skip to main content
10.1145/3452940.3452987acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciteeConference Proceedingsconference-collections
short-paper

Review of Illegal Network Channel Isolation Technology Based on PowerPlant

Published: 17 May 2021 Publication History

Abstract

In response to the common security risks such as illegal outreach and remote operation and maintenance in new energy plants, the method of identifying illegal network channels has been studied in depth. The purpose is to replace manual inspections and use technical means to effectively monitor and eliminate such illegal network channels. Based on this, this article summarizes and categorizes current research. First, starting from the multidimensional network device association relationship, how to obtain the network topology relationship, business relationship and physical entity relationship of the network device is discussed. Then, based on these obtained relationships, this paper focuses on the identification of cross-regional network access channels for typical application scenarios.

References

[1]
Z. D. Hu. Analysis on the Application and Sustainable Development of New Energy[J]. Science and Technology Outlook, 2015, 25( 28): 256.
[2]
National Development and Reform Commission, National Energy Administration. The 13th Five-Year Plan for Electric Power Development [EB/OL]( 2017-06-05). http://www.Ndrc.Gov.cn/fzgggz/fzgh/ghwb/gjjgh/201706/t20170605_849994. Html.
[3]
State Grid Energy Research Institute Co., Ltd. 2018 China New Energy Power Generation Analysis Report[M]. China Electric Power, 2018.
[4]
W. N. Liu, L. Zhang. Discussion on the Communication System of Regional New Energy Centralized Control Center[J]. Electric Power Survey & Design, 2019(12): 70--74.
[5]
L. P. Su, S. Y. Han. Research on flow identification technology in new energy plants and stations[J]. Application Research of Computers, 2020, 37(S1): 281--282.
[6]
Z. Y. Fan. Analysis of the impact of centralized access of new energy on grid protection and research on countermeasures[D]. Huazhong University of Science and Technology, 2019.
[7]
X. J. Jin, D. Su, N. P. Mao, et al. Research on active monitoring and early warning technology for new energy plants[J]. Zhejiang Electric Power, 2019, 38(06): 106--112.
[8]
L. Li. Research on multi-scenario online network identification method for new energy base[D]. North China Electric Power University (Beijing), 2019.
[9]
T. J. Zeng. Integrated design and implementation of new energy and hydropower monitoring system[J]. Hongshuihe, 2019, 38(04): 40--42+57.
[10]
Z. X. Huang, Y. Su. Research on network security situation assessment based on link performance analysis[J]. Computer Applications, 2013, 33(11): 3224--3227.
[11]
X. Zou, H. Liu, F. Wang. Network boundary security monitoring method based on PKI[J]. Computer Engineering, 2010, 36(13): 140--142.
[12]
M. Guri, G. Kedma, A. Kachlon, et al. AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies[C]// 2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE). IEEE, 2015.

Index Terms

  1. Review of Illegal Network Channel Isolation Technology Based on PowerPlant
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICITEE '20: Proceedings of the 3rd International Conference on Information Technologies and Electrical Engineering
        December 2020
        687 pages
        ISBN:9781450388665
        DOI:10.1145/3452940
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 17 May 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Analytical skills
        2. Connection relation
        3. Illegal network channel
        4. Multi-dimension
        5. Network traffic system

        Qualifiers

        • Short-paper
        • Research
        • Refereed limited

        Conference

        ICITEE2020

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 16
          Total Downloads
        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 28 Feb 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media