Font Size: a A A

Analysis For The Security Of Information Network For Electrical Power Plants

Posted on:2004-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:X X HuangFull Text:PDF
GTID:2168360092481376Subject:Water Resources and Hydropower Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of information for power market in China, information network for electrical power plants has developed from the previous isolated individual network to multi-connect complex ones for information share. The development of the regulation for the power market led the tendency for connection of network between electrical power system and society. The security of network is becoming more and more important during cooperation for personnel of electrical power plants among national, international, provincial agency, state and local government based on the resources of network.In this thesis the risk of security for the information of electrical power plants was analyzed, regulation of security system for the whole network was issued, a series of resolutions approaching to the security for electrical power plants was proposed in order to guarantee the operation of network of electrical power plants in the state of health, safety and efficiency. Resolution to the security for electrical power plants includes such five parts as equipment of firewall, security scan ofnetwork, intrusion detection, anti-virus as well as arrangement of network, detailed demonstration for each part was also discussed.Intrusion detection is an active technology for defense, supplies the complement for shortcoming of traditional security technology like firewall, cryptograph. The drawback for system of intrusion detection was analyzed, a kind of intrusion detection system based on data mining technology was proposed. In the realization of the system deep research was carried out based on regular mining, some achievements were gained.
Keywords/Search Tags:Information network for electrical power plants, SCADA, MIS, Firewall, Data mining, Intrusion detection
PDF Full Text Request
Related items