infrastructure in the network area of the overall
network security management architecture shown in
Figure 3. (2) the monitoring of network security
events has changed from the original monitoring of
Edge events to an all-round and overall monitoring,
covering both internal and external aspects of unsafe
behavior (Gu Zhuoyuan, 2019). (3) from simple
monitoring and early warning, to network security
analysis and location, traceability processing, Audit
and verification, interactive management. (4) a
network integrated security management mode from
“Edge monitoring, static control” to “Comprehensive
monitoring, dynamic real-time management”.
3 PLATFORM APPLICATION
The implementation of the platform follows the
overall design principle of hierarchical deployment
and cooperative management, and the network
security distributed management platform is
configured to all levels of regulatory agencies, and the
network security monitoring equipment is configured
to all plant stations, thus, a new and comprehensive
network security management system is formed,
which can cover the whole power network.
(1) to increase the monitoring and collection of
mainframe services, data exchange equipment,
network security equipment, database operation and
alarm information in the power monitoring system,
the security events of the monitoring target are
recorded and analyzed to provide the data basis for
the cooperative protection of the whole network. (2)
plant and station monitors shall be installed in fossil-
fuel power station stations and substations to collect
and manage them, so as to supplement the
deficiencies of safety management methods for their
equipment and systems. (3) providing an interface for
daily operation, centralized monitoring and
management of the software and hardware operation
status of the power monitoring system, and providing
recording functions such as Operation Information
and alarm information, provide effective data
tracking support for problem resolution and
traceability (Chen Wuhui, 2019). (4) by verifying the
security configuration of the host computer and
evaluating the security risk, it is easier to find the
security defect of the host computer, so that the
security work is changed from passive defense to
active monitoring. (5) it provides an effective
management method for the occurrence and disposal
of security incidents, which can manage the whole
life cycle of security incidents from occurrence to
disposal, and monitor the operation of resources in
real time. With the ability to view data and topology,
from passive reception to active monitoring; a unified
management of threats and vulnerabilities.
4 CONCLUSION
The construction and effective operation of network
security management platform is the basic technical
means to improve the ability of network security
situation awareness, early warning and emergency
response, it is also the primary work of network
security system of electric power monitoring system.
Compared with the previous generation internal
network security monitoring and management
platform, a power monitoring and management
platform based on Trusted Computing, security
controllable, security immune, the utility model can
play a more efficient safety protection effect in the
practical application.
ACKNOWLEDGEMENTS
This work was supported by New generation of
dispatching technology support system.
REFERENCES
Shi Zhiguo, Computer Network Security Tutorial (M).
Second edition. Beijing: Tsinghua University Press,
2018.
Ma Jianwei, Wan Huijiang, Wang Xiangdong. The present
situation and improvement method of network security
of electric power monitoring system (J). Information
and computing (theoretical edition), 2018(22): 193-194.
Sudan, Yang Rui, Wu Jia, etc. Design and application of
monitoring model for electric power information
communication system (J). Science and Technology
Bulletin, 2018(8): 164-167.
Gu Zhuoyuan, Tang Yong, Sun Huadong, etc. Response-
based power system security and stability, integrated
defense technology (J). Chinese Journal of Electrical
Engineering, 2019, 39(4): 196-204.
Chen Wuhui, Chen Wengan, Xue Ancheng. Physical power
system for cooperative information attack, system
security risk assessment and defense resource
allocation (J). Grid technology, 2019(7): 2353-2360.
Xue Mei Hou. Noise-Robust Speech Recognition Based on
RBF Neural Network (J). Advanced Materials
Research. 2011, VOL. 217-218: 413-418
Maha El Meseery,Mahmoud Fakhr El Din, Heba El Nemer.
A Hybrid Particle Swarm/Nelder-Mead Clustering
Algorithm for Face Recognition (J). International
ANIT 2023 - The International Seminar on Artificial Intelligence, Networking and Information Technology