Research and Application of Sensitive Information Control Based on Power Internet of Things Assets

Due to the presence of a large number of intelligent devices in the power grid IoT, the IoT terminals in the power grid exhibit characteristics such as intelligence, networking, and interactivity, often deployed in uncontrolled environments, resulting in high difficulty in control and high risk of u...

Full description

Saved in:
Bibliographic Details
Published in2023 IEEE 7th Information Technology and Mechatronics Engineering Conference (ITOEC) Vol. 7; pp. 2267 - 2271
Main Authors Zhang, KunSan, Ji, Wen, Fu, Jie, Zheng, JiaMing, Huang, TaiNing
Format Conference Proceeding
LanguageEnglish
Published IEEE 15.09.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Due to the presence of a large number of intelligent devices in the power grid IoT, the IoT terminals in the power grid exhibit characteristics such as intelligence, networking, and interactivity, often deployed in uncontrolled environments, resulting in high difficulty in control and high risk of unauthorized access and violation control. Moreover, at the beginning of the design of sensitive information collection systems for power IoT terminals, most of them did not consider corresponding security protection mechanisms, which makes them very susceptible to attacks and exploitation by hackers, leading to incomplete information collection, sensitive information leakage, and other abnormalities. Therefore, for institutions such as the power grid that have a large number of IoT devices and some other network assets, a fast and accurate GO language based high concurrency scanning tool for internet assets; Research device fingerprint collection methods for ports, and integrate fingerprints through YAML to achieve efficient and accurate device fingerprint collection; Research Big data visualization display based on Echarts, realize data analysis visualization, and help relevant personnel quickly locate risk assets; Research the precise risk warning and notification function based on containerized deployment to help relevant personnel quickly carry out relevant defense. This technology greatly saves manpower, material costs, and economic losses, and reduces the possibility of network attacks on the power IoT network.
ISSN:2693-289X
DOI:10.1109/ITOEC57671.2023.10291751