CN102354357A - Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid - Google Patents

Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid Download PDF

Info

Publication number
CN102354357A
CN102354357A CN2011102970155A CN201110297015A CN102354357A CN 102354357 A CN102354357 A CN 102354357A CN 2011102970155 A CN2011102970155 A CN 2011102970155A CN 201110297015 A CN201110297015 A CN 201110297015A CN 102354357 A CN102354357 A CN 102354357A
Authority
CN
China
Prior art keywords
lattice
implication
reasoning
partition
leak
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102970155A
Other languages
Chinese (zh)
Other versions
CN102354357B (en
Inventor
王勇
王威
吴亮
谷大武
李海明
姚刚
朱武
徐建平
成贵学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai University of Electric Power
University of Shanghai for Science and Technology
Original Assignee
Shanghai University of Electric Power
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai University of Electric Power filed Critical Shanghai University of Electric Power
Priority to CN201110297015.5A priority Critical patent/CN102354357B/en
Publication of CN102354357A publication Critical patent/CN102354357A/en
Application granted granted Critical
Publication of CN102354357B publication Critical patent/CN102354357B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a lattice implication reasoning algorithm of a bug in a partitioning protection system of a smart grid, comprising the steps of: building a lattice implication algebraic system model according to the experimental environment of the partitioning protection system of the smart grid; describing the bug in the model by a method of a concept lattice; building an automatic reasoning system of the lattice implication on the basis; reasoning and inspecting the bug of the system; and inspecting the reasoning efficiency by the experiment environment of the system. The automatic reasoning system of the boundary bug is built in the partitioning protection system of the smart grid by adopting a method that lattice implication is combined with concept lattice, so that the bug detection efficiency of the smart grid is improved.

Description

The lattice of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm
Technical field
The present invention relates to a kind of electric power and detect, particularly a kind of lattice of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm.
Background technology
The subregion guard system comprises the subsystem of different safety class; Border leak in this system derives from number of different types equipment; The characteristic of leak can't use unified standard to weigh, and compares with single infosystem leak, has the not comparability of leak source characteristic.Hole Detection method in the infosystem can not be applied in the detection in this environment fully.
The detection method of leak mainly contains Static Detection and detection of dynamic.Static Detection is towards program source code, has occurred C language buffer zone leak CSSV method over nearly 10 years, and automatic vulnerability is searched EXE method and automatic sensitive code KLEE leak method of testing.But these Hole Detection methods are to C under the computer system, and the source code of language such as JAVA can not be applied to the Hole Detection of CISCO hardware device.
In order to improve the efficiency of static detection, vulnerability detection tools using information systems, typically there ?
Figure 2011102970155100002DEST_PATH_IMAGE002
Lexical Analysis tool? RATS;
Figure 2011102970155100002DEST_PATH_IMAGE004
symbolic execution tool Mjolnir, STLlint and ChecknCrash;
Figure 2011102970155100002DEST_PATH_IMAGE006
model checking tool MOPS, SLAM, optimization model checking tool BLAST, race condition vulnerability detection tools RacerX ;
Figure 2011102970155100002DEST_PATH_IMAGE008
? rule checking tool MC and Splint;
Figure 2011102970155100002DEST_PATH_IMAGE010
? theorem proving tools Cogent, CodeSonar, Saturn, mygcc, Eau? Claire.Testing tool has experienced lexical analysis, and symbol is carried out, and model detects, and rule detection is to the evolution of theorem proving.
Can find out that from the rule of development of Static Detection instrument rule detection and theorem proving are the development trends of current Hole Detection, this method can realize with better function and the more perfect static analysis of performance.
In order to detect the executable program leak; Need to adopt dynamic testing method; Mainly contain C language dynamic testing method that Haugh and Wilanderf deliver respectively in the international top DNSS meeting of computer security and dynamic bug excavation comparative approach, integer detects the RICH method during operation of Brumley.The IntScope method trace routine leak that the Zou Wei seminar of Peking University mainly adopts Graph-theoretical Approach and symbol to carry out, achievement in research was issued on the international top-level meeting NDSS in 2009.
Detection of dynamic is compared Static Detection and is had clear superiority; This method is not limited to C; JAVA supervisor source code; But towards specific executable program; But the subregion guard system comprises multiple safeguard, and equipment has been installed multiple program, and program has multiple source code; Border leak on such complication system, dynamic testing method also can't be suitable fully.
In sum, in order to adapt to the detection of subregion guard system coboundary protection leak, on the theoretical foundation of information bug excavation research, can attempt adopting the non-classical reasoning from logic detection method of " lattice ".
Lattice are one type of important Algebraic Structure, and the scale value logic is a kind of important non-classical logic, and it is the popularization of classical logic and fuzzy logic.The scale value logic is opened up the chain true value territory of multi valued logic wide to more general lattice; Can handle total order information; Can handle incomparable information again, thereby can more effectively portray the uncertainty of reasoning, judgement and decision-making, especially to the research of the incomplete comparability of true value.
Concept lattice is that Wille R proposed in nineteen eighty-two.Each node extension instance of concept lattice and intension notion are formal descriptions.Since 2000; Professor Shi Chunyi of Tsing-Hua University has just begun the classification of concept lattice and the research of correlation rule; What he had improved a Bordat builds the lattice algorithm; Make it to be suitable for the needs of integrated excavation; And then an algorithm from concept lattice extraction correlation rule and classifying rules is proposed, realized the unification of excavation under the concept lattice framework of correlation rule and classifying rules.
The Xu Yang of Southwest Jiaotong University in 2002 instructs the Li Haiming doctor to carry out the research of " lattice implication " algebraically.It is a kind of Algebraic Structure that lattice and implication algebras are combined that lattice contain, and is an important channel studying scale value flogic system and character thereof.The Ruan Da professor and professor Xu Yang at International Atomic Energy Agency center in 2007 unites and carried out the theoretical research of lattice implication.Xu Yang has taught at this area research the language true value of scale value logic and has summed up automated reasoning, uncertain inference, the correlative study of language true value α-generalized resolution automated reasoning.
Road has been paved in the Hole Detection theoretical research that Shi Chunyi professor's " concept lattice " achievement theoretical and that Xu Yang professor " lattice implication " is theoretical is the subregion guard system.On their theoretical research result basis; Applicant and Xu Yang professor's doctor Li Haiming professor; Method combines with " lattice implication " to adopt " concept lattice "; Found the application of lattice at the subregion guard system; In information security and the non-classical logic crossing domain of mathematics; A research border Hole Detection difficult problem is intended reliability and the completeness of in intelligent grid subregion guard system, verifying inference method.
Intelligent grid in the construction " information flow " width and significant depth have broken through China existing power system security protection border, and information has increased a lot of uncertainties.The Power SCADA control system still exists overflows back the leak that zero-sum overflows full sign indicating number, and the assailant can attack transformer substation system through this leak.Mike Davis in 2009 has demonstrated virus in world-renowned black cap conference and has attacked the electrical network behavior through leak.On September 25th, 2009, USA National Institute of Standard and Technology (NIST) confirms " leak that the intelligent grid information infrastructure exists possibly allow assailant's percolating network, obtains Control Software or change configuration condition, can not the expection mode to destroy ".Zerbst in 2010 have proposed the area principle of intelligent grid network safety prevention structure in IEEE electric power energy association; IEEE Transactions also pays close attention to the safety technique of intelligent grid; Reliability engineering; But in the intelligent grid partition system in building, the research of border Hole Detection is also rare.
China's existing power electrical secondary system " information flow " employing " security partitioning, network-specific, lateral isolation, vertically authentication " strategy ensures the safety of electric power monitoring system and Electric Power Dispatching Data Network.But there are very big difference in electric system and information network in the subregion protection, mainly show as shown in table 1 below:
Table 1
The difference classification Information network Intelligent grid subregion guard system
Protection object Computer software and hardware resource on the different operating system Send out the defeated adapted that becomes, scheduling, all electric pressure equipment
Security partitioning Network segmentation, the VPN VPN (virtual private network) Production control Da Qu and management information Da Qu
Border Protection Antivirus software, fire wall Laterally gateway is isolated, vertically dialing authentication
Host-host protocol TCP/IP, HTTP, UDP, File Transfer Protocol IEC 101,102,103,104 stipulations
Data transmit Bi-directional Unidirectional delivery
The leak object System, database, application software Software and electric power safety hardware device
The leak characteristic The comparability of leak characteristic The noncomparabilities of distinct device leak characteristic
Topmost difference is that the leak characteristic has not comparability in the table.Risk sources is in the electric intelligent terminal, radio communication, electric power data storehouse and electric power special software.
Summary of the invention
The present invention be directed in the electric system leak characteristic does not have comparative; The lifting problem that causes risk; The lattice that proposed a kind of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm; Plan is set up the automated inference system of border leak in the method that intelligent grid subregion guard system adopts " lattice implication " and " concept lattice " to combine.
Technical scheme of the present invention is: a kind of lattice of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm, specifically comprise the steps:
1) According to the first smart grid experimental environment protection system partition lattice implication algebra system model to build the smart grid according to protection class district, the district parallel to the connection point for the legal point, the other as a boundary point of vulnerability, vulnerability invasion by outside attacks to the partition system, define Partition Protection System is a partially ordered set, assuming that S = {a, b, c}, in which any two elements have a least upper bound and the next largest, called
Figure 629963DEST_PATH_IMAGE011
protection system for the partition lattice, P (S) is the partition protection system S the power set, <P(S),> is a poset, <P(S),> protection system is partitioned grid, define a loophole collection {v}, re-build V = {a, b, c, v} the poset, saying
Figure 2011102970155100002DEST_PATH_IMAGE012
for the partition border protection system vulnerabilities grid, in <P(V),> posets, Hasse diagram constructed by partitioning grid protection systems <P(S),> induced algebra system <P(S),,∨,∧>, including the collection and ∨, ∧ pay for the collection, if the partition protection system
Figure 133757DEST_PATH_IMAGE011
grid, in algebra system <P(S),,∨,∧> on, assuming V S and V? ≠ Φ, and ∨, ∧ on V is closed, then the
Figure 373109DEST_PATH_IMAGE012
grid of porous borders
Figure 733683DEST_PATH_IMAGE011
sub-lattice;
2) adopt leak in the method descriptive model of concept lattice then; Rule Extraction on the lattice; Find the minimum notion that comprises; Sublattice to this node is carried out breadth first traversal; Each node is generated all nonredundancy rules; Each node is at first generated rule of implication, and the low confidence level rule of regeneration finally generates rule of implication based on the fact;
3) definition lattice implication operator makes up the automated inference system that lattice contain on this basis;
4) reasoning checking system leak is at last through experimental system environmental test Reasoning Efficiency.
The concrete steps that make up automated inference system structure automated inference system in the said step 3) are following:
The first step: definition lattice implication operator makes that it can complete description " border leak lattice " characteristic;
Second step: implication operator is offered, and condition is commented;
The 3rd step: make up the three-valued logic system according to system performance L 3 , Six valued logic system L 6 , and multi-value logic system L n
The 4th step: define the truth table of many-valued system, definition connects time direct relation, symbolically mode speech;
The 5th step: in inference system, can adopt the classical compositional rule of inference CRI method in the Fuzzy reasoning of Zadeh; Its basic thought is to represent the Fuzzy proposition with the Fuzzy set; Implications is converted to the Fuzzy relation, the synthetic output of input and Fuzzy relation then, or at many-valued inference system L n The middle automated reasoning method that adopts based on route searching;
The 6th step: the reliability completeness proves that the result improves the automated reasoning algorithm according to proof.
Beneficial effect of the present invention is: the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain reasoning algorithm; The method that plan adopts " lattice implication " and " concept lattice " to combine at intelligent grid subregion guard system; Set up the automated inference system of border leak, improved the Hole Detection efficient of intelligent grid.
Description of drawings
Fig. 1 is the structural model figure that the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain subregion guard system in the reasoning algorithm;
Fig. 2 is that the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain subregion guard system border leak trrellis diagram in the reasoning algorithm;
Fig. 3 is the Hasse synoptic diagram that the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain concept lattice in the reasoning algorithm.
Embodiment
Because the security partitioning safeguard structure data of electric system are unidirectional delivery, and security partitioning from low to high, can be used as a paritially ordered set, any two elements all have least upper bound and greatest lower bound, and the definition of the characteristic dative of this system is consistent.
Exist the classical logic reasoning can't explain the situation of the true and false of proposition in the subregion guard system, for example:
Proposition 1: still can there be security breaches in intelligent grid subregion guard system in the future.This proposition is to judging in the future, can't representing the really degree of this proposition with true or false.
Proposition 2: if there is leak in guard system, the risk of this systems face is bound to very big so.This is a conditional proposition, and under the situation that condition satisfies, conclusion is genuine situation, but risk necessarily very greatly also can't be explained with classical logic in the conclusion.In order to solve such problem.Adopt lattice to contain non-classical mathematical logic and carry out approximate resoning.
(1) algebra system of structure " border leak lattice ":
Intelligent grid subregion guard system comprises four subregions; Place of safety I (real time control area), place of safety II (non-control production area), place of safety III (production management district) and place of safety IV (management information area); Structure is as shown in Figure 1: parallel tie point is legal point among Fig. 1; Other are border leak point, and outside world can intrude into partition system through leak.Subregion guard system safe class partial ordering relation from high to low, whole each element of subregion guard system all has least upper bound and greatest lower bound.
Constructed grid shown in Figure 2, Figure 2, define the partition protection system
Figure 120802DEST_PATH_IMAGE011
is a partially ordered set, assuming that S = {a, b, c}, in which any two elements have a least upper bound and the greatest next, then said
Figure 428286DEST_PATH_IMAGE011
protection system for the partition grid.P (S) is the power set of the S of subregion guard system, and < P (S),>is a paritially ordered set, and < P (S),>is subregion guard system lattice.In the Hasse diagram to add a loophole set {v}, re-build V = {a, b, c, v} the poset, saying
Figure 318882DEST_PATH_IMAGE012
for the partition border protection system vulnerabilities grid.On < P (V),>paritially ordered set, make up Hasse figure.If the partition system lattice can't be from { making up border leak lattice, possibly have leak in the hypothetical system the v}.
The power set P (S) of P (S)={ Φ, { a}, { b}, { c}, { a, b}, { a, c}, { b, c}, { a, b, c}};
Subregion S1={ Φ, { a}, { b}, { c}}
Subregion S2={ Φ, { b}, { c}, { b, c}}
Subregion S3={{a}, { a, b}, { a, c}, { a, b, c}}
Subregion S4={{a, b}, { a, c}, { b, c}, { a, b, c}}
Figure 2011102970155100002DEST_PATH_IMAGE013
are sub-lattice.
The algebra system of inducing on the lattice is given an example:
For example 1: the algebra system of being induced by subregion guard system lattice < P (S),>is < P (S),, ∨, ∧ >, and wherein ∨ is a union of sets, and ∧ is an intersection of sets.
Example 2: If the partition protection system
Figure 662456DEST_PATH_IMAGE011
grid, on the algebraic system <P(S),,∨,∧>, assuming V S and V? ≠ Φ, and ∨, ∧ on V is closed, then the porous borders cell is sub-lattice.
(2) make up Hasse figure based on " concept lattice "
The first step: make up lattice, adopt the method for concept lattice to describe leak.With the polynary group of case set of describing the border leak, property set, the relation between case set and the property set.In this set, set up paritially ordered set, each element exists least upper bound and greatest lower bound, makes up the description of border leak lattice.Each node in the lattice is a notion preface idol, and the power set of example set is as extension of conception, and the set of the common descriptor of example is as the intension of notion.Concept connotation and extensive relation between the extension and specialization relation according to Hasse figure discloses make up the form background.For example suppose O={1,2,3,4},
D={a1, a2, a3, b1, b2, b3, c1, c2, d1, d2, d3, d4}, R have described the attribute value set among the D that element had among the O, and the Hasse figure of corresponding concept lattice is shown in Fig. 3 time.
Second step: Rule Extraction on the lattice, find the minimum notion that comprises, the sublattice of this node is carried out breadth first traversal, each node is generated all nonredundancy rules.Each node is at first generated rule of implication, and the low confidence level rule of regeneration finally generates rule of implication based on the fact.
The 3rd one: reliability proves: the reliability that proves the leak concept lattice description of subregion guard system.
(3) definition lattice implication operator and structure automated inference system
For example 3: establishing
Figure 2011102970155100002DEST_PATH_IMAGE014
and be one has universal bound O; The complemented lattice of I, if mapping
Figure 2011102970155100002DEST_PATH_IMAGE015
:
Figure 2011102970155100002DEST_PATH_IMAGE016
satisfies: to any
Figure 2011102970155100002DEST_PATH_IMAGE017
(I1)?x ?(y
Figure 681958DEST_PATH_IMAGE015
z)=y
Figure 393562DEST_PATH_IMAGE015
?(x
Figure 258749DEST_PATH_IMAGE015
z)
(I2)?x
Figure 335290DEST_PATH_IMAGE015
x=I
Figure 2011102970155100002DEST_PATH_IMAGE018
(I4)? If x
Figure 918718DEST_PATH_IMAGE015
y = y
Figure 106117DEST_PATH_IMAGE015
x = I, then x = y
(I5)?(x
Figure 91390DEST_PATH_IMAGE015
y)?
Figure 401149DEST_PATH_IMAGE015
y=(y
Figure 409556DEST_PATH_IMAGE015
x)?
Figure 462963DEST_PATH_IMAGE015
x
Called
Figure 2011102970155100002DEST_PATH_IMAGE020
is a lattice implication algebra.
In non-classical logic, can in the algebra system of lattice, make up the automated reasoning algorithm, be applied in two-valued function, middle boundary lattice logic and the hexa-atomic lattice flogic system, and prove the reliability and the completeness of this algorithm.The key step that makes up automated inference system is following:
The first step: definition lattice implication operator makes that it can complete description " border leak lattice " characteristic;
Second step: implication operator is offered, and condition is commented;
The 3rd step: make up the three-valued logic system according to system performance L 3 , Six valued logic system L 6 , and multi-value logic system L n
The 4th step: define the truth table of many-valued system, definition connects time direct relation, symbolically mode speech.
The 5th step: in inference system, can adopt the classical compositional rule of inference CRI method in the Fuzzy reasoning of Zadeh, its basic thought is to represent the Fuzzy proposition with the Fuzzy set, and implications is converted to the Fuzzy relation, and input and Fuzzy relation is synthesized and exported then.Or at many-valued inference system L n The middle automated reasoning method that adopts based on route searching.
The 6th step: the reliability completeness proves that the result improves the automated reasoning algorithm according to proof.
(4) experimental verification: on intelligent grid subregion guard system, make up border leak lattice, definition lattice implication operator, formation rule and method are set up automated inference system, detect the reliability and the completeness of lattice implication algebras system model; Adopt the characteristic attribute library test leak formalized description of leak whether to have redundant information; Coding is realized the multi valued logic inference system based on lattice, check inference system leak efficiency of test.
Intelligent grid subregion guard system application example:
1, the applied environment of instance: the subregion guard system that makes up intelligent grid according to Electricity Monitoring Commission's 5 commands " electric power secondary system regulation of protection "; Adopt the subregion safeguard in the electric system, isolate SMC-2000 detail network pipe unit management system in the single-bit file transfer ST3000 document transmission system, sysKeeper-2000 system, electric power encryption system of SysKeeper-2000 equipment, Direct/Reverse, DialKeeper-2000 safety dialing authentication network management system etc. like the forward and the reverse network security of electric power shielding system.
2, the purpose of application example: adopt lattice to contain inference method and detect the border leak in the intelligent grid subregion guard system.
3, exemplary application process: make up lattice implication algebras system model according to intelligent grid subregion guard system experimental situation earlier; Adopt the leak in the method descriptive model of concept lattice then; Make up the automated inference system that lattice contain on this basis; Reasoning checking system leak is at last through experimental system environmental test Reasoning Efficiency.
4, exemplary application result: according to the difference of interpretation and experimental hypothesis, the problem that possibly exist in the analysis ratiocination process, the deviation that exists in the test experiment process.
Complication system security protection application example:
1) exemplary application environment: complication system modeling.
2) exemplary application process: this algorithm is the method for the system science of employing; Intelligent grid subregion safeguard structure is placed in the form of complication system; The integral body and the overall situation from system; Analyze the characteristic that its architectural feature meets " subregion protection; lateral isolation; vertically authentication, unidirectional delivery ", make up algebraic model based on lattice; Then from system and Border Protection, Border Protection and leak, leak and leak, the unity of opposites relation of leak and external environment is analyzed and researched to its research, adopts the formal description leak of concept lattice.On the basis of system model that builds and leak description, set up inference system at last, prove the reliability and the completeness of leak inference system, adopt experimental check Hole Detection efficient.
3) application of principle of instance: globality, system and the leak of taking all factors into consideration complication system is comprehensive, the dynamic between the leak relation, the modelling and the leak of system push away the detection optimization.

Claims (2)

1. the lattice of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm, it is characterized in that, specifically comprise the steps:
1) According to the first smart grid experimental environment protection system partition lattice implication algebra system model to build the smart grid according to protection class district, the district parallel to the connection point for the legal point, the other as a boundary point of vulnerability, vulnerability invasion by outside attacks to the partition system, define Partition protection system
Figure 401461DEST_PATH_IMAGE001
is a partially ordered set, assuming that S = {a, b, c}, in which any two elements have a least upper bound and the next largest, called protection system for the partition lattice, P (S) is the partition protection system S the power set, <P(S),> is a poset,
Figure 560358DEST_PATH_IMAGE002
is the partition protection system grid, define a loophole set {v}, Rebuild V = {a, b, c, v} the poset, saying
Figure 972884DEST_PATH_IMAGE003
for the partition border protection system vulnerabilities grid, in <P(V),> posets, Hasse diagram constructed by the protection system partition induced cell <P(S),> algebraic system <P(S),,∨,∧>, including the collection and ∨, ∧ pay for the collection , if the partition protection system grid, on the algebraic system <P(S),,∨,∧>, assuming V S and V? ≠ Φ, and ∨, ∧ is closed with respect to V , then
Figure 244783DEST_PATH_IMAGE003
grid of porous borders
Figure 434456DEST_PATH_IMAGE001
sub-lattice;
2) adopt leak in the method descriptive model of concept lattice then; Rule Extraction on the lattice; Find the minimum notion that comprises; Sublattice to this node is carried out breadth first traversal; Each node is generated all nonredundancy rules; Each node is at first generated rule of implication, and the low confidence level rule of regeneration finally generates rule of implication based on the fact;
3) definition lattice implication operator makes up the automated inference system that lattice contain on this basis;
4) reasoning checking system leak is at last through experimental system environmental test Reasoning Efficiency.
2. the lattice according to the said intelligent grid subregion of claim 1 guard system vulnerabilities contain reasoning algorithm, it is characterized in that, the concrete steps that make up automated inference system structure automated inference system in the said step 3) are following:
The first step: definition lattice implication operator makes that it can complete description " border leak lattice " characteristic;
Second step: implication operator is offered, and condition is commented;
The 3rd step: make up the three-valued logic system according to system performance L 3 , six valued logic system L 6 , and multi-value logic system L n
The 4th step: define the truth table of many-valued system, definition connects time direct relation, symbolically mode speech;
The 5th step: in inference system, can adopt the classical compositional rule of inference CRI method in the Fuzzy reasoning of Zadeh; Its basic thought is to represent the Fuzzy proposition with the Fuzzy set; Implications is converted to the Fuzzy relation, the synthetic output of input and Fuzzy relation then, or at many-valued inference system L n The middle automated reasoning method that adopts based on route searching;
The 6th step: the reliability completeness proves that the result improves the automated reasoning algorithm according to proof.
CN201110297015.5A 2011-09-28 2011-09-28 Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid Expired - Fee Related CN102354357B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110297015.5A CN102354357B (en) 2011-09-28 2011-09-28 Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110297015.5A CN102354357B (en) 2011-09-28 2011-09-28 Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid

Publications (2)

Publication Number Publication Date
CN102354357A true CN102354357A (en) 2012-02-15
CN102354357B CN102354357B (en) 2014-10-01

Family

ID=45577919

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110297015.5A Expired - Fee Related CN102354357B (en) 2011-09-28 2011-09-28 Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid

Country Status (1)

Country Link
CN (1) CN102354357B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077325A (en) * 2013-01-30 2013-05-01 西安交通大学 Bad data detection method of smart power grid based on self-adaptive partition state estimation
CN103428478A (en) * 2013-08-16 2013-12-04 昆明能讯科技有限责任公司 Coordinated control system of centralized control station remote long-distance video
CN104468310A (en) * 2014-11-14 2015-03-25 国家电网公司 Power communication system and method
CN104463330A (en) * 2014-12-02 2015-03-25 刘泊荣 Method for setting up knowledge map and navigating disciplinary knowledge
CN106709354A (en) * 2016-10-24 2017-05-24 北京亚控科技发展有限公司 Security space construction method and system for configurable management control integrated platform
CN107992746A (en) * 2017-12-14 2018-05-04 华中师范大学 Malicious act method for digging and device
CN111125720A (en) * 2019-12-27 2020-05-08 国网四川省电力公司电力科学研究院 Information security and function security association analysis method
CN111967034A (en) * 2020-08-30 2020-11-20 河南大学 RBAC role fault tolerance auxiliary construction method based on attribute exploration
CN116910769A (en) * 2023-09-12 2023-10-20 中移(苏州)软件技术有限公司 Asset vulnerability analysis method, device and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030159070A1 (en) * 2001-05-28 2003-08-21 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
CN101854269A (en) * 2010-04-06 2010-10-06 珠海市鸿瑞信息技术有限公司 Information safety operation and maintenance supervising platform of electric power secondary system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030159070A1 (en) * 2001-05-28 2003-08-21 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages
CN101854269A (en) * 2010-04-06 2010-10-06 珠海市鸿瑞信息技术有限公司 Information safety operation and maintenance supervising platform of electric power secondary system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
YU YONG等: "Study on the security assessment platform for electric power secondary system", 《2006 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY》, 26 October 2006 (2006-10-26), pages 1 - 6, XP031053347 *
吴明慧等: "乘积格蕴涵代数的子代数的MATLAB实现", 《计算机科学》, vol. 38, no. 3, 31 March 2011 (2011-03-31), pages 263 - 289 *
周亮等: "信息系统漏洞风险定量评估模型研究", 《通信学报》, vol. 30, no. 2, 28 February 2009 (2009-02-28), pages 71 - 76 *
李劲: "电力生产控制区业务系统漏洞修补研究", 《广西电力》, no. 4, 31 December 2009 (2009-12-31), pages 1 - 4 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077325B (en) * 2013-01-30 2015-08-05 西安交通大学 Based on the intelligent grid bad data detection of adaptive partition state estimation
CN103077325A (en) * 2013-01-30 2013-05-01 西安交通大学 Bad data detection method of smart power grid based on self-adaptive partition state estimation
CN103428478A (en) * 2013-08-16 2013-12-04 昆明能讯科技有限责任公司 Coordinated control system of centralized control station remote long-distance video
CN104468310A (en) * 2014-11-14 2015-03-25 国家电网公司 Power communication system and method
CN104463330B (en) * 2014-12-02 2017-11-10 刘泊荣 A kind of foundation of Knowledge Map and subject knowledge air navigation aid
CN104463330A (en) * 2014-12-02 2015-03-25 刘泊荣 Method for setting up knowledge map and navigating disciplinary knowledge
CN106709354A (en) * 2016-10-24 2017-05-24 北京亚控科技发展有限公司 Security space construction method and system for configurable management control integrated platform
CN106709354B (en) * 2016-10-24 2018-07-06 北京亚控科技发展有限公司 A kind of the safe space building method and system of configurable control integration platform
CN107992746A (en) * 2017-12-14 2018-05-04 华中师范大学 Malicious act method for digging and device
CN111125720A (en) * 2019-12-27 2020-05-08 国网四川省电力公司电力科学研究院 Information security and function security association analysis method
CN111125720B (en) * 2019-12-27 2023-06-20 国网四川省电力公司电力科学研究院 Information security and functional security association analysis method
CN111967034A (en) * 2020-08-30 2020-11-20 河南大学 RBAC role fault tolerance auxiliary construction method based on attribute exploration
CN111967034B (en) * 2020-08-30 2022-09-16 河南大学 RBAC role fault tolerance auxiliary construction method based on attribute exploration
CN116910769A (en) * 2023-09-12 2023-10-20 中移(苏州)软件技术有限公司 Asset vulnerability analysis method, device and readable storage medium
CN116910769B (en) * 2023-09-12 2024-01-26 中移(苏州)软件技术有限公司 Asset vulnerability analysis method, device and readable storage medium

Also Published As

Publication number Publication date
CN102354357B (en) 2014-10-01

Similar Documents

Publication Publication Date Title
CN102354357B (en) Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid
Choi et al. Ontology-based security context reasoning for power IoT-cloud security service
Ahmed et al. WADI: a water distribution testbed for research in the design of secure cyber physical systems
Cárdenas et al. Research challenges for the security of control systems.
Yang et al. Impact of cyber-security issues on smart grid
Faisal et al. Securing advanced metering infrastructure using intrusion detection system with data stream mining
Cavalieri et al. Models for seismic vulnerability analysis of power networks: comparative assessment
Tian et al. Coordinated cyber‐physical attacks considering DoS attacks in power systems
CN101452469B (en) Software safety defect library system based on attack mode and management method thereof
Hossain et al. Cyber–physical security for on‐going smart grid initiatives: a survey
Lemaire et al. A SysML extension for security analysis of industrial control systems
CN110276200A (en) A kind of determination method of power information system state transition probability
Mohamed et al. Opportunities and challenges of data-driven cybersecurity for smart cities
CN108183897A (en) A kind of information physical emerging system safety risk estimating method
Yang et al. Attack and defence methods in cyber‐physical power system
Peng et al. Cascading failure dynamics against intentional attack for interdependent industrial internet of things
Himdi et al. Cyber security challenges in distributed energy resources for smart cities
Shukla et al. A narrative perspective of island detection methods under the lens of cyber-attack in data-driven smart grid
Bo et al. Review of active defense methods against power cps false data injection attacks from the multiple spatiotemporal perspective
Lakhoua Review on scada cybersecurity for critical infrastructures
CN110300099A (en) A kind of electric power industrial control system static state and dynamic leak analysis and digging technology
Syed et al. Security for Complex Cyber-Physical and Industrial Control Systems: Current Trends, Limitations, and Challenges.
Liu et al. Research on Cyber Security Defense Technology of Power Generation Acquisition Terminal in New Energy Plant
CN104915762A (en) Safe control method and platform based on electrical secondary system of nuclear power station
Yang et al. Technology research on panoramic situation awareness of operation state of smart distribution network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20141001

Termination date: 20170928

CF01 Termination of patent right due to non-payment of annual fee