1. Research on Security Threat Assessment for Power IOT Terminal Based on Knowledge Graph
- Author
-
Shen Quanjiang, Song Yan, and Pang Tianyu
- Subjects
ALARM ,Terminal (electronics) ,Computer science ,Software deployment ,Computer security ,computer.software_genre ,Maintenance engineering ,Threat assessment ,computer ,Terminal equipment ,Power (physics) ,Vulnerability (computing) - Abstract
Due to the large number of terminal nodes and wide deployment of power IOT, it is vulnerable to attacks such as physical hijacking, communication link theft and replay. In order to sense and measure the security risks and threats of massive power IOT terminals in real time, a security threat assessment for power IOT terminals based on knowledge graph was proposed. Firstly, the basic data, operation data and alarm threat data of power IOT terminal equipment are extracted and correlated, and the power IOT terminal based on knowledge graph is constructed. Then, the real-time monitoring data of the power IOT terminal is preprocessed. Based on the knowledge graph of the power IOT terminal, the safety analysis and operation analysis of the terminal are carried out, and the threat index of the power IOT terminal is perceived in real time. Finally, security operation and maintenance personnel make disposal decisions on the terminals according to the threat index of power IOT terminals to ensure the safe and stable operation of power IOT terminal nodes. The experimental results show that compared with the traditional IPS, the method can effectively detect the security threat of the power IOT terminal and reduce the alarm vulnerability rate.
- Published
- 2021
- Full Text
- View/download PDF