Visible to the public Application of Dynamic Security Technology Architecture for Advanced Directional Attacks in Power System Information Security

TitleApplication of Dynamic Security Technology Architecture for Advanced Directional Attacks in Power System Information Security
Publication TypeConference Paper
Year of Publication2018
AuthorsShen, W., Liu, Y., Wu, Q., Tian, Y., Liu, Y., Peng, H.
Conference Name2018 International Conference on Power System Technology (POWERCON)
Keywordsadvanced directed attack, advanced directional attacks, behavior-based detection, business application systems, composability, comprehensive technology transformation, Data analysis, defense-based static security protection architecture, Dynamic Networks and Security, dynamic security technology architecture, dynamic security technology system, Dynamical Systems, enterprise network security thinking, Information systems, Metrics, power engineering computing, power information system, power system information security, power system security, pubcrawl, Resiliency, security defense mechanism, security of data, security technology system, security threat prediction, unified security strategy
Abstract

In view of the increasingly severe network security situation of power information system, this paper draws on the experience of construction of security technology system at home and abroad, with the continuous monitoring and analysis as the core, covering the closed-loop management of defense, detection, response and prediction security as the starting point, Based on the existing defense-based static security protection architecture, a dynamic security technology architecture based on detection and response is established. Compared with the traditional PDR architecture, the architecture adds security threat prediction, strengthens behavior-based detection, and further explains the concept of dynamic defense, so that it can adapt to changes in the grid IT infrastructure and business application systems. A unified security strategy can be formed to deal with more secretive and professional advanced attacks in the future. The architecture emphasizes that network security is a cyclical confrontation process. Enterprise network security thinking should change from the past "emergency response" to "continuous response", real-time dynamic analysis of security threats, and automatically adapt to changing networks and threat environments, and Constantly optimize its own security defense mechanism, thus effectively solving the problem of the comprehensive technology transformation and upgrading of the security technology system from the traditional passive defense to the active sensing, from the simple defense to the active confrontation, and from the independent protection to the intelligence-driven. At the same time, the paper also gives the technical evolution route of the architecture, which provides a planning basis and a landing method for the continuous fulfillment of the new requirements of the security of the power information system during the 13th Five-Year Plan period.

URLhttps://ieeexplore.ieee.org/document/8601646
DOI10.1109/POWERCON.2018.8601646
Citation Keyshen_application_2018