CN118473730A - Electric power internet of things terminal network risk behavior identification method, equipment and medium - Google Patents
Electric power internet of things terminal network risk behavior identification method, equipment and medium Download PDFInfo
- Publication number
- CN118473730A CN118473730A CN202410559551.5A CN202410559551A CN118473730A CN 118473730 A CN118473730 A CN 118473730A CN 202410559551 A CN202410559551 A CN 202410559551A CN 118473730 A CN118473730 A CN 118473730A
- Authority
- CN
- China
- Prior art keywords
- behavior
- network
- risk
- network access
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/23—Clustering techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Bioinformatics & Computational Biology (AREA)
- General Health & Medical Sciences (AREA)
- Evolutionary Computation (AREA)
- General Physics & Mathematics (AREA)
- Evolutionary Biology (AREA)
- Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Hardware Design (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域Technical Field
本发明涉及电力物联网技术领域,尤其涉及一种电力物联终端网络风险行为识别方法、设备及介质。The present invention relates to the technical field of electric power Internet of Things, and in particular to a method, device and medium for identifying network risk behaviors of electric power Internet of Things terminals.
背景技术Background Art
伴随着电力行业物联网规模的扩大及智慧终端数量的增多,一方面实现了对电网设备的运行状态的实时监控,从而更加精准地进行能源调度和优化配置,另外一方面可以实现对用户用电行为的实时监控和分析,从而提供更加个性化且智能化的用电服务。With the expansion of the scale of the Internet of Things in the power industry and the increase in the number of smart terminals, on the one hand, real-time monitoring of the operating status of power grid equipment is realized, so that energy scheduling and optimization configuration can be carried out more accurately. On the other hand, real-time monitoring and analysis of user electricity consumption behavior can be achieved, so as to provide more personalized and intelligent electricity consumption services.
通过各类智能电力物联设备可以远程控制、智能连接、全面感知,能够更高效、更精准地管理电力能源,提高电力能源的使用效率,同时也为用户提供了更好的电力服务。Various smart power IoT devices can achieve remote control, intelligent connection, and comprehensive perception, which can manage electric energy more efficiently and accurately, improve the efficiency of electric energy use, and provide users with better power services.
然而,在电力智慧物联网带来智能便利的同时,与其相关的网络安全以及数据安全等安全问题与风险也随之凸显出来,在网络安全方面,DDoS攻击、暴力破解、恶意访问,这些攻击的手段被广泛的使用,需要从网络访问层面对恶意访问行为进行检测和阻断,防止攻击者的恶意攻击;数据安全方面,伴随着越来越多的物联网智能终端参与到业务当中,会有大量的敏感数据如智慧电表的客户用电信息存储在终端上、网络传输中。However, while the smart power Internet of Things brings intelligent convenience, related security issues and risks such as network security and data security have also become prominent. In terms of network security, DDoS attacks, brute force cracking, and malicious access are widely used. It is necessary to detect and block malicious access behaviors from the network access level to prevent malicious attacks from attackers. In terms of data security, with more and more smart IoT terminals participating in the business, a large amount of sensitive data such as customer electricity usage information of smart meters will be stored on the terminals and transmitted over the network.
发明内容Summary of the invention
本发明提供了一种电力物联终端网络风险行为识别方法、设备及介质,以实现对网络攻击事件的实时检测。The present invention provides a method, device and medium for identifying network risk behavior of a power Internet of Things terminal to achieve real-time detection of network attack events.
根据本发明的第一方面,提供了一种电力物联终端网络风险行为识别方法,包括:According to a first aspect of the present invention, a method for identifying network risk behaviors of a power IoT terminal is provided, comprising:
获取关联电力物联终端的网络访问流量;Obtain network access traffic of associated power IoT terminals;
根据各所述关联电力物联终端的网络访问流量,形成多线程消费消息队列,并确定所述多线程消费消息队列的网络行为的风险特征值;According to the network access traffic of each of the associated power IoT terminals, a multi-threaded consumption message queue is formed, and a risk characteristic value of the network behavior of the multi-threaded consumption message queue is determined;
根据各所述风险特征值及预设权重集进行特征值聚类,识别出所述多线程消费消息队列中的攻击特征行为。Characteristic value clustering is performed according to each of the risk characteristic values and the preset weight set to identify attack characteristic behaviors in the multi-threaded consumer message queue.
根据本发明的另一方面,提供了一种电力物联终端网络风险行为识别装置,包括:According to another aspect of the present invention, a device for identifying network risk behavior of a power Internet of Things terminal is provided, comprising:
流量获取模块,用于获取关联电力物联终端的网络访问流量;A traffic acquisition module, used to acquire network access traffic associated with the power IoT terminal;
特征值确定模块,用于根据各所述关联电力物联终端的网络访问流量,形成多线程消费消息队列,并确定所述多线程消费消息队列的网络行为的风险特征值;A characteristic value determination module, used to form a multi-threaded consumption message queue according to the network access flow of each of the associated power Internet of Things terminals, and determine the risk characteristic value of the network behavior of the multi-threaded consumption message queue;
行为确定模块,用于根据各所述风险特征值及预设权重集进行特征值聚类,识别出所述多线程消费消息队列中的攻击特征行为。The behavior determination module is used to cluster the characteristic values according to each of the risk characteristic values and the preset weight set, and identify the attack characteristic behaviors in the multi-threaded consumption message queue.
根据本发明的另一方面,提供了一种电子设备,所述电子设备包括:According to another aspect of the present invention, an electronic device is provided, the electronic device comprising:
至少一个处理器;以及at least one processor; and
与所述至少一个处理器通信连接的存储器;其中,a memory communicatively connected to the at least one processor; wherein,
所述存储器存储有可被所述至少一个处理器执行的计算机程序,所述计算机程序被所述至少一个处理器执行,以使所述至少一个处理器能够执行本发明任一实施例所述的电力物联终端网络风险行为识别方法。The memory stores a computer program that can be executed by the at least one processor, and the computer program is executed by the at least one processor so that the at least one processor can execute the method for identifying network risk behavior of power Internet of Things terminals described in any embodiment of the present invention.
根据本发明的另一方面,提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机指令,所述计算机指令用于使处理器执行时实现本发明任一实施例所述的电力物联终端网络风险行为识别方法。According to another aspect of the present invention, a computer-readable storage medium is provided, wherein the computer-readable storage medium stores computer instructions, and the computer instructions are used to enable a processor to implement the method for identifying network risk behavior of a power Internet of Things terminal described in any embodiment of the present invention when executed.
本发明实施例的技术方案,通过获取关联电力物联终端的网络访问流量;根据各关联电力物联终端的网络访问流量,形成多线程消费消息队列,并确定多线程消费消息队列的网络行为的风险特征值;根据各风险特征值及预设权重集进行特征值聚类,识别出多线程消费消息队列中的攻击特征行为。通过对收发的网络访问流量进行实时采集,并确定对应的风险特征值结合预设权重集进行聚类分析,识别出其中的网络风险攻击行为。实现了对网络风险行为的实时检测,以便于后续及时对网络风险行为进行处置,进而提升了数据传输的安全防护水平,保证了关联电力物联终端的安全性。The technical solution of the embodiment of the present invention is to obtain the network access traffic of the associated power IoT terminals; form a multi-threaded consumption message queue according to the network access traffic of each associated power IoT terminal, and determine the risk characteristic value of the network behavior of the multi-threaded consumption message queue; cluster the characteristic values according to each risk characteristic value and the preset weight set, and identify the attack characteristic behavior in the multi-threaded consumption message queue. By collecting the sent and received network access traffic in real time, and determining the corresponding risk characteristic value and combining it with the preset weight set for cluster analysis, the network risk attack behavior is identified. Real-time detection of network risk behavior is achieved, so that the network risk behavior can be dealt with in a timely manner later, thereby improving the security protection level of data transmission and ensuring the security of the associated power IoT terminals.
应当理解,本部分所描述的内容并非旨在标识本发明的实施例的关键或重要特征,也不用于限制本发明的范围。本发明的其它特征将通过以下的说明书而变得容易理解。It should be understood that the content described in this section is not intended to identify the key or important features of the embodiments of the present invention, nor is it intended to limit the scope of the present invention. Other features of the present invention will become easily understood through the following description.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings required for use in the description of the embodiments will be briefly introduced below. Obviously, the drawings described below are only some embodiments of the present invention. For ordinary technicians in this field, other drawings can be obtained based on these drawings without paying creative work.
图1是根据本发明实施例一提供的一种电力物联终端网络风险行为识别方法的流程图;FIG1 is a flow chart of a method for identifying network risk behaviors of power IoT terminals provided according to a first embodiment of the present invention;
图2是根据本发明实施例二提供的一种电力物联终端网络风险行为识别方法的流程图;2 is a flow chart of a method for identifying network risk behaviors of power IoT terminals provided according to a second embodiment of the present invention;
图3是根据本发明实施例三提供的一种电力物联终端网络风险行为识别装置的结构示意图;3 is a schematic diagram of the structure of a device for identifying network risk behavior of a power IoT terminal provided according to a third embodiment of the present invention;
图4是实现本发明实施例的电子设备的结构示意图。FIG. 4 is a schematic diagram of the structure of an electronic device implementing an embodiment of the present invention.
具体实施方式DETAILED DESCRIPTION
为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分的实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本发明保护的范围。In order to enable those skilled in the art to better understand the scheme of the present invention, the technical scheme in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work should fall within the scope of protection of the present invention.
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本发明的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。It should be noted that the terms "first", "second", etc. in the specification and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. It should be understood that the data used in this way can be interchanged where appropriate, so that the embodiments of the present invention described herein can be implemented in an order other than those illustrated or described herein. In addition, the terms "including" and "having" and any variations thereof are intended to cover non-exclusive inclusions, for example, a process, method, system, product or device that includes a series of steps or units is not necessarily limited to those steps or units clearly listed, but may include other steps or units that are not clearly listed or inherent to these processes, methods, products or devices.
可以理解的是,在使用本公开各实施例公开的技术方案之前,均应当依据相关法律法规通过恰当的方式对本公开所涉及个人信息以及网络访问流量等的类型、使用范围、使用场景等告知用户并获得用户的授权。It is understandable that before using the technical solutions disclosed in the embodiments of the present disclosure, the types, scopes of use, usage scenarios, etc. of the personal information and network access traffic involved in the present disclosure should be informed to the user and the user's authorization should be obtained in an appropriate manner in accordance with relevant laws and regulations.
实施例一Embodiment 1
图1为本发明实施例一提供了一种电力物联终端网络风险行为识别方法的流程图,本实施例可适用于终端设备、边缘计算设备及云端应用的风险识别情况,该方法可以由电力物联终端网络风险行为识别装置来执行,该电力物联终端网络风险行为识别装置可以采用硬件和/或软件的形式实现,该电力物联终端网络风险行为识别装置可配置于电子设备中。Figure 1 is a flow chart of a method for identifying network risk behavior of a power Internet of Things terminal provided in accordance with a first embodiment of the present invention. This embodiment can be applicable to risk identification situations of terminal devices, edge computing devices and cloud applications. The method can be executed by a power Internet of Things terminal network risk behavior identification device. The power Internet of Things terminal network risk behavior identification device can be implemented in the form of hardware and/or software. The power Internet of Things terminal network risk behavior identification device can be configured in an electronic device.
示例性的,本发明可以适用于电力行业智慧物联网(简称电力物联网),通过电力行业物联网与各种相关的电力智慧终端设备连接,其中包括终端设备的数量呈增长趋势,以及终端设备的类型呈多样化趋势,这些设备包括智能电表、温度检测装置、湿度检测装置、配电装置等。在数据传输方面,智慧物联网将各个配电网、变电站数据送到数据中心,数据中心之间的数据互相传递,同时将数据送到云平台,控制中心通过海量数据分析,实时监测控制电网。网络传输时则会存在网络安全问题,可以通过本发明对网络传输中的网络风险行为进行识别。处理器可以配备与电力物联网中,通过电力物联网与各电力智慧终端设备连接。Exemplarily, the present invention can be applied to the smart Internet of Things in the electric power industry (hereinafter referred to as the power Internet of Things), which is connected to various related electric power smart terminal devices through the power industry Internet of Things, including the increasing number of terminal devices and the diversification of terminal device types, including smart meters, temperature detection devices, humidity detection devices, power distribution devices, etc. In terms of data transmission, the smart Internet of Things sends the data of each distribution network and substation to the data center, and the data between the data centers are transmitted to each other. At the same time, the data is sent to the cloud platform, and the control center monitors and controls the power grid in real time through massive data analysis. There will be network security issues during network transmission, and the present invention can be used to identify network risk behaviors in network transmission. The processor can be equipped with the power Internet of Things and connected to each power smart terminal device through the power Internet of Things.
如图1所示,该方法包括:As shown in FIG1 , the method includes:
S110、获取关联电力物联终端的网络访问流量。S110: Obtain network access traffic of the associated power IoT terminal.
在本实施例中,关联电力物联终端可以理解为用于收发的已经接入的终端、边缘计算设备以及云端应用端等,例如可以包括智能电表、温度检测装置、湿度检测装置、配电装置。网络访问流量可以理解为通过网络传输的数据。In this embodiment, the associated power IoT terminal can be understood as an already connected terminal, edge computing device, and cloud application terminal for sending and receiving, and can include, for example, a smart meter, a temperature detection device, a humidity detection device, and a power distribution device. Network access traffic can be understood as data transmitted through the network.
具体的,处理器可以预先接入与处理器相关联的关联电力物联终端,处理器可以采集关联电力物联终端发送的或发送至关联电力物联终端的网络访问流量。Specifically, the processor may be pre-connected to an associated power Internet of Things terminal associated with the processor, and the processor may collect network access traffic sent by or to the associated power Internet of Things terminal.
其中,随着关联电力物联终端接入增多,部分关联电力物联终端存在用户信息,在这些关联电力物联终端的数据处理过程中涉及到数据的采集、传输、共享以及存储等,由于数据加密机制不健全给物联网系统的信息通信安全带来较大的安全风险,入侵者在未经允许的情况下可以获取甚至使用用户的敏感数据,存在终端的个人隐私及数据泄漏风险,对于此风险需要采取有效的安全防护措施确保物联通信安全。主要采用轻量级加密方式,从源头进行安全防护、端到端的加密传输,从传感器、采集器、边缘计算中心做数据的加密防护,端到端进行加密解密传输链路中进行加密,确保数据的传输安全。Among them, with the increase in the number of connected power IoT terminals, some of the connected power IoT terminals have user information. The data processing process of these connected power IoT terminals involves data collection, transmission, sharing and storage. Due to the imperfect data encryption mechanism, it brings great security risks to the information communication security of the IoT system. Intruders can obtain or even use users' sensitive data without permission, which poses a risk of personal privacy and data leakage in the terminal. Effective security protection measures need to be taken to ensure the security of IoT communication. Lightweight encryption is mainly used to perform security protection and end-to-end encrypted transmission from the source, encrypt data from sensors, collectors, and edge computing centers, and encrypt and decrypt data in the end-to-end transmission link to ensure data transmission security.
此类轻量级的加密使用AES即RSA相结合,通过对加密方法的改进在不影响物联网络资源即终端性能的情况下,保持加密的安全性。This type of lightweight encryption uses a combination of AES and RSA, and maintains the security of encryption without affecting IoT network resources or terminal performance by improving the encryption method.
AES加密,是一种对称的高级加密标准,采用的是一种区块加密方式。包括五种模式:ECB、CBC、OFB、CTR和CFB。密钥的长度支持128、192、256位。此类加密方式运算速度快、占用内存小,适合物联数据传输过程中的加密。AES encryption is a symmetric advanced encryption standard that uses a block encryption method. It includes five modes: ECB, CBC, OFB, CTR and CFB. The key length supports 128, 192, and 256 bits. This type of encryption method has fast operation speed and small memory usage, and is suitable for encryption during IoT data transmission.
RSA加密,是一种非对称加密,包含一对公私钥。RSA的密钥长度为1024位及以上,所以有较强的安全性,但是对于大量的数据传输需要占用一定的资源,本方法的RSA加密主要用在对称密钥的传输,达到安全与效率相结合,确保密钥安全传输。RSA encryption is an asymmetric encryption that includes a pair of public and private keys. The key length of RSA is 1024 bits or more, so it has strong security, but it takes up a certain amount of resources for large amounts of data transmission. The RSA encryption of this method is mainly used for the transmission of symmetric keys, achieving a combination of security and efficiency to ensure the secure transmission of keys.
在数据传输过程中处理器可以默认使用AES-256方式加密,使用动态密钥方式进行加解密,当使用端接收到加密数据后使用RSA的私钥进行解密AES-Key,获取对称加密的密钥然后使用此密钥进行解密数据,从而保障终端数据采集、传输、使用以及存储过程中的机密性,防止重要信息泄漏。During data transmission, the processor can use AES-256 encryption by default and dynamic key encryption and decryption. When the user receives the encrypted data, it uses RSA's private key to decrypt AES-Key, obtains the symmetric encryption key and then uses this key to decrypt the data, thereby ensuring the confidentiality of terminal data during collection, transmission, use and storage, and preventing the leakage of important information.
S120、根据各关联电力物联终端的网络访问流量,形成多线程消费消息队列,并确定多线程消费消息队列的网络行为的风险特征值。S120. Form a multi-threaded consumption message queue according to the network access traffic of each associated power IoT terminal, and determine the risk characteristic value of the network behavior of the multi-threaded consumption message queue.
在本实施例中,多线程消费消息队列可以理解为多线程且高并发的网络访问流量构成的队列。网络行为可以理解为用于进行网络访问的行为,例如API访问或终端账号登录等。风险特征值可以理解为用于表征网络行为中蕴含着攻击风险的特征值,如可以包括源地址、访问目的地址、目的端口、网络访问User-Agent及事件类型等。In this embodiment, the multi-threaded consumer message queue can be understood as a queue composed of multi-threaded and highly concurrent network access traffic. Network behavior can be understood as behavior used to access the network, such as API access or terminal account login. Risk feature values can be understood as feature values used to characterize the attack risks contained in network behavior, such as source address, access destination address, destination port, network access User-Agent, and event type.
具体的,处理器可以对各关联电力物联终端的网络访问流量进行流量分析,对多线程高并发接收网络访问流量信息、无效的流量数据清洗、流量数据转换以及流量数据的丰富化,形成分析后的流量数据,并基于分析后的流量数据进行关键字解析,得到其中所包括的数据内容,并从网络日志中提取访问属性,从访问属性以及数据内容中获取表征风险的信息,并按照特定的格式进行封装,形成各网络行为对应的风险特征值。Specifically, the processor can perform traffic analysis on the network access traffic of each associated power IoT terminal, receive network access traffic information of multiple threads with high concurrency, clean invalid traffic data, convert traffic data, and enrich traffic data to form analyzed traffic data, and perform keyword parsing based on the analyzed traffic data to obtain the data content included therein, extract access attributes from the network log, obtain information characterizing the risk from the access attributes and data content, and encapsulate them in a specific format to form risk characteristic values corresponding to each network behavior.
S130、根据各风险特征值及预设权重集进行特征值聚类,识别出多线程消费消息队列中的攻击特征行为。S130: clustering the feature values according to the risk feature values and the preset weight set, and identifying the attack feature behaviors in the multi-threaded consumer message queue.
在本实施例中,预设权重集可以理解为包括不同网络行为的风险特征值所对应的权重的集合,例如风险特征值中包括A、B、C及D,四个参数,网络行为A在风险特征值(A、B、C、D)所对应的预设权重则可以为(a、b、c、d)。攻击特征行为可以理解为危害网络安全的行为。In this embodiment, the preset weight set can be understood as a set of weights corresponding to the risk characteristic values of different network behaviors. For example, the risk characteristic value includes four parameters, A, B, C and D. The preset weight corresponding to the risk characteristic value (A, B, C, D) of network behavior A can be (a, b, c, d). Attack characteristic behavior can be understood as behavior that endangers network security.
具体的,在获取风险特征值之后,需要将单位时间内接收到的网络访问行为聚合,发现单位时间内访问凸起事件,如单位时间内发起异常的URL访问行为定义为DdoS攻击、即攻击者持续从入侵的分布式边缘设备向目标服务器发送数据包流,从而耗尽目标服务器的硬件资源,使其无法再及时处理任何合法请求;单位时间内发起访问某个账号登录同时登录失败的行为则定义为账号暴力破解攻击、即攻击者对物联终端设备发起暴力破解,可能导致设备的数据泄漏、权限账号失陷等问题。如何防护此类风险,处理器可以采用风险特征值聚类算法结合预设权重集,确定每个对象到每个聚类中心的欧式距离,并通过欧式距离确定最终的聚类中心和聚类簇,通过聚类中心以及聚类簇确定出网络访问行为数,通过网络访问行为数以及可容忍阈值来确定该网络访问行为是否为攻击特征行为,进而从多线程消费消息队列的网络访问行为中识别出哪些具有攻击特征行为。Specifically, after obtaining the risk characteristic value, it is necessary to aggregate the network access behaviors received within a unit time and discover the access bulge events within a unit time. For example, the abnormal URL access behavior initiated within a unit time is defined as a DDoS attack, that is, the attacker continuously sends data packet streams from the invaded distributed edge device to the target server, thereby exhausting the hardware resources of the target server and making it unable to process any legitimate requests in time; the behavior of initiating access to a certain account login and failing to log in within a unit time is defined as an account brute force cracking attack, that is, the attacker initiates brute force cracking on the IoT terminal device, which may lead to data leakage of the device, loss of authorized accounts, etc. How to protect against such risks, the processor can use the risk characteristic value clustering algorithm combined with the preset weight set to determine the Euclidean distance from each object to each cluster center, and determine the final cluster center and cluster cluster through the Euclidean distance, determine the number of network access behaviors through the cluster center and cluster cluster, determine whether the network access behavior is an attack characteristic behavior through the number of network access behaviors and the tolerable threshold, and then identify which behaviors have attack characteristic behaviors from the network access behaviors of the multi-threaded consumer message queue.
本发明实施例的技术方案,通过获取关联电力物联终端的网络访问流量;根据各关联电力物联终端的网络访问流量,形成多线程消费消息队列,并确定多线程消费消息队列的网络行为的风险特征值;根据各风险特征值及预设权重集进行特征值聚类,识别出多线程消费消息队列中的攻击特征行为。通过对收发的网络访问流量进行实时采集,并确定对应的风险特征值结合预设权重集进行聚类分析,识别出其中的网络风险攻击行为。实现了对网络风险行为的实时检测,以便于后续及时对网络风险行为进行处置,进而提升了数据传输的安全防护水平,保证了关联电力物联终端的安全性。The technical solution of the embodiment of the present invention is to obtain the network access traffic of the associated power IoT terminals; form a multi-threaded consumption message queue according to the network access traffic of each associated power IoT terminal, and determine the risk characteristic value of the network behavior of the multi-threaded consumption message queue; cluster the characteristic values according to each risk characteristic value and the preset weight set, and identify the attack characteristic behavior in the multi-threaded consumption message queue. By collecting the sent and received network access traffic in real time, and determining the corresponding risk characteristic value and combining it with the preset weight set for cluster analysis, the network risk attack behavior is identified. Real-time detection of network risk behavior is achieved, so that the network risk behavior can be dealt with in a timely manner later, thereby improving the security protection level of data transmission and ensuring the security of the associated power IoT terminals.
作为本实施例一的第一可选实施例,在根据各风险特征值及预设权重集,识别出多线程消费消息队列中的攻击特征行为之后,还包括:As a first optional embodiment of the first embodiment, after identifying the attack characteristic behaviors in the multi-threaded consumption message queue according to each risk characteristic value and the preset weight set, it also includes:
对攻击特征行为进行阻断处理,并对攻击特征行为的风险处置信息进行归档。Block attack characteristic behaviors and archive risk management information of attack characteristic behaviors.
在本实施例中,风险处置信息可以理解为处置该风险时所对应的信息In this embodiment, the risk handling information can be understood as the information corresponding to the handling of the risk.
具体的,当处理器发现存在攻击特征行为之后,一方面需要进行攻击事件的阻断处置,通过对接网络防护设备做时间处置的快速下发,如对接WAF将攻击行为的网路访问IP进行及时的IP封禁,对接防火墙设备将此类IP进行封禁,对接IPS设备将IP以及UA进行封禁,达到及时阻断攻击保护边缘计算设备及终端设备的安全;另外一方面,处理器可以收集攻击特征行为的详细信息,如攻击事件名称、攻击描述、影响范围、处置建议等,通过邮件或者企业消息通讯软件,将此类攻击及时的通知到安全运营人员及业务方的负责人,保护智慧物联系统的整体网络安全。对于已经处置的攻击特征行为,处理器可以收集该攻击特征行为所对应的网络安全事件的时间类型、等级以及影响范围等信息;同时收集此类安全事件的风险描述以及处置措施,对这些信息进行整理和分类,形成风险处置信息,并对风险处置信息进行归档,并将共性的安全事件进行特征抽取,如访问阈值反哺到算法库中,对归档的风险处置信息进行定期的更新和维护,以确保信息的准确性和时效性。Specifically, when the processor finds the existence of attack characteristic behaviors, on the one hand, it needs to block and deal with the attack events, and quickly issue time-based disposal by connecting to network protection devices, such as connecting to WAF to timely ban the network access IP of the attack behavior, connecting to firewall devices to ban such IPs, and connecting to IPS devices to ban IPs and UAs, so as to timely block the attack and protect the security of edge computing devices and terminal devices; on the other hand, the processor can collect detailed information on attack characteristic behaviors, such as attack event name, attack description, impact range, disposal suggestions, etc., and notify the security operation personnel and the person in charge of the business party of such attacks in a timely manner through email or enterprise messaging software to protect the overall network security of the smart IoT system. For the attack characteristic behaviors that have been dealt with, the processor can collect information such as the time type, level, and impact range of the network security events corresponding to the attack characteristic behaviors; at the same time, collect risk descriptions and disposal measures of such security events, organize and classify these information, form risk disposal information, and archive the risk disposal information, and extract features of common security events, such as access thresholds fed back to the algorithm library, and regularly update and maintain the archived risk disposal information to ensure the accuracy and timeliness of the information.
本实施例一的第一可选实施例,通过这样的设置,有效且及时处置阻断攻击从而降低网络安全风险,提高了传输的安全性。并且通过归档为后续进行风险识别提供了改进基础。In the first optional embodiment of the first embodiment, such a setting is used to effectively and timely handle blocking attacks, thereby reducing network security risks and improving transmission security. In addition, archiving provides an improved basis for subsequent risk identification.
由于物联网的终端设备所在环境复杂多样,大部分的设备部署在无人监控的环境中,因此面临中多重安全问题,比如终端设备可能会被冒名顶替、伪造复制终端设备、设备入侵等问题,对于以上问题需要对终端设备进行身份认证以实现可信接入。Since the environments where IoT terminal devices are located are complex and diverse, and most of the devices are deployed in unmonitored environments, they face multiple security issues. For example, terminal devices may be impersonated, forged and copied, and devices may be invaded. For the above issues, terminal devices need to be authenticated to achieve trusted access.
作为本实施例一的第二可选实施例,在上述实施例的基础上,还包括:As a second optional embodiment of the first embodiment, based on the above embodiment, it also includes:
在接收到待接入设备的接入请求时,根据预设私钥对接入请求进行解密,得到解密认证信息,并基于解密认证信息对待接入设备进行接入认证。When receiving an access request from a device to be accessed, the access request is decrypted according to a preset private key to obtain decrypted authentication information, and access authentication is performed on the device to be accessed based on the decrypted authentication information.
在本实施例中,待接入设备可以理解为需要与处理器进行数据传输的终端设备。接入请求可以理解为用于建立待接入设备与处理器之间的数据传输关系的请求。解密认证信息可以理解为解密出的用于认证待接入设备的信息,如可以包括时间参数以及设备串码等。In this embodiment, the device to be accessed can be understood as a terminal device that needs to perform data transmission with the processor. The access request can be understood as a request for establishing a data transmission relationship between the device to be accessed and the processor. The decrypted authentication information can be understood as the decrypted information used to authenticate the device to be accessed, such as time parameters and device serial codes.
具体的,待接入设备申请加入的时候采用身份认证及信息认证,待接入设备接入处理器的时候可以发起接入请求,将时间参数以及设备串码进行非对称公钥加密,处理器在接收到接入请求后,对于接收到的请求信息使用私钥进行解密,如果解密后无法获取时间参数及设备串码,则证明待接入设备在公钥加密时候未按照约定参数进行组装,认证失败,待接入设备存在冒名顶替。当通过私钥解密获取到时间参数以及设备串码所形成的解密认证信息时,处理器可以将对设备串码进行核对,确定设备串码的正确性,若正确且合法,则完成接入认证,处理器将待接入设备接入,否则认证失败。如果认证失败,则处理器会对该待接入设备进行拦截并加入黑名单中,同时发送预警信息至相关平台,从而及时避免系统遭到恶意的入侵访问。Specifically, when the device to be connected applies to join, identity authentication and information authentication are used. When the device to be connected accesses the processor, it can initiate an access request and perform asymmetric public key encryption on the time parameters and the device serial code. After receiving the access request, the processor uses the private key to decrypt the received request information. If the time parameters and the device serial code cannot be obtained after decryption, it proves that the device to be connected was not assembled according to the agreed parameters during the public key encryption, the authentication fails, and the device to be connected is impersonated. When the decrypted authentication information formed by the time parameters and the device serial code is obtained through private key decryption, the processor can check the device serial code to determine the correctness of the device serial code. If it is correct and legal, the access authentication is completed and the processor connects the device to be connected, otherwise the authentication fails. If the authentication fails, the processor will intercept the device to be connected and add it to the blacklist, and send a warning message to the relevant platform, so as to timely prevent the system from being invaded by malicious access.
本实施例一的第二可选实施例,通过这样的设置,防止待接入设备冒名顶替以及伪造复制等安全风险,采用身份认证及信息认证方式、数字签名加密、串码认证确保物联终端可信的接入。The second optional embodiment of the first embodiment of the present invention, through such a setting, prevents security risks such as impersonation and forgery and copying of the device to be connected, and adopts identity authentication and information authentication methods, digital signature encryption, and serial code authentication to ensure reliable access of the Internet of Things terminal.
实施例二Embodiment 2
图2为本发明实施例二提供的一种电力物联终端网络风险行为识别方法的流程图,本实施例是对上述实施例的进一步细化。如图2所示,该方法包括:FIG2 is a flow chart of a method for identifying network risk behaviors of power IoT terminals provided in the second embodiment of the present invention. This embodiment is a further refinement of the above embodiment. As shown in FIG2 , the method includes:
S201、获取关联电力物联终端的网络访问流量。S201. Obtain network access traffic of associated power IoT terminals.
S202、对各关联电力物联终端的网络访问流量进行镜像,得到镜像流量。S202: Mirror the network access traffic of each associated power IoT terminal to obtain mirrored traffic.
在本实施例中,镜像流量可以理解为对网络访问流量进行复制后所得到的。In this embodiment, the mirrored traffic can be understood as traffic obtained by duplicating the network access traffic.
具体的,处理器可以通过对网络交换机的接口的网络访问流量做镜像复制,得到镜像流量,镜像流量对于业务的访问无任何影响。得到镜像流量后,处理器可以将网络访问流量的原始日志异步传输到后端的数据结构化分级集群进行存储。Specifically, the processor can obtain mirrored traffic by mirroring the network access traffic of the interface of the network switch, and the mirrored traffic has no impact on the access to the service. After obtaining the mirrored traffic, the processor can asynchronously transmit the original log of the network access traffic to the back-end data structured hierarchical cluster for storage.
S203、将各镜像流量传输至消息队列集群中对应线程的消费队列中,形成多线程消息消费队列。S203: Transmit each mirrored traffic to the consumption queue of the corresponding thread in the message queue cluster to form a multi-threaded message consumption queue.
在本实施例中,消息队列集群可以理解为由多个线程的消费队列所构成的集群。In this embodiment, the message queue cluster can be understood as a cluster composed of consumer queues of multiple threads.
具体的,处理器可以将各镜像流量复制同步传输至消息队列集群中对应线程的消费队列中,如每一个类型的业务所对应不同的消费队列,形成各自对应的多线程消息消费队列,以便进行流量的内容分析。Specifically, the processor can copy and synchronously transmit each mirrored traffic to the consumption queue of the corresponding thread in the message queue cluster, such as different consumption queues corresponding to each type of business, to form their own corresponding multi-threaded message consumption queues, so as to perform traffic content analysis.
S204、根据各多线程消息消费队列,确定满足预设时间条件的网络行为的风险特征值。S204. Determine risk characteristic values of network behaviors that meet preset time conditions according to each multi-threaded message consumption queue.
在本实施例中,预设时间条件可以理解为用于判断攻击事件的设定时长范围,例如设定一个单位时间,预设时间条件即为这个单位时间,例如可以为10分钟内。In this embodiment, the preset time condition can be understood as a set time range for determining an attack event. For example, a unit time is set, and the preset time condition is the unit time, for example, it can be within 10 minutes.
具体的,处理器可以对各多线程消息消费队列中所包括的网络访问流量进行无效流量数据的清洗、流量数据的转换以及流量数的丰富化,再对处理后的网络访问流量按照预设时间条件进行解析,对解析后的数据提取风险特征值。Specifically, the processor can clean invalid traffic data, convert traffic data, and enrich traffic numbers for the network access traffic included in each multi-threaded message consumption queue, and then parse the processed network access traffic according to preset time conditions, and extract risk feature values from the parsed data.
进一步地,在上述实施例的基础上,根据各多线程消息消费队列,确定满足预设时间条件的网络行为的风险特征值的步骤可以优化为:Further, based on the above embodiment, the step of determining the risk characteristic value of the network behavior that meets the preset time condition according to each multi-threaded message consumption queue can be optimized as follows:
a1、从各多线程消息消费队列中读取满足预设读取条件的待处理流量数据。a1. Read the pending traffic data that meets the preset reading conditions from each multi-threaded message consumption queue.
在本实施例中,预设读取条件可以理解为用于判断多线程消息消费队列中的网络流量数据是否可以读取的条件,如网络流量数据的Topic为IoT_net_flow消息。待处理流量数据可以理解为可以进行处理的数据。In this embodiment, the preset reading condition can be understood as a condition for determining whether the network flow data in the multi-threaded message consumption queue can be read, such as the Topic of the network flow data is IoT_net_flow message. The flow data to be processed can be understood as data that can be processed.
具体的,首先采用多线程的方法,高并发的处理多线程消息消费队列中的各网络流量数据消息,从各多线程消息消费队列中读取满足预设读取条件的网络流量数据作为待处理流量数据,如读取Topic为IoT_net_flow消息,读取之后的待处理流量数据消息处于已消费状态,从而保证数据处理的一致性。Specifically, a multi-threaded method is first adopted to process each network traffic data message in a multi-threaded message consumption queue with high concurrency, and network traffic data that meets the preset reading conditions is read from each multi-threaded message consumption queue as traffic data to be processed. For example, if the Topic is read as IoT_net_flow message, the traffic data message to be processed after reading is in a consumed state, thereby ensuring the consistency of data processing.
b1、对待处理流量数据进行数据清洗以及格式标准化处理,得到中间流量数据。b1. Perform data cleaning and format standardization on the traffic data to be processed to obtain intermediate traffic data.
在本实施例中,中间流量数据可以理解为清洗且标准化处理后的流量数据。In this embodiment, the intermediate flow data can be understood as flow data after cleaning and standardization.
具体的,读取之后的待处理流量数据由于数据形式各异不统一,处理器可以对这些待处理流量数据进行再次加工清洗,这个加工过程包括:消除失效数据、错误数据以及过期数据等保持数据的原子性。由于采集到的网络流量数据的某些公共属性参数格式不同,如:时间参数格式、来源参数格式等,处理器可以对数据清洗后得到的数据的这些公共属性进行标准化规整,形成统一的辨识度较高的数据信息。Specifically, the processor can reprocess and clean the traffic data to be processed after reading because the data formats are different and not uniform. This processing process includes: eliminating invalid data, erroneous data, and expired data to maintain the atomicity of the data. Since some common attribute parameter formats of the collected network traffic data are different, such as: time parameter format, source parameter format, etc., the processor can standardize and regularize these common attributes of the data obtained after data cleaning to form unified data information with high recognition.
c1、基于采集到的公共参数信息对中间流量数据进行处理,得到目标流量数据。c1. Process the intermediate flow data based on the collected public parameter information to obtain the target flow data.
在本实施例中,公共参数信息可以理解为用于所有接口调用都需要用到的参数,如采集的数据源、采集时间以及存储时间等。目标流量数据可以理解为丰富了公共参数信息后的流量数据。In this embodiment, the public parameter information can be understood as parameters required for all interface calls, such as the data source, collection time, and storage time of the collection, etc. The target flow data can be understood as the flow data enriched with the public parameter information.
具体的,中间流量数据已具备较高的辨识度,但是其中可能缺少后期使用的公共参数信息,如:采集的数据源、采集时间以及存储时间等,因此处理器可以将这些公共参数信息进行丰富化,得到目标流量数据。便于数据更好的追溯、格式标准化统一。Specifically, the intermediate traffic data has a high degree of recognition, but it may lack public parameter information used later, such as the source of the data, the time of collection, and the storage time. Therefore, the processor can enrich these public parameter information to obtain the target traffic data, which is convenient for better data traceability and standardized format.
d1、对目标流量数据进行解析,确定目标流量数据所对应的网络行为的风险特征值。d1. Analyze the target traffic data and determine the risk characteristic value of the network behavior corresponding to the target traffic data.
具体的,处理器可以对目标流量数据进行解析,确定解析后的数据内容,并从中提取相对应的风险特征值。Specifically, the processor may parse the target traffic data, determine the content of the parsed data, and extract corresponding risk feature values therefrom.
其中,在上述实施例的基础上,可以将对目标流量数据进行解析,确定目标流量数据所对应的网络行为的风险特征值的步骤优化为:Among them, based on the above embodiment, the step of parsing the target traffic data and determining the risk characteristic value of the network behavior corresponding to the target traffic data can be optimized as follows:
对目标流量数据进行解析,得到目标格式下的解析数据;对目标流量数据所对应网络日志中的访问属性进行网络行为分析,确定目标流量数据的行为特征信息;根据行为特征信息以及解析数据中的提取目标信息,得到与目标流量数据所对应的网络行为的风险特征值。Parse the target traffic data to obtain parsed data in the target format; perform network behavior analysis on the access attributes in the network log corresponding to the target traffic data to determine the behavioral feature information of the target traffic data; obtain the risk feature value of the network behavior corresponding to the target traffic data based on the behavioral feature information and the extracted target information in the parsed data.
在本实施例中,目标格式可以理解为设定的格式条件,如可以为JSON格式。解析数据可以理解为解析后所得到的数据内容。网络日志可以理解为个人或用户在网络上记录的信息。访问属性可以理解为表征着网络访问行为的属性信息。行为特征信息可以理解为表征网络用户的行为模式和攻击特征的信息。In this embodiment, the target format can be understood as a set format condition, such as JSON format. Parsed data can be understood as the data content obtained after parsing. Network logs can be understood as information recorded by an individual or user on the network. Access attributes can be understood as attribute information that characterizes network access behavior. Behavioral feature information can be understood as information that characterizes the behavior pattern and attack characteristics of network users.
具体的,处理器可以对目标流量数据进行解析,得到目标格式下的解析数据,如得到JSON格式下的解析数据,解析数据的数据内容包括网络访问主机信息、内容长度、Agent、连接状态、源地址、网络访问目的地址、目的端口、网络访问类型以及网络访问的User-Agent等。物联网的网络攻击行为往往隐藏于正常的网络访问行为之中,如何能从正常的网络访问中发现这些攻击行为以及攻击事件,处理器可以首先从网络日志中提取访问属性,通过网络行为分析推断出网络用户的行为模式和攻击特征,得到目标流量数据对应的行为特征信息。处理器可以从解析数据中通过Key-Value获取网络访问源地址、访问目的地址、目的端口、网络访问User-Agent以及事件类型信息,处理器可以将此类信息组装成Str格式下的风险特征值并放入缓存信息中,为后续风险特征值聚类操作提供前置资源。Specifically, the processor can parse the target traffic data to obtain the parsed data in the target format, such as the parsed data in JSON format. The data content of the parsed data includes network access host information, content length, Agent, connection status, source address, network access destination address, destination port, network access type, and network access User-Agent. The network attack behavior of the Internet of Things is often hidden in the normal network access behavior. How can these attack behaviors and attack events be discovered from normal network access? The processor can first extract the access attributes from the network log, infer the network user's behavior pattern and attack characteristics through network behavior analysis, and obtain the behavior feature information corresponding to the target traffic data. The processor can obtain the network access source address, access destination address, destination port, network access User-Agent, and event type information from the parsed data through Key-Value. The processor can assemble such information into risk feature values in Str format and put them into cache information to provide pre-resources for subsequent risk feature value clustering operations.
S205、对各风险行为特征进行分类,确定相同字符串下的候选特征信息。S205: Classify each risk behavior feature and determine candidate feature information under the same character string.
在本实施例中,候选特征信息可以理解为分类后的风险特征值。In this embodiment, the candidate feature information can be understood as the classified risk feature value.
具体的,当处理器得到风险特征值之后,需要将预设时间条件内接收到的网络访问行为进行聚合,发现预设时间条件内访问凸起事件,如预设时间条件内发起异常的URL访问行为定义为DdoS攻击、即攻击者持续从入侵的分布式边缘设备向目标服务器发送网络访问流量,从而耗尽目标服务器的硬件资源,使其无法再及时处理任何合法请求;单位时间内发起访问某个账号登录同时登录失败的行为则定义为账号暴力破解攻击、即攻击者对物联终端设备发起暴力破解,可能导致设备的数据泄漏、权限账号失陷等问题。如何防护此类风险,采用风险特征值聚类算法,从网络访问行为中识别出哪些具有攻击特征行为。处理器首先可以获取风险特征值:源地址、访问目的地址、目的端口、网络访问User-Agent、事件类型;然后将特征值的Str进行缓存存储,得到候选特征信息,此过程中如果有相同的Str字符串,则合并为同一个候选特征信息。Specifically, after the processor obtains the risk feature value, it needs to aggregate the network access behaviors received within the preset time conditions to find the access bulge events within the preset time conditions. For example, the abnormal URL access behavior initiated within the preset time conditions is defined as a DdoS attack, that is, the attacker continuously sends network access traffic from the invaded distributed edge device to the target server, thereby exhausting the hardware resources of the target server and making it unable to process any legitimate requests in time; the behavior of initiating access to a certain account login and failing to log in within a unit time is defined as an account brute force attack, that is, the attacker initiates brute force cracking on the IoT terminal device, which may cause data leakage of the device, loss of authorized accounts, etc. How to protect against such risks, use the risk feature value clustering algorithm to identify which behaviors have attack characteristics from the network access behavior. The processor can first obtain the risk feature value: source address, access destination address, destination port, network access User-Agent, event type; then cache and store the feature value Str to obtain candidate feature information. If there is an identical Str string in this process, it will be merged into the same candidate feature information.
S206、根据各候选特征信息及预设权重集进行特征值聚类,确定最终聚类中心以及簇种类信息。S206: Clustering feature values according to each candidate feature information and a preset weight set to determine a final cluster center and cluster type information.
在本实施例中,最终聚类中心可以理解为确定出所属的聚类中心类别。簇种类信息可以理解为最终确定的簇的个数。In this embodiment, the final cluster center can be understood as the determined cluster center category. The cluster type information can be understood as the number of clusters finally determined.
具体的,处理器可以按照预设时间条件所对应的时间顺序,依次根据各候选特征信息及预设权重集进行特征值聚类,得到每个对象到聚类中心基于对应的权重的欧式距离,知道聚类中心不再发生变化时,在接下来的另一设定时间内获取的风险特征值计算到各聚类中心的欧式距离更新聚类中心,并输出最终聚类中心以及簇种类信息。Specifically, the processor can cluster the feature values according to the time sequence corresponding to the preset time conditions, and in turn according to the candidate feature information and the preset weight set, to obtain the Euclidean distance of each object to the cluster center based on the corresponding weight. When the cluster center no longer changes, the risk feature value obtained within another set time is calculated to update the cluster center with the Euclidean distance to each cluster center, and the final cluster center and cluster type information are output.
进一步地,在上述实施例的基础上,可以将根据各候选特征信息及预设权重集进行特征值聚类,确定最终聚类中心以及簇种类信息的步骤优化为:Further, based on the above embodiment, the step of clustering the feature values according to each candidate feature information and the preset weight set and determining the final cluster center and cluster type information can be optimized as follows:
根据满足预设初始时间条件的候选特征信息,初始化设定数量的初始聚类中心;根据候选特征信息中确定满足第一时间条件的目标特征信息串以及预设权重集,确定目标特征信息串中每个对象到各初始聚类中心的欧式距离;根据各欧式距离,对初始聚类中心进行更新,得到中间聚类中心;当各中间聚类中心满足中心稳定条件时,根据满足第二时间条件的特征信息串及中间聚类中心确定最终聚类中心以及簇种类信息;当各中间聚类中心不满足中心稳定条件时,将中间聚类中心作为更新后的初始聚类中心,并返回欧式距离的确定步骤。Initialize a set number of initial cluster centers according to candidate feature information that meets the preset initial time condition; determine the Euclidean distance from each object in the target feature information string to each initial cluster center according to the target feature information string that meets the first time condition and the preset weight set in the candidate feature information; update the initial cluster center according to each Euclidean distance to obtain the intermediate cluster center; when each intermediate cluster center meets the center stability condition, determine the final cluster center and cluster type information according to the feature information string that meets the second time condition and the intermediate cluster center; when each intermediate cluster center does not meet the center stability condition, use the intermediate cluster center as the updated initial cluster center and return to the step of determining the Euclidean distance.
在本实施例中,预设初始时间条件可以理解为用于更新聚类中心的时间范围,比预设时间条件小,例如预设时间条件为13s,则预设初始时间条件可以为5s。第一时间条件可以理解为用于划分聚类对象的时间条件,例如2分钟内的每个风险特征值作为每一个对象。欧式距离可以理解为每个对象到每个聚类中心的距离。目标特征信息串可以理解为第一时间条件内所有候选特征信息按时间先后所构成特征信息串。初始聚类中心可以理解为初始化后得到的聚类中心。中间聚类中心可以理解为更新后的聚类中心。中心稳定条件可以理解为用于判断聚类中心变化幅度是否稳定的条件。第二时间条件可以理解为用于确定最终聚类中心以及簇种类信息的时间条件,如可以为3分钟。In this embodiment, the preset initial time condition can be understood as the time range for updating the cluster center, which is smaller than the preset time condition. For example, if the preset time condition is 13s, the preset initial time condition can be 5s. The first time condition can be understood as the time condition for dividing the cluster objects, for example, each risk feature value within 2 minutes is regarded as each object. The Euclidean distance can be understood as the distance from each object to each cluster center. The target feature information string can be understood as the feature information string composed of all candidate feature information in the first time condition in chronological order. The initial cluster center can be understood as the cluster center obtained after initialization. The intermediate cluster center can be understood as the updated cluster center. The center stability condition can be understood as the condition for judging whether the change range of the cluster center is stable. The second time condition can be understood as the time condition for determining the final cluster center and cluster type information, such as 3 minutes.
具体的,处理器首先可以通过步骤a、根据满足预设初始时间条件的候选特征信息,初始化设定数量的初始聚类中心,例如,初始化k个初始聚类中心:每个网络行为C都对应有5各候选特征值,即C的属性={源地址,访问目的地址,目的端口,网络访问User-Agent,事件类型};则k个聚类中心={C1,C2,C3,C4,C5……,Ck}。然后处理器可以通过步骤b、计算每一个对象到每一个聚类中心的欧氏距离,即在上一步的前提下,处理器可以根据候选特征信息中确定满足第一时间条件的目标特征信息串,例如未来的2分钟内物联网的访问行为中的目标特征信息串作为每一个对象,进而结合预设权重集,确定目标特征信息串中每个对象到各初始聚类中心的欧式距离,如可以通过下述公式确定欧式距离dis(Xi,Cj):Specifically, the processor can first initialize a set number of initial cluster centers according to the candidate feature information that meets the preset initial time condition through step a, for example, initialize k initial cluster centers: each network behavior C corresponds to 5 candidate feature values, that is, the attribute of C = {source address, access destination address, destination port, network access User-Agent, event type}; then k cluster centers = {C1, C2, C3, C4, C5..., Ck}. Then the processor can calculate the Euclidean distance from each object to each cluster center through step b, that is, under the premise of the previous step, the processor can determine the target feature information string that meets the first time condition according to the candidate feature information, for example, the target feature information string in the access behavior of the Internet of Things within the next 2 minutes as each object, and then combine the preset weight set to determine the Euclidean distance from each object in the target feature information string to each initial cluster center, such as the Euclidean distance dis(X i ,C j ) can be determined by the following formula:
其中,Wt表示第t个属性的权重:当t=1时代表源地址的权重;当t=2时代表目的地址的权重;当t=3时代表目的端口的权重;当t=4时代表访问者的User-Agent的权重。Xi表示第i个对象,Cj表示第k个聚类中心,Xit表示第i个对象的第t个属性,Ckt表示第k个聚类中心的第t个属性。Where Wt represents the weight of the t-th attribute: when t=1, it represents the weight of the source address; when t=2, it represents the weight of the destination address; when t=3, it represents the weight of the destination port; when t=4, it represents the weight of the visitor's User-Agent. Xi represents the ith object, Cj represents the k-th cluster center, Xit represents the t-th attribute of the ith object, and Ckt represents the t-th attribute of the k-th cluster center.
以上4种属性的权重按照事件类型进行权重划分,所有事件类型的权重均记录于预设权重集中,例如如果是暴力破解则相应的权重为Wt={0.2,0.4,0.3,0.1}即不同的源地址或者不同的UA对于同一个地址相似的端口发起访问,则认为欧式距离较近;如果是API遍历则响应的权重为Wt={0.3,0.2,0.3,0.2}即相似的源地址或者相近的UA对于不同的地址相同的端口发起访问,则认为欧式距离较近。The weights of the above four attributes are divided according to the event type. The weights of all event types are recorded in the preset weight set. For example, if it is a brute force cracking, the corresponding weight is W t ={0.2, 0.4, 0.3, 0.1}, that is, different source addresses or different UAs initiate access to similar ports of the same address, and the Euclidean distance is considered to be close; if it is an API traversal, the response weight is W t ={0.3, 0.2, 0.3, 0.2}, that is, similar source addresses or similar UAs initiate access to the same port of different addresses, and the Euclidean distance is considered to be close.
处理器进一步可以通过步骤c、在确定出使用每个聚类的样本均值更新聚类中心,即使用上述步骤b中的对象重新更新k个聚类中心,得到中间聚类中心。The processor may further, through step c, determine to use the sample mean of each cluster to update the cluster center, that is, use the object in the above step b to re-update the k cluster centers to obtain the intermediate cluster center.
步骤d、重复步骤b、c,直到中间聚类中心满足中心稳定条件不再发生变化时,根据满足第二时间条件的特征信息串及所述中间聚类中心确定最终聚类中心以及簇种类信息,即在接下来的3分钟内继续获取物联网中的网络访问行为,将此行为中的风险特征值作为对象计算此对象到k个聚类中心的欧式距离,然后再次更新聚类中的k值,并输出最终聚类中心和簇种类信息,即k个簇划分。Step d, repeat steps b and c until the intermediate cluster center meets the center stability condition and no longer changes, determine the final cluster center and cluster type information based on the feature information string that meets the second time condition and the intermediate cluster center, that is, continue to obtain network access behavior in the Internet of Things within the next 3 minutes, take the risk feature value in this behavior as the object to calculate the Euclidean distance from this object to the k cluster centers, then update the k value in the cluster again, and output the final cluster center and cluster type information, that is, k cluster divisions.
S207、根据最终聚类中心以及簇种类信息,确定网络访问行为数信息。S207: Determine the number of network access behaviors according to the final cluster center and cluster type information.
在本实施例中,网络访问行为数信息可以理解为用于表征每类网络访问行为的数量。In this embodiment, the network access behavior number information can be understood as the number used to characterize each type of network access behavior.
具体的,处理器可以获取单位时间内(如10分钟内)的网络访问行为通过包括最终聚类中心以及簇种类信息的K-means聚合得到网络访问行为数,即AC=Bi/Ti,其中,AC为单位时间内聚合出来的网络访问行为数;Bi为单位时间内所有的聚类簇;Ti为单位时间。Specifically, the processor can obtain the network access behavior within a unit time (such as within 10 minutes) through K-means aggregation including the final cluster center and cluster type information to obtain the number of network access behaviors, that is, AC = Bi/Ti, where AC is the number of network access behaviors aggregated within a unit time; Bi is all the clustering clusters within a unit time; Ti is the unit time.
S208、根据网络访问行为数信息所属目标网络访问流量的目标风险特征值,确定网络访问行为数信息所对应的网络访问行为类别。S208: Determine the network access behavior category corresponding to the network access behavior number information according to the target risk characteristic value of the target network access traffic to which the network access behavior number information belongs.
在本实施例中,网络访问行为类别可以理解为网络访问行为的访问类型,如为终端账号登录等。In this embodiment, the network access behavior category can be understood as the access type of the network access behavior, such as terminal account login and the like.
具体的,由于网络访问行为数信息是通过网络访问流量所对应的风险特征值计算得到的,则处理器可以查找网络访问行为数信息所属的目标网络访问流量,进而确定出目标网络访问流量所对应的目标风险特征值,进而确定出目标风险特征值中表征类别的项,得到网络访问行为数信息所对应的网络访问行为类别。Specifically, since the network access behavior number information is calculated through the risk characteristic value corresponding to the network access traffic, the processor can search for the target network access traffic to which the network access behavior number information belongs, and then determine the target risk characteristic value corresponding to the target network access traffic, and then determine the item representing the category in the target risk characteristic value, and obtain the network access behavior category corresponding to the network access behavior number information.
S209、根据网络访问行为数信息、网络访问行为类别及预设容忍阈值列表,判断目标网络访问流量所对应的网络访问行为是否为攻击特征行为,得到网络访问行为的识别结果。S209: According to the network access behavior number information, network access behavior category and preset tolerance threshold list, determine whether the network access behavior corresponding to the target network access traffic is an attack characteristic behavior, and obtain the identification result of the network access behavior.
在本实施例中,预设容忍阈值列表可以理解为容忍不同类型网络攻击行为的阈值。识别结果可以理解为用于表示网络访问行为是否为攻击行为的识别结果。In this embodiment, the preset tolerance threshold list can be understood as the thresholds for tolerating different types of network attack behaviors. The identification result can be understood as the identification result used to indicate whether the network access behavior is an attack behavior.
具体的,处理器可以根据网络访问行为类别在预设容忍阈值列表中进行查找,确定该网络访问行为类别所对应的容忍阈值,进而将网络访问行为数信息与该容忍阈值进行比对,当网络访问行为数信息大于或等于该容忍阈值时,判断目标网络访问流量所对应的网络访问行为是攻击特征行为,则网络访问行为的识别结果为其对应的网络攻击行为所属的类别,反之则不是。Specifically, the processor can search in the preset tolerance threshold list according to the network access behavior category, determine the tolerance threshold corresponding to the network access behavior category, and then compare the network access behavior number information with the tolerance threshold. When the network access behavior number information is greater than or equal to the tolerance threshold, it is judged that the network access behavior corresponding to the target network access traffic is an attack characteristic behavior, and the identification result of the network access behavior is the category to which the corresponding network attack behavior belongs, otherwise it is not.
示例性的,如果AC的数值为1000且网络访问行为类别为终端账号登录、同时登录的回参是失败状态,此类的登录行为单位时间内的可容忍阈值为10次,以此可以推断出此网络访问行为存在对于某个终端设备的账号暴力破解的网络攻击行为。如果AC的数据值为1500且网络访问行为的类型为API访问、同时存在大量的API返回失败状态,此类的API访问行为单位时间内的可容忍值为100,以此可以推断出此网络访问行为存在对于边缘计算系统的API遍历攻击行为。For example, if the value of AC is 1000 and the network access behavior category is terminal account login, and the login return parameter is a failure state, the tolerable threshold of this type of login behavior per unit time is 10 times, from which it can be inferred that this network access behavior has a network attack behavior of brute force cracking of the account of a certain terminal device. If the data value of AC is 1500 and the type of network access behavior is API access, and there are a large number of APIs returning a failure state, the tolerable value of this type of API access behavior per unit time is 100, from which it can be inferred that this network access behavior has an API traversal attack behavior on the edge computing system.
S210、根据各识别结果,确定多线程消费消息队列中的攻击特征行为。S210: Determine attack feature behaviors in the multi-threaded consumer message queue according to each identification result.
具体的,处理器可以将各识别结果作为多线程消费消息队列中的攻击特征行为。Specifically, the processor may use each identification result as an attack feature behavior in a multi-threaded consumption message queue.
本发明实施例的技术方案,通过获取关联电力物联终端的网络访问流量,并根据网络访问流量生成多线程消息消费队列,对满足预设读取条件的待处理流量数据进行数据清洗、格式标准化以及公共参数信息丰富化的处理,得到格式统一标准化且辨识度较高的的目标流量数据,通过对目标流量数据进行解析,提取目标格式下的解析数据,并对网络日志中的访问属性进行网络行为分析得到行为特征信息,基于行为特征信息及解析数据中提取的目标信息,生成风险特征值。通过风险特征值为特征值聚类提供了前置资源。通过预设权重集来校正不同类别下的风险特征值所占权重,进而通过预设权重集以及风险特征值,来确定欧式距离,通过欧式距离对聚类中心进行更新,得到中间聚类中心,进而通过中间聚类中心确定出最终聚类中心以及簇种类信息,通过最终聚类中心以及簇种类信息确定网络防卫行为数信息,根据网络访问行为数信息及对应的网络访问行为类别以及预设容忍阈值列表来判断网络访问行为是否为攻击特征行为,得到识别结果。实现了对网络风险行为的实时检测,提高了识别的准确率以及识别的网络攻击行为对应的类别,以便于后续及时对网络风险行为进行处置,进而提升了数据传输的安全防护水平,保证了关联电力物联终端的安全性。The technical solution of the embodiment of the present invention obtains the network access flow of the associated power Internet of Things terminal, generates a multi-threaded message consumption queue according to the network access flow, performs data cleaning, format standardization and public parameter information enrichment processing on the to-be-processed flow data that meets the preset reading conditions, obtains the target flow data with unified and standardized format and high recognition, extracts the parsed data under the target format by parsing the target flow data, and performs network behavior analysis on the access attributes in the network log to obtain behavior feature information, and generates risk feature values based on the behavior feature information and the target information extracted from the parsed data. The risk feature value provides a pre-resource for feature value clustering. The weights of the risk feature values under different categories are corrected by a preset weight set, and then the Euclidean distance is determined by the preset weight set and the risk feature value, and the cluster center is updated by the Euclidean distance to obtain the intermediate cluster center, and then the final cluster center and cluster type information are determined by the intermediate cluster center, and the network defense behavior number information is determined by the final cluster center and cluster type information, and the network access behavior number information and the corresponding network access behavior category and the preset tolerance threshold list are used to determine whether the network access behavior is an attack feature behavior, and obtain the identification result. It realizes real-time detection of network risk behaviors, improves the recognition accuracy and the corresponding categories of identified network attack behaviors, so as to facilitate the subsequent timely disposal of network risk behaviors, thereby improving the security protection level of data transmission and ensuring the security of related power Internet of Things terminals.
实施例三Embodiment 3
图3为本发明实施例三提供的一种电力物联终端网络风险行为识别装置的结构示意图。如图3所示,该装置包括:流量获取模块31、特征值确定模块32以及行为确定模块33。Fig. 3 is a schematic diagram of the structure of a device for identifying network risk behavior of a power IoT terminal provided in Embodiment 3 of the present invention. As shown in Fig. 3 , the device includes: a flow acquisition module 31 , a feature value determination module 32 , and a behavior determination module 33 .
流量获取模块31,用于获取关联电力物联终端的网络访问流量;A traffic acquisition module 31 is used to acquire network access traffic associated with a power IoT terminal;
特征值确定模块32,用于根据各所述关联电力物联终端的网络访问流量,形成多线程消费消息队列,并确定所述多线程消费消息队列的网络行为的风险特征值;A characteristic value determination module 32, configured to form a multi-threaded consumption message queue according to the network access flow of each of the associated power IoT terminals, and determine a risk characteristic value of the network behavior of the multi-threaded consumption message queue;
行为确定模块33,用于根据各所述风险特征值及预设权重集进行特征值聚类,识别出所述多线程消费消息队列中的攻击特征行为。The behavior determination module 33 is used to perform feature value clustering according to each of the risk feature values and a preset weight set, and identify attack feature behaviors in the multi-threaded consumption message queue.
本发明实施例的技术方案,通过获取关联电力物联终端的网络访问流量;根据各关联电力物联终端的网络访问流量,形成多线程消费消息队列,并确定多线程消费消息队列的网络行为的风险特征值;根据各风险特征值及预设权重集进行特征值聚类,识别出多线程消费消息队列中的攻击特征行为。通过对收发的网络访问流量进行实时采集,并确定对应的风险特征值结合预设权重集进行聚类分析,识别出其中的网络风险攻击行为。实现了对网络风险行为的实时检测,以便于后续及时对网络风险行为进行处置,进而提升了数据传输的安全防护水平,保证了关联电力物联终端的安全性。The technical solution of the embodiment of the present invention is to obtain the network access traffic of the associated power IoT terminals; form a multi-threaded consumption message queue according to the network access traffic of each associated power IoT terminal, and determine the risk characteristic value of the network behavior of the multi-threaded consumption message queue; cluster the characteristic values according to each risk characteristic value and the preset weight set, and identify the attack characteristic behavior in the multi-threaded consumption message queue. By collecting the sent and received network access traffic in real time, and determining the corresponding risk characteristic value and combining it with the preset weight set for cluster analysis, the network risk attack behavior is identified. Real-time detection of network risk behavior is achieved, so that the network risk behavior can be dealt with in a timely manner later, thereby improving the security protection level of data transmission and ensuring the security of the associated power IoT terminals.
进一步地,所述特征值确定模块32包括:Furthermore, the feature value determination module 32 includes:
流量镜像单元,用于对各所述关联电力物联终端的网络访问流量进行镜像,得到镜像流量;A traffic mirroring unit, used for mirroring the network access traffic of each of the associated power IoT terminals to obtain mirrored traffic;
队列形成单元,用于将各所述镜像流量传输至消息队列集群中对应线程的消费队列中,形成多线程消息消费队列;A queue forming unit, used for transmitting each mirrored traffic to a consumption queue of a corresponding thread in a message queue cluster to form a multi-threaded message consumption queue;
特征值确定单元,用于根据各所述多线程消息消费队列,确定满足预设时间条件的网络行为的风险特征值。The characteristic value determination unit is used to determine the risk characteristic value of the network behavior that meets the preset time condition according to each of the multi-threaded message consumption queues.
进一步地,特征值确定单元包括:Furthermore, the characteristic value determination unit includes:
数据读取子单元,用于从各所述多线程消息消费队列中读取满足预设读取条件的待处理流量数据;A data reading subunit, used to read the to-be-processed traffic data that meets the preset reading conditions from each of the multi-threaded message consumption queues;
第一处理子单元,用于对所述待处理流量数据进行数据清洗以及格式标准化处理,得到中间流量数据;A first processing subunit is used to perform data cleaning and format standardization processing on the to-be-processed flow data to obtain intermediate flow data;
第二处理子单元,用于基于采集到的公共参数信息对所述中间流量数据进行处理,得到目标流量数据;A second processing subunit is used to process the intermediate flow data based on the collected public parameter information to obtain target flow data;
确定子单元,用于对所述目标流量数据进行解析,确定所述目标流量数据所对应的网络行为的风险特征值。A determination subunit is used to parse the target traffic data and determine the risk characteristic value of the network behavior corresponding to the target traffic data.
其中,确定子单元具体用于:Wherein, the determination subunit is specifically used for:
对所述目标流量数据进行解析,得到目标格式下的解析数据;Parsing the target flow data to obtain parsed data in a target format;
对所述目标流量数据所对应网络日志中的访问属性进行网络行为分析,确定所述目标流量数据的行为特征信息;Performing network behavior analysis on access attributes in the network log corresponding to the target traffic data to determine behavior feature information of the target traffic data;
根据所述行为特征信息以及所述解析数据中的提取目标信息,得到与所述目标流量数据所对应的网络行为的风险特征值。According to the behavior characteristic information and the extraction target information in the parsed data, a risk characteristic value of the network behavior corresponding to the target traffic data is obtained.
进一步地,行为确定模块33包括:Furthermore, the behavior determination module 33 includes:
第一确定单元,用于对各所述风险行为特征进行分类,确定相同字符串下的候选特征信息;A first determination unit, used to classify each of the risk behavior features and determine candidate feature information under the same character string;
第二确定单元,用于根据各所述候选特征信息及预设权重集进行特征值聚类,确定最终聚类中心以及簇种类信息;A second determination unit, configured to cluster feature values according to each of the candidate feature information and a preset weight set, and determine a final cluster center and cluster type information;
第三确定单元,用于根据所述最终聚类中心以及所述簇种类信息,确定网络访问行为数信息;A third determining unit, configured to determine network access behavior quantity information according to the final cluster center and the cluster type information;
第四确定单元,用于根据所述网络访问行为数信息所属目标网络访问流量的目标风险特征值,确定所述网络访问行为数信息所对应的网络访问行为类别;A fourth determining unit, configured to determine a network access behavior category corresponding to the network access behavior number information according to a target risk characteristic value of a target network access flow to which the network access behavior number information belongs;
第五确定单元,用于根据所述网络访问行为数信息、所述网络访问行为类别及预设容忍阈值列表,判断所述目标网络访问流量所对应的网络访问行为是否为攻击特征行为,得到所述网络访问行为的识别结果;A fifth determination unit, configured to determine whether the network access behavior corresponding to the target network access traffic is an attack characteristic behavior according to the network access behavior number information, the network access behavior category and a preset tolerance threshold list, and obtain an identification result of the network access behavior;
行为确定单元,用于根据各所述识别结果,确定所述多线程消费消息队列中的攻击特征行为。A behavior determination unit is used to determine the attack characteristic behavior in the multi-threaded consumption message queue according to each of the identification results.
其中,第二确定单元具体用于:The second determining unit is specifically used for:
根据满足预设初始时间条件的候选特征信息,初始化设定数量的初始聚类中心;Initialize a set number of initial cluster centers according to the candidate feature information that meets the preset initial time conditions;
根据所述候选特征信息中确定满足第一时间条件的目标特征信息串以及预设权重集,确定所述目标特征信息串中每个对象到各所述初始聚类中心的欧式距离;Determine the Euclidean distance from each object in the target feature information string to each of the initial cluster centers according to the target feature information string that satisfies the first time condition and the preset weight set in the candidate feature information;
根据各所述欧式距离,对所述初始聚类中心进行更新,得到中间聚类中心;According to each of the Euclidean distances, the initial cluster center is updated to obtain an intermediate cluster center;
当各所述中间聚类中心满足中心稳定条件时,根据满足第二时间条件的特征信息串及所述中间聚类中心确定最终聚类中心以及簇种类信息;When each of the intermediate cluster centers meets the center stability condition, determining the final cluster center and cluster type information according to the feature information string that meets the second time condition and the intermediate cluster center;
当各所述中间聚类中心不满足中心稳定条件时,将所述中间聚类中心作为更新后的初始聚类中心,并返回所述欧式距离的确定步骤。When each of the intermediate cluster centers does not satisfy the center stability condition, the intermediate cluster center is used as the updated initial cluster center, and the process returns to the step of determining the Euclidean distance.
可选地,该装置还包括:Optionally, the device further comprises:
信息归档模块,用于在所述根据各所述风险特征值及预设权重集,识别出所述多线程消费消息队列中的攻击特征行为之后,对所述攻击特征行为进行阻断处理,并对所述攻击特征行为的风险处置信息进行归档。The information archiving module is used to block the attack characteristic behavior after identifying the attack characteristic behavior in the multi-threaded consumer message queue according to each risk characteristic value and a preset weight set, and to archive the risk handling information of the attack characteristic behavior.
可选地,该装置还包括:Optionally, the device further comprises:
认证模块,用于在接收到待接入设备的接入请求时,根据预设私钥对所述接入请求进行解密,得到解密认证信息,并基于所述解密认证信息对所述待接入设备进行接入认证。The authentication module is used to, when receiving an access request from a device to be accessed, decrypt the access request according to a preset private key to obtain decrypted authentication information, and perform access authentication on the device to be accessed based on the decrypted authentication information.
本发明实施例所提供的电力物联终端网络风险行为识别装置可执行本发明任意实施例所提供的电力物联终端网络风险行为识别方法,具备执行方法相应的功能模块和有益效果。The device for identifying network risk behavior of a power Internet of Things terminal provided in an embodiment of the present invention can execute the method for identifying network risk behavior of a power Internet of Things terminal provided in any embodiment of the present invention, and has functional modules and beneficial effects corresponding to the execution method.
实施例四Embodiment 4
图4示出了可以用来实施本发明的实施例的电子设备40的结构示意图。电子设备旨在表示各种形式的数字计算机,诸如,膝上型计算机、台式计算机、工作台、个人数字助理、服务器、刀片式服务器、大型计算机、和其它适合的计算机。电子设备还可以表示各种形式的移动装置,诸如,个人数字处理、蜂窝电话、智能电话、可穿戴设备(如头盔、眼镜、手表等)和其它类似的计算装置。本文所示的部件、它们的连接和关系、以及它们的功能仅仅作为示例,并且不意在限制本文中描述的和/或者要求的本发明的实现。FIG4 shows a block diagram of an electronic device 40 that can be used to implement an embodiment of the present invention. The electronic device is intended to represent various forms of digital computers, such as laptop computers, desktop computers, workstations, personal digital assistants, servers, blade servers, mainframe computers, and other suitable computers. The electronic device can also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices (such as helmets, glasses, watches, etc.) and other similar computing devices. The components shown herein, their connections and relationships, and their functions are merely examples and are not intended to limit the implementation of the present invention described and/or required herein.
如图4所示,电子设备40包括至少一个处理器41,以及与至少一个处理器41通信连接的存储器,如只读存储器(ROM)42、随机访问存储器(RAM)43等,其中,存储器存储有可被至少一个处理器执行的计算机程序,处理器41可以根据存储在只读存储器(ROM)42中的计算机程序或者从存储单元48加载到随机访问存储器(RAM)43中的计算机程序,来执行各种适当的动作和处理。在RAM 43中,还可存储电子设备40操作所需的各种程序和数据。处理器41、ROM 42以及RAM 43通过总线44彼此相连。输入/输出(I/O)接口45也连接至总线44。As shown in FIG4 , the electronic device 40 includes at least one processor 41, and a memory connected to the at least one processor 41 in communication, such as a read-only memory (ROM) 42, a random access memory (RAM) 43, etc., wherein the memory stores a computer program that can be executed by at least one processor, and the processor 41 can perform various appropriate actions and processes according to the computer program stored in the read-only memory (ROM) 42 or the computer program loaded from the storage unit 48 to the random access memory (RAM) 43. In the RAM 43, various programs and data required for the operation of the electronic device 40 can also be stored. The processor 41, the ROM 42, and the RAM 43 are connected to each other via a bus 44. An input/output (I/O) interface 45 is also connected to the bus 44.
电子设备40中的多个部件连接至I/O接口45,包括:输入单元46,例如键盘、鼠标等;输出单元47,例如各种类型的显示器、扬声器等;存储单元48,例如磁盘、光盘等;以及通信单元49,例如网卡、调制解调器、无线通信收发机等。通信单元49允许电子设备40通过诸如因特网的计算机网络和/或各种电信网络与其他设备交换信息/数据。A number of components in the electronic device 40 are connected to the I/O interface 45, including: an input unit 46, such as a keyboard, a mouse, etc.; an output unit 47, such as various types of displays, speakers, etc.; a storage unit 48, such as a disk, an optical disk, etc.; and a communication unit 49, such as a network card, a modem, a wireless communication transceiver, etc. The communication unit 49 allows the electronic device 40 to exchange information/data with other devices through a computer network such as the Internet and/or various telecommunication networks.
处理器41可以是各种具有处理和计算能力的通用和/或专用处理组件。处理器41的一些示例包括但不限于中央处理单元(CPU)、图形处理单元(GPU)、各种专用的人工智能(AI)计算芯片、各种运行机器学习模型算法的处理器、数字信号处理器(DSP)、以及任何适当的处理器、控制器、微控制器等。处理器41执行上文所描述的各个方法和处理,例如电力物联终端网络风险行为识别方法。The processor 41 may be a variety of general and/or special processing components with processing and computing capabilities. Some examples of the processor 41 include, but are not limited to, a central processing unit (CPU), a graphics processing unit (GPU), various dedicated artificial intelligence (AI) computing chips, various processors running machine learning model algorithms, digital signal processors (DSPs), and any appropriate processors, controllers, microcontrollers, etc. The processor 41 executes the various methods and processes described above, such as the method for identifying network risk behaviors of power IoT terminals.
在一些实施例中,电力物联终端网络风险行为识别方法可被实现为计算机程序,其被有形地包含于计算机可读存储介质,例如存储单元48。在一些实施例中,计算机程序的部分或者全部可以经由ROM 42和/或通信单元49而被载入和/或安装到电子设备40上。当计算机程序加载到RAM 43并由处理器41执行时,可以执行上文描述的电力物联终端网络风险行为识别方法的一个或多个步骤。备选地,在其他实施例中,处理器41可以通过其他任何适当的方式(例如,借助于固件)而被配置为执行电力物联终端网络风险行为识别方法。In some embodiments, the method for identifying network risk behavior of a power Internet of Things terminal may be implemented as a computer program, which is tangibly contained in a computer-readable storage medium, such as a storage unit 48. In some embodiments, part or all of the computer program may be loaded and/or installed on the electronic device 40 via the ROM 42 and/or the communication unit 49. When the computer program is loaded into the RAM 43 and executed by the processor 41, one or more steps of the method for identifying network risk behavior of a power Internet of Things terminal described above may be performed. Alternatively, in other embodiments, the processor 41 may be configured to execute the method for identifying network risk behavior of a power Internet of Things terminal in any other appropriate manner (e.g., by means of firmware).
本文中以上描述的系统和技术的各种实施方式可以在数字电子电路系统、集成电路系统、场可编程门阵列(FPGA)、专用集成电路(ASIC)、专用标准产品(ASSP)、芯片上系统的系统(SOC)、负载可编程逻辑设备(CPLD)、计算机硬件、固件、软件、和/或它们的组合中实现。这些各种实施方式可以包括:实施在一个或者多个计算机程序中,该一个或者多个计算机程序可在包括至少一个可编程处理器的可编程系统上执行和/或解释,该可编程处理器可以是专用或者通用可编程处理器,可以从存储系统、至少一个输入装置、和至少一个输出装置接收数据和指令,并且将数据和指令传输至该存储系统、该至少一个输入装置、和该至少一个输出装置。Various implementations of the systems and techniques described above herein can be implemented in digital electronic circuit systems, integrated circuit systems, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), application specific standard products (ASSPs), systems on chips (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various implementations can include: being implemented in one or more computer programs that can be executed and/or interpreted on a programmable system including at least one programmable processor, which can be a special purpose or general purpose programmable processor that can receive data and instructions from a storage system, at least one input device, and at least one output device, and transmit data and instructions to the storage system, the at least one input device, and the at least one output device.
用于实施本发明的方法的计算机程序可以采用一个或多个编程语言的任何组合来编写。这些计算机程序可以提供给通用计算机、专用计算机或其他可编程数据处理装置的处理器,使得计算机程序当由处理器执行时使流程图和/或框图中所规定的功能/操作被实施。计算机程序可以完全在机器上执行、部分地在机器上执行,作为独立软件包部分地在机器上执行且部分地在远程机器上执行或完全在远程机器或服务器上执行。Computer programs for implementing the methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general-purpose computer, a special-purpose computer, or other programmable data processing device, so that when the computer program is executed by the processor, the functions/operations specified in the flow chart and/or block diagram are implemented. The computer program may be executed entirely on the machine, partially on the machine, partially on the machine and partially on a remote machine as a stand-alone software package, or entirely on a remote machine or server.
在本发明的上下文中,计算机可读存储介质可以是有形的介质,其可以包含或存储以供指令执行系统、装置或设备使用或与指令执行系统、装置或设备结合地使用的计算机程序。计算机可读存储介质可以包括但不限于电子的、磁性的、光学的、电磁的、红外的、或半导体系统、装置或设备,或者上述内容的任何合适组合。备选地,计算机可读存储介质可以是机器可读信号介质。机器可读存储介质的更具体示例会包括基于一个或多个线的电气连接、便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或快闪存储器)、光纤、便捷式紧凑盘只读存储器(CD-ROM)、光学储存设备、磁储存设备、或上述内容的任何合适组合。In the context of the present invention, a computer-readable storage medium may be a tangible medium that may contain or store a computer program for use by an instruction execution system, device or equipment or used in combination with an instruction execution system, device or equipment. A computer-readable storage medium may include, but is not limited to, electronic, magnetic, optical, electromagnetic, infrared, or semiconductor systems, devices or equipment, or any suitable combination of the foregoing. Alternatively, a computer-readable storage medium may be a machine-readable signal medium. A more specific example of a machine-readable storage medium may include an electrical connection based on one or more lines, a portable computer disk, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
为了提供与用户的交互,可以在电子设备上实施此处描述的系统和技术,该电子设备具有:用于向用户显示信息的显示装置(例如,CRT(阴极射线管)或者LCD(液晶显示器)监视器);以及键盘和指向装置(例如,鼠标或者轨迹球),用户可以通过该键盘和该指向装置来将输入提供给电子设备。其它种类的装置还可以用于提供与用户的交互;例如,提供给用户的反馈可以是任何形式的传感反馈(例如,视觉反馈、听觉反馈、或者触觉反馈);并且可以用任何形式(包括声输入、语音输入或者、触觉输入)来接收来自用户的输入。To provide interaction with a user, the systems and techniques described herein may be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user; and a keyboard and a pointing device (e.g., a mouse or trackball) through which the user can provide input to the electronic device. Other types of devices may also be used to provide interaction with the user; for example, the feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form (including acoustic input, voice input, or tactile input).
可以将此处描述的系统和技术实施在包括后台部件的计算系统(例如,作为数据服务器)、或者包括中间件部件的计算系统(例如,应用服务器)、或者包括前端部件的计算系统(例如,具有图形用户界面或者网络浏览器的用户计算机,用户可以通过该图形用户界面或者该网络浏览器来与此处描述的系统和技术的实施方式交互)、或者包括这种后台部件、中间件部件、或者前端部件的任何组合的计算系统中。可以通过任何形式或者介质的数字数据通信(例如,通信网络)来将系统的部件相互连接。通信网络的示例包括:局域网(LAN)、广域网(WAN)、区块链网络和互联网。The systems and techniques described herein may be implemented in a computing system that includes backend components (e.g., as a data server), or a computing system that includes middleware components (e.g., an application server), or a computing system that includes frontend components (e.g., a user computer with a graphical user interface or a web browser through which a user can interact with implementations of the systems and techniques described herein), or a computing system that includes any combination of such backend components, middleware components, or frontend components. The components of the system may be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: a local area network (LAN), a wide area network (WAN), a blockchain network, and the Internet.
计算系统可以包括客户端和服务器。客户端和服务器一般远离彼此并且通常通过通信网络进行交互。通过在相应的计算机上运行并且彼此具有客户端-服务器关系的计算机程序来产生客户端和服务器的关系。服务器可以是云服务器,又称为云计算服务器或云主机,是云计算服务体系中的一项主机产品,以解决了传统物理主机与VPS服务中,存在的管理难度大,业务扩展性弱的缺陷。A computing system may include a client and a server. The client and the server are generally remote from each other and usually interact through a communication network. The client and server relationship is generated by computer programs running on the corresponding computers and having a client-server relationship with each other. The server may be a cloud server, also known as a cloud computing server or cloud host, which is a host product in the cloud computing service system to solve the defects of difficult management and weak business scalability in traditional physical hosts and VPS services.
应该理解,可以使用上面所示的各种形式的流程,重新排序、增加或删除步骤。例如,本发明中记载的各步骤可以并行地执行也可以顺序地执行也可以不同的次序执行,只要能够实现本发明的技术方案所期望的结果,本文在此不进行限制。It should be understood that the various forms of processes shown above can be used to reorder, add or delete steps. For example, the steps described in the present invention can be executed in parallel, sequentially or in different orders, as long as the desired results of the technical solution of the present invention can be achieved, and this document does not limit this.
上述具体实施方式,并不构成对本发明保护范围的限制。本领域技术人员应该明白的是,根据设计要求和其他因素,可以进行各种修改、组合、子组合和替代。任何在本发明的精神和原则之内所作的修改、等同替换和改进等,均应包含在本发明保护范围之内。The above specific implementations do not constitute a limitation on the protection scope of the present invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions can be made according to design requirements and other factors. Any modification, equivalent substitution and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410559551.5A CN118473730A (en) | 2024-05-08 | 2024-05-08 | Electric power internet of things terminal network risk behavior identification method, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410559551.5A CN118473730A (en) | 2024-05-08 | 2024-05-08 | Electric power internet of things terminal network risk behavior identification method, equipment and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118473730A true CN118473730A (en) | 2024-08-09 |
Family
ID=92155075
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410559551.5A Pending CN118473730A (en) | 2024-05-08 | 2024-05-08 | Electric power internet of things terminal network risk behavior identification method, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118473730A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118900207A (en) * | 2024-09-30 | 2024-11-05 | 国网北京市电力公司 | Power Internet of Things traffic filtering method, device, storage medium and electronic equipment |
CN120338438A (en) * | 2025-06-16 | 2025-07-18 | 国能信控技术股份有限公司 | Robotic team collaborative management method and system for high-risk operations in power plants |
-
2024
- 2024-05-08 CN CN202410559551.5A patent/CN118473730A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118900207A (en) * | 2024-09-30 | 2024-11-05 | 国网北京市电力公司 | Power Internet of Things traffic filtering method, device, storage medium and electronic equipment |
CN120338438A (en) * | 2025-06-16 | 2025-07-18 | 国能信控技术股份有限公司 | Robotic team collaborative management method and system for high-risk operations in power plants |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20250047717A1 (en) | Cybersecurity risk analysis and anomaly detection using active and passive external reconnaissance | |
US20220014561A1 (en) | System and methods for automated internet-scale web application vulnerability scanning and enhanced security profiling | |
US20200389495A1 (en) | Secure policy-controlled processing and auditing on regulated data sets | |
US20200296137A1 (en) | Cybersecurity profiling and rating using active and passive external reconnaissance | |
US9984241B2 (en) | Method, apparatus, and system for data protection | |
CN118473730A (en) | Electric power internet of things terminal network risk behavior identification method, equipment and medium | |
JP7473608B2 (en) | Method, apparatus and electronic device for determining instance risk level in a cloud server | |
US20180234234A1 (en) | System for describing and tracking the creation and evolution of digital files | |
CN114553456B (en) | Digital Identity Network Alert | |
CN112367338A (en) | Malicious request detection method and device | |
CN117874789B (en) | A dynamic privacy data encryption method and system | |
Mishra et al. | Efficient approaches for intrusion detection in cloud environment | |
Rad et al. | Security and privacy challenges in big data era | |
Lv et al. | Publishing triangle counting histogram in social networks based on differential privacy | |
CN113159866A (en) | Method for building network user trust evaluation model in big data environment | |
Yang et al. | Security Assessment Model for Blockchain Software and Hardware Fusion Device Based on Decision Tree Algorithm | |
Zhang et al. | Pontus: Finding waves in data streams | |
Ehsan et al. | Securing smart contracts in fog computing: Machine learning-based attack detection for registration and resource access granting | |
Gaur et al. | Prevention of Security Attacks in Cloud Computing | |
CN117421640A (en) | API asset identification method, device, equipment and storage medium | |
CN112104625A (en) | Process access control method and device | |
CN116684116A (en) | Method for excavating core fragile points of power monitoring system | |
CN115941295A (en) | Abnormal network behavior detection method and device | |
Xu et al. | Development of computer network security management technology based on artificial intelligence under big data | |
Wang | Application of blockchain technology in the field of network and information security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |