KEYWORDS: Data modeling, Telecommunications, Data conversion, Data fusion, Performance modeling, Optimization (mathematics), Lithium, Systems modeling, Network security, Data communications
The equipment and device protocols in the power monitoring system are difficult to unify, and the existing power monitoring system structure system analysis protocol takes a long time. In order to improve the system operation efficiency, a power monitoring system architecture based on multi-protocol fusion is designed. Establish a power monitoring system model through the power and state change equations; coordinate the data analysis in the system and the caching and reading functions of key logic to ensure multi-protocol fusion and conversion of power monitoring data; reset the power monitoring architecture based on the multi-protocol fusion method, establish a multi-objective optimization model, set its constraints, and obtain a new power monitoring system architecture. Taking the user scale as a variable, comparing the response time of four different power monitoring systems, it can be seen from the experimental data that the time required for this architecture is the minimum value under the same conditions under five different operations. The optimization effect is the best, which can realize the fast response of the power monitoring system.
KEYWORDS: Telecommunications, Computing systems, Computer security, Information security, Data communications, Data acquisition, Network security, Quantum communications, Receivers, Data transmission
In the security agent communication of power monitoring system, because the front-end machine corresponds to multiple communication equipment, when one front-end machine fails, the load of the front-end machine system is unbalanced, resulting in system paralysis. Therefore, based on Docker technology, a safe load method of power monitoring system is designed. The security agent communication model of the power monitoring system is established. Based on the model, the Docker container is allocated to the front mobile state of the master station, combined with the telescopic group service to balance the load of the front-end computer system. According to the network configuration information of the Docker container, the communication connection between the acquisition equipment and the master station is established, the computer processes the access request, and sets the routing strategy according to multiple constraints, The information transmission channel and encrypted transmission channel are established by using the routing strategy to complete the design of safe load method of power monitoring system. The experimental results show that using the proposed safe load method of power monitoring system based on Docker technology, the load of front-end computer system is more balanced, and the load rate is between 40 ~ 50%, which can quickly process the communication and improve the stability and security of the system.
The existing security alarm system is difficult to accurately judge the effective alarm data, resulting in a large amount of redundant data in the alarm system database. In order to alleviate the operation pressure of the alarm system, a power monitoring network security threat alarm system based on attribute attack graph is designed. In the system hardware, the CPU power supply and network interface are designed. In the system software, the visual traceability analysis of security threat data is carried out. Based on the attribute attack graph, the topology algorithm is used as the analysis tool of attack nodes, and the weight index of information similarity is established. The binary attack node system in the system is established by atomic attack node and attribute attack node to judge the similarity level of different alarm information. In the experiment, the alarm aggregation rate and system reliability of four different alarm systems are tested. The experimental data show that the system can remove more redundant data without losing alarm data, which shows that the system has better performance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.