Research on Terminal Security Protection Technology Based on Automatic Detection and Response

Song Xi, Shang Weiliang, Liu Jixiang

Integrated Circuits and Embedded Systems ›› 2022, Vol. 22 ›› Issue (3) : 36-40.

PDF(1188 KB)
PDF(1188 KB)
Integrated Circuits and Embedded Systems ›› 2022, Vol. 22 ›› Issue (3) : 36-40.
TECHNOLOGY REVIEW

Research on Terminal Security Protection Technology Based on Automatic Detection and Response

  • Song Xi1, Shang Weiliang1, Liu Jixiang2
Author information +
History +

Abstract

Aiming at the security problems in the application of terminal operating systems,this paper studies the terminal security protection technology based on automated detection and response,and designs the hardware for automated detection and response,which includes 5 parts:console,analog signal output unit,switch analog unit,communication unit and test bench.It also uses the improved K-means algorithm to detect and protect the terminal security.The experiment results show that the accuracy of the research in this paper is the highest with a minimum error of 0.2%,and when the number of threat attacks is the same,the security protection lasts the longest.

Key words

automatic detection and response / security protection / K-means improved algorithm

Cite this article

Download Citations
Song Xi, Shang Weiliang, Liu Jixiang. Research on Terminal Security Protection Technology Based on Automatic Detection and Response[J]. Integrated Circuits and Embedded Systems, 2022, 22(3): 36-40

References

[1] 常方圆,李二霞,王金丽,等.基于可信计算的配电自动化终端安全防护方法研究[J].电力信息与通信技术,2020(2):37-42.
[2] 朱兵,叶水勇,陈明,等.电力公司移动作业终端安全防护研究[J].机电信息,2019,602(32):92-93.
[3] 倪伟东,武利会,王俊丰.基于自主安全芯片的配网自动化系统网络安全防护及硬件加速[J].电力科学与技术学报,2020,130(3):168-174.
[4] Wang Z,Yu L.Research on IoT Security Defense Based on Honeypot Technology[J].Journal of Physics: Conference Series,2021,508(32):87-93.
[5] Chen J,Liu W,Lv X,et al.Research on Microkernel-based Power Dedicated Secure Operating System[J].Journal of signal processing systems for signal,image,and video technology,2019,91(10):1127-1136.
[6] 张艳,彭华熹,何申.移动终端安全要求测评技术研究及应用[J].信息安全研究,2020,6(5):427-432.
[7] 孙舟,潘鸣宇,陈振,等.电动汽车充电桩自动化渗透测试系统的研究和设计[J].中国电力,2019,52(1):63-68,115.
[8] 史训涛,黎智,陈川,等.湿热环境下配电自动化终端的腐蚀失效分析[J].装备环境工程,2019,16(7):95-100.
[9] 张文哲,赖宇阳,孙宏棣,等.一种配电自动化信息安全防护系统设计[J].机械设计与制造工程,2020,434(1):66-71.
[10] 杨宇荣,许永军,杜东威,等.基于网络分布式规约的配电网安全防护方案应用[J].浙江电力,2019,38(3):48-53.
[11] Wang Y,Gao Y,Luo B B.Research on Security Protection Technology Based on Terminal Information Jump[J].Journal of Physics:Conference Series,2020,1651(1):012044(4pp).
[12] 谢云龙.工业控制系统主机安全防护研究与实践[J].自动化博览,2019,316(S2):104-106.
[13] 张涛,赵东艳,薛峰,等.电力系统智能终端信息安全防护技术研究框架[J].电力系统自动化,2019,665(19):7-14,91.
[14] 路晔绵,翟旭,朱红伟,等.移动终端可信执行环境自动化安全测试方法研究[J].移动通信,2019,43(10):62-67.
[15] 丁剑明.煤矿工业控制系统安全现状和解决方案[J].信息安全研究,2019,47(8):10-16.
[16] 尚文利,张修乐,刘贤达,等.工控网络局域可信计算环境构建方法与验证[J].信息网络安全,2019,220(4):7-16.
[17] 曾瑞江,陈秀萍,都海波,等.配电自动化设备闭环检测技术研究[J].测控技术,2020,339(5):101-105,121.
PDF(1188 KB)

48

Accesses

0

Citation

Detail

Sections
Recommended

/