首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于AC算法的电力业务快速识别方法
引用本文:王红凯,林亮成,王剑,余敏槠,周欢.一种基于AC算法的电力业务快速识别方法[J].中国电力,2016,49(9):78-82.
作者姓名:王红凯  林亮成  王剑  余敏槠  周欢
作者单位:1. 国网浙江省电力公司,浙江 杭州 310007;
2. 北京中电普华信息技术有限公司,北京 100085;
3. 华北电力大学 控制与计算机工程学院,北京 102206
摘    要:电力公司主要业务系统已逐步采用移动作业终端通过公用信息网络接入电力信息内网,业务系统在内外网数据交换过程中通过协议特征进行业务识别。针对业务识别过程存在匹配时间长、内存消耗大等问题,提出了一种基于AC(Aho-Corasick)算法的电力业务快速识别方法。在分析电力信息网络安全接入流程、高密度流量的协议特征、安全网关性能瓶颈的基础上,提出基于传输层协议分组的并行处理方式,提高匹配处理的吞吐量;采用基于位图的存储方式,降低构建和存储协议特征规则库所需的内存空间;最终通过算例证明了该方法能提升协议匹配速率,降低协议特征规则库的内存消耗,使协议特征识别过程的时间开销和空间开销达到最优平衡。仿真结果验证了所提方法的有效性和准确性。

关 键 词:电力信息化  电力业务识别  安全接入  协议特征识别  AC算法  
收稿时间:2016-03-17

A Quick Identify Method for Electricity Business Based on AC Algorithm
WANG Hongkai,LIN Liangcheng,WANG Jian,YU Minzhu,ZHOU Huan.A Quick Identify Method for Electricity Business Based on AC Algorithm[J].Electric Power,2016,49(9):78-82.
Authors:WANG Hongkai  LIN Liangcheng  WANG Jian  YU Minzhu  ZHOU Huan
Affiliation:1. State Grid Zhejiang Electric Power Company, Hangzhou 310007, China;
2. China Power Information Technology of Beijing,Beijing 100085, China;
3. North China Electric Power University, Beijing 102206, China
Abstract:Most business systems in electric power company use mobile terminals to access internal electricity information network, and signatures of protocols are used to identify different businesses while exchanging data between internal and external network. In order to solve problems of slow pattern matching and large memory consumption, a quick electricity business identify method based on AC algorithm is proposed. After analyzing security access procedure in electricity information network, protocol features of high-density traffic and security gateway performance bottlenecks, the proposed method groups signatures of protocols according to the transport layer protocols for parallel processing to increase matching throughput. The bitmap-based storage is selected to reduce memory consumption of rules library. At last, simulation results show that proposed method can increase matching throughput and reduce memory consumption.
Keywords:power enterprise  security access  identification of protocol signatures  AC algorithm  
本文献已被 CNKI 等数据库收录!
点击此处可从《中国电力》浏览原始摘要信息
点击此处可从《中国电力》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号