CN102354357A - Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid - Google Patents
Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid Download PDFInfo
- Publication number
- CN102354357A CN102354357A CN2011102970155A CN201110297015A CN102354357A CN 102354357 A CN102354357 A CN 102354357A CN 2011102970155 A CN2011102970155 A CN 2011102970155A CN 201110297015 A CN201110297015 A CN 201110297015A CN 102354357 A CN102354357 A CN 102354357A
- Authority
- CN
- China
- Prior art keywords
- lattice
- implication
- reasoning
- partition
- leak
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention relates to a lattice implication reasoning algorithm of a bug in a partitioning protection system of a smart grid, comprising the steps of: building a lattice implication algebraic system model according to the experimental environment of the partitioning protection system of the smart grid; describing the bug in the model by a method of a concept lattice; building an automatic reasoning system of the lattice implication on the basis; reasoning and inspecting the bug of the system; and inspecting the reasoning efficiency by the experiment environment of the system. The automatic reasoning system of the boundary bug is built in the partitioning protection system of the smart grid by adopting a method that lattice implication is combined with concept lattice, so that the bug detection efficiency of the smart grid is improved.
Description
Technical field
The present invention relates to a kind of electric power and detect, particularly a kind of lattice of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm.
Background technology
The subregion guard system comprises the subsystem of different safety class; Border leak in this system derives from number of different types equipment; The characteristic of leak can't use unified standard to weigh, and compares with single infosystem leak, has the not comparability of leak source characteristic.Hole Detection method in the infosystem can not be applied in the detection in this environment fully.
The detection method of leak mainly contains Static Detection and detection of dynamic.Static Detection is towards program source code, has occurred C language buffer zone leak CSSV method over nearly 10 years, and automatic vulnerability is searched EXE method and automatic sensitive code KLEE leak method of testing.But these Hole Detection methods are to C under the computer system, and the source code of language such as JAVA can not be applied to the Hole Detection of CISCO hardware device.
In order to improve the efficiency of static detection, vulnerability detection tools using information systems, typically there ?
Lexical Analysis tool? RATS;
symbolic execution tool Mjolnir, STLlint and ChecknCrash;
model checking tool MOPS, SLAM, optimization model checking tool BLAST, race condition vulnerability detection tools RacerX ;
? rule checking tool MC and Splint;
? theorem proving tools Cogent, CodeSonar, Saturn, mygcc, Eau? Claire.Testing tool has experienced lexical analysis, and symbol is carried out, and model detects, and rule detection is to the evolution of theorem proving.
Can find out that from the rule of development of Static Detection instrument rule detection and theorem proving are the development trends of current Hole Detection, this method can realize with better function and the more perfect static analysis of performance.
In order to detect the executable program leak; Need to adopt dynamic testing method; Mainly contain C language dynamic testing method that Haugh and Wilanderf deliver respectively in the international top DNSS meeting of computer security and dynamic bug excavation comparative approach, integer detects the RICH method during operation of Brumley.The IntScope method trace routine leak that the Zou Wei seminar of Peking University mainly adopts Graph-theoretical Approach and symbol to carry out, achievement in research was issued on the international top-level meeting NDSS in 2009.
Detection of dynamic is compared Static Detection and is had clear superiority; This method is not limited to C; JAVA supervisor source code; But towards specific executable program; But the subregion guard system comprises multiple safeguard, and equipment has been installed multiple program, and program has multiple source code; Border leak on such complication system, dynamic testing method also can't be suitable fully.
In sum, in order to adapt to the detection of subregion guard system coboundary protection leak, on the theoretical foundation of information bug excavation research, can attempt adopting the non-classical reasoning from logic detection method of " lattice ".
Lattice are one type of important Algebraic Structure, and the scale value logic is a kind of important non-classical logic, and it is the popularization of classical logic and fuzzy logic.The scale value logic is opened up the chain true value territory of multi valued logic wide to more general lattice; Can handle total order information; Can handle incomparable information again, thereby can more effectively portray the uncertainty of reasoning, judgement and decision-making, especially to the research of the incomplete comparability of true value.
Concept lattice is that Wille R proposed in nineteen eighty-two.Each node extension instance of concept lattice and intension notion are formal descriptions.Since 2000; Professor Shi Chunyi of Tsing-Hua University has just begun the classification of concept lattice and the research of correlation rule; What he had improved a Bordat builds the lattice algorithm; Make it to be suitable for the needs of integrated excavation; And then an algorithm from concept lattice extraction correlation rule and classifying rules is proposed, realized the unification of excavation under the concept lattice framework of correlation rule and classifying rules.
The Xu Yang of Southwest Jiaotong University in 2002 instructs the Li Haiming doctor to carry out the research of " lattice implication " algebraically.It is a kind of Algebraic Structure that lattice and implication algebras are combined that lattice contain, and is an important channel studying scale value flogic system and character thereof.The Ruan Da professor and professor Xu Yang at International Atomic Energy Agency center in 2007 unites and carried out the theoretical research of lattice implication.Xu Yang has taught at this area research the language true value of scale value logic and has summed up automated reasoning, uncertain inference, the correlative study of language true value α-generalized resolution automated reasoning.
Road has been paved in the Hole Detection theoretical research that Shi Chunyi professor's " concept lattice " achievement theoretical and that Xu Yang professor " lattice implication " is theoretical is the subregion guard system.On their theoretical research result basis; Applicant and Xu Yang professor's doctor Li Haiming professor; Method combines with " lattice implication " to adopt " concept lattice "; Found the application of lattice at the subregion guard system; In information security and the non-classical logic crossing domain of mathematics; A research border Hole Detection difficult problem is intended reliability and the completeness of in intelligent grid subregion guard system, verifying inference method.
Intelligent grid in the construction " information flow " width and significant depth have broken through China existing power system security protection border, and information has increased a lot of uncertainties.The Power SCADA control system still exists overflows back the leak that zero-sum overflows full sign indicating number, and the assailant can attack transformer substation system through this leak.Mike Davis in 2009 has demonstrated virus in world-renowned black cap conference and has attacked the electrical network behavior through leak.On September 25th, 2009, USA National Institute of Standard and Technology (NIST) confirms " leak that the intelligent grid information infrastructure exists possibly allow assailant's percolating network, obtains Control Software or change configuration condition, can not the expection mode to destroy ".Zerbst in 2010 have proposed the area principle of intelligent grid network safety prevention structure in IEEE electric power energy association; IEEE Transactions also pays close attention to the safety technique of intelligent grid; Reliability engineering; But in the intelligent grid partition system in building, the research of border Hole Detection is also rare.
China's existing power electrical secondary system " information flow " employing " security partitioning, network-specific, lateral isolation, vertically authentication " strategy ensures the safety of electric power monitoring system and Electric Power Dispatching Data Network.But there are very big difference in electric system and information network in the subregion protection, mainly show as shown in table 1 below:
Table 1
The difference classification | Information network | Intelligent grid subregion guard system |
Protection object | Computer software and hardware resource on the different operating system | Send out the defeated adapted that becomes, scheduling, all electric pressure equipment |
Security partitioning | Network segmentation, the VPN VPN (virtual private network) | Production control Da Qu and management information Da Qu |
Border Protection | Antivirus software, fire wall | Laterally gateway is isolated, vertically dialing authentication |
Host-host protocol | TCP/IP, HTTP, UDP, File Transfer Protocol | IEC 101,102,103,104 stipulations |
Data transmit | Bi-directional | Unidirectional delivery |
The leak object | System, database, application software | Software and electric power safety hardware device |
The leak characteristic | The comparability of leak characteristic | The noncomparabilities of distinct device leak characteristic |
Topmost difference is that the leak characteristic has not comparability in the table.Risk sources is in the electric intelligent terminal, radio communication, electric power data storehouse and electric power special software.
Summary of the invention
The present invention be directed in the electric system leak characteristic does not have comparative; The lifting problem that causes risk; The lattice that proposed a kind of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm; Plan is set up the automated inference system of border leak in the method that intelligent grid subregion guard system adopts " lattice implication " and " concept lattice " to combine.
Technical scheme of the present invention is: a kind of lattice of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm, specifically comprise the steps:
1) According to the first smart grid experimental environment protection system partition lattice implication algebra system model to build the smart grid according to protection class district, the district parallel to the connection point for the legal point, the other as a boundary point of vulnerability, vulnerability invasion by outside attacks to the partition system, define Partition Protection System
is a partially ordered set, assuming that S = {a, b, c}, in which any two elements have a least upper bound and the next largest, called
protection system for the partition lattice, P (S) is the partition protection system S the power set, <P(S),> is a poset, <P(S),> protection system is partitioned grid, define a loophole collection {v}, re-build V = {a, b, c, v} the poset, saying
for the partition border protection system vulnerabilities grid, in <P(V),> posets, Hasse diagram constructed by partitioning grid protection systems <P(S),> induced algebra system <P(S),,∨,∧>, including the collection and ∨, ∧ pay for the collection, if the partition protection system
grid, in algebra system <P(S),,∨,∧> on, assuming V S and V? ≠ Φ, and ∨, ∧ on V is closed, then the
grid of porous borders
sub-lattice;
2) adopt leak in the method descriptive model of concept lattice then; Rule Extraction on the lattice; Find the minimum notion that comprises; Sublattice to this node is carried out breadth first traversal; Each node is generated all nonredundancy rules; Each node is at first generated rule of implication, and the low confidence level rule of regeneration finally generates rule of implication based on the fact;
3) definition lattice implication operator makes up the automated inference system that lattice contain on this basis;
4) reasoning checking system leak is at last through experimental system environmental test Reasoning Efficiency.
The concrete steps that make up automated inference system structure automated inference system in the said step 3) are following:
The first step: definition lattice implication operator makes that it can complete description " border leak lattice " characteristic;
Second step: implication operator is offered, and condition is commented;
The 3rd step: make up the three-valued logic system according to system performance
L 3 ,
Six valued logic system
L 6 , and multi-value logic system
L n
The 4th step: define the truth table of many-valued system, definition connects time direct relation, symbolically mode speech;
The 5th step: in inference system, can adopt the classical compositional rule of inference CRI method in the Fuzzy reasoning of Zadeh; Its basic thought is to represent the Fuzzy proposition with the Fuzzy set; Implications is converted to the Fuzzy relation, the synthetic output of input and Fuzzy relation then, or at many-valued inference system
L n The middle automated reasoning method that adopts based on route searching;
The 6th step: the reliability completeness proves that the result improves the automated reasoning algorithm according to proof.
Beneficial effect of the present invention is: the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain reasoning algorithm; The method that plan adopts " lattice implication " and " concept lattice " to combine at intelligent grid subregion guard system; Set up the automated inference system of border leak, improved the Hole Detection efficient of intelligent grid.
Description of drawings
Fig. 1 is the structural model figure that the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain subregion guard system in the reasoning algorithm;
Fig. 2 is that the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain subregion guard system border leak trrellis diagram in the reasoning algorithm;
Fig. 3 is the Hasse synoptic diagram that the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain concept lattice in the reasoning algorithm.
Embodiment
Because the security partitioning safeguard structure data of electric system are unidirectional delivery, and security partitioning from low to high, can be used as a paritially ordered set, any two elements all have least upper bound and greatest lower bound, and the definition of the characteristic dative of this system is consistent.
Exist the classical logic reasoning can't explain the situation of the true and false of proposition in the subregion guard system, for example:
Proposition 1: still can there be security breaches in intelligent grid subregion guard system in the future.This proposition is to judging in the future, can't representing the really degree of this proposition with true or false.
Proposition 2: if there is leak in guard system, the risk of this systems face is bound to very big so.This is a conditional proposition, and under the situation that condition satisfies, conclusion is genuine situation, but risk necessarily very greatly also can't be explained with classical logic in the conclusion.In order to solve such problem.Adopt lattice to contain non-classical mathematical logic and carry out approximate resoning.
(1) algebra system of structure " border leak lattice ":
Intelligent grid subregion guard system comprises four subregions; Place of safety I (real time control area), place of safety II (non-control production area), place of safety III (production management district) and place of safety IV (management information area); Structure is as shown in Figure 1: parallel tie point is legal point among Fig. 1; Other are border leak point, and outside world can intrude into partition system through leak.Subregion guard system safe class partial ordering relation from high to low, whole each element of subregion guard system all has least upper bound and greatest lower bound.
Constructed grid shown in Figure 2, Figure 2, define the partition protection system
is a partially ordered set, assuming that S = {a, b, c}, in which any two elements have a least upper bound and the greatest next, then said
protection system for the partition grid.P (S) is the power set of the S of subregion guard system, and < P (S),>is a paritially ordered set, and < P (S),>is subregion guard system lattice.In the Hasse diagram to add a loophole set {v}, re-build V = {a, b, c, v} the poset, saying
for the partition border protection system vulnerabilities grid.On < P (V),>paritially ordered set, make up Hasse figure.If the partition system lattice can't be from { making up border leak lattice, possibly have leak in the hypothetical system the v}.
The power set P (S) of P (S)={ Φ, { a}, { b}, { c}, { a, b}, { a, c}, { b, c}, { a, b, c}};
Subregion S1={ Φ, { a}, { b}, { c}}
Subregion S2={ Φ, { b}, { c}, { b, c}}
Subregion S3={{a}, { a, b}, { a, c}, { a, b, c}}
Subregion S4={{a, b}, { a, c}, { b, c}, { a, b, c}}
The algebra system of inducing on the lattice is given an example:
For example 1: the algebra system of being induced by subregion guard system lattice < P (S),>is < P (S),, ∨, ∧ >, and wherein ∨ is a union of sets, and ∧ is an intersection of sets.
Example 2: If the partition protection system
grid, on the algebraic system <P(S),,∨,∧>, assuming V S and V? ≠ Φ, and ∨, ∧ on V is closed, then the
porous borders cell is
sub-lattice.
(2) make up Hasse figure based on " concept lattice "
The first step: make up lattice, adopt the method for concept lattice to describe leak.With the polynary group of case set of describing the border leak, property set, the relation between case set and the property set.In this set, set up paritially ordered set, each element exists least upper bound and greatest lower bound, makes up the description of border leak lattice.Each node in the lattice is a notion preface idol, and the power set of example set is as extension of conception, and the set of the common descriptor of example is as the intension of notion.Concept connotation and extensive relation between the extension and specialization relation according to Hasse figure discloses make up the form background.For example suppose O={1,2,3,4},
D={a1, a2, a3, b1, b2, b3, c1, c2, d1, d2, d3, d4}, R have described the attribute value set among the D that element had among the O, and the Hasse figure of corresponding concept lattice is shown in Fig. 3 time.
Second step: Rule Extraction on the lattice, find the minimum notion that comprises, the sublattice of this node is carried out breadth first traversal, each node is generated all nonredundancy rules.Each node is at first generated rule of implication, and the low confidence level rule of regeneration finally generates rule of implication based on the fact.
The 3rd one: reliability proves: the reliability that proves the leak concept lattice description of subregion guard system.
(3) definition lattice implication operator and structure automated inference system
For example 3: establishing
and be one has universal bound O; The complemented lattice of I, if mapping
:
satisfies: to any
In non-classical logic, can in the algebra system of lattice, make up the automated reasoning algorithm, be applied in two-valued function, middle boundary lattice logic and the hexa-atomic lattice flogic system, and prove the reliability and the completeness of this algorithm.The key step that makes up automated inference system is following:
The first step: definition lattice implication operator makes that it can complete description " border leak lattice " characteristic;
Second step: implication operator is offered, and condition is commented;
The 3rd step: make up the three-valued logic system according to system performance
L 3 ,
Six valued logic system
L 6 , and multi-value logic system
L n
The 4th step: define the truth table of many-valued system, definition connects time direct relation, symbolically mode speech.
The 5th step: in inference system, can adopt the classical compositional rule of inference CRI method in the Fuzzy reasoning of Zadeh, its basic thought is to represent the Fuzzy proposition with the Fuzzy set, and implications is converted to the Fuzzy relation, and input and Fuzzy relation is synthesized and exported then.Or at many-valued inference system
L n The middle automated reasoning method that adopts based on route searching.
The 6th step: the reliability completeness proves that the result improves the automated reasoning algorithm according to proof.
(4) experimental verification: on intelligent grid subregion guard system, make up border leak lattice, definition lattice implication operator, formation rule and method are set up automated inference system, detect the reliability and the completeness of lattice implication algebras system model; Adopt the characteristic attribute library test leak formalized description of leak whether to have redundant information; Coding is realized the multi valued logic inference system based on lattice, check inference system leak efficiency of test.
Intelligent grid subregion guard system application example:
1, the applied environment of instance: the subregion guard system that makes up intelligent grid according to Electricity Monitoring Commission's 5 commands " electric power secondary system regulation of protection "; Adopt the subregion safeguard in the electric system, isolate SMC-2000 detail network pipe unit management system in the single-bit file transfer ST3000 document transmission system, sysKeeper-2000 system, electric power encryption system of SysKeeper-2000 equipment, Direct/Reverse, DialKeeper-2000 safety dialing authentication network management system etc. like the forward and the reverse network security of electric power shielding system.
2, the purpose of application example: adopt lattice to contain inference method and detect the border leak in the intelligent grid subregion guard system.
3, exemplary application process: make up lattice implication algebras system model according to intelligent grid subregion guard system experimental situation earlier; Adopt the leak in the method descriptive model of concept lattice then; Make up the automated inference system that lattice contain on this basis; Reasoning checking system leak is at last through experimental system environmental test Reasoning Efficiency.
4, exemplary application result: according to the difference of interpretation and experimental hypothesis, the problem that possibly exist in the analysis ratiocination process, the deviation that exists in the test experiment process.
Complication system security protection application example:
1) exemplary application environment: complication system modeling.
2) exemplary application process: this algorithm is the method for the system science of employing; Intelligent grid subregion safeguard structure is placed in the form of complication system; The integral body and the overall situation from system; Analyze the characteristic that its architectural feature meets " subregion protection; lateral isolation; vertically authentication, unidirectional delivery ", make up algebraic model based on lattice; Then from system and Border Protection, Border Protection and leak, leak and leak, the unity of opposites relation of leak and external environment is analyzed and researched to its research, adopts the formal description leak of concept lattice.On the basis of system model that builds and leak description, set up inference system at last, prove the reliability and the completeness of leak inference system, adopt experimental check Hole Detection efficient.
3) application of principle of instance: globality, system and the leak of taking all factors into consideration complication system is comprehensive, the dynamic between the leak relation, the modelling and the leak of system push away the detection optimization.
Claims (2)
1. the lattice of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm, it is characterized in that, specifically comprise the steps:
1) According to the first smart grid experimental environment protection system partition lattice implication algebra system model to build the smart grid according to protection class district, the district parallel to the connection point for the legal point, the other as a boundary point of vulnerability, vulnerability invasion by outside attacks to the partition system, define Partition protection system
is a partially ordered set, assuming that S = {a, b, c}, in which any two elements have a least upper bound and the next largest, called
protection system for the partition lattice, P (S) is the partition protection system S the power set, <P(S),> is a poset,
is the partition protection system grid, define a loophole set {v}, Rebuild V = {a, b, c, v} the poset, saying
for the partition border protection system vulnerabilities grid, in <P(V),> posets, Hasse diagram constructed by the protection system partition induced cell <P(S),> algebraic system <P(S),,∨,∧>, including the collection and ∨, ∧ pay for the collection , if the partition protection system
grid, on the algebraic system <P(S),,∨,∧>, assuming V S and V? ≠ Φ, and ∨, ∧ is closed with respect to V , then
grid of porous borders
sub-lattice;
2) adopt leak in the method descriptive model of concept lattice then; Rule Extraction on the lattice; Find the minimum notion that comprises; Sublattice to this node is carried out breadth first traversal; Each node is generated all nonredundancy rules; Each node is at first generated rule of implication, and the low confidence level rule of regeneration finally generates rule of implication based on the fact;
3) definition lattice implication operator makes up the automated inference system that lattice contain on this basis;
4) reasoning checking system leak is at last through experimental system environmental test Reasoning Efficiency.
2. the lattice according to the said intelligent grid subregion of claim 1 guard system vulnerabilities contain reasoning algorithm, it is characterized in that, the concrete steps that make up automated inference system structure automated inference system in the said step 3) are following:
The first step: definition lattice implication operator makes that it can complete description " border leak lattice " characteristic;
Second step: implication operator is offered, and condition is commented;
The 3rd step: make up the three-valued logic system according to system performance
L 3 , six valued logic system
L 6 , and multi-value logic system
L n
The 4th step: define the truth table of many-valued system, definition connects time direct relation, symbolically mode speech;
The 5th step: in inference system, can adopt the classical compositional rule of inference CRI method in the Fuzzy reasoning of Zadeh; Its basic thought is to represent the Fuzzy proposition with the Fuzzy set; Implications is converted to the Fuzzy relation, the synthetic output of input and Fuzzy relation then, or at many-valued inference system
L n The middle automated reasoning method that adopts based on route searching;
The 6th step: the reliability completeness proves that the result improves the automated reasoning algorithm according to proof.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110297015.5A CN102354357B (en) | 2011-09-28 | 2011-09-28 | Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110297015.5A CN102354357B (en) | 2011-09-28 | 2011-09-28 | Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102354357A true CN102354357A (en) | 2012-02-15 |
CN102354357B CN102354357B (en) | 2014-10-01 |
Family
ID=45577919
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110297015.5A Expired - Fee Related CN102354357B (en) | 2011-09-28 | 2011-09-28 | Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102354357B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077325A (en) * | 2013-01-30 | 2013-05-01 | 西安交通大学 | Bad data detection method of smart power grid based on self-adaptive partition state estimation |
CN103428478A (en) * | 2013-08-16 | 2013-12-04 | 昆明能讯科技有限责任公司 | Coordinated control system of centralized control station remote long-distance video |
CN104468310A (en) * | 2014-11-14 | 2015-03-25 | 国家电网公司 | Power communication system and method |
CN104463330A (en) * | 2014-12-02 | 2015-03-25 | 刘泊荣 | Method for setting up knowledge map and navigating disciplinary knowledge |
CN106709354A (en) * | 2016-10-24 | 2017-05-24 | 北京亚控科技发展有限公司 | Security space construction method and system for configurable management control integrated platform |
CN107992746A (en) * | 2017-12-14 | 2018-05-04 | 华中师范大学 | Malicious act method for digging and device |
CN111125720A (en) * | 2019-12-27 | 2020-05-08 | 国网四川省电力公司电力科学研究院 | Information security and function security association analysis method |
CN111967034A (en) * | 2020-08-30 | 2020-11-20 | 河南大学 | RBAC role fault tolerance auxiliary construction method based on attribute exploration |
CN116910769A (en) * | 2023-09-12 | 2023-10-20 | 中移(苏州)软件技术有限公司 | Asset vulnerability analysis method, device and readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030159070A1 (en) * | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
CN101854269A (en) * | 2010-04-06 | 2010-10-06 | 珠海市鸿瑞信息技术有限公司 | Information safety operation and maintenance supervising platform of electric power secondary system |
-
2011
- 2011-09-28 CN CN201110297015.5A patent/CN102354357B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030159070A1 (en) * | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
CN101854269A (en) * | 2010-04-06 | 2010-10-06 | 珠海市鸿瑞信息技术有限公司 | Information safety operation and maintenance supervising platform of electric power secondary system |
Non-Patent Citations (4)
Title |
---|
YU YONG等: "Study on the security assessment platform for electric power secondary system", 《2006 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY》, 26 October 2006 (2006-10-26), pages 1 - 6, XP031053347 * |
吴明慧等: "乘积格蕴涵代数的子代数的MATLAB实现", 《计算机科学》, vol. 38, no. 3, 31 March 2011 (2011-03-31), pages 263 - 289 * |
周亮等: "信息系统漏洞风险定量评估模型研究", 《通信学报》, vol. 30, no. 2, 28 February 2009 (2009-02-28), pages 71 - 76 * |
李劲: "电力生产控制区业务系统漏洞修补研究", 《广西电力》, no. 4, 31 December 2009 (2009-12-31), pages 1 - 4 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077325B (en) * | 2013-01-30 | 2015-08-05 | 西安交通大学 | Based on the intelligent grid bad data detection of adaptive partition state estimation |
CN103077325A (en) * | 2013-01-30 | 2013-05-01 | 西安交通大学 | Bad data detection method of smart power grid based on self-adaptive partition state estimation |
CN103428478A (en) * | 2013-08-16 | 2013-12-04 | 昆明能讯科技有限责任公司 | Coordinated control system of centralized control station remote long-distance video |
CN104468310A (en) * | 2014-11-14 | 2015-03-25 | 国家电网公司 | Power communication system and method |
CN104463330B (en) * | 2014-12-02 | 2017-11-10 | 刘泊荣 | A kind of foundation of Knowledge Map and subject knowledge air navigation aid |
CN104463330A (en) * | 2014-12-02 | 2015-03-25 | 刘泊荣 | Method for setting up knowledge map and navigating disciplinary knowledge |
CN106709354A (en) * | 2016-10-24 | 2017-05-24 | 北京亚控科技发展有限公司 | Security space construction method and system for configurable management control integrated platform |
CN106709354B (en) * | 2016-10-24 | 2018-07-06 | 北京亚控科技发展有限公司 | A kind of the safe space building method and system of configurable control integration platform |
CN107992746A (en) * | 2017-12-14 | 2018-05-04 | 华中师范大学 | Malicious act method for digging and device |
CN111125720A (en) * | 2019-12-27 | 2020-05-08 | 国网四川省电力公司电力科学研究院 | Information security and function security association analysis method |
CN111125720B (en) * | 2019-12-27 | 2023-06-20 | 国网四川省电力公司电力科学研究院 | Information security and functional security association analysis method |
CN111967034A (en) * | 2020-08-30 | 2020-11-20 | 河南大学 | RBAC role fault tolerance auxiliary construction method based on attribute exploration |
CN111967034B (en) * | 2020-08-30 | 2022-09-16 | 河南大学 | RBAC role fault tolerance auxiliary construction method based on attribute exploration |
CN116910769A (en) * | 2023-09-12 | 2023-10-20 | 中移(苏州)软件技术有限公司 | Asset vulnerability analysis method, device and readable storage medium |
CN116910769B (en) * | 2023-09-12 | 2024-01-26 | 中移(苏州)软件技术有限公司 | Asset vulnerability analysis method, device and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN102354357B (en) | 2014-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102354357B (en) | Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid | |
Choi et al. | Ontology-based security context reasoning for power IoT-cloud security service | |
Ahmed et al. | WADI: a water distribution testbed for research in the design of secure cyber physical systems | |
Cárdenas et al. | Research challenges for the security of control systems. | |
Yang et al. | Impact of cyber-security issues on smart grid | |
Faisal et al. | Securing advanced metering infrastructure using intrusion detection system with data stream mining | |
Cavalieri et al. | Models for seismic vulnerability analysis of power networks: comparative assessment | |
Tian et al. | Coordinated cyber‐physical attacks considering DoS attacks in power systems | |
CN101452469B (en) | Software safety defect library system based on attack mode and management method thereof | |
Hossain et al. | Cyber–physical security for on‐going smart grid initiatives: a survey | |
Lemaire et al. | A SysML extension for security analysis of industrial control systems | |
CN110276200A (en) | A kind of determination method of power information system state transition probability | |
Mohamed et al. | Opportunities and challenges of data-driven cybersecurity for smart cities | |
CN108183897A (en) | A kind of information physical emerging system safety risk estimating method | |
Yang et al. | Attack and defence methods in cyber‐physical power system | |
Peng et al. | Cascading failure dynamics against intentional attack for interdependent industrial internet of things | |
Himdi et al. | Cyber security challenges in distributed energy resources for smart cities | |
Shukla et al. | A narrative perspective of island detection methods under the lens of cyber-attack in data-driven smart grid | |
Bo et al. | Review of active defense methods against power cps false data injection attacks from the multiple spatiotemporal perspective | |
Lakhoua | Review on scada cybersecurity for critical infrastructures | |
CN110300099A (en) | A kind of electric power industrial control system static state and dynamic leak analysis and digging technology | |
Syed et al. | Security for Complex Cyber-Physical and Industrial Control Systems: Current Trends, Limitations, and Challenges. | |
Liu et al. | Research on Cyber Security Defense Technology of Power Generation Acquisition Terminal in New Energy Plant | |
CN104915762A (en) | Safe control method and platform based on electrical secondary system of nuclear power station | |
Yang et al. | Technology research on panoramic situation awareness of operation state of smart distribution network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20141001 Termination date: 20170928 |
|
CF01 | Termination of patent right due to non-payment of annual fee |