, phishing, Ddos attacks, network intrusions and zero-day vulnerability attacks can be discovered and identified in a timely manner. Using various technologies, such as intrusion detection systems (IDS) and behavioral analysis systems (BAS), nodes and traffic in the power network can be monitored and detected in real time. Power network security experts can provide professional opinions and judgments by reviewing and analyzing data. They can evaluate potential threat events based on their experience and knowledge to determine whether they are malware attacks, phishing, DDoS attacks, network intrusions or zero-day vulnerability attacks.

步骤S32:确认电力网络威胁判别事件为恶意软件攻击事件时,则对电力网络异常节点数据进行节点防火墙部署,得到异常节点防火墙;基于异常节点防火墙进行入侵检测以及入侵防御,得到网络流量数据和异常节点行为数据;根据网络流量数据和异常节点行为数据对电力网络异常节点进行最小网络控制权限调整,生成恶意软件防御策略;Step S32: When it is confirmed that the power network threat identification event is a malware attack event, node firewalls are deployed on the abnormal node data of the power network to obtain abnormal node firewalls; intrusion detection and intrusion prevention are performed based on the abnormal node firewall to obtain network traffic data and abnormal node behavior data; the minimum network control authority of the abnormal node of the power network is adjusted according to the network traffic data and the abnormal node behavior data to generate a malware defense strategy;

本发明实施例中,通过根据已确认的异常节点,在电力网络中针对这些节点进行防火墙的部署,防火墙可以监控和过滤与该节点相关的网络流量,以阻止潜在的恶意软件攻击。防火墙的配置需要根据电力网络的特定需求进行调整。通过异常节点防火墙对电力网络进行入侵检测和入侵防御。入侵检测系统可以分析网络流量数据和异常节点行为数据,以便及时发现存在的恶意软件攻击行为。入侵防御措施包括及时响应和阻止入侵行为,以保护电力网络的安全性。利用网络流量数据和异常节点行为数据进行分析,以了解攻击者的行为模式和攻击方式。通过流量分析,可以确定恶意软件攻击的特征和目标,从而制定有效的防御策略。根据网络流量数据和异常节点行为数据,对电力网络异常节点进行最小网络控制权限的调整,包括对异常节点进行审计和限制其网络访问权限,以减轻安全风险。基于分析结果和最小网络控制权限调整,生成恶意软件防御策略,策略包括对恶意软件攻击行为的检测规则、阻止规则和响应措施等。In an embodiment of the present invention, by deploying firewalls for the confirmed abnormal nodes in the power network, the firewall can monitor and filter the network traffic related to the node to prevent potential malware attacks. The configuration of the firewall needs to be adjusted according to the specific needs of the power network. The power network is intrusion detected and intrusion prevented by the abnormal node firewall. The intrusion detection system can analyze the network traffic data and the abnormal node behavior data to timely discover the existing malware attack behavior. The intrusion prevention measures include timely response and prevention of intrusion behavior to protect the security of the power network. The network traffic data and the abnormal node behavior data are used for analysis to understand the attacker's behavior pattern and attack method. Through traffic analysis, the characteristics and targets of the malware attack can be determined, so as to formulate an effective defense strategy. According to the network traffic data and the abnormal node behavior data, the minimum network control authority of the abnormal node of the power network is adjusted, including auditing the abnormal node and limiting its network access rights to reduce security risks. Based on the analysis results and the minimum network control authority adjustment, a malware defense strategy is generated, and the strategy includes detection rules, blocking rules and response measures for malware attack behavior.

步骤S33:确认电力网络威胁判别事件为网络钓鱼事件时,则对电力网络异常节点数据进行电子邮件过滤器设置,得到邮件过滤器配置规则数据;基于邮件过滤器配置规则数据对电力网络异常节点数据进行数据上传多因素认证强制,生成网络钓鱼防御策略;Step S33: When it is confirmed that the power network threat identification event is a phishing event, an email filter is set for the power network abnormal node data to obtain email filter configuration rule data; based on the email filter configuration rule data, multi-factor authentication is enforced for data upload of the power network abnormal node data to generate a phishing defense strategy;

本发明实施例中,通过确定合适的电子邮件过滤器软件或服务来过滤电力网络中收发的电子邮件。配置过滤器以识别和拦截潜在的网络钓鱼邮件,包括设置规则、黑名单、白名单、关键字过滤等。根据电力网络的需求和安全政策,调整过滤器的灵敏度和策略。在配置邮件过滤器时,记录所使用的规则和设置,以便后续参考和审查,记录包括过滤器版本、规则列表、策略配置等信息。确认采用多因素认证技术来增强电力网络中异常节点的登录安全性。配置多因素认证,例如使用密码、令牌、生物识别等多个身份验证因素进行登录验证。强制所有电力网络异常节点使用多因素认证,并严格限制只有通过多因素认证才能访问关键系统和数据。基于邮件过滤器配置规则数据和数据上传多因素认证强制,生成网络钓鱼防御策略,策略包括配置合适的过滤规则、完善的多因素认证设置和相应的安全策略指南。In an embodiment of the present invention, the emails sent and received in the power network are filtered by determining appropriate email filter software or services. The filter is configured to identify and intercept potential phishing emails, including setting rules, blacklists, whitelists, keyword filtering, etc. The sensitivity and strategy of the filter are adjusted according to the needs and security policies of the power network. When configuring the email filter, the rules and settings used are recorded for subsequent reference and review, and the records include information such as the filter version, rule list, and policy configuration. Confirm that multi-factor authentication technology is used to enhance the login security of abnormal nodes in the power network. Configure multi-factor authentication, such as using multiple authentication factors such as passwords, tokens, and biometrics for login verification. Force all abnormal nodes in the power network to use multi-factor authentication, and strictly limit access to key systems and data only through multi-factor authentication. Generate a phishing defense strategy based on the email filter configuration rule data and data upload multi-factor authentication enforcement, and the strategy includes configuring appropriate filtering rules, perfect multi-factor authentication settings, and corresponding security policy guidelines.

步骤S34:确认电力网络威胁判别事件为Ddos攻击事件时,则对电力网络异常节点数据进行攻击时段分析,生成攻击密集时段数据;根据攻击密集时段数据对电力网络异常节点进行负载均衡,生成负载均衡数据;对负载均衡数据和预设的标准负载均衡阈值进行判别,当负载均衡数据大于预设的标准负载均衡阈值时,则对超出部分的电力网络异常节点数据进行路由黑洞,生成Ddos攻击防御策略;Step S34: When it is confirmed that the power network threat identification event is a Ddos attack event, the attack period analysis is performed on the power network abnormal node data to generate attack intensive period data; load balancing is performed on the power network abnormal nodes according to the attack intensive period data to generate load balancing data; the load balancing data and the preset standard load balancing threshold are distinguished, and when the load balancing data is greater than the preset standard load balancing threshold, a routing black hole is performed on the excess power network abnormal node data to generate a Ddos attack defense strategy;

本发明实施例中,通过对电力网络异常节点数据进行分析,确定Ddos攻击发生的时间段,可以通过监测网络流量、识别异常数据包以及分析攻击模式来实现。攻击时段分析的目的是确定哪些时间段受到攻击最为密集,以便后续的负载均衡措施。根据攻击时段分析的结果,生成攻击密集时段数据,数据可以标识出攻击活动高发的时间段,为后续的负载均衡提供依据。根据攻击密集时段数据,对电力网络的异常节点进行负载均衡调整。负载均衡的目的是均衡网络负载,以减轻受攻击节点的负担,确保网络的正常运行。根据进行负载均衡调整后的结果,生成负载均衡数据,数据描述了每个节点的负载状态,包括当前负载水平、处理能力等信息。将负载均衡数据与预设的标准负载均衡阈值进行比较。如果某个节点的负载均衡数据超过了设定的阈值,即负载过大,表示该节点正受到攻击并超出了正常负载范围。对超出负载均衡阈值的部分电力网络异常节点数据采取路由黑洞措施。路由黑洞是一种措施,将异常节点的流量引导到一个无效地址或丢弃该流量,从而有效阻止攻击流量进入网络。根据路由黑洞的实施结果,生成Ddos攻击防御策略。该策略包括针对Ddos攻击的具体防御措施,如黑洞路由配置、流量过滤、攻击流量标识等,以保护电力网络免受Ddos攻击的影响。In an embodiment of the present invention, by analyzing the data of abnormal nodes in the power network, determining the time period in which the DDoS attack occurs, this can be achieved by monitoring network traffic, identifying abnormal data packets, and analyzing attack patterns. The purpose of the attack period analysis is to determine which time periods are most intensively attacked, so as to facilitate subsequent load balancing measures. According to the results of the attack period analysis, attack intensive period data is generated, and the data can identify the time period with high incidence of attack activities, providing a basis for subsequent load balancing. According to the attack intensive period data, load balancing adjustment is performed on the abnormal nodes of the power network. The purpose of load balancing is to balance the network load to reduce the burden on the attacked nodes and ensure the normal operation of the network. According to the results of the load balancing adjustment, load balancing data is generated, and the data describes the load status of each node, including information such as the current load level and processing capacity. The load balancing data is compared with a preset standard load balancing threshold. If the load balancing data of a node exceeds the set threshold, that is, the load is too large, it means that the node is under attack and exceeds the normal load range. A routing black hole measure is taken for some abnormal node data of the power network that exceeds the load balancing threshold. A routing black hole is a measure that directs the traffic of an abnormal node to an invalid address or discards the traffic, thereby effectively preventing the attack traffic from entering the network. According to the implementation results of routing black hole, a DDoS attack defense strategy is generated. This strategy includes specific defense measures against DDoS attacks, such as black hole routing configuration, traffic filtering, attack traffic identification, etc., to protect the power network from DDoS attacks.

步骤S35:确认电力网络威胁判别事件为网络入侵事件时,则对电力网络异常节点数据进行入侵区域分析,得到入侵区域分析数据;基于入侵区域分析数据进行网络隔离,生成网络隔离区域数据;利用网络隔离区域数据对入侵区域进行安全修复,生成网络入侵防御策略;Step S35: When the power network threat identification event is confirmed to be a network intrusion event, an intrusion area analysis is performed on the power network abnormal node data to obtain intrusion area analysis data; network isolation is performed based on the intrusion area analysis data to generate network isolation area data; and security repair is performed on the intrusion area using the network isolation area data to generate a network intrusion defense strategy;

本发明实施例中,通过对电力网络异常节点数据进行入侵区域分析,包括识别入侵节点、分析入侵路径、确定入侵节点之间的关系等。入侵区域分析的目的是确定受到入侵的具体区域和节点,为后续的网络隔离提供依据。根据入侵区域分析的结果,生成入侵区域分析数据,数据描述了入侵事件发生的区域和相关节点的信息,包括入侵节点的位置、攻击方式等。基于入侵区域分析数据,进行网络隔离操作。网络隔离可以将受到入侵的区域或节点与其他部分隔离开来,以防止入侵事件的扩散和影响其它部分的电力网络。根据进行网络隔离的结果,生成网络隔离区域数据,数据描述了已经隔离的区域或节点的信息,包括隔离的方式、隔离范围等。利用网络隔离区域数据,对入侵区域进行安全修复。安全修复包括修复已受到入侵的系统、补丁安装、提升安全配置等措施,以恢复受影响区域的正常状态。根据安全修复的结果,生成网络入侵防御策略。该策略包括针对网络入侵的具体防御措施,如入侵检测系统的部署、访问控制策略的优化、加强认证和授权等,以增强电力网络的安全性。In the embodiment of the present invention, the intrusion area analysis is performed on the abnormal node data of the power network, including identifying the intrusion node, analyzing the intrusion path, determining the relationship between the intrusion nodes, etc. The purpose of the intrusion area analysis is to determine the specific area and node that has been invaded, so as to provide a basis for subsequent network isolation. According to the results of the intrusion area analysis, the intrusion area analysis data is generated, and the data describes the area where the intrusion event occurs and the information of the relevant nodes, including the location of the intrusion node, the attack method, etc. Based on the intrusion area analysis data, the network isolation operation is performed. Network isolation can isolate the invaded area or node from other parts to prevent the spread of the intrusion event and affect other parts of the power network. According to the results of the network isolation, the network isolation area data is generated, and the data describes the information of the isolated area or node, including the isolation method, the isolation range, etc. The network isolation area data is used to perform security repair on the intrusion area. The security repair includes measures such as repairing the invaded system, patch installation, and improving the security configuration to restore the normal state of the affected area. According to the results of the security repair, a network intrusion defense strategy is generated. The strategy includes specific defense measures against network intrusion, such as the deployment of intrusion detection system, the optimization of access control strategy, and the strengthening of authentication and authorization, so as to enhance the security of the power network.

步骤S36:确认电力网络威胁判别事件为零日漏洞攻击事件时,则对电力网络异常节点数据进行威胁情报分析,生成威胁情报分析数据;对威胁情报分析数据进行零日漏洞补丁应用,生成零日漏洞补丁数据;根据零日漏洞补丁数据对电力网络异常节点进行流量规则过滤,生成零日漏洞攻击防御策略。Step S36: When it is confirmed that the power network threat identification event is a zero-day vulnerability attack event, threat intelligence analysis is performed on the power network abnormal node data to generate threat intelligence analysis data; zero-day vulnerability patches are applied to the threat intelligence analysis data to generate zero-day vulnerability patch data; traffic rules are filtered on the power network abnormal nodes according to the zero-day vulnerability patch data to generate a zero-day vulnerability attack defense strategy.

本发明实施例中,通过对电力网络异常节点数据进行威胁情报分析,包括对攻击事件的特征、来源、方法等进行分析,以获取关于零日漏洞攻击的情报信息。通过分析威胁情报,可以了解攻击者的策略、目的以及攻击方式。根据威胁情报分析的结果,生成威胁情报分析数据,数据包括关键信息,例如已知的零日漏洞攻击的特征、攻击指令、漏洞的影响范围等。针对已知的零日漏洞攻击,根据威胁情报分析数据进行相应的补丁应用,包括下载和安装针对漏洞的修复补丁,更新软件版本,或者进行相关配置调整。根据零日漏洞补丁应用的结果,生成零日漏洞补丁数据,数据描述了已应用的补丁信息,包括补丁的版本、应用时间等。根据零日漏洞补丁数据,对电力网络异常节点进行流量规则过滤,涉及配置防火墙、入侵检测系统等网络设备,以筛选和过滤通过网络节点的流量,阻止包含零日漏洞攻击的恶意流量进入受影响的节点。根据流量规则过滤的结果,生成零日漏洞攻击的防御策略。该策略包括特定的阻断规则、应用层过滤规则、流量监控策略等,以减轻零日漏洞攻击的风险,保护电力网络的安全。In an embodiment of the present invention, by performing threat intelligence analysis on abnormal node data of the power network, including analyzing the characteristics, sources, methods, etc. of the attack events, intelligence information about zero-day vulnerability attacks is obtained. By analyzing the threat intelligence, the attacker's strategy, purpose, and attack method can be understood. According to the results of the threat intelligence analysis, threat intelligence analysis data is generated, and the data includes key information, such as the characteristics of known zero-day vulnerability attacks, attack instructions, and the scope of influence of the vulnerability. For known zero-day vulnerability attacks, corresponding patches are applied according to the threat intelligence analysis data, including downloading and installing repair patches for the vulnerabilities, updating software versions, or making relevant configuration adjustments. According to the results of the zero-day vulnerability patch application, zero-day vulnerability patch data is generated, and the data describes the applied patch information, including the version of the patch, the application time, etc. According to the zero-day vulnerability patch data, traffic rule filtering is performed on abnormal nodes of the power network, involving configuring network devices such as firewalls and intrusion detection systems to screen and filter traffic passing through network nodes, and prevent malicious traffic containing zero-day vulnerability attacks from entering the affected nodes. According to the results of the traffic rule filtering, a defense strategy for zero-day vulnerability attacks is generated. The strategy includes specific blocking rules, application layer filtering rules, traffic monitoring strategies, etc. to mitigate the risk of zero-day vulnerability attacks and protect the security of the power network.

优选的,步骤S4包括以下步骤:Preferably, step S4 comprises the following steps:

步骤S41:将恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略进行策略整合,生成网络事件防御策略;利用网络事件防御策略对电力网络潜在威胁事件进行防御日志采集,得到安全防御日志数据;Step S41: integrating malware defense strategy, phishing defense strategy, DDoS attack defense strategy, network intrusion defense strategy and zero-day vulnerability attack defense strategy to generate a network event defense strategy; using the network event defense strategy to collect defense logs for potential threat events of the power network to obtain security defense log data;

步骤S42:对安全防御日志数据进行数据集划分,生成模型训练集和模型测试集;利用决策树模型对模型训练集进行模型训练,生成智能防御决策训练模型;通过模型测试集对智能防御决策训练模型进行模型测试,生成智能防御决策模型;Step S42: divide the security defense log data into data sets to generate a model training set and a model test set; use a decision tree model to perform model training on the model training set to generate an intelligent defense decision training model; use a model test set to perform model testing on the intelligent defense decision training model to generate an intelligent defense decision model;

步骤S43:利用智能防御决策模型对电力网络潜在威胁事件进行智能防御决策,生成智能防御决策方案。Step S43: Use the intelligent defense decision model to make intelligent defense decisions on potential threat events in the power network and generate an intelligent defense decision plan.

本发明通过将恶意软件防御策略、网络钓鱼防御策略、DDoS攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略进行整合,可以有效提高电力网络的整体安全性,确保多个安全方面的综合防护。利用智能防御决策模型,可以实现对电力网络潜在威胁事件的智能分析和决策,帮助网络安全人员更快速、准确地响应威胁,提供针对性的防御措施,降低漏报漏检的风险,并加强对新型威胁和未知威胁的应对能力。通过对安全防御日志数据的分析和模型训练,可以发现潜在的安全威胁和攻击模式,并生成智能防御决策方案,从而在发生安全事件时能够更及时、有效地采取防御措施,提高电力网络的安全防护能力。The present invention can effectively improve the overall security of the power network and ensure comprehensive protection of multiple security aspects by integrating malware defense strategies, phishing defense strategies, DDoS attack defense strategies, network intrusion defense strategies and zero-day vulnerability attack defense strategies. By using the intelligent defense decision model, intelligent analysis and decision-making of potential threat events in the power network can be achieved, helping network security personnel to respond to threats more quickly and accurately, providing targeted defense measures, reducing the risk of missed reports and missed detections, and strengthening the ability to respond to new and unknown threats. Through the analysis of security defense log data and model training, potential security threats and attack patterns can be discovered, and intelligent defense decision-making plans can be generated, so that defense measures can be taken more promptly and effectively when security incidents occur, thereby improving the security protection capabilities of the power network.

本发明实施例中,通过将恶意软件防御策略、网络钓鱼防御策略、DDoS攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略进行整合,生成网络事件防御策略,包括指定特定的配置规则、设置防御参数、部署安全设备等。接着,利用网络事件防御策略对电力网络潜在威胁事件进行防御日志采集,以获取安全防御日志数据。对安全防御日志数据进行数据集划分,生成模型训练集和模型测试集,可以通过按照一定比例划分数据集,确保训练集和测试集的样本分布的代表性。然后,使用决策树模型对模型训练集进行模型训练。决策树模型是一种有监督学习方法,能够根据输入的特征对样本进行分类和预测。利用训练好的决策树模型对电力网络潜在威胁事件进行智能防御决策。通过使用安全防御日志数据和相关特征作为输入,决策树模型可以自动进行分析和判断,确定威胁事件的等级、类型和应对策略,能够生成智能防御决策方案,提供具体的防御措施和行动建议。In an embodiment of the present invention, a network event defense strategy is generated by integrating malware defense strategy, phishing defense strategy, DDoS attack defense strategy, network intrusion defense strategy and zero-day vulnerability attack defense strategy, including specifying specific configuration rules, setting defense parameters, deploying security equipment, etc. Next, the network event defense strategy is used to collect defense logs for potential threat events in the power network to obtain security defense log data. The security defense log data is divided into data sets to generate model training sets and model test sets. The representativeness of the sample distribution of the training set and the test set can be ensured by dividing the data set according to a certain ratio. Then, the model training set is trained using a decision tree model. The decision tree model is a supervised learning method that can classify and predict samples according to input features. The trained decision tree model is used to make intelligent defense decisions for potential threat events in the power network. By using security defense log data and related features as input, the decision tree model can automatically analyze and judge, determine the level, type and response strategy of the threat event, and can generate an intelligent defense decision plan to provide specific defense measures and action suggestions.

在本说明书中,提供了一种网络事件安全检测系统,用于执行上述的网络事件安全检测方法,该网络事件安全检测系统包括:In this specification, a network event security detection system is provided, which is used to execute the above-mentioned network event security detection method. The network event security detection system includes:

分布式标识模块,用于获取电力网络节点数据;根据电力网络节点数据进行电力网络信息数据采集,从而获取节点流量原始数据;对节点流量原始数据进行分布式流量标识,生成分布式流量标识数据;The distributed identification module is used to obtain power network node data; collect power network information data according to the power network node data, thereby obtaining the original node flow data; perform distributed flow identification on the original node flow data to generate distributed flow identification data;

潜在威胁分析模块,用于对分布式流量标识数据进行异常节点检测,生成电力网络异常节点数据;对电力网络异常节点数据进行潜在威胁检测分析,生成电力网络潜在威胁事件;The potential threat analysis module is used to detect abnormal nodes on the distributed flow identification data and generate abnormal node data of the power network; perform potential threat detection and analysis on the abnormal node data of the power network and generate potential threat events of the power network;

策略防御模块,用于对电力网络潜在威胁事件进行威胁事件判别,生成电力网络威胁判别事件,其中电力网络威胁判别事件包括恶意软件攻击事件、网络钓鱼事件、Ddos攻击事件、网络入侵事件和零日漏洞攻击事件;对电力网络威胁判别事件进行策略防御,生成恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略;The strategy defense module is used to identify potential threat events of the power network and generate power network threat identification events, where the power network threat identification events include malware attack events, phishing events, Ddos attack events, network intrusion events and zero-day vulnerability attack events; perform strategy defense on the power network threat identification events and generate malware defense strategies, phishing defense strategies, Ddos attack defense strategies, network intrusion defense strategies and zero-day vulnerability attack defense strategies;

智能决策模块,用于对恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略进行防御日志采集,得到安全防御日志数据;对安全防御日志数据进行智能防御决策,生成智能防御决策方案。The intelligent decision-making module is used to collect defense logs for malware defense strategies, phishing defense strategies, Ddos attack defense strategies, network intrusion defense strategies and zero-day vulnerability attack defense strategies to obtain security defense log data; make intelligent defense decisions on the security defense log data and generate intelligent defense decision plans.

本发明的有益效果在于通过对分布式流量标识数据进行异常节点检测和潜在威胁分析,可以发现电力网络中存在的异常节点和潜在威胁事件,有助于及早发现潜在的攻击或异常情况,提高网络安全的监控和响应能力。针对电力网络潜在威胁事件,进行威胁事件判别并生成相应的威胁判别事件,有助于对不同类型的威胁进行分类和识别,从而能够采取特定的防御策略和措施,如恶意软件防御策略、网络钓鱼防御策略、DDoS攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略。通过防御日志采集和智能防御决策,可以利用安全防御日志数据进行智能化的防御决策,有助于根据实时的安全日志和网络状态,自动生成具有针对性和智能化的防御方案,以及应对威胁事件的决策建议。因此,本发明通过对网络事件进行异常节点标识以及多层次攻击类型防御策略构建,提高了网络安全防护的全面性和适应性。The beneficial effect of the present invention is that by performing abnormal node detection and potential threat analysis on the distributed traffic identification data, abnormal nodes and potential threat events in the power network can be found, which helps to detect potential attacks or abnormal situations as early as possible and improve the monitoring and response capabilities of network security. For potential threat events in the power network, threat event discrimination is performed and corresponding threat discrimination events are generated, which helps to classify and identify different types of threats, so that specific defense strategies and measures can be taken, such as malware defense strategies, phishing defense strategies, DDoS attack defense strategies, network intrusion defense strategies and zero-day vulnerability attack defense strategies. Through defense log collection and intelligent defense decision-making, security defense log data can be used to make intelligent defense decisions, which helps to automatically generate targeted and intelligent defense plans and decision-making suggestions for dealing with threat events based on real-time security logs and network status. Therefore, the present invention improves the comprehensiveness and adaptability of network security protection by performing abnormal node identification on network events and constructing multi-level attack type defense strategies.

因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本发明的范围由所附权利要求而不是上述说明限定,因此旨在将落在申请文件的等同要件的含义和范围内的所有变化涵括在本发明内。Therefore, the embodiments should be regarded as illustrative and non-restrictive from all points, and the scope of the present invention is limited by the appended claims rather than the above description, and it is intended that all changes falling within the meaning and range of equivalent elements of the application documents are included in the present invention.

以上所述仅是本发明的具体实施方式,使本领域技术人员能够理解或实现本发明。对这些实施例的多种修改对本领域的技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本发明的精神或范围的情况下,在其它实施例中实现。因此,本发明将不会被限制于本文所示的这些实施例,而是要符合与本文所发明的原理和新颖特点相一致的最宽的范围。The above description is only a specific embodiment of the present invention, so that those skilled in the art can understand or implement the present invention. Various modifications to these embodiments will be apparent to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the present invention. Therefore, the present invention will not be limited to the embodiments shown herein, but should conform to the widest scope consistent with the principles and novel features invented herein.

Claims (9)

1.一种网络事件安全监测方法,其特征在于,包括以下步骤:1. A network event security monitoring method, characterized in that it includes the following steps: 步骤S1:获取电力网络节点数据;根据电力网络节点数据进行电力网络信息数据采集,从而获取节点流量原始数据;对节点流量原始数据进行分布式流量标识,将节点流量数据划分为区块或流量片段,并为每个区块或流量片段生成唯一的标识符,生成分布式流量标识数据;Step S1: Acquire power network node data; collect power network information data according to the power network node data, so as to obtain node flow raw data; perform distributed flow identification on the node flow raw data, divide the node flow data into blocks or flow segments, and generate a unique identifier for each block or flow segment, and generate distributed flow identification data; 步骤S2:对分布式流量标识数据进行异常节点检测,生成电力网络异常节点数据;对电力网络异常节点数据进行潜在威胁检测分析,生成电力网络潜在威胁事件;Step S2: performing abnormal node detection on the distributed flow identification data to generate abnormal node data of the power network; performing potential threat detection and analysis on the abnormal node data of the power network to generate potential threat events of the power network; 步骤S3:对电力网络潜在威胁事件进行威胁事件判别,生成电力网络威胁判别事件,其中电力网络威胁判别事件包括恶意软件攻击事件、网络钓鱼事件、Ddos攻击事件、网络入侵事件和零日漏洞攻击事件;对电力网络威胁判别事件进行策略防御,生成恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略;Step S3: Perform threat event identification on potential threat events of the power network, and generate power network threat identification events, wherein the power network threat identification events include malware attack events, phishing events, Ddos attack events, network intrusion events, and zero-day vulnerability attack events; perform strategy defense on the power network threat identification events, and generate malware defense strategies, phishing defense strategies, Ddos attack defense strategies, network intrusion defense strategies, and zero-day vulnerability attack defense strategies; 步骤S4:对恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略进行防御日志采集,得到安全防御日志数据;对安全防御日志数据进行智能防御决策,生成智能防御决策方案;Step S4: collecting defense logs for malware defense strategies, phishing defense strategies, DDoS attack defense strategies, network intrusion defense strategies, and zero-day vulnerability attack defense strategies to obtain security defense log data; making intelligent defense decisions on the security defense log data to generate intelligent defense decision plans; 步骤S4包括以下步骤:Step S4 includes the following steps: 步骤S41:将恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略进行策略整合,生成网络事件防御策略;利用网络事件防御策略对电力网络潜在威胁事件进行防御日志采集,得到安全防御日志数据;Step S41: integrating malware defense strategy, phishing defense strategy, DDoS attack defense strategy, network intrusion defense strategy and zero-day vulnerability attack defense strategy to generate a network event defense strategy; using the network event defense strategy to collect defense logs for potential threat events of the power network to obtain security defense log data; 步骤S42:对安全防御日志数据进行数据集划分,生成模型训练集和模型测试集;利用决策树模型对模型训练集进行模型训练,生成智能防御决策训练模型;通过模型测试集对智能防御决策训练模型进行模型测试,生成智能防御决策模型;Step S42: divide the security defense log data into data sets to generate a model training set and a model test set; use a decision tree model to perform model training on the model training set to generate an intelligent defense decision training model; use a model test set to perform model testing on the intelligent defense decision training model to generate an intelligent defense decision model; 步骤S43:利用智能防御决策模型对电力网络潜在威胁事件进行智能防御决策,生成智能防御决策方案。Step S43: Use the intelligent defense decision model to make intelligent defense decisions on potential threat events in the power network and generate an intelligent defense decision plan. 2.根据权利要求1所述的网络事件安全监测方法,其特征在于,步骤S1包括以下步骤:2. The network event security monitoring method according to claim 1, characterized in that step S1 comprises the following steps: 步骤S11:获取电力网络节点数据;Step S11: Acquire power network node data; 步骤S12:根据电力网络节点数据进行分布式感知节点部署,得到分布式电力网络感知节点;基于分布式电力网络感知节点进行电力网络信息数据采集,从而获取节点流量原始数据,其中电力网络信息数据采集包括数据包解析、数据包过滤和数据包嗅探;Step S12: deploy distributed sensing nodes according to the power network node data to obtain distributed power network sensing nodes; collect power network information data based on the distributed power network sensing nodes to obtain node flow raw data, wherein the power network information data collection includes data packet parsing, data packet filtering and data packet sniffing; 步骤S13:对节点流量原始数据进行数据预处理,生成标准节点流量原始数据,其中数据预处理包括数据清洗、数据缺失值填充和数据标准化;Step S13: preprocessing the node flow raw data to generate standard node flow raw data, wherein the data preprocessing includes data cleaning, data missing value filling and data standardization; 步骤S14:对标准节点流量原始数据进行分布式流量标识,生成分布式流量标识数据。Step S14: Perform distributed traffic identification on the original data of standard node traffic to generate distributed traffic identification data. 3.根据权利要求2所述的网络事件安全监测方法,其特征在于,步骤S14包括以下步骤:3. The network event security monitoring method according to claim 2, characterized in that step S14 comprises the following steps: 步骤S141:对标准节点流量原始数据进行网络上传溯源,得到分布式电力流量传输上传节点数据;对分布式电力流量传输上传节点数据进行上传频率分析,得到分布式电力流量传输上传频率数据;Step S141: perform network upload tracing on the original data of standard node flow to obtain the node data of distributed power flow transmission upload; perform upload frequency analysis on the node data of distributed power flow transmission upload to obtain the frequency data of distributed power flow transmission upload; 步骤S142:根据分布式电力流量传输上传频率数据对标准节点流量原始数据进行相邻节点最短传输路径计算,得到相邻节点最短路径数据;根据相邻节点最短路径数据对标准节点流量原始数据进行传输闭环通路构建,生成节点传输闭环通路;Step S142: Calculate the shortest transmission path of adjacent nodes for the original data of standard node flow according to the uploaded frequency data of distributed power flow transmission, and obtain the shortest path data of adjacent nodes; construct a transmission closed-loop path for the original data of standard node flow according to the shortest path data of adjacent nodes, and generate a node transmission closed-loop path; 步骤S143:基于节点传输闭环通路和分布式电力流量传输上传频率数据进行节点上传活跃度分析,生成节点上传活跃度分析数据;将节点上传活跃度分析数据和预设的节点上传活跃度阈值进行对比,当节点上传活跃度分析数据大于或等于预设的节点上传活跃度阈值时,则对相应的标准节点流量原始数据进行流量标识,生成分布式流量标识数据。Step S143: Perform node upload activity analysis based on the node transmission closed-loop path and the distributed power flow transmission upload frequency data to generate node upload activity analysis data; compare the node upload activity analysis data with a preset node upload activity threshold, and when the node upload activity analysis data is greater than or equal to the preset node upload activity threshold, perform flow identification on the corresponding standard node flow raw data to generate distributed flow identification data. 4.根据权利要求1所述的网络事件安全监测方法,其特征在于,步骤S2包括以下步骤:4. The network event security monitoring method according to claim 1, characterized in that step S2 comprises the following steps: 步骤S21:对分布式流量标识数据进行异常节点检测,生成电力网络异常节点数据;Step S21: performing abnormal node detection on the distributed flow identification data to generate abnormal node data of the power network; 步骤S22:根据电力网络异常节点数据进行异常关联关系探索,生成异常关联关系矩阵;Step S22: exploring abnormal correlation relationships based on abnormal node data of the power network to generate an abnormal correlation relationship matrix; 步骤S23:通过电力网络异常节点数据和异常关联关系矩阵进行复杂网络结构建模,生成电力网络复杂网络结构;对电力网络复杂网络结构进行低维向量空间嵌入,生成电力网络异常图谱;Step S23: Modeling a complex network structure through abnormal node data and abnormal correlation matrix of the power network to generate a complex network structure of the power network; embedding the complex network structure of the power network into a low-dimensional vector space to generate an abnormal map of the power network; 步骤S24:利用电力网络异常图谱对电力网络异常节点数据进行潜在威胁检测分析,生成电力网络潜在威胁事件。Step S24: Utilize the power network anomaly map to perform potential threat detection and analysis on the power network abnormal node data to generate a power network potential threat event. 5.根据权利要求4所述的网络事件安全监测方法,其特征在于,步骤S21包括以下步骤:5. The network event security monitoring method according to claim 4, characterized in that step S21 comprises the following steps: 步骤S211:对分布式流量标识数据进行节点发送接收比率分析,得到节点发送接收比率数据;基于节点发送接收比率对分布式流量标识数据进行数据包大小分析,生成节点发送数据包大小比率数据;Step S211: Perform node sending/receiving ratio analysis on the distributed traffic identification data to obtain node sending/receiving ratio data; perform data packet size analysis on the distributed traffic identification data based on the node sending/receiving ratio to generate node sending data packet size ratio data; 步骤S212:基于节点发送接收比率数据和节点发送数据包大小比率数据对分布式流量标识数据进行网络传输流量速率变化分析,生成节点传输流量速率变化比率数据;Step S212: performing network transmission flow rate change analysis on the distributed flow identification data based on the node sending and receiving ratio data and the node sending data packet size ratio data, and generating node transmission flow rate change ratio data; 步骤S213:利用节点流量特征比率计算公式对节点发送接收比率数据、节点发送数据包大小比率数据和节点传输流量速率变化比率数据进行节点流量特征比率计算,得到节点流量特征比率数据;Step S213: Calculate the node traffic characteristic ratio of the node sending and receiving ratio data, the node sending data packet size ratio data and the node transmission flow rate change ratio data using the node traffic characteristic ratio calculation formula to obtain the node traffic characteristic ratio data; 步骤S214:将节点流量特征比率数据和预设的标准节点流量特征比率进行对比,当节点流量特征比率数据大于或等于预设的标准节点流量特征比率时,则生成电力网络异常节点数据。Step S214: Compare the node flow characteristic ratio data with a preset standard node flow characteristic ratio. When the node flow characteristic ratio data is greater than or equal to the preset standard node flow characteristic ratio, abnormal power network node data is generated. 6.根据权利要求5所述的网络事件安全监测方法,其特征在于,步骤S213中的节点流量特征比率计算公式如下所示:6. The network event security monitoring method according to claim 5, characterized in that the node traffic characteristic ratio calculation formula in step S213 is as follows: ; 式中,表示为节点在时间的流量特征比率,表示为节点在时间的发送数据包大小占其最大发送数据包大小的比率,表示为节点在时间的发送数据包传输流量速率变化占其最大传输流量速率的比率,表示为节点的最大传输流量速率,表示为节点在时间的发送接收比率,表示为节点的最大发送接收比率,表示为节点在时间的接收数据包大小占其最大接收数据包大小的比率,表示为节点在时间的接收数据包传输流量速率变化占其最大传输流量速率的比率,表示为节点检测时间上限,表示为节点在时间的接收数据包发送接收比率,表示为时间点。In the formula, Represented as a node at time The flow characteristic ratio, Represented as a node at time The ratio of the size of the data packet sent to the maximum size of the data packet sent. Represented as a node at time The ratio of the change in the data packet transmission rate to its maximum transmission rate, It is expressed as the maximum transmission flow rate of the node, Represented as a node at time The sending and receiving ratio, Expressed as the maximum sending and receiving ratio of a node, Represented as a node at time The ratio of the received packet size to the maximum received packet size. Represented as a node at time The ratio of the received data packet transmission flow rate change to its maximum transmission flow rate, It represents the upper limit of node detection time. Represented as a node at time The receive packet send-receive ratio, Expressed as a point in time. 7.根据权利要求4所述的网络事件安全监测方法,其特征在于,步骤S24包括以下步骤:7. The network event security monitoring method according to claim 4, characterized in that step S24 comprises the following steps: 步骤S241:利用电力网络异常图谱对电力网络异常节点数据进行威胁行为关联图构建,生成网络威胁行为图谱;对网络威胁行为图谱进行节点中心性分析,生成网络节点中心性指标,其中网络节点中心性指标包括节点度中心性、节点介数中心性和节点接近中心性;Step S241: construct a threat behavior association graph for abnormal node data of the power network using the power network anomaly graph to generate a network threat behavior graph; perform node centrality analysis on the network threat behavior graph to generate a network node centrality index, wherein the network node centrality index includes node degree centrality, node betweenness centrality and node proximity centrality; 步骤S242:根据节点度中心性、节点介数中心性和节点接近中心性对电力网络异常图谱进行威胁行为社区划分,生成网络威胁行为社区标识数据;基于网络威胁行为社区标识数据对电力网络异常节点数据进行相似行为聚类,生成异常节点行为聚类数据;Step S242: dividing the power network anomaly map into threat behavior communities according to node degree centrality, node betweenness centrality, and node proximity centrality to generate network threat behavior community identification data; clustering the power network abnormal node data into similar behaviors based on the network threat behavior community identification data to generate abnormal node behavior clustering data; 步骤S243:对异常节点行为聚类数据进行威胁路径识别,生成威胁行为路径识别数据;对威胁行为路径识别数据进行威胁行为强关联分析,生成威胁行为关键路径识别数据;Step S243: performing threat path identification on the abnormal node behavior clustering data to generate threat behavior path identification data; performing threat behavior strong correlation analysis on the threat behavior path identification data to generate threat behavior key path identification data; 步骤S244:根据威胁行为关键路径识别数据对电力网络异常节点数据进行潜在威胁关联分析,生成电力网络潜在威胁事件。Step S244: performing potential threat correlation analysis on abnormal node data of the power network according to the threat behavior key path identification data, and generating a potential threat event for the power network. 8.根据权利要求1所述的网络事件安全监测方法,其特征在于,步骤S3包括以下步骤:8. The network event security monitoring method according to claim 1, characterized in that step S3 comprises the following steps: 步骤S31:对电力网络潜在威胁事件进行威胁事件判别,生成电力网络威胁判别事件,其中电力网络威胁判别事件包括恶意软件攻击事件、网络钓鱼事件、Ddos攻击事件、网络入侵事件和零日漏洞攻击事件;Step S31: Perform threat event identification on potential threat events of the power network to generate power network threat identification events, wherein the power network threat identification events include malware attack events, phishing events, DDoS attack events, network intrusion events and zero-day vulnerability attack events; 步骤S32:确认电力网络威胁判别事件为恶意软件攻击事件时,则对电力网络异常节点数据进行节点防火墙部署,得到异常节点防火墙;基于异常节点防火墙进行入侵检测以及入侵防御,得到网络流量数据和异常节点行为数据;根据网络流量数据和异常节点行为数据对电力网络异常节点进行最小网络控制权限调整,生成恶意软件防御策略;Step S32: when it is confirmed that the power network threat identification event is a malware attack event, node firewalls are deployed on the abnormal node data of the power network to obtain abnormal node firewalls; intrusion detection and intrusion prevention are performed based on the abnormal node firewalls to obtain network traffic data and abnormal node behavior data; the minimum network control authority of the abnormal nodes of the power network is adjusted according to the network traffic data and the abnormal node behavior data to generate a malware defense strategy; 步骤S33:确认电力网络威胁判别事件为网络钓鱼事件时,则对电力网络异常节点数据进行电子邮件过滤器设置,得到邮件过滤器配置规则数据;基于邮件过滤器配置规则数据对电力网络异常节点数据进行数据上传多因素认证强制,生成网络钓鱼防御策略;Step S33: When it is confirmed that the power network threat identification event is a phishing event, an email filter is set for the power network abnormal node data to obtain email filter configuration rule data; based on the email filter configuration rule data, multi-factor authentication is enforced for data upload of the power network abnormal node data to generate a phishing defense strategy; 步骤S34:确认电力网络威胁判别事件为Ddos攻击事件时,则对电力网络异常节点数据进行攻击时段分析,生成攻击密集时段数据;根据攻击密集时段数据对电力网络异常节点进行负载均衡,生成负载均衡数据;对负载均衡数据和预设的标准负载均衡阈值进行判别,当负载均衡数据大于预设的标准负载均衡阈值时,则对超出部分的电力网络异常节点数据进行路由黑洞,生成Ddos攻击防御策略;Step S34: When it is confirmed that the power network threat identification event is a Ddos attack event, the attack period analysis is performed on the power network abnormal node data to generate attack intensive period data; load balancing is performed on the power network abnormal nodes according to the attack intensive period data to generate load balancing data; the load balancing data and the preset standard load balancing threshold are distinguished, and when the load balancing data is greater than the preset standard load balancing threshold, a routing black hole is performed on the excess power network abnormal node data to generate a Ddos attack defense strategy; 步骤S35:确认电力网络威胁判别事件为网络入侵事件时,则对电力网络异常节点数据进行入侵区域分析,得到入侵区域分析数据;基于入侵区域分析数据进行网络隔离,生成网络隔离区域数据;利用网络隔离区域数据对入侵区域进行安全修复,生成网络入侵防御策略;Step S35: When the power network threat identification event is confirmed to be a network intrusion event, an intrusion area analysis is performed on the power network abnormal node data to obtain intrusion area analysis data; network isolation is performed based on the intrusion area analysis data to generate network isolation area data; and security repair is performed on the intrusion area using the network isolation area data to generate a network intrusion defense strategy; 步骤S36:确认电力网络威胁判别事件为零日漏洞攻击事件时,则对电力网络异常节点数据进行威胁情报分析,生成威胁情报分析数据;对威胁情报分析数据进行零日漏洞补丁应用,生成零日漏洞补丁数据;根据零日漏洞补丁数据对电力网络异常节点进行流量规则过滤,生成零日漏洞攻击防御策略。Step S36: When it is confirmed that the power network threat identification event is a zero-day vulnerability attack event, threat intelligence analysis is performed on the power network abnormal node data to generate threat intelligence analysis data; zero-day vulnerability patches are applied to the threat intelligence analysis data to generate zero-day vulnerability patch data; traffic rules are filtered on the power network abnormal nodes according to the zero-day vulnerability patch data to generate a zero-day vulnerability attack defense strategy. 9.一种网络事件安全监测系统,其特征在于,用于执行如权利要求1所述的网络事件安全监测方法,该网络事件安全监测系统包括:9. A network event security monitoring system, characterized in that it is used to execute the network event security monitoring method according to claim 1, and the network event security monitoring system comprises: 分布式标识模块,用于获取电力网络节点数据;根据电力网络节点数据进行电力网络信息数据采集,从而获取节点流量原始数据;对节点流量原始数据进行分布式流量标识,生成分布式流量标识数据;The distributed identification module is used to obtain power network node data; collect power network information data according to the power network node data, thereby obtaining the original node flow data; perform distributed flow identification on the original node flow data to generate distributed flow identification data; 潜在威胁分析模块,用于对分布式流量标识数据进行异常节点检测,生成电力网络异常节点数据;对电力网络异常节点数据进行潜在威胁检测分析,生成电力网络潜在威胁事件;The potential threat analysis module is used to detect abnormal nodes on the distributed flow identification data and generate abnormal node data of the power network; perform potential threat detection and analysis on the abnormal node data of the power network and generate potential threat events of the power network; 策略防御模块,用于对电力网络潜在威胁事件进行威胁事件判别,生成电力网络威胁判别事件,其中电力网络威胁判别事件包括恶意软件攻击事件、网络钓鱼事件、Ddos攻击事件、网络入侵事件和零日漏洞攻击事件;对电力网络威胁判别事件进行策略防御,生成恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略;The strategy defense module is used to identify potential threat events of the power network and generate power network threat identification events, where the power network threat identification events include malware attack events, phishing events, Ddos attack events, network intrusion events and zero-day vulnerability attack events; perform strategy defense on the power network threat identification events and generate malware defense strategies, phishing defense strategies, Ddos attack defense strategies, network intrusion defense strategies and zero-day vulnerability attack defense strategies; 智能决策模块,用于对恶意软件防御策略、网络钓鱼防御策略、Ddos攻击防御策略、网络入侵防御策略和零日漏洞攻击防御策略进行防御日志采集,得到安全防御日志数据;对安全防御日志数据进行智能防御决策,生成智能防御决策方案。The intelligent decision-making module is used to collect defense logs for malware defense strategies, phishing defense strategies, Ddos attack defense strategies, network intrusion defense strategies and zero-day vulnerability attack defense strategies to obtain security defense log data; make intelligent defense decisions on the security defense log data and generate intelligent defense decision plans.
CN202410443479.XA 2024-04-12 2024-04-12 Network event safety monitoring method and system Active CN118200019B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410443479.XA CN118200019B (en) 2024-04-12 2024-04-12 Network event safety monitoring method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410443479.XA CN118200019B (en) 2024-04-12 2024-04-12 Network event safety monitoring method and system

Publications (2)

Publication Number Publication Date
CN118200019A CN118200019A (en) 2024-06-14
CN118200019B true CN118200019B (en) 2024-09-20

Family

ID=91393052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410443479.XA Active CN118200019B (en) 2024-04-12 2024-04-12 Network event safety monitoring method and system

Country Status (1)

Country Link
CN (1) CN118200019B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118869295A (en) * 2024-07-09 2024-10-29 襄阳臻辰网络科技有限公司 A network security protection method based on big data
CN118694617B (en) * 2024-08-27 2024-12-20 江苏爱星信息科技有限公司 Network data transmission monitoring system and method based on big data analysis
CN118858827B (en) * 2024-09-25 2024-11-26 福建亿力天龙集团股份有限公司 Online monitoring method and system for electric energy quality
CN119094243B (en) * 2024-10-30 2025-02-11 国网浙江省电力有限公司杭州市富阳区供电公司 Network malicious traffic detection and analysis method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106888196A (en) * 2015-12-16 2017-06-23 国家电网公司 A kind of coordinated defense system of unknown threat detection
CN112671807A (en) * 2021-03-15 2021-04-16 中国电子信息产业集团有限公司第六研究所 Threat processing method, threat processing device, electronic equipment and computer readable storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11985154B2 (en) * 2021-10-26 2024-05-14 Cisco Technology, Inc. Comprehensible threat detection
CN115834177A (en) * 2022-11-18 2023-03-21 广东电网有限责任公司 Smart power grid safety monitoring method and device and storage medium
CN116896468A (en) * 2023-07-14 2023-10-17 国网思极网安科技(北京)有限公司 Methods and related equipment for determining protection strategies for network attack events
CN117319019A (en) * 2023-09-21 2023-12-29 国网智能电网研究院有限公司 A dynamic defense system for power networks based on intelligent decision-making
CN117692251B (en) * 2024-01-25 2024-04-09 中诚华隆计算机技术有限公司 Processor network security defense system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106888196A (en) * 2015-12-16 2017-06-23 国家电网公司 A kind of coordinated defense system of unknown threat detection
CN112671807A (en) * 2021-03-15 2021-04-16 中国电子信息产业集团有限公司第六研究所 Threat processing method, threat processing device, electronic equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN118200019A (en) 2024-06-14

Similar Documents

Publication Publication Date Title
US20220353286A1 (en) Artificial intelligence cyber security analyst
CN118200019B (en) Network event safety monitoring method and system
US20230012220A1 (en) Method for determining likely malicious behavior based on abnormal behavior pattern comparison
Hajj et al. Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
EP2040435B1 (en) Intrusion detection method and system
Bass Intrusion detection systems and multisensor data fusion
CN112651006A (en) Power grid security situation perception platform framework
CN108566364B (en) Intrusion detection method based on neural network
CN102098180B (en) Network security situational awareness method
Hassan Current studies on intrusion detection system, genetic algorithm and fuzzy logic
Repalle et al. Intrusion detection system using ai and machine learning algorithm
CN118694617B (en) Network data transmission monitoring system and method based on big data analysis
RU180789U1 (en) DEVICE OF INFORMATION SECURITY AUDIT IN AUTOMATED SYSTEMS
CN118509249A (en) Method and system for detecting and analyzing network security abnormality
CN118018231A (en) Security policy management method, device, equipment and storage medium for isolation area
Squicciarini et al. Situational awareness through reasoning on network incidents
CN117749426A (en) Abnormal flow detection method based on graph neural network
Protic et al. WK-FNN design for detection of anomalies in the computer network traffic
Aslan Using machine learning techniques to detect attacks in computer networks
Ten et al. Anomaly extraction and correlations for power infrastructure cyber systems
You et al. Research on Cyber Security Situation Awareness System Based on Knowledge Graph
CN118536124B (en) A computer system security model verification method
Janabi et al. A Survey of Intrusion Detection Systems based Machine Learning Approaches Applied to Software-Defined Networks (SDN): Research Issues and Challenges
Zhiqiang et al. Research on Network Intrusion Detection Method Based on CNN
CN116996264A (en) Integrated safety control method and system for electric power infrastructure

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant