CN106453432A - Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform - Google Patents

Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform Download PDF

Info

Publication number
CN106453432A
CN106453432A CN201611181197.9A CN201611181197A CN106453432A CN 106453432 A CN106453432 A CN 106453432A CN 201611181197 A CN201611181197 A CN 201611181197A CN 106453432 A CN106453432 A CN 106453432A
Authority
CN
China
Prior art keywords
vulnerability
management
module
engine
scanning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611181197.9A
Other languages
Chinese (zh)
Inventor
李炜
金高峰
沈宏杰
李彬
江虹
郭雪松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Information and Telecommunication Branch of State Grid Jiangxi Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Information and Telecommunication Branch of State Grid Jiangxi Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Information and Telecommunication Branch of State Grid Jiangxi Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201611181197.9A priority Critical patent/CN106453432A/en
Publication of CN106453432A publication Critical patent/CN106453432A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a vulnerability scanning and threat intelligence based unified vulnerability management and warning platform. The platform comprises a multi-form vulnerability scanning engine module, an engine equipment management module, an accurate asset warning module, a priority analysis module, a process optimization analysis module, an internal plan communication module, a vulnerability management module and a system management module. Through a unified management mode, multiple lower multi-mode vulnerability scanning engines are subjected to unified dispatching, task issue and result return, asset statistic information and external intelligence information can be combined to realize threat warning of assets in the corporate scope, the platform can be used in the corporate information internal-external network single-network environment as well as in information internal-external network province, city and county cascade environment, the advantages of the platform in the longitudinal cascade or transverse distribution network environment can be reflected more fully, and integrated defense in electric power company information security is realized.

Description

The unified vulnerability management based on vulnerability scanning and threatening information and early warning platform
Technical field
The present invention relates to Vulnerability-scanning technology and threat intelligence sharing technical field, specially it is based on vulnerability scanning and threat Unified vulnerability management and the early warning platform of information.
Background technology
Carry out the internet security problem of network attack using security breaches, as the shade under sunlight, all the time along with interconnection The application development of net industry.In recent years, the form of network security threats also occurred in that different changes, and attack pattern is from single emerging The simple tool that interesting fan arbitrarily downloads is attacked, and changes to the attacker of organized professional and technical personnel's bespoke, Attack purpose and steal transformation from proof individual skill strength to business or national information.
The change of new attack mode, still can utilize various leaks, such as:It is utilized in Google aurora attack IE browser Overflow Vulnerability, the FEATHEADER remote code execution of the EXCEL program being utilized in Shady RAT attack Leak.Attacker's attack process not all can utilize 0day leak, such as FEATHEADER Remote Code Execution Vulnerability in fact, real On border, great majority attack the known bugs being all to utilize.For attacker, all there is fragility in the every aspect of IT system Property, these aspects include common Loopholes of OS, application system leak, weak passwurd, also include easily ignored mistake Security configuration problem, and violate the open unnecessary account of minimization principle, service, port etc..Threaten in new attack In the case of transformed, network security management personnel still with traditional hole scanner, quarterly or half a year, Jin Jinjin Row network system leak inspection is it is impossible to be really achieved the purpose repairing network security vulnerabilities by safety inspection in advance.
For many years, build with state's net company informationization, company information level of security more and more higher, for corporate assets Attention rate is also increasing, and outside severe network attack environmental factorss also gradually result in and threaten the coverage with leak to get over Come bigger, although the estimation flow that many tissues have maturation can effectively find leak, potential risk, leak affect Analysis, repairs priority, mending course management, lacks and still suffer from challenging.Risk management promotes Vulnerability Management success and has Effect.But risk management lacks practice, frequent and business objective offset direction.
Additionally, for the utilization threatening information, good intelligence channel sets up the model of intelligence, and the model of intelligence provides wisdom Decision, wise decision brings more preferable security practices, and more preferable security practices improve the visual angle treating risk, these, just It is that efficient, successful leak finds and management process, these steps can be accomplished, these risks would not occur the body at us On.
Content of the invention
It is an object of the invention to provide the unified vulnerability management based on vulnerability scanning and threatening information and early warning platform, it is In conjunction with tradition but rationally the integrating with of comprehensive Vulnerability-scanning technology and threat information, and be applied to the daily Hole Detection of company In early warning work, achievable 1+1>2 security protection effect, can be used in company information intranet and extranet list network environment, Can be applicable to information intranet and extranet province, city, in environment at county level, and more can body in the longitudinally network environment of cascade or cross direction profiles Existing platform advantage, to solve the problems, such as to propose in above-mentioned background technology.
For achieving the above object, the present invention provides following technical scheme:Unified leakage based on vulnerability scanning and threat information Hole management and early warning platform, including polymorphic vulnerability scanning engine modules, engine apparatus management module, assets accurate early warning mould Block, priority analysis module, process optimization analysis module, inner solution AC module, Vulnerability Management module and system administration mould Block;Be configured with polymorphic vulnerability scanning engine modules web site scan engine, system configuration engine, system scanning engine and With the hardware device of its supporting setting, virtualization mirror image and cluster engine;The port of polymorphic vulnerability scanning engine modules also with The port of engine apparatus management module is electrically connected with, and is attached with engine apparatus and adds function, engine in engine apparatus management module Linkage function and engine management function.
Preferably, polymorphic vulnerability scanning engine modules are used for what realization can cover to lower end polymorphic vulnerability scanning engine The leak of the server host in region, operating system, data base, web application, the network equipment, safety equipment etc. and configuration scanning And assets find etc. effect.
Preferably, engine apparatus management module is used for realizing unifying to manage for all lower ends polymorphic vulnerability scanning engine The work such as reason scheduling, task issue, collection.
Preferably, it is attached with the automatic discovery feature of assets in the accurate warning module of assets, assets confirm that function and assets are pre- Alert function, accurate to assets information, leak information acquisition and screening and leak early warning in institute's compass of competency for realizing The work such as positioning.
Preferably, priority analysis module is used for realizing the priority intelligent decision to built scan task and leak threatens The priority suggestion of information is formed.
Preferably, process optimization analysis module be used for realizing for the reception of the horizontal information of trade management and management optimization according to According to formation function.
Preferably, inner solution AC module is used for realizing sharing for leak repairing scheme and issues function in time.
Preferably, Vulnerability Management module be used for realize platform has been scanned leak overall process supervision, include scan, Analysis, repairing, improved overall process monitoring function.
Preferably, system management module is used for realizing for user right control, equipment state management and user operation The functions such as management.
Compared with prior art, the invention has the beneficial effects as follows:
1st, this based on polymorphic vulnerability scanning engine and threatens the unified vulnerability that information combines to manage and early warning platform, is manager institute Leak present in administration business or configuration hidden danger provide the platform of a unified management, decrease original artificial one by one Domain or one by one system go the situation scanning, and decrease labor workload.
2nd, this based on polymorphic vulnerability scanning engine and threatens the unified vulnerability that information combines to manage and early warning platform, Ke Yijie Close external infornation information and assets information, the assets in our company administrative area are given warning in advance, peace can be supervised simultaneously Full personnel carry out repairing or preventive measure in advance, it is to avoid the potential safety hazard brought because of leak.
3rd, this based on polymorphic vulnerability scanning engine and threatens the unified vulnerability that information combines to manage and early warning platform, Ke Yishi Referring now to the unified management of cross-region polymorphic vulnerability scanning engine apparatus, decrease equipment control and O&M cost, lift work Make efficiency.
Brief description
Fig. 1 is the business structure schematic diagram of the present invention;
Fig. 2 is the present invention each module configuration interface diagram;
Fig. 3 is present system framework diagram.
In figure:1 polymorphic vulnerability scanning engine modules;11 web site scan engines;12 system configuration engines;13 systems Scanning engine;14 hardware devices;15 virtualization mirror images;16 cluster engines;2 engine apparatus management modules;3 assets accurate early warning mould Block;4 priority analysis modules;5 process optimization analysis modules;6 inner solution AC module;7 Vulnerability Management modules;8 system pipes Reason module.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out with close Chu, complete Site preparation description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of not making creative work Embodiment, broadly falls into the scope of protection of the invention.
Refer to Fig. 1-3, the present invention provides a kind of technical scheme:Unified vulnerability pipe based on vulnerability scanning and threat information Reason with early warning platform, including polymorphic vulnerability scanning engine modules 1, engine apparatus management module 2, the accurate warning module of assets 3, Priority analysis module 4, process optimization analysis module 5, inner solution AC module 6, Vulnerability Management module 7 and system administration mould Block 8;It is configured with web site scan engine 11, system configuration engine 12, system scanning in polymorphic vulnerability scanning engine modules 1 Engine 13 and the hardware device 14 with its supporting setting, virtualization mirror image 15 and cluster engine 16, for realizing to lower end multiform The server host in region that state vulnerability scanning engine can cover, operating system, data base, web application, the network equipment, safety The leak of equipment etc. and the effect such as configuration scanning and assets discovery;The port of polymorphic vulnerability scanning engine modules 1 also with draw The port holding up device management module 2 is electrically connected with, and engine apparatus management module 2 is used for realizing for all lower ends polymorphic leak The work such as the unified management scheduling of scanning engine, task issue, collection;It is attached with engine in engine apparatus management module 2 Equipment adds function, engine linkage function and engine management function, and engine apparatus add that function is used for adding or to delete lower end many Form vulnerability scanning engine, in order to be managed collectively;Engine linkage function is used for after adding engine, its connectivity being surveyed Examination, confirms whether administrative center can carry out proper communication with the polymorphic vulnerability scanning engine modules 1 newly increasing;Engine management work( The communication transmission between administrative center and lower end engine can be used for, issue including the task for engine, task scheduling between engine, sweep Retouch the functions such as result passback reception;The accurate warning module of assets 3 is used for realizing to assets information, leak in institute's compass of competency Information acquisition and screening and leak early warning such as are accurately positioned at the work, be attached with assets and automatically send out in the accurate warning module of assets 3 Existing function, assets confirm function and assets warning function, and the automatic discovery feature of assets can find to assets in network, pass through After scan task is issued to polymorphic vulnerability scanning engine modules 1, the assets information scanning is reported by scanning engine, This module carries out new assets and assets alteration is shown, can automatically find assets association attributes, including operating system class simultaneously The information such as type, version, component type used, version;Assets confirm that function is used for manager and carries out for the automatic assets finding Artificial mate, for put on record but do not include sweep limitss assets carry out confirming and artificial add, for non-assets of putting on record Alerted;Assets warning function is used for carrying out early warning to the risk that assets assembly faces, and process is realized in early warning:Receive feelings first Report message, filters out rapid information according to certain matched rule, is mated in conjunction with Asset Attributes, realize assets accurately pre- Alert, for example say if locally there are not Struts2 Vulnerability events, but in external infornation, produced Struts2 leak, Ke Yili Use this information, compare with Asset Attributes, find out first in assets carry Struts2 assembly assets, fit version number, then Complete to be accurately positioned and warning function;Priority analysis module 4 is used for realizing the priority intelligent decision to built scan task The priority suggestion threatening information with leak is formed;Process optimization analysis module 5 is used for realizing for trade management horizontal information Reception and management optimization according to formed function;Inner solution AC module 6 is used for realizing sharing for leak repairing scheme With issue function in time;Vulnerability Management module 7 is used for the overall process supervision of leak realizing platform has been scanned, including sweeping Retouch, analyze, repairing, improved overall process monitoring function;System management module 8 is used for realizing for user right control, equipment The function such as condition managing and user operation management.
In sum:This based on polymorphic vulnerability scanning engine and threatens the unified vulnerability management that information combines to put down with early warning Platform, by being managed collectively pattern, carries out United Dispatching to subordinate's multiple stage polymorphic vulnerability scanning engine, task issues and result is returned Pass, the threat early warning to assets in firm-wide, the present invention can be realized in conjunction with asset statistical information and external infornation information simultaneously On the basis of traditional vulnerability scanning, broken away from passive situation, enabled to make an initiative sally, added in conjunction with scanning, assets information and Threaten information to make to give warning in advance, it can be used in company information intranet and extranet list network environment, also apply be applicable in information Outer net province, city, in environment at county level, and more can embody platform advantage in the longitudinally network environment of cascade or cross direction profiles;It is Will tradition but comprehensive Vulnerability-scanning technology with threaten rationally integrating with of information, and be applied to the daily Hole Detection of company and In early warning work, achievable 1+1>2 security protection effect.
The above, the only present invention preferably specific embodiment, but protection scope of the present invention is not limited thereto, Any those familiar with the art the invention discloses technical scope in, technology according to the present invention scheme and its Inventive concept equivalent or change in addition, all should be included within the scope of the present invention.

Claims (9)

1. the unified vulnerability management based on vulnerability scanning and threatening information and early warning platform are it is characterised in that include polymorphic leakage Hole scanning engine module(1), engine apparatus management module(2), the accurate warning module of assets(3), priority analysis module(4)、 Process optimization analysis module(5), inner solution AC module(6), Vulnerability Management module(7)And system management module(8);Multiform State vulnerability scanning engine modules(1)Inside it is configured with web site scan engine(11), system configuration engine(12), system scanning draw Hold up(13)And the hardware device with its supporting setting(14), virtualization mirror image(15)With cluster engine(16);Polymorphic leak is swept Retouch engine modules(1)Port also with engine apparatus management module(2)Port be electrically connected with, engine apparatus management module(2) Inside it is attached with engine apparatus and add function, engine linkage function and engine management function.
2. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special Levy and be, polymorphic vulnerability scanning engine modules(1)For realizing the region that lower end polymorphic vulnerability scanning engine can be covered Server host, operating system, data base, web application, the network equipment, the leak of safety equipment etc. and configuration scanning and The effects such as assets discovery.
3. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special Levy and be, engine apparatus management module(2)For realizing adjusting for the unified management of all lower ends polymorphic vulnerability scanning engine The work such as degree, task issue, collection.
4. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special Levy and be, the accurate warning module of assets(3)Inside it is attached with the automatic discovery feature of assets, assets confirm function and assets early warning work( Can, for realizing assets information, leak information acquisition and screening and leak early warning in institute's compass of competency are accurately positioned Deng work.
5. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special Levy and be, priority analysis module(4)Threaten information for realizing the priority intelligent decision to built scan task and leak Priority suggestion formed.
6. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special Levy and be, process optimization analysis module(5)For realizing the reception for the horizontal information of trade management and management optimization foundation shape Become function.
7. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special Levy and be, inner solution AC module(6)For realizing sharing for leak repairing scheme and issuing function in time.
8. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special Levy and be, Vulnerability Management module(7)For realize platform has been scanned leak overall process supervision, include scanning, analyze, Repairing, improved overall process monitoring function.
9. the unified vulnerability management based on vulnerability scanning and threatening information according to claim 1 and early warning platform, it is special Levy and be, system management module(8)For realizing for user right control, equipment state management and user operation management work( Energy.
CN201611181197.9A 2016-12-20 2016-12-20 Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform Pending CN106453432A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611181197.9A CN106453432A (en) 2016-12-20 2016-12-20 Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611181197.9A CN106453432A (en) 2016-12-20 2016-12-20 Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform

Publications (1)

Publication Number Publication Date
CN106453432A true CN106453432A (en) 2017-02-22

Family

ID=58215385

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611181197.9A Pending CN106453432A (en) 2016-12-20 2016-12-20 Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform

Country Status (1)

Country Link
CN (1) CN106453432A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239705A (en) * 2017-05-25 2017-10-10 中国东方电气集团有限公司 A kind of contactless industrial control system or the static leakage location of equipment and detection method
CN107370763A (en) * 2017-09-04 2017-11-21 ***通信集团广东有限公司 Assets security method for early warning and device based on outside threat intelligence analysis
CN107526630A (en) * 2017-07-31 2017-12-29 杭州安恒信息技术有限公司 A kind of method for solving Distributed engine communication
CN107634945A (en) * 2017-09-11 2018-01-26 平安科技(深圳)有限公司 Website vulnerability scan method, device, computer equipment and storage medium
CN108737425A (en) * 2018-05-24 2018-11-02 北京凌云信安科技有限公司 Fragility based on multi engine vulnerability scanning association analysis manages system
CN110225018A (en) * 2019-05-31 2019-09-10 江苏百达智慧网络科技有限公司 A method of based on more equipment evaluation web application fragility
CN110753047A (en) * 2019-10-16 2020-02-04 杭州安恒信息技术股份有限公司 Method for reducing false alarm of vulnerability scanning
CN111199042A (en) * 2019-12-17 2020-05-26 中国南方电网有限责任公司超高压输电公司 Safe and efficient vulnerability management system
CN111695120A (en) * 2020-06-12 2020-09-22 公安部第三研究所 Information system safety deep threat early warning system and method
CN111989678A (en) * 2018-10-17 2020-11-24 松下电器(美国)知识产权公司 Information processing apparatus, information processing method, and program
CN112532647A (en) * 2020-12-07 2021-03-19 中国南方电网有限责任公司超高压输电公司 Deep attack identification method and device for core service of power system
CN112615812A (en) * 2020-11-19 2021-04-06 贵州电网有限责任公司 Information network unified vulnerability multi-dimensional security information collection, analysis and management system
CN113206825A (en) * 2021-03-25 2021-08-03 国网浙江省电力有限公司衢州供电公司 Scanning result comparison analysis method of missing scanning device
CN114866285A (en) * 2022-04-07 2022-08-05 水利部信息中心 Vulnerability full-life-cycle automatic intelligent system for unified command
CN114978614A (en) * 2022-04-29 2022-08-30 广州市昊恒信息科技有限公司 IP asset rapid scanning processing system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030140250A1 (en) * 2002-01-18 2003-07-24 Yoshihito Taninaka Method and system of monitoring vulnerabilities
CN104778414A (en) * 2015-05-06 2015-07-15 广州万方计算机科技有限公司 Vulnerability management system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030140250A1 (en) * 2002-01-18 2003-07-24 Yoshihito Taninaka Method and system of monitoring vulnerabilities
CN104778414A (en) * 2015-05-06 2015-07-15 广州万方计算机科技有限公司 Vulnerability management system and method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
俞承杭: "《计算机网络与信息安全技术》", 31 March 2008 *
黄凯: "电力行业信息安全管理平台的研究与应用", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239705A (en) * 2017-05-25 2017-10-10 中国东方电气集团有限公司 A kind of contactless industrial control system or the static leakage location of equipment and detection method
CN107526630A (en) * 2017-07-31 2017-12-29 杭州安恒信息技术有限公司 A kind of method for solving Distributed engine communication
CN107370763A (en) * 2017-09-04 2017-11-21 ***通信集团广东有限公司 Assets security method for early warning and device based on outside threat intelligence analysis
CN107370763B (en) * 2017-09-04 2020-10-20 ***通信集团广东有限公司 Asset safety early warning method and device based on external threat information analysis
CN107634945A (en) * 2017-09-11 2018-01-26 平安科技(深圳)有限公司 Website vulnerability scan method, device, computer equipment and storage medium
CN107634945B (en) * 2017-09-11 2018-06-22 平安科技(深圳)有限公司 Website vulnerability scan method, device, computer equipment and storage medium
CN108737425A (en) * 2018-05-24 2018-11-02 北京凌云信安科技有限公司 Fragility based on multi engine vulnerability scanning association analysis manages system
CN111989678A (en) * 2018-10-17 2020-11-24 松下电器(美国)知识产权公司 Information processing apparatus, information processing method, and program
CN110225018A (en) * 2019-05-31 2019-09-10 江苏百达智慧网络科技有限公司 A method of based on more equipment evaluation web application fragility
CN110753047A (en) * 2019-10-16 2020-02-04 杭州安恒信息技术股份有限公司 Method for reducing false alarm of vulnerability scanning
CN110753047B (en) * 2019-10-16 2022-02-11 杭州安恒信息技术股份有限公司 Method for reducing false alarm of vulnerability scanning
CN111199042A (en) * 2019-12-17 2020-05-26 中国南方电网有限责任公司超高压输电公司 Safe and efficient vulnerability management system
CN111695120A (en) * 2020-06-12 2020-09-22 公安部第三研究所 Information system safety deep threat early warning system and method
CN112615812A (en) * 2020-11-19 2021-04-06 贵州电网有限责任公司 Information network unified vulnerability multi-dimensional security information collection, analysis and management system
CN112532647A (en) * 2020-12-07 2021-03-19 中国南方电网有限责任公司超高压输电公司 Deep attack identification method and device for core service of power system
CN113206825A (en) * 2021-03-25 2021-08-03 国网浙江省电力有限公司衢州供电公司 Scanning result comparison analysis method of missing scanning device
CN114866285A (en) * 2022-04-07 2022-08-05 水利部信息中心 Vulnerability full-life-cycle automatic intelligent system for unified command
CN114866285B (en) * 2022-04-07 2023-10-27 水利部信息中心 Uniform command vulnerability full life cycle automatic intelligent system
CN114978614A (en) * 2022-04-29 2022-08-30 广州市昊恒信息科技有限公司 IP asset rapid scanning processing system

Similar Documents

Publication Publication Date Title
CN106453432A (en) Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform
Chin et al. Energy big data security threats in IoT-based smart grid communications
CN103999089B (en) For the system and method for scanning computer leak in a network environment
CN106595565B (en) A kind of intellectual faculties based on BIM
CN107786640A (en) A kind of city intelligent manhole cover system and management method
CN107516282A (en) Three look into the Land Change Survey information management system of unification
CN110401661A (en) A kind of network security target range system of electric power monitoring system
CN103227797A (en) Distributive management system of information network security for power enterprises
CN106780154A (en) The electricity transmitting and converting construction process environmental practice monitoring system and method for multithreading information fusion
CN104899922A (en) Three-dimensional holographic generation method for intelligent power grid visualization application
CN103118036A (en) Cloud end based intelligent security protection system and method
CN104680318A (en) BIM-based engineering personnel control system and method
CN101938459A (en) CRNET (China Railcom Net) sSafe cooperative defense system for whole course communication network
CN103995936A (en) Simulation system platform used for practical training of water supply and drainage pump operators
CN105975863A (en) Method for evaluating and calculating information security risk of power distribution automation terminal equipment
CN109327471A (en) A kind of loophole discovery and verifying implementation method of meeting an urgent need
CN106779485A (en) Total management system and data processing method based on SOA framework
CN103944763A (en) Network-assistant management system and method of electrical power system
CN1614941A (en) Method for establishing complex network running environmental analog stimulative platform
CN105939200A (en) Method and system for performing network security risk evaluation by utilizing expert system
CN109376527A (en) A kind of management method and system based on receipts and trustship in account
CN202870564U (en) Digital mine safety production local area network system
CN106911673A (en) A kind of electric power wide area Internet cooperates with safely guard system and its means of defence
CN101488203A (en) Method and system for real-time browsing production technique document in production field
CN114124436B (en) APN access trusted computing management system based on electric power Internet of things universal terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222