scispace - formally typeset
Open AccessJournal ArticleDOI

New Active Defense Technology under the Background of Power Information Network Security

Jing Li, +3 more
- Vol. 1852, Iss: 2, pp 022071
TLDR
The research of active defense technology under the background of power information network security is put forward, the defects of firewall technology and intrusion trap technology in passive network security defense technology are expounded, and the pitfalls of activedefense new technology are introduced.
Abstract
With the rapid development of the national power industry, the security of power information network has been widely concerned by the society, and the related impact has also been prominent. At this stage, the development of power information technology is more and more inseparable from the network, so network security has become more and more important, if the network has a serious threat in practical application, the loss caused will be unbearable. In the process of controlling the network security of power information industry, one of the most important and effective methods is active defense. Based on this, this paper puts forward the research of active defense technology under the background of power information network security, expounds the defects of firewall technology and intrusion trap technology in passive network security defense technology, and introduces the pitfalls of active defense new technology In addition, the paper discusses the new active defense technology and its application in power information network security, and puts forward reasonable suggestions. Therefore, the use of information technology to solve the hidden danger of power network security is important.

read more

Citations
More filters

Research and Measures on the Security of Internet of Things

TL;DR: The three layers logic architecture of IoT is introduced, and the security problems at each level and the key points of the research are expounded, and then the security requirements are analyzed.

Urban Network Analysis and Pathology in Central Texture of Mashhad Metropolis from a Passive Defense Point of View, Case Study of Mashhad Municipality, Mashhad, Iran

TL;DR: When planning for defensive security, not only protecting human lives should be taken into consideration, but also, retaining a city’s structure and all of its achievements including economic, social, and ... would be of interest.
Proceedings ArticleDOI

Security posture assessment of power information networks based on adversarial deep learning and D-S evidence theory

TL;DR: In this article , a security posture assessment model for power information networks against deep learning and D-S evidence theory is proposed to address the shortcomings of over-reliance on expert experience in the construction of the basic probability assignment of traditional D S evidence theory.
Journal ArticleDOI

Improving the Performance of the Single Shot Multibox Detector for Steel Surface Defects with Context Fusion and Feature Refinement

TL;DR: In this paper , the context fusion structure introduces the local information of shallow layer and the semantic information of the deep layer into multiscale feature maps, and a feature refinement module is introduced in the method, which further improves the detection accuracy.
Proceedings ArticleDOI

Security posture assessment of power information networks based on adversarial deep learning and D-S evidence theory

TL;DR: In this paper , a security posture assessment model for power information networks against deep learning and D-S evidence theory is proposed to address the shortcomings of over-reliance on expert experience in the construction of the basic probability assignment of traditional D S evidence theory.
References
More filters
Journal ArticleDOI

Development status of high power fiber lasers and their coherent beam combination

TL;DR: The state-of-the-art high power fiber lasers are reviewed, in terms of narrow-linewidth fiber lasers, broadband fiber lasers and fiber lasers at 2 μm, and coherent beam combining technique is discussed.
Journal ArticleDOI

An Active Defense Solution for ARP Spoofing in OpenFlow Network

TL;DR: This work proposes a novel mechanism as defense solution for ARP spoofing oriented to OpenFlow platform and shows that this solution can reduce the security threat of ARp spoofing remarkably on Open Flow platform and related SDN platforms.
Journal ArticleDOI

Signal Processing and Deep Learning Techniques for Power Quality Events Monitoring and Classification

TL;DR: The simulation and experimental results demonstrate that the SSA-based DNN classifier has significantly higher potential than the WT-based classifier to classify the power quality events under noisy and noiseless conditions.
Journal ArticleDOI

A review of scientific research in defensive cyberspace operation tools and technologies

TL;DR: A review of relevant research in cybersecurity tools and technologies is performed, organized according to both active and passive Defensive Cyberspace Operations, which accounts for the bulk of the cyber research literature over the last two decades.
Journal ArticleDOI

Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service

TL;DR: This article proposes a new endogenous security defense mechanism named LSSM, the first work to provide a systematic defense structure with endogenous security to resist deductive attacks, and discusses several future directions for LADs.