Disclosure of Invention
Therefore, the technical problem to be solved by the present invention is to overcome the defects that the method for evaluating the network space security in the prior art cannot dynamically quantify the network security and has a large security evaluation deviation, so as to provide a method and a system for evaluating the network space security of an electric power monitoring system.
In order to achieve the purpose, the invention provides the following technical scheme:
in a first aspect, an embodiment of the present invention provides a method for evaluating network space security of a power monitoring system, including: acquiring security information of each element influencing network space security, and storing the security information of each element into an established security rating database; calculating an initial security score of the security information of each element according to the security information of each element in the security rating database and the influence factor and the penalty factor of each element; calculating a final score of the security information of each element according to the security information of each element in the security rating database by using a plurality of penalty factors of the security information of each element and the initial security score of the security information of each element; and calculating the security score of the network space based on the final score of the security information of each element, and judging the security level of the network space according to the security score of the network space.
In one embodiment, the security information of the elements affecting cyberspace security includes: device security information, protocol security information, and policy security information.
In one embodiment, the process of calculating an initial security score of the security information of each element according to the security information of each element in the security rating database and the influence factor and penalty factor of each element comprises: classifying the equipment in the power monitoring system according to the equipment safety information; acquiring a preset grade weight corresponding to each grade, and calculating an initial security score of each grade device according to the number of each grade device, the influence factor of the security information and the preset grade weight corresponding to each grade; taking the ratio of the influence factors of the protocol security information to the number of protocols used by the network space as an initial security score of the protocol security information; and taking the ratio of the influence factor of the policy security information to the number of the penalty factors of the policy security information as the initial security score of the policy security information.
In one embodiment, the process of calculating the final score of the security information of each element by using the penalty factor of the security information of each element and the initial security score comprises the following steps: according to the safety information of each element, acquiring a corresponding weighted weight of the safety information of each element under each punishment factor; and calculating the final score of the safety information of each element according to the corresponding weighted weight of the safety information of each element under each punishment factor, the initial safety score and the number of the punishment factors of the safety information of each element.
In one embodiment, the penalty factors for device security information include: risk factor punishment factor, network availability punishment factor, network attack rate punishment factor, influence equipment punishment factor, equipment influenced time punishment factor, attack tool quantity punishment factor and attack time punishment factor.
In one embodiment, the penalty factors for the protocol security information include: the system comprises a protocol vulnerability quantity penalty factor, a protocol authentication penalty factor, a protocol authority distinguishing penalty factor, a protocol broadcast inhibition penalty factor, a protocol encryption penalty factor and a protocol programmability penalty factor.
In one embodiment, the penalty factors for policy security information include: the system comprises a system password penalty factor, a system firewall penalty factor, a system access control penalty factor, a system backup recovery penalty factor, a system audit penalty factor and a system vulnerability check penalty factor.
In a second aspect, an embodiment of the present invention provides an evaluation apparatus for network space security of a power monitoring system, including: the information acquisition module is used for establishing a security rating database, acquiring the security information of each element influencing the network space security in real time, and storing the security information of each element into the security rating database, wherein the security rating database is also used for storing the disclosed danger factor information; the initial scoring module is used for calculating the initial security score of the security information of each element according to the security information of each element in the security rating database and the influence factor and the penalty factor of each element; the final grading module is used for calculating the final grade of the safety information of each element according to the safety information of each element in the safety rating database by utilizing a plurality of punishment factors of the safety information of each element and the initial safety grade of the safety information of each element; and the rating module is used for calculating the security score of the network space based on the final score of the security information of each element, and judging the security level of the network space according to the security score of the network space.
In one embodiment, the initial scoring apparatus includes: the first computing unit is used for grading the equipment in the power monitoring system according to the equipment safety information; acquiring a preset grade weight corresponding to each grade, and calculating an initial security score of each grade device according to the number of each grade device, the influence factor of the security information and the preset grade weight corresponding to each grade; a second calculating unit, configured to use a ratio of an influence factor of protocol security information to a number of protocols used by the network space as an initial security score of the protocol security information; and the third calculating unit is used for taking the ratio of the influence factor of the policy security information to the number of the penalty factors of the policy security information as the initial security score of the policy security information.
In one embodiment, the final scoring module includes: the weighting module is used for acquiring a corresponding weighting value of the safety information of each element under each punishment factor according to the safety information of each element; and the final scoring module is used for calculating the final scoring of the safety information of each element according to the corresponding weighted weight of the safety information of each element under each punishment factor, the initial safety scoring and the number of the punishment factors of the safety information of each element.
In a third aspect, an embodiment of the present invention provides a computer device, including: the system comprises at least one processor and a memory which is in communication connection with the at least one processor, wherein the memory stores instructions which can be executed by the at least one processor, and the instructions are executed by the at least one processor, so that the at least one processor executes the evaluation method for the network space security of the power monitoring system in the first aspect of the embodiment of the invention.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where computer instructions are stored, and the computer instructions are configured to enable a computer to execute the method for evaluating network space security of a power monitoring system according to the first aspect of the embodiment of the present invention.
The technical scheme of the invention has the following advantages:
1. the invention provides an evaluation method and system for network space security of a power monitoring system, which comprises the steps of establishing a security rating database, acquiring security information of each element influencing network space security in real time, and storing the security information of each element into the security rating database; calculating an initial security score of the security information of each element according to the security information of each element in the security rating database and the influence factor and the penalty factor of each element; calculating a final score of the security information of each element according to the security information of each element in the security rating database by using a plurality of penalty factors of the security information of each element and the initial security score of the security information of each element; and calculating the security score of the network space based on the final score of the security information of each element, and judging the security level of the network space according to the security score of the network space. The invention scores the network space security from multiple dimensions and multiple angles, thereby dynamically quantifying the network security and improving the accuracy of the evaluation result.
2. According to the method and the system for evaluating the network space security of the power monitoring system, the equipment in the power monitoring system is classified according to the equipment security information; acquiring a preset grade weight corresponding to each grade, and calculating an initial security score of each grade device according to the number of each grade device, the influence factor of the security information and the preset grade weight corresponding to each grade; taking the ratio of the influence factors of the protocol security information to the number of the protocols used by the network space as the initial security score of the protocol security information; and taking the ratio of the influence factor of the strategy safety information to the number of the punishment factors of the strategy safety information as the initial safety score of the strategy safety information. The method and the device score the network space safety in multiple dimensions from the equipment safety information, the protocol safety information and the strategy safety information, comprehensively consider and set the influence factors of each kind of safety information, and finally calculate the initial safety score of each kind of safety information, thereby improving the accuracy of the evaluation result.
3. According to the method and the system for evaluating the network space security of the power monitoring system, provided by the invention, a plurality of punishment factors are set for each type of security information, the security information is scored and calculated again by utilizing the punishment factors, and finally the final score of the security information is obtained based on the initial security score and the punishment factors, so that the influence of various punishment factors on the network security is comprehensively considered from multiple angles, and the most complete and comprehensive evaluation method and system are obtained.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; the two elements may be directly connected or indirectly connected through an intermediate medium, or may be communicated with each other inside the two elements, or may be wirelessly connected or wired connected. The specific meanings of the above terms in the present invention can be understood in a specific case to those of ordinary skill in the art.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Example 1
The embodiment of the invention provides an evaluation method for network space security of a power monitoring system, which comprises the following steps of S11-S14 as shown in FIG. 1:
step S11: and acquiring security information of each element influencing the network space security, and storing the security information of each element into the established security rating database.
Specifically, before a security rating database is established, a network space to be tested needs to be communicated so that the network space to be tested can normally communicate with the network space, the security rating database of the embodiment of the present invention stores and periodically updates the published risk factor information in a network, and the risk factor information includes: NVD, CVE and the like disclose information such as bugs, trojans, viruses and the like in the database.
Specifically, the security rating database of the embodiment stores the security information of various elements affecting network security detected by the system to be tested, and the security information of each element dynamically changes along with the change of the network state and configuration; because the device security in the power monitoring system is mainly affected by the device security information, the protocol security is mainly affected by the protocol security information, and the policy security is mainly affected by the policy security information, the security information of the elements affecting the network space security of the embodiment of the present invention includes: device security information, protocol security information, and policy security information.
Specifically, the device security information may include the number of device connections, the type of information stored, the device permissions, bugs, the number of trojans and viruses, the number of times of network disconnection, the time of network disconnection, the number of times of attacks, the number of times of successful attacks, the security rating database entry state, the number of affected devices, the total number of devices to be tested, the time of affected devices, the test time, the number of attack tools, the attack time, and the like.
Specifically, the protocol security information may include the number of protocols, the number of vulnerabilities, authentication mechanisms, authority differentiation, data transmission encryption, broadcast suppression, programmability, and the like.
Specifically, the policy security information may include user password or password complexity, number of all users, firewall configuration, access control policy, backup and recovery mechanism, security audit, periodic vulnerability check and repair, vulnerability check and repair frequency, and the like; and finally, summing the equipment, protocol and strategy safety scores to obtain a network safety total score in the power monitoring system, and grading according to the corresponding strategy.
Step S12: and calculating the initial security score of the security information of each element according to the security information of each element in the security rating database and the influence factor and the penalty factor of each element.
Specifically, according to three major factors (device security, protocol security, and policy security) that affect the security of the power monitoring system, the embodiments of the present invention respectively allocate security allocation impact factors to devices, protocols, and policies in a network space according to actual situations, for example: security information for devices, security information for protocols, and protocolsThe influence factor of the security information is A1=30、A2=40、A350, satisfies A1+A2+A3=100。
Specifically, as shown in fig. 2, step S12 is executed by steps S21 to S23, which are as follows:
step S21: classifying equipment in the power monitoring system according to the equipment safety information; and acquiring a preset grade weight corresponding to each grade, and calculating an initial security score of each grade device according to the number of each grade device, the influence factor of the security information and the preset grade weight corresponding to each grade.
Specifically, the embodiments of the present invention classify devices in a network space according to device security information obtained in real time, where the classification may be based on the importance of the devices, and the devices may be classified into A, B, C classes, where the class a device at least meets one of the following conditions: (1) the number of other directly connected devices is more than or equal to 10, (2) the devices with the storage information types of password and the like are used, (3) the device with the authority of an administrator in the power monitoring system is used; class B devices must satisfy the following two conditions: (1) the number of other directly connected devices is less than 10 and is more than or equal to 5, (2) the stored information type is important service information, or adjacent devices of A-level devices; the class C device is a device other than the class a device and the class B device.
Specifically, according to the number of each level of equipment, the preset level weight corresponding to each level and the influence factor of the equipment safety information, the initial safety score T of each level of equipment is calculatedoThe calculation formula is as follows:
wherein, A1Influencing factors representing safety information of the installation, CA、CB、CCRespectively representing the number of class A, B and C devices, A11、A12、A13Respectively preset grades of A-grade equipment, B-grade equipment and C-grade equipmentThe weight, specifically the preset level weight, is set according to the actual situation, and is not limited herein.
Step S22: and taking the ratio of the influence factors of the protocol security information to the number of the protocols used by the network space as the initial security score of the protocol security information.
In particular, an initial security score T for protocol security informationPThe calculation formula of (a) is as follows:
wherein A is2Influencing factors representing protocol security information, CPRepresenting the number of protocols used in the network space.
Step S23: and taking the ratio of the influence factor of the policy security information to the number of the penalty factors of the policy security information as the initial security score of the policy security information.
In particular, an initial security score T for policy security informationSThe calculation formula of (a) is as follows:
wherein A is3Factor of influence, N, representing policy security information1The number of penalty factors for policy security information.
Step S13: and calculating a final grade of the safety information of each element according to the safety information of each element in the safety rating database by using a plurality of penalty factors of the safety information of each element and the initial safety grade of the safety information of each element.
Specifically, since the security of each element is affected by multiple factors, the embodiment of the present invention sets multiple penalty factors for each element, scores the security information of each element in multiple dimensions, and combines the initial scores of the security information of each element to finally obtain the final score of the security information of each element, as shown in fig. 3, where step S13 is performed by steps S31 to S32, and specifically, the following steps are performed:
step S31: and acquiring the corresponding weighting value of the safety information of each element under each punishment factor according to the safety information of each element.
Specifically, the penalty factors of the device security information include: risk factors penalty factor P1Network availability penalty factor P2Network attack rate punishment factor P3Impact device penalty factor P4Device affected time penalty factor P5Attack tool quantity penalty factor P6Penalty factor P for time spent on attacks7。
Specifically, according to the embodiment of the invention, the safety information of the equipment of the power monitoring system is analyzed according to the actual situation, and then the P is determined1、P2、P3、P4、P5、P6、P7In which P is1、P2、P3、P4、P5、P6、P7Independent of each other, the segments of each penalty factor of the device safety information are shown in formulas (4) to (12), wherein each segment is set according to the actual condition and the weighted weight setting basis corresponding to each segment, and no limitation is made here.
Wherein, P
1Representing equipment vulnerability, Trojan horse, virus penalty factor, n
1E is the sum of the number of the loopholes, the trojans and the viruses on the equipment, the safety rating database of the loopholes, the trojans and the viruses represents that the recording state is recorded,
and the safety rating database recording state representing the vulnerability, Trojan horse and virus is not recorded.
Wherein, P2And expressing a network availability penalty factor, U expressing network availability, and a network availability calculation formula is as follows:
the method comprises the following steps that a represents the network disconnection times of a network to be tested in a test time caused by equipment bugs, trojans and viruses, and b represents the network disconnection times of the network to be tested in the test time caused by the equipment bugs, the trojans and the viruses, wherein the network disconnection times are cubic roots due to the fact that the magnitude of the network disconnection times is different from the magnitude of the network disconnection times, and a is greater than or equal to 0, and b is greater than or equal to 0.
Wherein, P3And (3) representing a network attack rate punishment factor, wherein R represents the network attack rate, and the network attack rate calculation formula is as follows:
wherein, CIFor the number of successful attacks of the network under test during the test time, CTFor the number of attacks on the network to be tested during the test time, when CI=CTWhen R is 0, R is 0.
Wherein, P4The penalty factors of the influencing equipment are represented, M represents the quantity of the equipment directly connected with the equipment, M represents the total number of the equipment to be tested, and M is equal to CA+CB+CC。
Wherein, P5Representing the time penalty factor, t, of the affected equipment1Indicating the affected time of the equipment and T indicating the test time.
Wherein, P6Penalty factor, n, representing the number of attack tools2Representing the number of attack tools used to implement the attack.
Wherein, P7Represents a time-consuming penalty factor for the attack, t2Indicating that the attack is time consuming.
Specifically, the penalty factors of the protocol security information include: protocol vulnerability quantity penalty factor Q1Protocol authentication penalty factor Q2Protocol authority distinguishing penalty factor Q3Protocol broadcast suppression penalty factor Q4Protocol encryption penalty factor Q5Protocol programmability penalty factor Q6。
According to the embodiment of the invention, the protocol safety information of the power monitoring system is analyzed according to the actual situation, and then Q is determined1、Q2、Q3、Q4、Q5、Q6In which Q1、Q2、Q3、Q4、Q5、Q6Independent of each other, the segments of each penalty factor of the protocol security information are shown in formulas (13) to (18), wherein each segment and the weighted weight setting basis corresponding to each segment are set according to the actual situation, and are not limited herein.
Wherein Q is1A penalty factor, n, representing the number of protocol vulnerabilities3The number of the network protocol loopholes to be detected.
Wherein Q is
2Indicating a protocol authentication penalty factor, G indicating that the protocol has an authentication mechanism,
indicating that the protocol has no authentication mechanism.
Wherein Q is
3A penalty factor for indicating the authority discrimination of the protocol, V indicates that the protocol has authority discrimination,
indicating that the protocol has no authority to distinguish.
Wherein Q is
4Represents a protocol broadcast suppression penalty factor, J represents a protocol broadcast suppression,
indicating that the protocol has no broadcast suppression.
Wherein Q is5Representing a protocol encryption penalty factor.
Wherein Q is
6A penalty factor for the programmability of the protocol, I indicates that the protocol is programmable,
indicating that the protocol is not programmable.
Specifically, the penalty factors of the policy security information include: the system comprises a system password penalty factor R1, a system firewall penalty factor R2, a system access control penalty factor R3, a system backup recovery penalty factor R4, a system audit penalty factor R5 and a system vulnerability check penalty factor R6.
Specifically, the embodiment of the invention analyzes the policy security message of the power monitoring system according to the actual situation, and further determines R1、R2、R3、R4、R5、R6In which R is1、R2、R3、R4、R5、R6Independent of each other, the segments of each penalty factor of the policy security information are shown in formulas (19) to (24), wherein each segment basis and the weighted weight setting basis corresponding to each segment are set according to the actual situation, and no limitation is made here.
Wherein R is1Representing a system cryptographic penalty factor, NCThe number of users with password length and password complexity (number, letter, underline and other character types) more than or equal to 3 in the system to be tested is shown, N2Indicating the number of all registered users in the system to be tested.
Wherein R is
2Indicating the system firewall penalty factor, F indicating the system to be tested has the firewall, E indicating the system to be tested has the firewall configured correctly,
indicating that the system under test is not firewall-free,
indicating a firewall configuration error for the system under test.
Wherein R is
3Represents a system access control penalty factor, W represents that the system to be tested has an access control strategy,
indicating that the system under test has no access control policy.
Wherein R is
4The system backup and recovery penalty factor is represented, O represents that the system to be tested has a backup and recovery mechanism,
indicating that the system under test has no backup and recovery mechanism.
Wherein R is
5Indicating a system audit punishment factor, H indicating that the system to be tested has safety audit,
indicating that the system under test has no security audit.
Wherein R is
6Indicating system leaksHole inspection punishment factor D represents that the system to be tested has regular bug inspection and repair,
and K represents the bug checking and repairing frequency of the system to be tested.
Step S32: and calculating the final score of the safety information of each element according to the corresponding weighted weight of the safety information of each element under each punishment factor, the initial safety score and the number of the punishment factors of the safety information of each element.
Specifically, the final score S of the device security information is calculated as follows1I.e. initial rating of the safety information of the device, except for a final rating S of the penalty factor corresponding to the rating1:
Wherein S is
ARepresenting the total security score, S, of all class A devices in the network space
BRepresenting the total security score, S, of all class B devices in the network space
CRepresenting the total security score, T, of all class C devices in the network space
O3Initial Security score, T, representing Security information for A-class device
O2Initial security score, T, representing security information for class B devices
O1An initial security score representing level C device security information,
represents the jth penalty factor for the ith class a device,
represents the jth penalty factor for the ith class B device,
denotes the j penalty factor, C, of the ith class C device
A、C
B、C
CRespectively representing the number of devices of class a, class B and class C.
Specifically, the final score S of the protocol security information is calculated as follows2Namely, the initial score of the protocol safety information deducts the final score of the score corresponding to the protocol penalty factor:
wherein, TPRepresents the initial security score, Q, of the protocol(i,j)A j penalty factor, C, representing the ith protocolPRepresenting the number of protocols used in the network under test;
specifically, the final score S of the policy security information is calculated according to the following formula3Namely, the initial score of the policy security information deducts the final score of the score corresponding to the policy penalty factor:
wherein, TSRepresenting the policy initial Security score, RKRepresenting a security policy penalty factor.
Step S14: and calculating the security score of the network space based on the final score of the security information of each element, and judging the security level of the network space according to the security score of the network space.
Specifically, the network security total score S of the system to be tested is calculated according to the following formula:
S=S1+S2+S3 (28)
specifically, the network security rating L of the system to be tested may be obtained according to the following formula, and may also be in other rating forms, which is not limited herein:
example 2
An embodiment of the present invention provides an evaluation apparatus for network space security of a power monitoring system, as shown in fig. 4, including:
the information acquisition module 1 is used for establishing a security rating database, acquiring the security information of each element influencing the network space security in real time, and storing the security information of each element into the security rating database, wherein the security rating database is also used for storing the disclosed danger factor information; this module executes the method described in step S11 in embodiment 1, and is not described herein again.
The initial scoring module 2 is used for calculating the initial security score of the security information of each element according to the security information of each element in the security rating database and the influence factor and the penalty factor of each element; this module executes the method described in step S12 in embodiment 1, and is not described herein again.
A final scoring module 3, configured to calculate a final score of the security information of each element according to the security information of each element in the security rating database, using a plurality of penalty factors of the security information of each element and the initial security score of the security information of each element; this module executes the method described in step S13 in embodiment 1, and is not described herein again.
The rating module 4 is used for calculating the security score of the network space based on the initial security score and the final score of the security information of each element and the number of penalty factors of the security information of each element, and judging the security level of the network space according to the security score of the network space; this module executes the method described in step S14 in embodiment 1, and is not described herein again.
In one embodiment, the initial scoring apparatus includes:
the first computing unit is used for grading the equipment in the power monitoring system according to the equipment safety information; acquiring a preset grade weight corresponding to each grade, and calculating an initial security score of each grade device according to the number of each grade device, the influence factor of the security information and the preset grade weight corresponding to each grade; this module executes the method described in step S21 in embodiment 1, and is not described herein again.
The second calculation unit is used for taking the ratio of the influence factor of the protocol security information to the number of the protocols used by the network space as the initial security score of the protocol security information; this module executes the method described in step S22 in embodiment 1, and is not described herein again.
The third calculation unit is used for taking the ratio of the influence factor of the policy security information to the number of the penalty factors of the policy security information as the initial security score of the policy security information; this module executes the method described in step S23 in embodiment 1, and is not described herein again.
In one embodiment, the final scoring module includes:
the weighting module is used for acquiring a corresponding weighting value of the safety information of each element under each punishment factor according to the safety information of each element; this module executes the method described in step S31 in embodiment 1, and is not described herein again.
The final scoring module is used for calculating the final score of the safety information of each element according to the corresponding weighted weight of the safety information of each element under each punishment factor, the initial safety score and the number of the punishment factors of the safety information of each element; this module executes the method described in step S32 in embodiment 1, and is not described herein again.
Example 3
An embodiment of the present invention provides a computer device, as shown in fig. 5, including: at least one processor 401, such as a CPU (Central Processing Unit), at least one communication interface 403, memory 404, and at least one communication bus 402. Wherein a communication bus 402 is used to enable connective communication between these components. The communication interface 403 may include a Display (Display) and a Keyboard (Keyboard), and the optional communication interface 403 may also include a standard wired interface and a standard wireless interface. The Memory 404 may be a RAM (random Access Memory) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The memory 404 may optionally be at least one memory device located remotely from the processor 401. Wherein the processor 401 may execute the evaluation method for cyber-space security of the power monitoring system of embodiment 1. A set of program codes is stored in the memory 404, and the processor 401 calls the program codes stored in the memory 404 for executing the evaluation method of the cyber-space security of the power monitoring system of embodiment 1.
The communication bus 402 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. The communication bus 402 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one line is shown in FIG. 5, but this does not represent only one bus or one type of bus.
The memory 404 may include a volatile memory (RAM), such as a random-access memory (RAM); the memory may also include a non-volatile memory (english: non-volatile memory), such as a flash memory (english: flash memory), a hard disk (english: hard disk drive, abbreviated: HDD) or a solid-state drive (english: SSD); the memory 404 may also comprise a combination of memories of the kind described above.
The processor 401 may be a Central Processing Unit (CPU), a Network Processor (NP), or a combination of a CPU and an NP.
The processor 401 may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a field-programmable gate array (FPGA), a General Array Logic (GAL), or any combination thereof.
Optionally, the memory 404 is also used to store program instructions. The processor 401 may call a program instruction to implement the method for evaluating the cyber-space security of the power monitoring system according to embodiment 1.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer-executable instruction is stored on the computer-readable storage medium, and the computer-executable instruction can execute the method for evaluating the network space security of the power monitoring system in embodiment 1. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD), a Solid-State Drive (SSD), or the like; the storage medium may also comprise a combination of memories of the kind described above.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications of the invention may be made without departing from the scope of the invention.