Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Electric Power Automation Equipment》 2006-01
Add to Favorite Get Latest Update

Research on Agent & STAT-based intrusion detection system of electric power information system

DONG Bin,ZHANG Shao-min,WANG Bao-yi(School of Computer Science and Engineering,North China Electric Power University,Baoding 071003,China)  
The necessity of intrusion detection for electric power information network is analy-zed and a new intrusion detection system based on both Agent and STAT(State Transition Analysis Tool)is proposed by introducing the Agent-technique.The new system updates rules by Agent-technique,and perceives real-timely the state of intruding activities and analyzes them by STAT.The experimental result indicates that the intrusion detection system based on Agent and STAT is capable of increasing efficiently the detection rate.Its application in electric power system is analyzed.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 2 Hits
1 WANG Yufei;ZHAO Ting;LI Shaoyu;ZHAO Baohua;LI Yujie;Department of Information & Communication,China Electric Power Research Institute, Haidian District;Gansu Electric Power Corporation;;An Intrusion Detection Method for Electric Power Information Network Based on Improved Minimum Enclosing Ball Vector Machine[J];Power System Technology;2013-09
2 LAN Wen-fei,LU Ji-guang(College of Computer Science,South-Central University for Nationalities,Wuhan 430074,China);Research on intelligent Agent in component library system[J];Computer Engineering and Design;2007-17
Chinese Journal Full-text Database 10 Hits
1 Guo Hone - gane , LIU Ke - sheng;Intrusion Detection Technology and the Analysis of Its frangibility[J];Journal of Anhui Vocational College of Electrontcs & Information Technology;2004-Z1
2 LI Chang-chun(Chuzhou Vocational Technology College,Chuzhou 239000,China);On the Technology of WLAN Intrusion Detection[J];Journal of Baicheng Normal University;2012-03
3 ZHANG Zhi-guo,GUAN Qun(College of Computer Science,Sichuan University,Chengdu 610064,China);Research on Accelerating of Rule-Matching in Snort[J];Ordnance Industry Automation;2008-12
4 DU Hao-yang (Henan University of Finance and Economics,Zhengzhou,450001,China);Research and improvement of BM-algorithm for pattern matching in Snort[J];Journal of Henan University of Urban Construction;2009-03
5 TAO Ran(Dept of Computer Science and Technology,Anhui University of Science and Technology,Huainan,Anhui,China 232001);Application of data mining in network information security[J];Journal of Changsha Telecommunications and Technology Vocational College;2007-03
6 Zhou Li(Sydney Institute of Language and Commerce,Shanghai University,Shanghai 201800,P.R.China);Yang Yanhang(Harbin University of Science and Technology);Diao Hongbin(Heilongjiang Provincial Bureau of Statistics);Application of Multi-agent Model to Intrusion Detection Systems Based on Immune Theory[J];Journal of Northeast Forestry University;2009-12
7 LI Hong-xia 1 , WANG Xin-sheng 1 , LIU Lin 1 (1. College of Information Science and Engineering, YanShan University, QinHuangDao, Heibei 066004, China);Improvement of content-based intrusion detection system[J];Journal of Yanshan University;2005-04
8 ;Research and Application of Intrusion Detection on 802.11 Wireless Local Area Network[J];Computer Development & Applications;2010-11
9 LI Jian (School of Information Security, Shanghai Jiaotong University,Shanghai 200240,China);Analysis of Intrusion Detection System[J];Computer Knowledge and Technology(Academic Exchange);2007-19
10 ZHOU Yan,HAN Yi(Anyang Institute of Technology Computer Science and Information Engineering Department,Anyang 455000,China);The Introduction of Intrusion Detection Technology[J];Computer Knowledge and Technology;2008-03
China Proceedings of conference Full-text Database 3 Hits
1 Lin Guo-qing, Wang Xin-mei (ISN Key National Laboratory; Xidian University, Xi'an, 710071, China);A Network Intrusion Detection System Based on Agreement Flow Analysis and Protocol Analysis[A];[C];2006
2 Xu Lie,Wang Ming Yin (Department of Information & Equipment,The Academy of Equipment Command & Technology,Beijing,101416);Real-time anomaly detection based on the Hidden Markov Model[A];[C];2009
3 Xu Lie;Wang Ming Yin;Department of Information & Equipment,The Academy of Equipment Command & Technology;;Real-time anomaly detection based on the Hidden Markov Model[A];[C];2009
Chinese Journal Full-text Database 10 Hits
1 Wang Jianming(North China Electric Power University);Data Security Design of Power System Based on Improved RBAC Model[J];Electrotechnical Application;2006-09
2 Wang Xianpei1 ,Xiong Ping1 ,L i Wenwu2 1. Wuhan U niversity,Wuhan 4 30 0 72 ,China 2 .Three Gorges U niversity,Yichang4 4 30 0 2 ,China;APPLICATION OF FIREWALL AND IDSIN THE INFORMATION NETWORK FOR POWER ENTERPRISES[J];Automation of Electric Power Systems;2002-05
3 Hu Yan1 ,Dong Mingchui2 ,H an Yingduo1 1.Tsinghua U niversity,Beijing10 0 0 84 ,China 2 .Institute of System s and Computer Engineering,Macau,China;CONSIDERATION OF INFORMATION SECURITY FOR ELECTRIC POWER INDUSTRY[J];Automation of Electric Power Systems;2002-07
4 Hu Yan 1, Dong Mingchui 2 (1. Tsinghua University, Beijing 100084, China) (2. Institute of Systems and Computer Engineering, Macao, China);STRENGTHENING THE SECURITY OF NETWORK APPLICATIONS WITH SSL PROTOCOL[J];Automation of Electric Power Systems;2002-15
5 Shang Jincheng 1, Huang Yonghao 1, Huang Yongqian 2, Meng Yuanjing 1, He Nanqiang 1, Chen Weihua 2 (1. Henan Electric Power Company, Zhengzhou 450052, China) (2. Beijing DIS Electronic Datasystem Co Ltd, Beijing 100031, China);NETWORK INFORMATION SECURITY SOLUTION FOR ELECTRICITY MARKET OPERATION SYSTEM[J];Automation of Electric Power Systems;2003-09
6 Huang Tianshu, Sun Fuxiong, Xiang Jidong, Yu Jingsong(Wuhan University, Wuhan 430072, China);APPLICATION OF OPSEC IN NETWORK SECURITY MANAGEMENT FOR POWER ENTERPRISES[J];Automation of Electric Power Systems;2003-13
7 Xiang Jidong, Huang Tianshu, Sun Dong (Wuhan University, Wuhan 430072, China);DESIGN AND IMPLEMENTATION OF AN INFORMATION NETWORK SECURITY MANAGEMENT SYSTEM FOR POWER ENTERPRISES[J];Automation of Electric Power Systems;2003-15
8 Xiang Jidong, Huang Tianshu, Guan Huanmei (Wuhan University, Wuhan 430072, China);A REAL-TIME ANTI-VIRUS SYSTEM BASED ON GATEWAY FOR POWER ENTERPRISES[J];Automation of Electric Power Systems;2003-17
9 Wu Yiyuan , Bu Xiande , Zhang Guanyuan , Guo Jinghong (Suqian Power Supply Bureau, Suqian 223800, China) (Nanjing Automation Research Institute, Nanjing 210003, China);SECURITY TECHNOLOGY IN VOIP BASED ELECTRIC POWER COMMUNICATION SYSTEM[J];Automation of Electric Power Systems;2004-05
10 HU Yan, XIE Xiao-rong , XIN Yao-zhong ( NARI-Relays Electric Co Ltd, Nanjing 211100, China) ( Tsinghua University, Beijing 100084, China) ( National Electric Power Dispatching & Communication Center, Beijing 100031, China);Modeling and Quantitative Security Evaluation for Electric Power Information Systems[J];Automation of Electric Power Systems;2005-10
【Secondary References】
Chinese Journal Full-text Database 2 Hits
1 SU Sheng;WU Changjiang;MA Jun;ZENG Xiangjun;Hunan Province Key Laboratory of Smart Grids Operation and Control (Changsha University of Science and Technology);;Attacker's Perspective Based Analysis on Cyber Attack Mode to Cyber-Physical System[J];Power System Technology;2014-11
2 ZHAO Hai-jun;Research on Some Common Technologies Used in Unified Retrieval of Heterogeneous Data Resources[J];Sci-Tech Information Development & Economy;2010-13
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved