Proceedings of the 5th Management Science Informatization and Economic Innovation Development Conference, MSIEID 2023, December 8–10, 2023, Guangzhou, China

Research Article

Security Situation Awareness Analysis of Mobile Power Business Based on Artificial Intelligence

Download30 downloads
  • @INPROCEEDINGS{10.4108/eai.8-12-2023.2344481,
        author={Liang  Yuan and Yubin  Du and Xinrui  Ju and Mengyuan  Li},
        title={Security Situation Awareness Analysis of Mobile Power Business Based on Artificial Intelligence},
        proceedings={Proceedings of the 5th Management Science Informatization and Economic Innovation Development Conference, MSIEID 2023, December 8--10, 2023, Guangzhou, China},
        publisher={EAI},
        proceedings_a={MSIEID},
        year={2024},
        month={4},
        keywords={network security; data acquisition; situation awareness; data analysis},
        doi={10.4108/eai.8-12-2023.2344481}
    }
    
  • Liang Yuan
    Yubin Du
    Xinrui Ju
    Mengyuan Li
    Year: 2024
    Security Situation Awareness Analysis of Mobile Power Business Based on Artificial Intelligence
    MSIEID
    EAI
    DOI: 10.4108/eai.8-12-2023.2344481
Liang Yuan1, Yubin Du1,*, Xinrui Ju1, Mengyuan Li1
  • 1: State Grid Huitongjincai (Beijing) Information Technology CO., LTD
*Contact email: duyubin1221@163.com

Abstract

Service bearer network is an important support for information communication in various jobs. The traditional security construction with numerous chimneys is difficult to form synergistic benefits and difficult to operate and maintain. The outbreak of malicious codes such as APT attacks and ransomware, and the access of new units all bring great risks and challenges to the safe operation of the network. Establish a system for statistical analysis and multi-form visual presentation of all kinds of security situation information, and realize the normal monitoring of cyberspace situation by compiling and integrating the security situation of each network. The test shows that the system supports equipment log collection, asset detection, security event feature extraction and correlation analysis, which can help network operators to grasp the security situation of cyberspace at any time and improve the overall security protection ability of the network.