skip to main content
10.1145/3452940.3452985acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
research-article

Review on The Collection Technology of Station Network Equipment Status Based on Power Plant Side

Published: 17 May 2021 Publication History

Abstract

The safety protection of new energy plants is an important link in the power monitoring system. This paper summarizes the collection technology of network equipment status in new energy plants, mainly from three aspects: illegal network channel analysis and isolation technology, security status collection index and collection technology, and honeypot-based illegal network traffic traction technology. First, we study and analyze illegal network channels based on the obtained equipment status information and network topology information. Then, based on the discovered illegal network channel link information, we discuss the illegal network channel isolation technology based on firewalls and Illegal network traffic traction technology based on honeypots. Finally, in view of the problems of multiple external information interaction interfaces for network equipment and complex terminal communication, We discuss the collection index system and collection technology of the security status of network equipment.

References

[1]
L. P. Su, S. Y. Han. Research on flow identification technology in new energy plants and stations[J]. Application Research of Computers. 2020, (A1): 281--282.
[2]
Z. X. Chen. Analysis of safety status of industrial control system in thermal power plant[J]. Automation Instrumentation. 2019, 40(2): 72--75.
[3]
J. Ma, H. Pang, H. T. Nie, et al. Research on the security collection of new energy power plant dispatch data based on Beidou power application[J]. Power Supply and Use. 2019, 36(6): 29--33.
[4]
X. Dong, T. Zhang. Research on Network Information Security Risk Analysis and Protection of New Energy Power Station[J]. Cyberspace Security. 2020, 11(2): 59--65.
[5]
Q. L. Wang, Y. S. Wang, D. Wang, et al. Research and implementation of new energy power station network security protection scheme[J]. Network Security Technology and Application. 2020, (8): 144--145.
[6]
S. P. Su, J. C. Zhao. Construction and practice of the whole-process management system for safety protection of Qinghai Power Grid power monitoring system[C]//Management Innovation Practice of China's Power Enterprises, 2019.
[7]
Z. Zheng. Methods to improve the safety protection level of the secondary system of new energy power stations[J]. Science and Technology Outlook. 2016, 26(23): 126.
[8]
M. Jiang. Considerations and Practice of Network Security Protection for New Energy Power Stations in Three Gorges Group[J]. Mechanical and Electrical Technology of Hydropower Stations, 2019, 42(03): 43--44+72.
[9]
W. Liu. Research on Remote Operating System Detection Using Libnet[J]. International Conference on Industrial and Information Systems, 2009, 101--103.
[10]
W. H. Jiang, W. H. Li, and J. Du. The Application of ICMP Protocol in Network Scanning[C]//Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2003, 904--906.
[11]
S. Marshall. Candid: Classifying Assets in Networks by Determining Importance and Dependencies [M]. University of California at Berkeley, 2013.
[12]
H. Kim, K. Claffy, M. Fomenkov, et al. Internet Traffic Classification Demystified: Myths, Caveats, and the Best Practice[C]//Proceedings of the ACM Conext Conference, 2008, 11: 1--12.

Index Terms

  1. Review on The Collection Technology of Station Network Equipment Status Based on Power Plant Side
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICITEE '20: Proceedings of the 3rd International Conference on Information Technologies and Electrical Engineering
        December 2020
        687 pages
        ISBN:9781450388665
        DOI:10.1145/3452940
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 17 May 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Acquisition technology
        2. Isolation technology
        3. Network equipment
        4. Power monitoring system
        5. Safe state

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ICITEE2020

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 11
          Total Downloads
        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 28 Feb 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media