CN102354357B - Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid - Google Patents

Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid Download PDF

Info

Publication number
CN102354357B
CN102354357B CN201110297015.5A CN201110297015A CN102354357B CN 102354357 B CN102354357 B CN 102354357B CN 201110297015 A CN201110297015 A CN 201110297015A CN 102354357 B CN102354357 B CN 102354357B
Authority
CN
China
Prior art keywords
lattice
subregion
leak
implication
reasoning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110297015.5A
Other languages
Chinese (zh)
Other versions
CN102354357A (en
Inventor
王勇
王威
吴亮
谷大武
李海明
姚刚
朱武
徐建平
成贵学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai University of Electric Power
Original Assignee
Shanghai University of Electric Power
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai University of Electric Power filed Critical Shanghai University of Electric Power
Priority to CN201110297015.5A priority Critical patent/CN102354357B/en
Publication of CN102354357A publication Critical patent/CN102354357A/en
Application granted granted Critical
Publication of CN102354357B publication Critical patent/CN102354357B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Supply And Distribution Of Alternating Current (AREA)

Abstract

The invention relates to a lattice implication reasoning algorithm of a bug in a partitioning protection system of a smart grid, comprising the steps of: building a lattice implication algebraic system model according to the experimental environment of the partitioning protection system of the smart grid; describing the bug in the model by a method of a concept lattice; building an automatic reasoning system of the lattice implication on the basis; reasoning and inspecting the bug of the system; and inspecting the reasoning efficiency by the experiment environment of the system. The automatic reasoning system of the boundary bug is built in the partitioning protection system of the smart grid by adopting a method that lattice implication is combined with concept lattice, so that the bug detection efficiency of the smart grid is improved.

Description

The lattice of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm
Technical field
The present invention relates to a kind of electric power and detect, particularly a kind of lattice of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm.
Background technology
The subsystem that subregion guard system comprises different safety class, border leak in this system derives from number of different types equipment, the characteristic of leak cannot be weighed by unified standard, compares with single infosystem leak, has the incomparability of leak source characteristic.Leak detection method in infosystem can not be applied in the detection in this environment completely.
The detection method of leak mainly contains Static Detection and detection of dynamic.Static Detection is towards program source code, has occurred C language overflowing loopholes in buffer CSSV method over nearly 10 years, and automatic vulnerability is searched EXE method and automatic sensitive code KLEE leak method of testing.But these leak detection methods are for C under computer system, the source code of the language such as JAVA, can not be applied to the Hole Detection of CISCO hardware device.
In order to improve the efficiency of Static Detection, infosystem adopts Hole Detection instrument, and representational have lexical analysis analysis tool RATS; symbol executing means Mjolnir, STLlint and ChecknCrash; model checking tools MOPS, SLAM, Optimized model testing tool BLAST, race condition Hole Detection instrument RacerX; rule checking tool MC and Splint; theorem proving instrument Cogent, CodeSonar, Saturn, mygcc, Eau Claire.Testing tool has experienced lexical analysis, and symbol is carried out, and model detects, and rule detection is to the evolution of theorem proving.
From the rule of development of static detecting tool, can find out, rule detection and theorem proving are the development trends of current Hole Detection, the method can practical function the more powerful and more perfect static analysis of performance.
In order to detect executable program leak, need to adopt dynamic testing method, mainly contain C language dynamic testing method that Haugh and Wilanderf deliver respectively in the international top DNSS meeting of computer security and dynamic bug excavation comparative approach, during the operation of Brumley, integer detects RICH method.The IntScope method trace routine leak that the Zou Wei seminar of Peking University mainly adopts Graph-theoretical Approach and symbol to carry out, achievement in research was issued on international top-level meeting NDSS in 2009.
Detection of dynamic is compared Static Detection and is had clear superiority, the method is not limited to C, JAVA supervisor source code, but towards specific executable program, but subregion guard system comprises multiple safeguard, and equipment has been installed multiple programs, program has multiple source code, border leak on such complication system, dynamic testing method also cannot be completely applicable.
In sum, in order to adapt to the detection of subregion guard system coboundary protection leak, in the theoretical foundation of information bug excavation research, can attempt adopting the non-classical reasoning from logic detection method of " lattice ".
Lattice are the important Algebraic Structure of a class, and scale value logic is a kind of important non-classical logic, and it is the popularization of classical logic and fuzzy logic.Scale value logic is opened up the chain true value territory of multi valued logic wide to more general lattice, can process total order information, incomparable information can be processed again, thereby the uncertainty of reasoning, judgement and decision-making, the especially research to the incomplete comparability of true value can be more effectively portrayed.
Concept lattice is that Wille R proposed in nineteen eighty-two.Each node extension example of concept lattice and intension concept are formal descriptions.Since 2000, professor Shi Chunyi of Tsing-Hua University has just started the classification of concept lattice and the research of correlation rule, what he had improved a Bordat builds lattice algorithm, make it to be suitable for the needs of integrated mine, and then propose one and extract the algorithm of correlation rule and classifying rules from concept lattice, the unification of the excavation that has realized correlation rule and classifying rules under concept lattice framework.
The Xu Yang of Southwest Jiaotong University in 2002 instructs Li Haiming doctor to carry out the research of " lattice implication " algebraically.It is a kind of Algebraic Structure that lattice and implication algebras are combined that lattice contain, and is an important channel studying lattice-valued logic system and character thereof.The Ruan Da professor at International Atomic Energy Agency center in 2007 and professor Xu Yang combine and have carried out the theoretical research of lattice implication.Xu Yang has taught at this area research the language true value of scale value logic and has summed up automated reasoning, uncertain inference, the correlative study of language true value α-generalized resolution automated reasoning.
Road has been paved in the Hole Detection theoretical research that " concept lattice " achievement theoretical and that Xu Yang professor " lattice implication " is theoretical of Shi Chunyi professor is subregion guard system.On their theoretical research result basis, applicant and Xu Yang professor's doctor Li Haiming professor, method combines with " lattice implication " to adopt " concept lattice ", found the application of lattice at subregion guard system, in information security and the non-classical logic crossing domain of mathematics, a research border Hole Detection difficult problem, intends verifying reliability and the completeness of inference method in intelligent grid subregion guard system.
Intelligent grid in construction " information flow " width and significant depth have broken through the existing power system security protection of China border, and information has increased a lot of uncertainties.Still there is the leak that overflows back to zero and overflow full code in Power SCADA control system, assailant can attack transformer substation system by this leak.Mike Davis in 2009 has demonstrated virus in world-renowned black cap conference and has attacked electrical network behavior by leak.On September 25th, 2009, USA National Institute of Standard and Technology (NIST) confirms " leak that intelligent grid information infrastructure exists, may allow assailant's percolating network, obtain and control software or change configuration condition, can not expection mode to destroy ".Zerbst in 2010 have proposed the area principle of intelligent grid network safety prevention structure in IEEE electric power energy association, IEEE Transactions also pays close attention to the safety technique of intelligent grid, reliability engineering, but in the intelligent grid partition system in building, the research of border Hole Detection is also rare.
The existing electric power secondary system of China " information flow " employing " security partitioning, network-specific, lateral isolation, longitudinally authentication " strategy, ensures the safety of electric power monitoring system and Electric Power Dispatching Data Network.But there is very large difference in subregion protection in electric system and information network, main manifestations is as shown in table 1 below:
Table 1
Difference classification Information network Intelligent grid subregion guard system
Protection object Computer software and hardware resource on different operating system Send out change adapted defeated, scheduling, all electric pressure equipment
Security partitioning Network segmentation, VPN VPN (virtual private network) Production control great Qu and management information great Qu
Border Protection Antivirus software, fire wall Laterally gateway isolation, longitudinally dialing authentication
Host-host protocol TCP/IP, HTTP, UDP, File Transfer Protocol IEC 101,102,103,104 stipulations
Data transmit Bi-directional Unidirectional delivery
Leak object System, database, application software Software and electric power safety hardware device
Leak characteristic The comparability of leak characteristic The noncomparabilities of distinct device leak characteristic
In table, topmost difference is that leak characteristic has incomparability.Risk sources is in electric intelligent terminal, radio communication, electric power data storehouse and electric power special software.
Summary of the invention
The present invention be directed in electric system leak characteristic without comparative, the Upgrade Problem that causes risk, the lattice that proposed a kind of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm, plan adopts the method for " lattice implication " and " concept lattice " combination at intelligent grid subregion guard system, set up the automated inference system of border leak.
Technical scheme of the present invention is: a kind of lattice of intelligent grid subregion guard system vulnerabilities contain reasoning algorithm, specifically comprise the steps:
1) first according to intelligent grid subregion guard system building up of experiment environment lattice implication algebras system model, intelligent grid is pressed degree of protection subregion, and the parallel tie point in each district is legal point, and other are border leak point, outside world can intrude into partition system by leak, in definition subregion guard system be a paritially ordered set, suppose S={a, b, c}, wherein any two elements have least upper bound and maximum next, claim for subregion guard system lattice, P (S) is the power set of the S of subregion guard system, <P (S), and > is a paritially ordered set, <P (S), > is subregion guard system lattice, and { v}, rebuilds V={a to define a leak set, b, c, the paritially ordered set of v}, and claim for the border leak lattice in subregion guard system, at <P (V), on > paritially ordered set, build Hasse figure, by subregion guard system lattice <P (S), the algebra system that > induces is <P (S),, ∨, ∧ >, wherein ∨ is union of sets, and ∧ is intersection of sets, if subregion guard system lattice, are <P (S) in algebra system,, ∨, on ∧ >, supposes V S and V ≠ Φ, and ∨, ∧ seals about V, so border leak lattice are sublattice;
2) then adopt the leak in the method descriptive model of concept lattice, Rule Extraction on lattice, find the minimum concept comprising, the sublattice of this node is carried out to breadth first traversal, each node is generated to all nonredundancy rules, first each node is generated to rule of implication, and the low confidence level rule of regeneration, finally generates rule of implication based on the fact;
3) definition lattice implication operator, builds the automated inference system that lattice contain on this basis;
4) reasoning checking system leak, finally system environments is checked Reasoning Efficiency by experiment.
The concrete steps that build automated inference system structure automated inference system in described step 3) are as follows:
The first step: definition lattice implication operator, makes its energy complete description " border leak lattice " characteristic;
Second step: implication operator is offered, and condition is commented;
The 3rd step: build Ternary Logic System according to system performance l 3 , six valued logic system l 6 , and multi-value logic system l n ;
The 4th step: the truth table of definition Multivalued System, definition connects time direct relation, symbolically mode word;
The 5th step: can adopt the classical compositional rule of inference CRI method in the Fuzzy reasoning of Zadeh in inference system, its basic thought is with Fuzzy set expression Fuzzy proposition, implications is converted to Fuzzy relation, then input and the output of Fuzzy Composition, or at many-valued inference system l n the automated reasoning method of middle employing based on route searching;
The 6th step: reliability completeness proves, improves automated reasoning algorithm according to proof result.
Beneficial effect of the present invention is: the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain reasoning algorithm, plan adopts the method for " lattice implication " and " concept lattice " combination at intelligent grid subregion guard system, set up the automated inference system of border leak, improved the Hole Detection efficiency of intelligent grid.
Accompanying drawing explanation
Fig. 1 is the structural model figure that the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain subregion guard system in reasoning algorithm;
Fig. 2 is that the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain subregion guard system border leak trrellis diagram in reasoning algorithm;
Fig. 3 is the Hasse schematic diagram that the lattice of intelligent grid subregion guard system vulnerabilities of the present invention contain concept lattice in reasoning algorithm.
Embodiment
Because the security partitioning safeguard structure data of electric system are unidirectional delivery, and security partitioning from low to high, can be used as a paritially ordered set, and any two elements have least upper bound and greatest lower bound, and the definition of the characteristic dative of this system is consistent.
In subregion guard system, exist classical logic reasoning cannot explain the situation of the true and false of proposition, for example:
Proposition 1: intelligent grid subregion guard system still can exist security breaches in the future.This proposition is to judging in the future, cannot representing with true or false the really degree of this proposition.
Proposition 2: if guard system exists leak, the risk of this systems face is bound to very large so.This is a conditional proposition, and in the satisfied situation of condition, conclusion is genuine situation, but conclusion risk necessarily very greatly also cannot be explained with classical logic.In order to solve such problem.Adopt lattice to contain non-classical mathematical logic and carry out approximate resoning.
(1) build the algebra system of " border leak lattice ":
Intelligent grid subregion guard system comprises four subregions, place of safety I(real time control area), III(production management district, place of safety II(Fei production control district, place of safety)) and IV(management information area, place of safety), structure is as shown in Figure 1: in Fig. 1, parallel tie point is legal point, other are border leak point, and outside world can intrude into partition system by leak.Subregion guard system safe class partial ordering relation from high to low, whole each element of subregion guard system has least upper bound and greatest lower bound.
The lattice that build as shown in Figure 2, define in Fig. 2 in subregion guard system be a paritially ordered set, suppose S={a, b, c}, wherein any two elements have least upper bound and maximum next, claim for subregion guard system lattice.P (S) is the power set of the S of subregion guard system, <P (S), and > is a paritially ordered set, <P (S), > is subregion guard system lattice.{ v}, rebuilds V={a, b, c, the paritially ordered set of v}, and title in Hasse figure, to add a leak set for the border leak lattice in subregion guard system.At <P (V), on > paritially ordered set, build Hasse figure.If partition system lattice cannot be from { building border leak lattice, may have leak in hypothetical system v}.
The power set P (S) of P (S)={ Φ, { a}, { b}, { c}, { a, b}, { a, c}, { b, c}, { a, b, c}};
Subregion S1={ Φ, { a}, { b}, { c}}
Subregion S2={ Φ, { b}, { c}, { b, c}}
Subregion S3={{a}, { a, b}, { a, c}, { a, b, c}}
Subregion S4={{a, b}, { a, c}, { b, c}, { a, b, c}}
be all sublattice.
The algebra system of inducing on lattice is given an example:
Give an example 1: by subregion guard system lattice <P (S), the algebra system that > induces is <P (S),, ∨, ∧ >, wherein ∨ is union of sets, ∧ is intersection of sets.
Give an example 2: if subregion guard system lattice, are <P (S) in algebra system,, ∨, on ∧ >, supposes V S and V ≠ Φ, and ∨, ∧ seals about V, so border leak lattice are sublattice.
(2) based on " concept lattice ", build Hasse figure
The first step: build lattice, adopt the method for concept lattice to be described leak.By the polynary group of case set of describing border leak, property set, the relation between case set and property set.In this set, setting up paritially ordered set, there is least upper bound and greatest lower bound in each element, builds the description of border leak lattice.Each node in lattice is that a concept order is even, and the power set of example set is as the extension of concept, and the set of the common descriptor of example, as the intension of concept.The concept connotation and the generalization between extension and the specialization relation that according to Hasse figure, disclose, build Formal Context.For example suppose O={1,2,3,4},
D={a1, a2, a3, b1, b2, b3, c1, c2, d1, d2, d3, d4}, R has described the attribute value set in the D that in O, element has, and the Hasse figure of corresponding concept lattice is as shown under Fig. 3.
Second step: Rule Extraction on lattice, find the minimum concept comprising, the sublattice of this node is carried out to breadth first traversal, each node is generated to all nonredundancy rules.First each node is generated to rule of implication, and the low confidence level rule of regeneration, finally generates rule of implication based on the fact.
The 3rd: reliability proves: the reliability that proves the leak concept lattice description of subregion guard system.
(3) definition lattice implication operator and structure automated inference system
Give an example 3: establish be one to have universal bound O, the complemented lattice of I, if mapping : meet: to arbitrarily
(I1)?x ?(y z)=y ?(x z)
(I2)?x x=I
(I4) if x y=y x=I, x=y
(I5)?(x y)? y=(y x)? x
Claim it is a lattice implication algebras.
In non-classical logic, can in the algebra system of lattice, build automated reasoning algorithm, be applied in two-valued function, middle boundary lattice logic and hexa-atomic lattice flogic system, and prove reliability and the completeness of this algorithm.The key step that builds automated inference system is as follows:
The first step: definition lattice implication operator, makes its energy complete description " border leak lattice " characteristic;
Second step: implication operator is offered, and condition is commented;
The 3rd step: build Ternary Logic System according to system performance l 3 , six valued logic system l 6 , and multi-value logic system l n
The 4th step: the truth table of definition Multivalued System, definition connects time direct relation, symbolically mode word.
The 5th step: can adopt the classical compositional rule of inference CRI method in the Fuzzy reasoning of Zadeh in inference system, its basic thought is with Fuzzy set expression Fuzzy proposition, and implications is converted to Fuzzy relation, then input and the output of Fuzzy Composition.Or at many-valued inference system l n the automated reasoning method of middle employing based on route searching.
The 6th step: reliability completeness proves, improves automated reasoning algorithm according to proof result.
(4) experimental verification: on intelligent grid subregion guard system, build border leak lattice, definition lattice implication operator, formation rule and method, set up automated inference system, detects reliability and the completeness of lattice implication algebras system model; Adopt the characteristic attribute library test leak formalized description of leak whether to have redundant information; Coding is realized the multi valued logic inference system based on lattice, the efficiency of check inference system leak check.
Intelligent grid subregion guard system application example:
1, the applied environment of example: the subregion guard system that builds intelligent grid according to the 5 command < < electric power secondary system regulation of protection > > of Electricity Monitoring Commission, adopt the subregion safeguard in electric system, as the forward of electric power shielding system and reverse network security isolation SysKeeper-2000 equipment, the single-bit file transfer ST3000 document transmission system of Direct/Reverse, sysKeeper-2000 system, SMC-2000 in electric power encryption system encrypts webmaster apparatus management system, the safe dialing authentication network management system of DialKeeper-2000 etc.
2, the object of application example: adopt lattice to contain inference method and detect the border leak in intelligent grid subregion guard system.
3, exemplary application process: first according to intelligent grid subregion guard system building up of experiment environment lattice implication algebras system model, then adopt the leak in the method descriptive model of concept lattice, build on this basis the automated inference system that lattice contain, reasoning checking system leak, finally system environments is checked Reasoning Efficiency by experiment.
4, exemplary application result: according to the difference of interpretation and experimental hypothesis, the problem that may exist in analysis ratiocination process, the deviation existing in check experimentation.
Complication system security protection application example:
1) exemplary application environment: complex system modeling.
2) exemplary application process: this algorithm is the method for the system science of employing, intelligent grid subregion safeguard structure is placed in the form of complication system, integral body and the overall situation from system, analyze the feature that its architectural feature meets " subregion protection; lateral isolation; longitudinally authentication, unidirectional delivery ", build the algebraic model based on lattice; Then from system and Border Protection, Border Protection and leak, leak and leak, the unity of opposites relation of leak and external environment, analyzes and researches to its research, adopts the formal description leak of concept lattice.Finally, on the basis of the system model building and leak description, set up inference system, prove reliability and the completeness of leak inference system, adopt experimental check Hole Detection efficiency.
3) application of principle of example: the globality, system and the leak that consider complication system are comprehensive, the dynamic between leak relation, modelling and the leak of system push away detection optimization.

Claims (1)

1. the lattice of intelligent grid subregion guard system vulnerabilities contain an inference method, it is characterized in that, specifically comprise the steps:
1) first according to intelligent grid subregion guard system building up of experiment environment lattice implication algebras system model, intelligent grid is pressed degree of protection subregion, the parallel tie point in each district is legal point, other are border leak point, outside world can intrude into subregion guard system by leak, in definition subregion guard system be a paritially ordered set, suppose S={a, b, c}, wherein any two elements have least upper bound and greatest lower bound, claim for subregion guard system lattice, P (S) is the power set of the S of subregion guard system, <P (S), and > is a paritially ordered set, be subregion guard system lattice, { v}, rebuilds V={a, b, c, the paritially ordered set of v}, and title to define one for the border leak lattice in subregion guard system, P (V) is that { power set of V}, at <P (V), on > paritially ordered set, build Hasse figure, by subregion guard system lattice <P (S), the algebra system that > induces is <P (S), ∨, ∧ >, wherein ∨ is union of sets, ∧ is intersection of sets, if subregion guard system lattice , having algebra system is <P (S),, ∨, ∧ >, and suppose V S and V ≠ Φ, and ∨, ∧ seals about V, so border leak lattice are sublattice;
2) then adopt the leak in the method descriptive model of concept lattice, Rule Extraction on lattice, find the minimum concept comprising, sublattice to concept lattice Hasse node is carried out breadth first traversal, each node is generated to all nonredundancy rules, first each node is generated to if-then rule, and the low confidence level rule of regeneration, finally generates if-then rule based on the fact;
3) definition lattice Implication Operator, builds the automated inference system that lattice contain on this basis;
4) reasoning checking system leak, finally system environments is checked Reasoning Efficiency by experiment;
The concrete steps that build automated inference system in described step 3) are as follows:
The first step: definition lattice Implication Operator, makes its energy complete description border leak lattice characteristic;
Second step: Implication Operator is offered, and condition is commented;
The 3rd step: build Ternary Logic System according to system performance l 3 , six valued logic system l 6 , and multi-value logic system l n ;
The 4th step: the truth table of definition Multivalued System, definition conjunction direct relation, symbolically mode word;
The 5th step: in inference system, adopt the classical compositional rule of inference CRI method in the Fuzzy reasoning of Zadeh,
Its basic thought is with Fuzzy set expression Fuzzy proposition, and implication is converted to Fuzzy relation, input and the output of Fuzzy Composition, or at many-valued inference system l n the automated reasoning method of middle employing based on route searching;
The 6th step: reliability completeness proves, improves automated reasoning algorithm according to proof result.
CN201110297015.5A 2011-09-28 2011-09-28 Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid Expired - Fee Related CN102354357B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110297015.5A CN102354357B (en) 2011-09-28 2011-09-28 Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110297015.5A CN102354357B (en) 2011-09-28 2011-09-28 Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid

Publications (2)

Publication Number Publication Date
CN102354357A CN102354357A (en) 2012-02-15
CN102354357B true CN102354357B (en) 2014-10-01

Family

ID=45577919

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110297015.5A Expired - Fee Related CN102354357B (en) 2011-09-28 2011-09-28 Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid

Country Status (1)

Country Link
CN (1) CN102354357B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077325B (en) * 2013-01-30 2015-08-05 西安交通大学 Based on the intelligent grid bad data detection of adaptive partition state estimation
CN103428478A (en) * 2013-08-16 2013-12-04 昆明能讯科技有限责任公司 Coordinated control system of centralized control station remote long-distance video
CN104468310A (en) * 2014-11-14 2015-03-25 国家电网公司 Power communication system and method
CN104463330B (en) * 2014-12-02 2017-11-10 刘泊荣 A kind of foundation of Knowledge Map and subject knowledge air navigation aid
CN106709354B (en) * 2016-10-24 2018-07-06 北京亚控科技发展有限公司 A kind of the safe space building method and system of configurable control integration platform
CN107992746B (en) * 2017-12-14 2021-06-25 华中师范大学 Malicious behavior mining method and device
CN111125720B (en) * 2019-12-27 2023-06-20 国网四川省电力公司电力科学研究院 Information security and functional security association analysis method
CN111967034B (en) * 2020-08-30 2022-09-16 河南大学 RBAC role fault tolerance auxiliary construction method based on attribute exploration
CN116910769B (en) * 2023-09-12 2024-01-26 中移(苏州)软件技术有限公司 Asset vulnerability analysis method, device and readable storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854269A (en) * 2010-04-06 2010-10-06 珠海市鸿瑞信息技术有限公司 Information safety operation and maintenance supervising platform of electric power secondary system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030159070A1 (en) * 2001-05-28 2003-08-21 Yaron Mayer System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854269A (en) * 2010-04-06 2010-10-06 珠海市鸿瑞信息技术有限公司 Information safety operation and maintenance supervising platform of electric power secondary system

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
Study on the security assessment platform for electric power secondary system;Yu Yong等;《2006 International Conference on Power System Technology》;20061026;第1-6页 *
Yu Yong等.Study on the security assessment platform for electric power secondary system.《2006 International Conference on Power System Technology》.2006,第1-6页.
乘积格蕴涵代数的子代数的MATLAB实现;吴明慧等;《计算机科学》;20110331;第38卷(第3期);第263-289页 *
信息系统漏洞风险定量评估模型研究;周亮等;《通信学报》;20090228;第30卷(第2期);第71-76页 *
吴明慧等.乘积格蕴涵代数的子代数的MATLAB实现.《计算机科学》.2011,第38卷(第3期),第263-289页.
周亮等.信息系统漏洞风险定量评估模型研究.《通信学报》.2009,第30卷(第2期),第71-76页.
李劲.电力生产控制区业务系统漏洞修补研究.《广西电力》.2009,(第4期),第1-4页.
电力生产控制区业务系统漏洞修补研究;李劲;《广西电力》;20091231(第4期);第1-4页 *

Also Published As

Publication number Publication date
CN102354357A (en) 2012-02-15

Similar Documents

Publication Publication Date Title
CN102354357B (en) Lattice implication reasoning algorithm of bug in partitioning protection system of smart grid
Choi et al. Ontology-based security context reasoning for power IoT-cloud security service
Ahmed et al. WADI: a water distribution testbed for research in the design of secure cyber physical systems
Cárdenas et al. Research challenges for the security of control systems.
Tian et al. Coordinated cyber‐physical attacks considering DoS attacks in power systems
Hossain et al. Cyber–physical security for on‐going smart grid initiatives: a survey
CN113516357B (en) Electric power system vulnerable line assessment method and system considering network attack risk
Himdi et al. Cyber security challenges in distributed energy resources for smart cities
Zhou et al. Robustness analysis of interdependent urban critical infrastructure networks against cascade failures
Liu et al. Importance evaluation of power network nodes based on community division and characteristics of coupled network
CN103124223B (en) A kind of automatic real-time judgment method of IT system security postures
Liu et al. Research on Cyber Security Defense Technology of Power Generation Acquisition Terminal in New Energy Plant
Sinha et al. Cyber physical defense framework for distributed smart grid applications
kamal Kaur et al. Security analysis of smart grids: Successes and challenges
Syed et al. Security for Complex Cyber-Physical and Industrial Control Systems: Current Trends, Limitations, and Challenges.
Yang et al. Technology research on panoramic situation awareness of operation state of smart distribution network
Li et al. Overview of Intrusion Detection in Smart Substation
Zheng et al. An IoT security risk autonomic assessment algorithm
Gangjun et al. Network security risk assessment of cps system in distribution network based on attack graph
Woo et al. Risk analysis of power information control system based on smart grid security standardization
Chen et al. Application of trusted computing technology in active defense of smart substation
Yufei et al. Evaluating the harmfulness of cascading failures across space in electric cyber-physical systems
Mahmoudi Nasr A Petri-net Model for Operational Cycle in SCADA Systems
CN109446805A (en) A kind of measure and its computer installation, readable storage medium storing program for executing of the complete sexual assault of information flow
CN115712894B (en) Load false data injection attack modeling method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20141001

Termination date: 20170928

CF01 Termination of patent right due to non-payment of annual fee