Telecommunications Science ›› 2019, Vol. 35 ›› Issue (11): 132-139.doi: 10.11959/j.issn.1000-0801.2019280

• Power informatization column • Previous Articles     Next Articles

Knowledge graph based ubiquitous power IoT security visualization technology

Yang YU,Shaomin ZHU,Chaoyi BIAN   

  1. Beijing Venus Information Security Technology Co.,Ltd.,Beijing 100193,China
  • Revised:2019-11-10 Online:2019-11-01 Published:2019-12-23

Abstract:

With the construction of the ubiquitous power IoT,the power network transform to interconnection,the data become more interactive and shared,and the business transform to lateral link-up,which pose new challenges to the original network security protection system.Network security visualization technology helps network security personnel quickly identify potential attacks,locate abnormal events,discover new types of attacks,and quickly capture global network security situation by displaying and analyzing the graph patterns.Based on the knowledge graph,the ubiquitous power IoT security analysis was carried out.The internal and external threat intelligence was modeled firstly.Then the relationship between the conceptual entities was constructed.The threat intelligence as knowledge graph was modeled,and then the abstract and complex alarm information which was invisible was converted into a more intuitive and convenient style,which provided accurate support for ubiquitous network security protection decisions in the power IoT.

Key words: ubiquitous power IoT, security visualization, threat intelligence, knowledge graph

CLC Number: 

No Suggested Reading articles found!