浏览全部资源
扫码关注微信
[ "余洋(1985- ),男,博士,北京启明星辰信息安全技术有限公司高级研究员,主要研究方向为大数据安全分析、人工智能安全应用、知识图谱" ]
[ "朱少敏(1983- ),男,博士,北京启明星辰信息安全技术有限公司高级工程师,主要研究方向为电力二次系统安全防护、多媒体信息安全、云计算安全" ]
[ "卞超轶(1987- ),男,博士,北京启明星辰信息安全技术有限公司高级研究员,主要研究方向为大数据安全分析、人工智能安全应用等" ]
网络出版日期:2019-11,
纸质出版日期:2019-11-20
移动端阅览
余洋, 朱少敏, 卞超轶. 基于知识图谱的泛在电力物联网安全可视化技术[J]. 电信科学, 2019,35(11):132-139.
Yang YU, Shaomin ZHU, Chaoyi BIAN. Knowledge graph based ubiquitous power IoT security visualization technology[J]. Telecommunications science, 2019, 35(11): 132-139.
余洋, 朱少敏, 卞超轶. 基于知识图谱的泛在电力物联网安全可视化技术[J]. 电信科学, 2019,35(11):132-139. DOI: 10.11959/j.issn.1000-0801.2019280.
Yang YU, Shaomin ZHU, Chaoyi BIAN. Knowledge graph based ubiquitous power IoT security visualization technology[J]. Telecommunications science, 2019, 35(11): 132-139. DOI: 10.11959/j.issn.1000-0801.2019280.
随着泛在电力物联网的建设,电力网络向互联互通转变、数据向交互共享转变、业务向横向贯通转变,对原有网络安全防护体系提出了新的挑战。网络安全可视化技术通过对图模式的展示和分析,帮助网络安全人员快速识别潜在攻击,定位异常事件,发现新的攻击类型,快速捕获全局网络安全态势。基于知识图谱进行泛在电力物联网安全分析,通过对内外部威胁情报进行建模,构建概念实体间关系,将威胁情报知识图谱化,把复杂的警报信息转换成直观的、便于理解的图形图像信息,为泛在电力物联网的网络安全防护决策提供精准支撑。
With the construction of the ubiquitous power IoT
the power network transform to interconnection
the data become more interactive and shared
and the business transform to lateral link-up
which pose new challenges to the original network security protection system.Network security visualization technology helps network security personnel quickly identify potential attacks
locate abnormal events
discover new types of attacks
and quickly capture global network security situation by displaying and analyzing the graph patterns.Based on the knowledge graph
the ubiquitous power IoT security analysis was carried out.The internal and external threat intelligence was modeled firstly.Then the relationship between the conceptual entities was constructed.The threat intelligence as knowledge graph was modeled
and then the abstract and complex alarm information which was invisible was converted into a more intuitive and convenient style
which provided accurate support for ubiquitous network security protection decisions in the power IoT.
修健 . 网络安全分析中的大数据技术应用分析 [J ] . 网络安全技术与应用 , 2018 ( 3 ): 67 - 115 .
XIU J . The analysis of big data technology application in network security [J ] . Network Security Technology & Application , 2018 ( 3 ): 67 - 115 .
司德睿 , 华程 , 杨红光 , 等 . 一种基于机器学习的安全威胁分析系统 [J ] . 信息技术与网络安全 , 2019 , 38 ( 4 ): 37 - 41 .
SI D R , HUA C , YANG H G , et al . An intelligent analysis system for security threats based on machine learning [J ] . Information Technology and Network Security , 2019 , 38 ( 4 ): 37 - 41 .
汪渊 , 蒋凡 , 陈国良 . 基于图论的网络安全分析方法研究与应用 [J ] . 小型微型计算机系统 , 2003 ( 10 ): 1865 - 1869 . http://d.wanfangdata.com.cn/Periodical_xxwxjsjxt200310032.aspx http://d.wanfangdata.com.cn/Periodical_xxwxjsjxt200310032.aspx
WANG Y , JIANG F , CHEN G L . A network security analysis method research and application based on graph theory [J ] . Journal of Chinese Computer Systems , 2003 ( 10 ): 1865 - 1869 .
侯梦薇 , 卫荣 , 陆亮 , 等 . 知识图谱研究综述及其在医疗领域的应用 [J ] . 计算机研究与发展 , 2018 , 55 ( 12 ): 2587 - 2599 .
HOU M W , WEI L , LU L , et al . Research review of knowledgegraph and its application in medical domain [J ] . Journal of Computer Research and Development , 2018 , 55 ( 12 ): 2587 - 2599 .
刘峤 , 李杨 , 段宏 , 等 . 知识图谱构建技术综述 [J ] . 计算机研究与发展 , 2016 , 53 ( 3 ): 582 - 600 . DOI: 10.7544/issn1000-1239.2016.20148228 http://doi.org/10.7544/issn1000-1239.2016.20148228 http://crad.ict.ac.cn/CN/abstract/abstract3127.shtml http://crad.ict.ac.cn/CN/abstract/abstract3127.shtml
LIU Q , LI Y , DUAN H , et al . Knowledge graph construction techniques [J ] . Journal of Computer Research and Development , 2016 , 53 ( 3 ): 582 - 600 .
汤楠 , 申德荣 , 寇月 , 等 . 一种面向多源知识图谱的样例查询方法 [J ] . 计算机研究与发展 , 2015 , 52 ( S1 ): 1 - 8 .
TANG N , SHEN D R , KOU Y , et al . A query-by-example method for multiple knowledge graphs [J ] . Journal of Computer Research and Development , 2015 , 52 ( S1 ): 1 - 8 .
王永杰 , 鲜明 , 刘进 , 等 . 基于攻击图模型的网络安全评估研究 [J ] . 通信学报 , 2007 ( 3 ): 29 - 34 . http://d.wanfangdata.com.cn/Periodical_txxb200703005.aspx http://d.wanfangdata.com.cn/Periodical_txxb200703005.aspx
WANG Y J , XIAN M , LIU J , et al . Study of network security evaluation based on attack graph model [J ] . Journal on Communications , 2007 ( 3 ): 29 - 34 .
叶云 , 徐锡山 , 贾焰 , 等 . 基于攻击图的网络安全概率计算方法 [J ] . 计算机学报 , 2010 , 33 ( 10 ): 1987 - 1996 .
YE Y , XU X S , JIA Y , et al . An attack graph-based probabilistic computing approach of network security [J ] . Chinese Journal of Computers , 2010 , 33 ( 10 ): 1987 - 1996 .
吴迪 , 连一峰 , 陈恺 , 等 . 一种基于攻击图的安全威胁识别和分析方法 [J ] . 计算机学报 , 2012 , 35 ( 9 ): 1938 - 1950 .
WU D , LIAN Y F , CHEN K , et al . A security threats identification and analysis method based on attack graph [J ] . Chinese Journal of Computers , 2012 , 35 ( 9 ): 1938 - 1950 .
胡浩 , 刘玉岭 , 张玉臣 , 等 . 基于攻击图的网络安全度量研究综述 [J ] . 网络与信息安全学报 , 2018 , 4 ( 9 ): 1 - 16 .
HU H , LIU Y L , ZHANG Y C , et al . Survey of attack graph based network security metric [J ] . Chinese Journal of Network and Information Security , 2018 , 4 ( 9 ): 1 - 16 .
余洋 , 夏春和 , 胡潇云 . 采用混和路径攻击图的防御方案生成方法 [J ] . 浙江大学学报(工学版) , 2017 , 51 ( 9 ): 1745 - 1759 .
YU Y , XIA C H , HU X Y . Defense scheme generation method using mixed path attack graph [J ] . Journal of Zhejiang University (Engineering Science) , 2017 , 51 ( 9 ): 1745 - 1759 .
殷树刚 , 许勇刚 , 李祉岐 , 等 . 基于泛在电力物联网的全场景网络安全防护体系研究 [J ] . 供用电 , 2019 , 36 ( 6 ): 83 - 89 .
YIN S G , XU Y G , LI Z Q , et al . Research on full scene network security protection system based on ubiquitous power internet of things [J ] . Distribution & Utilization , 2019 , 36 ( 6 ): 83 - 89 .
王静 , 高昆仑 , 张波 . 基于网络隔离与安全数据交换的发电集团双网体系研究与设计 [J ] . 电信科学 , 2017 , 33 ( 2 ): 163 - 172 .
WANG J , GAO K L , ZHANG B . Research and design in dual network scheme of power corporation based on network isolation and secure data exchange [J ] . Telecommunications Science , 2017 , 33 ( 2 ): 163 - 172 .
0
浏览量
770
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构