首页 | 本学科首页   官方微博 | 高级检索  
     

基于多防线分布容侵技术的电力企业信息集成安全防护体系
引用本文:陶佳,朱传柏,唐跃中,郭创新,曹一家. 基于多防线分布容侵技术的电力企业信息集成安全防护体系[J]. 电网技术, 2008, 32(20): 24-29
作者姓名:陶佳  朱传柏  唐跃中  郭创新  曹一家
作者单位:浙江大学电气工程学院,上海市电力公司调度通信中心
基金项目:国家自然科学基金,教育部科学技术研究重点项目,国家电网公司重大科技创新专项
摘    要:结合电力企业信息集成的发展趋势和安全防护现状提出了基于多防线分布容侵技术的电力企业信息集成安全防护体系。该防护体系的容侵策略包括:以防火墙作为基础性防护措施;在非实时应用网络的各关键节点部署移动智能体进行内外入侵的在线检测与追踪;在入侵检测系统成功确认入侵者之后,基于蜜罐技术的入侵诱导系统根据系统安全要求对被锁定的入侵流进行定向诱导,以主动防御模式保护合法系统不受侵犯;弹性文件系统采用基于分片-散射的分布式文件管理方式,并作为企业存储系统的最后防线。文章还针对性地剖析了信息横向、纵向集成中关键的安全防护问题,以及安全防护体系中的移动智能体、蜜罐、弹性文件系统等技术,最后简要介绍了该防护体系的实际应用情况。

关 键 词:入侵容忍  分布式系统  信息集成  安全防护  电力企业  移动智能体
收稿时间:2007-09-27

Security Protection Architecture for Power Enterprise Information Integration Based on Technology of Distributed Intrusion Tolerance with Multi-Level Defense Line
TAO Jia,ZHU Chuan-bai,TANG Yue-zhong,GUO Chuang-xin,CAO Yi-jia. Security Protection Architecture for Power Enterprise Information Integration Based on Technology of Distributed Intrusion Tolerance with Multi-Level Defense Line[J]. Power System Technology, 2008, 32(20): 24-29
Authors:TAO Jia  ZHU Chuan-bai  TANG Yue-zhong  GUO Chuang-xin  CAO Yi-jia
Affiliation:1. College of Electrical Engineering,Zhejiang University,Hangzhou 310027,Zhejiang Province,China; 2.Shanghai Municipal Electric Power Company,Huangpu District,Shanghai 200025,China
Abstract:According to the development trend and present condition of security protection of power enterprise information integration,a security protection architecture of power enterprise information integration based on the technology of distributed intrusion tolerance with multi-level defense line is proposed.The intrusion tolerance strategies of the proposed architecture consist of following items:(A) the firewall is used as the fundamental protective measures;(B) at key nodes in non-realtime application network,the mobile agents are configured to implement on-line detection and tracking of internal and external intrusions;(C) after the intruder is successfully confirmed by intrusion detection system,according to the requirement of system security the honeypot technology based intrusion inducting system directionally inducts the locked invading flow,and the active defensive mode protects the legitimate system from invasion;(D) by means of slicing-scattering based distributed document management style,the resilient file system serves as the last defense line of enterprise memory system.Moreover,the key security protection problems pertinent to transverse and longitudinal information integration as well as the application of the technologies,such as mobile agents,honeypot,resilient file system and so on,in security protection system are analyzed.Finally,the application of the proposed secure protection architecture is briefly presented.
Keywords:intrusion tolerance  distributed system  information integration  security protection  power enterprise  mobile agent
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《电网技术》浏览原始摘要信息
点击此处可从《电网技术》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号