CN102354357B - Lattice Implication Reasoning Algorithm for Vulnerabilities in Smart Grid Partition Protection System - Google Patents
Lattice Implication Reasoning Algorithm for Vulnerabilities in Smart Grid Partition Protection System Download PDFInfo
- Publication number
- CN102354357B CN102354357B CN201110297015.5A CN201110297015A CN102354357B CN 102354357 B CN102354357 B CN 102354357B CN 201110297015 A CN201110297015 A CN 201110297015A CN 102354357 B CN102354357 B CN 102354357B
- Authority
- CN
- China
- Prior art keywords
- lattice
- reasoning
- implication
- protection system
- partition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000005192 partition Methods 0.000 title claims description 71
- 238000000034 method Methods 0.000 claims abstract description 34
- 238000012360 testing method Methods 0.000 claims description 12
- 238000001514 detection method Methods 0.000 abstract description 33
- 238000002474 experimental method Methods 0.000 abstract description 2
- 238000000638 solvent extraction Methods 0.000 abstract 3
- 238000011160 research Methods 0.000 description 9
- 230000003068 static effect Effects 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000002955 isolation Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 3
- 230000018109 developmental process Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000005065 mining Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 239000002131 composite material Substances 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 241001428573 Cacao swollen shoot virus Species 0.000 description 1
- 239000007993 MOPS buffer Substances 0.000 description 1
- 241000700159 Rattus Species 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000000872 buffer Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005094 computer simulation Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 239000000243 solution Substances 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Landscapes
- Supply And Distribution Of Alternating Current (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域 technical field
本发明涉及一种电力检测,特别涉及一种智能电网分区防护系统漏洞的格蕴含推理算法。 The invention relates to electric power detection, in particular to a lattice implication reasoning algorithm for loopholes in a partition protection system of a smart grid.
背景技术 Background technique
分区防护系统包含不同安全等级的子系统,该系统中的边界漏洞来源于多种不同类型设备,漏洞的特性无法用统一标准衡量,和单一的信息系统漏洞相比,具有漏洞来源特性的不可比较性。信息系统中的漏洞检测方法不能完全应用在该环境中的检测。 The partition protection system includes subsystems with different security levels. The boundary vulnerabilities in this system come from a variety of different types of equipment, and the characteristics of the vulnerabilities cannot be measured by a unified standard. sex. Vulnerability detection methods in information systems cannot be fully applied to detection in this environment.
漏洞的检测方法主要有静态检测与动态检测。静态检测是面向程序源代码,近10年来出现了C语言缓冲区漏洞CSSV方法,自动漏洞查找EXE方法和自动敏感代码KLEE漏洞测试方法。但是这些漏洞检测方法是针对计算机系统下C,JAVA等语言的源代码,不能应用到CISCO硬件设备的漏洞检测。 Vulnerability detection methods mainly include static detection and dynamic detection. Static detection is oriented to the program source code. In the past 10 years, the C language buffer vulnerability CSSV method, the automatic vulnerability finding EXE method and the automatic sensitive code KLEE vulnerability testing method have emerged. But these vulnerability detection methods are aimed at the source codes of C, JAVA and other languages under the computer system, and cannot be applied to the vulnerability detection of CISCO hardware equipment.
为了提高静态检测的效率,信息系统采用漏洞检测工具,代表性的有 词法分析分析工具 RATS;符号执行工具Mjolnir,STLlint和ChecknCrash;模型检测工具MOPS,SLAM,优化模型检测工具BLAST,竞争条件漏洞检测工具RacerX; 规则检查工具MC和Splint; 定理证明工具Cogent,CodeSonar,Saturn,mygcc,Eau Claire。检测工具经历了词法分析,符号执行,模型检测,规则检测到定理证明的发展过程。 In order to improve the efficiency of static detection, the information system adopts vulnerability detection tools, representatively Lexical analysis analysis tool RATS; Symbolic execution tools Mjolnir, STLlint and ChecknCrash; Model detection tools MOPS, SLAM, optimization model detection tool BLAST, race condition vulnerability detection tool RacerX; Rule checking tools MC and Splint; Theorem proving tools Cogent, CodeSonar, Saturn, mygcc, Eau Claire. Detection tools have gone through the development process of lexical analysis, symbolic execution, model checking, rule checking and theorem proving.
从静态检测工具的发展规律可以看出,规则检测和定理证明是当前漏洞检测的发展趋势,该方法能够实现功能更强大和性能更完善的静态分析。 From the development of static detection tools, we can see that rule detection and theorem proving are the current development trend of vulnerability detection, and this method can realize static analysis with more powerful functions and better performance.
为了检测可执行程序漏洞,需要采用动态检测方法,主要有Haugh和Wilanderf在计算机安全国际顶级DNSS会议上分别发表的C语言动态测试方法和动态漏洞挖掘比较方法,Brumley的运行时整数检测RICH方法。北京大学的邹维研究组主要采用图论方法和符号执行的IntScope方法检测程序漏洞,研究成果在2009年国际顶级会议NDSS上发布。 In order to detect executable program vulnerabilities, dynamic detection methods are needed, mainly including the C language dynamic testing method and dynamic vulnerability mining comparison method published by Haugh and Wilanderf at the top international DNSS conference on computer security, and Brumley's runtime integer detection RICH method. Zou Wei's research group at Peking University mainly uses the graph theory method and the IntScope method of symbolic execution to detect program vulnerabilities, and the research results were released at the top international conference NDSS in 2009.
动态检测相比静态检测具有明显优势,该方法不局限于C,JAVA等程序源代码,而是面向特定可执行程序,但是分区防护系统包含多种防护设备,设备安装了多种程序,程序具有多种源代码,这样的复杂系统上的边界漏洞,动态检测方法也无法完全适用。 Compared with static detection, dynamic detection has obvious advantages. This method is not limited to C, JAVA and other program source codes, but is oriented to specific executable programs. A variety of source codes, the boundary loopholes on such a complex system, the dynamic detection method is also not fully applicable.
综上所述,为了适应分区防护系统上边界防护漏洞的检测,在信息漏洞挖掘研究的理论基础上,可以尝试采用“格”的非经典逻辑推理检测方法。 To sum up, in order to adapt to the detection of boundary protection vulnerabilities in the partition protection system, on the theoretical basis of information vulnerability mining research, we can try to use the "lattice" non-classical logical reasoning detection method.
格是一类重要的代数结构,格值逻辑是一种重要的非经典逻辑,它是经典逻辑和模糊逻辑的推广。格值逻辑把多值逻辑的链型真值域拓广到较一般的格上,既能处理全序信息,又能处理不可比的信息,从而可以更有效地刻画推理、判断和决策的不确定性,尤其是对真值不完全可比较性的研究。 Lattice is an important class of algebraic structures, and lattice-valued logic is an important non-classical logic, which is a generalization of classical logic and fuzzy logic. Lattice-valued logic extends the chain-type truth domain of multi-valued logic to more general lattices, which can not only deal with total order information, but also deal with incomparable information, so that it can more effectively describe the difference between reasoning, judgment and decision-making. Certainty, especially the study of imperfect comparability of truth values.
概念格是Wille R于1982年提出。概念格的每个节点外延实例和内涵概念是一个形式描述。从2000年开始,清华大学的石纯一教授就开始了概念格的分类和关联规则的研究,他改进了一个Bordat的建格算法,使之适合于集成挖掘的需要,进而提出一个从概念格上提取关联规则和分类规则的算法,实现了关联规则和分类规则的挖掘在概念格框架下的统一。 The concept lattice was proposed by Wille R in 1982. Each node extension instance and connotation concept of concept lattice is a formal description. Since 2000, Professor Shi Chunyi of Tsinghua University has started the research on the classification of concept lattices and association rules. Based on the algorithm for extracting association rules and classification rules, the mining of association rules and classification rules is unified under the framework of concept lattice.
2002年西南交通大学的徐扬指导李海明博士生开展了“格蕴涵”代数的研究。格蕴涵是将格与蕴涵代数结合起来的一种代数结构,是研究格值逻辑系统及其性质的一个重要途径。2007年国际原子能机构中心的阮达教授和徐扬教授联合开展了格蕴涵理论研究。徐扬教授在该领域研究了格值逻辑的语言真值归结自动推理,不确定性推理,语言真值α-广义归结自动推理的相关研究。 In 2002, Xu Yang from Southwest Jiaotong University guided Dr. Li Haiming to carry out the research on "lattice implication" algebra. Lattice implication is an algebraic structure combining lattice and implication algebra, and it is an important way to study lattice-valued logic systems and their properties. In 2007, Professor Ruan Da and Professor Xu Yang of the International Atomic Energy Agency Center jointly carried out the research on lattice implication theory. Professor Xu Yang has studied the automatic reasoning of linguistic truth-value resolution of lattice-valued logic, uncertainty reasoning, and automatic reasoning of linguistic truth-value α-generalized resolution in this field.
石纯一教授的“概念格”理论和徐扬教授“格蕴涵”理论的成果为分区防护系统的漏洞检测理论研究铺平了道路。在他们的理论研究成果基础上,申请人和徐扬教授的博士李海明教授,采用“概念格”与“格蕴涵”相结合方法,找到了格在分区防护系统的应用对象,在信息安全与数学非经典逻辑交叉领域中,研究边界漏洞检测难题,拟在智能电网分区防护系统中验证推理方法的可靠性与完备性。 The achievements of Professor Shi Chunyi's "Concept Lattice" theory and Professor Xu Yang's "Lattice Implication" theory paved the way for theoretical research on vulnerability detection of partition protection systems. On the basis of their theoretical research results, the applicant and Professor Li Haiming, a Ph.D. of Professor Xu Yang, used the method of combining "conceptual lattice" and "lattice implication" to find the application object of lattice in partition protection system, in information security and mathematics In the field of non-classical logic intersection, the problem of boundary vulnerability detection is studied, and the reliability and completeness of the reasoning method are to be verified in the smart grid partition protection system.
建设中的智能电网“信息流”宽度和有效深度突破了我国现有电力系统安全防护边界,信息增加了很多不确定性。电力SCADA控制系统依然存在溢出回零和溢出满码的漏洞,攻击者可以通过该漏洞攻击变电站系统。2009年Mike Davis在世界著名的黑帽大会演示了病毒通过漏洞攻击电网行为。2009年9月25日,美国国家标准技术研究院(NIST)证实“智能电网信息基础设施存在的漏洞,可能允许攻击者渗透网络、获取控制软件或改变配置条件,以不可预期方式破坏”。2010年Zerbst在IEEE电力能源协会上提出了智能电网网络安全防护结构的分区原则,IEEE Transactions也关注智能电网的安全技术,可靠性技术,但是建设中的智能电网分区系统中,边界漏洞检测的研究还不多见。 The width and effective depth of the "information flow" of the smart grid under construction have broken through the security protection boundary of my country's existing power system, and the information has increased a lot of uncertainty. The power SCADA control system still has the loopholes of overflow back to zero and overflow full code, and attackers can attack the substation system through this loophole. In 2009, Mike Davis demonstrated the behavior of viruses attacking the power grid through vulnerabilities at the world-renowned Black Hat Conference. On September 25, 2009, the National Institute of Standards and Technology (NIST) confirmed that "the vulnerabilities in the information infrastructure of the smart grid may allow attackers to infiltrate the network, obtain control software or change configuration conditions, and damage in unpredictable ways." In 2010, Zerbst proposed the partition principle of the smart grid network security protection structure at the IEEE Electric Energy Association. IEEE Transactions also pays attention to the security technology and reliability technology of the smart grid, but in the smart grid partition system under construction, the research on boundary vulnerability detection Not so much.
我国现有的电力二次系统“信息流”采用“安全分区、网络专用、横向隔离、纵向认证”策略,来保障电力监控系统和电力调度数据网络的安全。但是电力系统与信息网络在分区防护存在很大的差异,主要表现如下表1所示: The "information flow" of my country's existing power secondary system adopts the strategy of "safe partition, network dedicated, horizontal isolation, and vertical authentication" to ensure the security of the power monitoring system and power dispatching data network. However, there are great differences between the power system and the information network in partition protection, which are mainly shown in Table 1 below:
表1 Table 1
表中最主要的差异是漏洞特性具有不可比较性。风险来源于电力智能终端,无线通信,电力数据库与电力专用软件。 The main difference in the table is that the vulnerability characteristics are not comparable. Risks come from power intelligent terminals, wireless communications, power databases and power-specific software.
发明内容 Contents of the invention
本发明是针对电力系统中漏洞特性无比较性,导致风险的提升问题,提出了一种智能电网分区防护系统漏洞的格蕴含推理算法,拟在智能电网分区防护系统采用“格蕴涵”和“概念格”结合的方法,建立边界漏洞的自动推理系统。 The present invention is aimed at the problem that the characteristics of loopholes in the power system are not comparable, which leads to the increase of risk, and proposes a lattice implication reasoning algorithm for loopholes in the partition protection system of the smart grid. Grid" combined method to establish an automatic reasoning system for boundary loopholes.
本发明的技术方案为:一种智能电网分区防护系统漏洞的格蕴含推理算法,具体包括如下步骤: The technical solution of the present invention is: a lattice implication reasoning algorithm for loopholes in a smart grid partition protection system, which specifically includes the following steps:
1)先根据智能电网分区防护系统实验环境构建格蕴含代数系统模型,智能电网按防护等级分区,各区平行连接点为合法点,其他为边界漏洞点,外界攻击可以通过漏洞入侵到分区系统,定义分区防护系统中是一个偏序集,假设S={a,b,c},其中任意两个元素都有最小上界和最大下届,则称为分区防护系统格,P(S)是分区防护系统的S的幂集,<P(S), ⊆>是一个偏序集,<P(S), ⊆>是分区防护系统格,定义一个漏洞集合{v},重新构建V={a,b,c,v}的偏序集,并称为分区防护系统中的边界漏洞格,在<P(V), ⊆>偏序集上,构建Hasse图,由分区防护系统格<P(S), ⊆>所诱导的代数系统为<P(S), ⊆,∨,∧>,其中∨为集合的并,∧为集合的交,如果分区防护系统格,在代数系统为<P(S), ⊆,∨,∧>上,假设V⊆ S并且V ≠Φ,并且∨,∧关于V是封闭的,那么边界漏洞格为的子格; 1) First construct a lattice implication algebraic system model based on the experimental environment of the smart grid partition protection system. The smart grid is partitioned according to the protection level. The parallel connection points in each area are legal points, and the others are border loophole points. External attacks can invade the partition system through loopholes. Define Partition protection system It is a partially ordered set, assuming S={a,b,c}, where any two elements have the smallest upper bound and the largest lower bound, then it is called is the partition protection system lattice, P(S) is the power set of S of the partition protection system, <P(S), ⊆> is a partial order set, <P(S), ⊆> is the partition protection system lattice, define a Vulnerability set {v}, rebuild the partial order set of V={a,b,c,v}, and say For the boundary vulnerability lattice in the partition protection system, construct a Hasse graph on the <P(V), ⊆> poset set, and the algebraic system induced by the partition protection system lattice <P(S), ⊆> is <P( S), ⊆, ∨, ∧>, where ∨ is the union of sets, and ∧ is the intersection of sets, if the partition protection system lattice, on the algebraic system <P(S), ⊆, ∨, ∧>, assuming V⊆ S and V ≠ Φ, and ∨, ∧ are closed with respect to V, then The boundary hole is subgrid;
2)然后采用概念格的方法描述模型中的漏洞,格上规则提取,找到包含的最小概念,对该节点的子格进行宽度优先遍历,对每个节点生成所有非冗余规则,对每个节点首先生成蕴涵规则,再生成低可信度规则,最终基于事实生成蕴涵规则; 2) Then use the concept lattice method to describe the loopholes in the model, extract the rules on the lattice, find the smallest concept contained, and perform breadth-first traversal on the sub-lattice of the node, generate all non-redundant rules for each node, and generate all non-redundant rules for each node. Nodes first generate implication rules, then generate low-confidence rules, and finally generate implication rules based on facts;
3)定义格蕴涵算子,在此基础上构建格蕴含的自动推理系统; 3) Define the lattice implication operator, and build an automatic reasoning system for lattice implication on this basis;
4)推理检验系统漏洞,最后通过实验系统环境检验推理效率。 4) Reasoning test system loopholes, and finally test the reasoning efficiency through the experimental system environment.
所述步骤3)中构建自动推理系统构建自动推理系统的具体步骤如下: The specific steps of building an automatic reasoning system in the step 3) to build an automatic reasoning system are as follows:
第一步:定义格蕴涵算子,使得其能完整描述“边界漏洞格”特性; The first step: define the lattice implication operator, so that it can fully describe the characteristics of the "boundary loophole lattice";
第二步:对蕴涵算子提出条件,并对条件评述; The second step: put forward the conditions for the implication operator, and comment on the conditions;
第三步:根据系统特性构建三值逻辑系统 L3 ,六值逻辑系统 L6 ,和多值逻辑系统 Ln ; Step 3: Construct three-valued logic system L 3 , six-valued logic system L 6 , and multi-valued logic system L n according to system characteristics;
第四步:定义多值系统的真值表,定义连接次直接关系,用符号表示模态词; The fourth step: define the truth table of the multi-valued system, define the connection sub-direct relationship, and use symbols to represent the modal words;
第五步:在推理系统中可以采用Zadeh的Fuzzy推理中的经典合成推理CRI方法,其基本思想是用Fuzzy集合表示Fuzzy命题,把蕴涵式转换成Fuzzy关系,然后输入与Fuzzy关系合成输出,或则在多值推理系统 Ln 中采用基于路径搜索的自动推理方法; Step 5: In the reasoning system, the classic composite reasoning CRI method in Zadeh's Fuzzy reasoning can be used. The basic idea is to use the Fuzzy set to represent the Fuzzy proposition, convert the implication into a Fuzzy relationship, and then synthesize the output with the input and the Fuzzy relationship, or Then the automatic reasoning method based on path search is adopted in the multi-valued reasoning system L n ;
第六步:可靠性完备性证明,根据证明结果改善自动推理算法。 Step 6: Prove the reliability and completeness, and improve the automatic reasoning algorithm according to the proof results.
本发明的有益效果在于:本发明智能电网分区防护系统漏洞的格蕴含推理算法,拟在智能电网分区防护系统采用“格蕴涵”和“概念格”结合的方法,建立边界漏洞的自动推理系统,提高了智能电网的漏洞检测效率。 The beneficial effect of the present invention is that: the lattice implication reasoning algorithm for the loopholes of the smart grid partition protection system of the present invention intends to adopt the method of combining "lattice implication" and "concept lattice" in the smart grid partition protection system to establish an automatic reasoning system for boundary loopholes, The vulnerability detection efficiency of the smart grid is improved.
附图说明 Description of drawings
图1是本发明智能电网分区防护系统漏洞的格蕴含推理算法中分区防护系统的结构模型图; Fig. 1 is a structural model diagram of the partition protection system in the lattice implication reasoning algorithm of the vulnerability of the smart grid partition protection system of the present invention;
图2是本发明智能电网分区防护系统漏洞的格蕴含推理算法中分区防护系统边界漏洞格图; Fig. 2 is a grid diagram of the boundary loopholes of the partition protection system in the lattice implication reasoning algorithm of the loopholes of the smart grid partition protection system of the present invention;
图3是本发明智能电网分区防护系统漏洞的格蕴含推理算法中概念格的Hasse示意图。 Fig. 3 is a Hasse schematic diagram of the concept lattice in the lattice implication reasoning algorithm of the vulnerability of the smart grid partition protection system of the present invention.
具体实施方式 Detailed ways
由于电力系统的安全分区防护结构数据是单向传递,并且安全分区从低到高,可以作为一个偏序集,任何两个元素都有最小上界和最大下界,该系统的特性与格的定义相符合。 Since the data of the security partition protection structure of the power system is one-way transmission, and the security partition is from low to high, it can be used as a partial order set, and any two elements have the smallest upper bound and the largest lower bound. The characteristics of the system are defined by the lattice match.
分区防护系统中存在经典逻辑推理无法表述命题的真伪的情况,例如: In the partition protection system, there are situations where classical logical reasoning cannot express the truth of propositions, for example:
命题1:智能电网分区防护系统将来依然会存在安全漏洞。该命题是对将来进行判断,无法用真或假来表示该命题的真实程度。 Proposition 1: There will still be security loopholes in the smart grid partition protection system in the future. The proposition is a judgment about the future, and it is impossible to use true or false to express the degree of truth of the proposition.
命题2:如果防护系统存在漏洞,那么该系统面临的风险一定会很大。这是一个条件命题,当条件满足的情况下,结论为真的情况,但是结论中风险一定很大也无法用经典逻辑表述。为了解决这样的问题。采用格蕴涵非经典的数理逻辑进行近似推理。 Proposition 2: If there are loopholes in the defense system, then the risk faced by the system must be great. This is a conditional proposition. When the conditions are met, the conclusion is true, but the risk in the conclusion must be too high to be expressed by classical logic. In order to solve such a problem. Approximate reasoning is performed using lattice implication non-classical mathematical logic.
(1)构建“边界漏洞格”的代数系统 : (1) Construct the algebraic system of "boundary loophole lattice":
智能电网分区防护系统包含四个分区,安全区I(实时控制区)、安全区II(非控制生产区)、安全区III(生产管理区)和安全区IV(管理信息区),结构如图1所示:图1中平行连接点为合法点,其他为边界漏洞点,外界攻击可以通过漏洞入侵到分区系统。分区防护系统安全等级从高到低的偏序关系, 整个分区防护系统每个元素都有最小上界和最大下界。 The smart grid partition protection system includes four partitions, safety area I (real-time control area), safety area II (non-controlled production area), safety area III (production management area) and safety area IV (management information area), the structure is shown in the figure As shown in Figure 1: the parallel connection point in Figure 1 is the legal point, and the other points are boundary loopholes, through which external attacks can invade the partition system. The partial order relationship of the security level of the partition protection system from high to low, Each element of the entire partition protection system has the smallest upper bound and the largest lower bound.
构建的格如图2所示,图2中定义分区防护系统中是一个偏序集,假设S={a,b,c},其中任意两个元素都有最小上界和最大下届,则称为分区防护系统格。P(S)是分区防护系统的S的幂集,<P(S), ⊆>是一个偏序集,<P(S), ⊆>是分区防护系统格。在Hasse图中添加一个漏洞集合{v},重新构建V={a,b,c,v}的偏序集,并称为分区防护系统中的边界漏洞格。在<P(V), ⊆>偏序集上,构建Hasse图。若分区系统格无法从{v}中构建边界漏洞格,推测系统中可能存在漏洞。 The constructed grid is shown in Figure 2, and the partition protection system is defined in Figure 2 It is a partially ordered set, assuming S={a,b,c}, where any two elements have the smallest upper bound and the largest lower bound, then it is called Grid for the partition protection system. P(S) is the power set of S of the partition protection system, <P(S), ⊆> is a partially ordered set, and <P(S), ⊆> is the lattice of the partition protection system. Add a vulnerability set {v} to the Hasse graph, reconstruct the partial order set of V={a,b,c,v}, and say is the border hole grid in the partition protection system. On the <P(V), ⊆> poset, construct a Hasse graph. If the partition system grid cannot construct a boundary loophole grid from {v}, it is speculated that there may be loopholes in the system.
P(S)的幂集P(S)={ Φ,{a},{b},{c},{a,b},{a,c},{b,c},{a,b,c}}; The power set of P(S) P(S)={Φ,{a},{b},{c},{a,b},{a,c},{b,c},{a,b, c}};
分区S1={Φ,{a},{b},{c}} Partition S1={Φ,{a},{b},{c}}
分区S2={Φ, {b},{c},{b,c}} Partition S2={Φ, {b},{c},{b,c}}
分区S3={{a},{a,b},{a,c},{a,b,c}} Partition S3={{a},{a,b},{a,c},{a,b,c}}
分区S4={{a,b},{a,c},{b,c},{a,b,c}} Partition S4={{a,b},{a,c},{b,c},{a,b,c}}
都是的子格。 are all subgrid.
格上诱导的代数系统举例: Examples of algebraic systems induced on lattices:
举例1:由分区防护系统格<P(S), ⊆>所诱导的代数系统为<P(S), ⊆,∨,∧>,其中∨为集合的并,∧为集合的交。 Example 1: By partition protection system lattice <P(S), The algebraic system induced by ⊆> is <P(S), ⊆, ∨, ∧>, where ∨ is the union of sets, and ∧ is the intersection of sets.
举例2:如果分区防护系统格,在代数系统为<P(S), ⊆,∨,∧>上,假设V⊆ S并且V ≠Φ,并且∨,∧关于V是封闭的,那么边界漏洞格为的子格。 Example 2: If the partition protection system lattice, on the algebraic system <P(S), ⊆, ∨, ∧>, assuming V⊆ S and V ≠ Φ, and ∨, ∧ are closed with respect to V, then The boundary hole is subgrid.
(2)基于“概念格”构建Hasse图 (2) Construct a Hasse diagram based on the "concept lattice"
第一步:构建格,采用概念格的方法进行描述漏洞。用多元组描述边界漏洞的事例集,属性集,事例集与属性集之间的关系。在这个集合中建立偏序集,每个元素存在最小上界和最大下界,构建边界漏洞格的描述。格中的每个节点是一个概念序偶,事例集合的幂集作为概念的外延,事例的共同描述符的集合,作为概念的内涵。根据Hasse图揭示的概念内涵与外延之间的泛化关系和特化关系,构建形式背景。例如假设O={1,2,3,4}, The first step: construct a lattice, and use the method of concept lattice to describe the vulnerability. Use tuples to describe the case set, attribute set, and the relationship between the case set and attribute set of boundary vulnerabilities. A partially ordered set is established in this set, each element has a minimum upper bound and a maximum lower bound, and a description of the boundary hole lattice is constructed. Each node in the lattice is a concept pair, the power set of the case set is the extension of the concept, and the set of common descriptors of the cases is the connotation of the concept. According to the generalization relationship and specialization relationship between the concept connotation and extension revealed by the Hasse diagram, the formal background is constructed. For example, suppose O={1,2,3,4},
D={a1,a2,a3,b1,b2,b3,c1,c2,d1,d2,d3,d4},R描述了O中元素所拥有的D中的属性值集,相应的概念格的Hasse图如图3下所示。 D={a1,a2,a3,b1,b2,b3,c1,c2,d1,d2,d3,d4}, R describes the attribute value set in D owned by the elements in O, and the Hasse of the corresponding concept lattice The figure is shown below in Figure 3.
第二步:格上规则提取,找到包含的最小概念,对该节点的子格进行宽度优先遍历,对每个节点生成所有非冗余规则。对每个节点首先生成蕴涵规则,再生成低可信度规则,最终基于事实生成蕴涵规则。 The second step: rule extraction on the lattice, find the smallest concept included, perform breadth-first traversal on the sub-lattice of the node, and generate all non-redundant rules for each node. First generate implication rules for each node, then generate low-confidence rules, and finally generate implication rules based on facts.
第三部:可靠性证明:证明分区防护系统的漏洞概念格描述的可靠性。 Part Three: Reliability Proof: Prove the reliability of the vulnerability concept lattice description of the partition protection system.
(3)定义格蕴涵算子与构建自动推理系统 (3) Define the lattice implication operator and build an automatic reasoning system
举例3:设是一有泛界O,I的有余格,若映射:满足:对任意 Example 3: Set is a co-lattice with a universal O and I, if the mapping : Satisfied: for any
(I1) x (yz)=y (xz) (I1)x (y z)=y (x z)
(I2) xx=I (I2)x x=I
(I4) 如果xy=yx=I,则x=y (I4) if x y=y x=I, then x=y
(I5) (xy) y=(yx) x (I5) (x y) y=(y x) x
则称是一格蕴涵代数。 then called is a lattice implication algebra.
在非经典逻辑中,可以在格的代数系统中,构建自动推理算法,将其应用于二值逻辑、中界格逻辑和六元格逻辑系统中,并证明这种算法的可靠性和完备性。 构建自动推理系统的主要步骤如下: In non-classical logic, it is possible to construct an automatic reasoning algorithm in the algebraic system of lattices, apply it to binary logic, intermediate lattice logic and six-element lattice logic system, and prove the reliability and completeness of this algorithm . The main steps of building an automatic reasoning system are as follows:
第一步:定义格蕴涵算子,使得其能完整描述“边界漏洞格”特性; The first step: define the lattice implication operator, so that it can fully describe the characteristics of the "boundary loophole lattice";
第二步:对蕴涵算子提出条件,并对条件评述; The second step: put forward the conditions for the implication operator, and comment on the conditions;
第三步:根据系统特性构建三值逻辑系统 L3 ,六值逻辑系统 L6 ,和多值逻辑系统 Ln Step 3: Construct three-valued logic system L 3 , six-valued logic system L 6 , and multi-valued logic system L n according to system characteristics
第四步:定义多值系统的真值表,定义连接次直接关系,用符号表示模态词。 Step 4: Define the truth table of the multi-valued system, define the connection sub-direct relationship, and use symbols to represent the modal words.
第五步:在推理系统中可以采用Zadeh的Fuzzy推理中的经典合成推理CRI方法,其基本思想是用Fuzzy集合表示Fuzzy命题,把蕴涵式转换成Fuzzy关系,然后输入与Fuzzy关系合成输出。或则在多值推理系统 Ln 中采用基于路径搜索的自动推理方法。 Step 5: In the reasoning system, the classic composite reasoning CRI method in Zadeh's Fuzzy reasoning can be used. The basic idea is to use the Fuzzy set to represent the Fuzzy proposition, convert the implication into a Fuzzy relation, and then synthesize the output with the input and the Fuzzy relation. Or use the automatic reasoning method based on path search in the multi-valued reasoning system L n .
第六步:可靠性完备性证明,根据证明结果改善自动推理算法。 Step 6: Prove the reliability and completeness, and improve the automatic reasoning algorithm according to the proof results.
(4)实验验证:在智能电网分区防护系统上,构建边界漏洞格,定义格蕴涵算子,构造规则和方法,建立自动推理系统,检测格蕴涵代数系统模型的可靠性与完备性;采用漏洞的特征属性库测试漏洞形式化描述是否存在冗余信息;编写程序实现基于格的多值逻辑推理系统,检验推理系统漏洞检验的效率。 (4) Experimental verification: On the smart grid partition protection system, construct a boundary loophole lattice, define lattice implication operators, construct rules and methods, establish an automatic reasoning system, and test the reliability and completeness of the lattice implication algebraic system model; The feature attribute library is used to test whether there is redundant information in the formal description of the vulnerability; write a program to realize the lattice-based multi-valued logic reasoning system, and test the efficiency of the reasoning system vulnerability detection.
智能电网分区防护系统应用实例: Application examples of smart grid partition protection system:
1、实例的应用环境:根据电监会5号令《电力二次系统防护规定》构建智能电网的分区防护系统,采用电力系统中的分区防护设备,如电力隔离系统的正向和反向网络安全隔离SysKeeper-2000设备、正向反向的单比特文件传输ST3000文件传输系统 、sysKeeper-2000 系统、电力加密系统中的SMC-2000加密网管装置管理系统、DialKeeper-2000安全拨号认证网管系统等。 1. The application environment of the example: According to the Electricity Regulatory Commission No. 5 "Power Secondary System Protection Regulations", the partition protection system of the smart grid is constructed, and the partition protection equipment in the power system is used, such as the forward and reverse network security of the power isolation system Isolate SysKeeper-2000 equipment, forward and reverse single-bit file transfer ST3000 file transfer system , sysKeeper-2000 system, SMC-2000 encrypted network management device management system in the power encryption system, DialKeeper-2000 secure dial-up authentication network management system, etc.
2、应用实例的目的:采用格蕴含推理方法检测智能电网分区防护系统中的边界漏洞。 2. The purpose of the application example: use the lattice implication reasoning method to detect the boundary loopholes in the partition protection system of the smart grid.
3、实例应用过程:先根据智能电网分区防护系统实验环境构建格蕴含代数系统模型,然后采用概念格的方法描述模型中的漏洞,在此基础上构建格蕴含的自动推理系统,推理检验系统漏洞,最后通过实验系统环境检验推理效率。 3. Example application process: first construct a lattice implication algebraic system model according to the experimental environment of the smart grid partition protection system, and then use the concept lattice method to describe the loopholes in the model, and then build an automatic reasoning system for lattice implication on this basis to reason and test system loopholes , and finally test the reasoning efficiency through the experimental system environment.
4、实例应用结果:根据实验结果分析与实验假设的差异,分析推理过程中可能存在的问题,检验实验过程中存在的偏差。 4. Example application results: According to the difference between the experimental result analysis and the experimental hypothesis, analyze the possible problems in the reasoning process, and test the deviation in the experimental process.
复杂系统安全防护应用实例: Application examples of complex system security protection:
1)实例应用环境:复杂系统建模。 1) Example application environment: complex system modeling.
2)实例应用过程:本算法是采用的系统科学的方法,把智能电网分区防护结构放在复杂系统的形式中,从系统的整体和全局出发,分析其结构特征符合“分区防护,横向隔离,纵向认证,单向传递”的特征,构建基于格的代数模型;然后从系统与边界防护,边界防护与漏洞,漏洞与漏洞,漏洞与外界环境的对立统一关系,对其研究进行分析研究,采用概念格的形式描述漏洞。最后在构建好的系统模型与漏洞描述的基础上,建立推理系统,证明漏洞推理系统的可靠性与完备性,采用实验检验漏洞检测效率。 2) Example application process: This algorithm adopts a systematic and scientific method. It puts the partition protection structure of the smart grid in the form of a complex system, and analyzes its structural characteristics in line with the "partition protection, horizontal isolation, "Vertical authentication, one-way transmission" features, build a lattice-based algebraic model; then analyze and study the relationship between the system and boundary protection, boundary protection and loopholes, loopholes and loopholes, and loopholes and the external environment. Vulnerabilities are described in the form of concept lattices. Finally, on the basis of the well-built system model and vulnerability description, a reasoning system is established to prove the reliability and completeness of the vulnerability reasoning system, and the vulnerability detection efficiency is tested by experiments.
3)实例的应用原则:综合考虑复杂系统的整体性、系统与漏洞综合性、漏洞关系之间的动态性、系统的模型化和漏洞推检测最优化。 3) Application principles of examples: comprehensively consider the integrity of the complex system, the integration of the system and vulnerabilities, the dynamics of the relationship between vulnerabilities, the modeling of the system, and the optimization of vulnerability detection.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110297015.5A CN102354357B (en) | 2011-09-28 | 2011-09-28 | Lattice Implication Reasoning Algorithm for Vulnerabilities in Smart Grid Partition Protection System |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110297015.5A CN102354357B (en) | 2011-09-28 | 2011-09-28 | Lattice Implication Reasoning Algorithm for Vulnerabilities in Smart Grid Partition Protection System |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102354357A CN102354357A (en) | 2012-02-15 |
CN102354357B true CN102354357B (en) | 2014-10-01 |
Family
ID=45577919
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110297015.5A Expired - Fee Related CN102354357B (en) | 2011-09-28 | 2011-09-28 | Lattice Implication Reasoning Algorithm for Vulnerabilities in Smart Grid Partition Protection System |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102354357B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077325B (en) * | 2013-01-30 | 2015-08-05 | 西安交通大学 | Based on the intelligent grid bad data detection of adaptive partition state estimation |
CN103428478A (en) * | 2013-08-16 | 2013-12-04 | 昆明能讯科技有限责任公司 | Coordinated control system of centralized control station remote long-distance video |
CN104468310A (en) * | 2014-11-14 | 2015-03-25 | 国家电网公司 | Power communication system and method |
CN104463330B (en) * | 2014-12-02 | 2017-11-10 | 刘泊荣 | A kind of foundation of Knowledge Map and subject knowledge air navigation aid |
CN106709354B (en) * | 2016-10-24 | 2018-07-06 | 北京亚控科技发展有限公司 | A kind of the safe space building method and system of configurable control integration platform |
CN107992746B (en) * | 2017-12-14 | 2021-06-25 | 华中师范大学 | Malicious behavior mining method and device |
CN111125720B (en) * | 2019-12-27 | 2023-06-20 | 国网四川省电力公司电力科学研究院 | Information security and functional security association analysis method |
CN111967034B (en) * | 2020-08-30 | 2022-09-16 | 河南大学 | RBAC role fault tolerance auxiliary construction method based on attribute exploration |
CN116910769B (en) * | 2023-09-12 | 2024-01-26 | 中移(苏州)软件技术有限公司 | Asset vulnerability analysis method, device and readable storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101854269A (en) * | 2010-04-06 | 2010-10-06 | 珠海市鸿瑞信息技术有限公司 | Information safety operation and maintenance supervising platform of electric power secondary system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030159070A1 (en) * | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
-
2011
- 2011-09-28 CN CN201110297015.5A patent/CN102354357B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101854269A (en) * | 2010-04-06 | 2010-10-06 | 珠海市鸿瑞信息技术有限公司 | Information safety operation and maintenance supervising platform of electric power secondary system |
Non-Patent Citations (8)
Title |
---|
Study on the security assessment platform for electric power secondary system;Yu Yong等;《2006 International Conference on Power System Technology》;20061026;第1-6页 * |
Yu Yong等.Study on the security assessment platform for electric power secondary system.《2006 International Conference on Power System Technology》.2006,第1-6页. |
乘积格蕴涵代数的子代数的MATLAB实现;吴明慧等;《计算机科学》;20110331;第38卷(第3期);第263-289页 * |
信息系统漏洞风险定量评估模型研究;周亮等;《通信学报》;20090228;第30卷(第2期);第71-76页 * |
吴明慧等.乘积格蕴涵代数的子代数的MATLAB实现.《计算机科学》.2011,第38卷(第3期),第263-289页. |
周亮等.信息系统漏洞风险定量评估模型研究.《通信学报》.2009,第30卷(第2期),第71-76页. |
李劲.电力生产控制区业务系统漏洞修补研究.《广西电力》.2009,(第4期),第1-4页. |
电力生产控制区业务系统漏洞修补研究;李劲;《广西电力》;20091231(第4期);第1-4页 * |
Also Published As
Publication number | Publication date |
---|---|
CN102354357A (en) | 2012-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102354357B (en) | Lattice Implication Reasoning Algorithm for Vulnerabilities in Smart Grid Partition Protection System | |
Choi et al. | Ontology-based security context reasoning for power IoT-cloud security service | |
CN101968769B (en) | Behavioral model-based software security test case generation method | |
WO2017210005A1 (en) | Systems and methods for detecting attacks in big data systems | |
CN106878257B (en) | Industrial network closed-loop control method and system with intelligent attack protection | |
CN112073431A (en) | Security defense method and system for industrial control system network | |
Zhang et al. | Mechanized network origin and path authenticity proofs | |
Hongjun et al. | Survey of research on information security in big data | |
WO2021147343A1 (en) | Method for discovery of operating system access control vulnerability based on model checking | |
Zhao et al. | An invocation chain test and evaluation method for fog computing | |
CN108183897A (en) | A kind of information physical emerging system safety risk estimating method | |
Shang et al. | Modbus communication behavior modeling and SVM intrusion detection method | |
Gangadharan et al. | Advancing bug detection in solidity smart contracts with the proficiency of deep learning | |
Li et al. | Network security in the industrial control system: A survey | |
Amine et al. | IDS-DL: A description language for detection system in cloud computing | |
CN110611659A (en) | A method, device and system for protection of business nature of power monitoring system | |
Tang et al. | Android static taint analysis based on multi branch search association | |
Yao et al. | Node importance evaluation method for cyberspace security risk control | |
Li et al. | A new method to construct the software vulnerability model | |
Yang et al. | Cascading‐Failures Effect on Heterogeneous Internet of Things Systems under Targeted Selective Attack | |
Zhao et al. | Overview of Network Security Defense Technologies for Power Systems | |
Peng et al. | Reliability analysis of heterogeneous sensor-cloud systems against targeted attacks | |
Zhang et al. | Modeling virtual channel to enforce runtime properties for IoT services | |
Dash Karan | AI-Driven Cloud Computing: Enhancing Scalability, Security, and Efficiency | |
Han et al. | Hardcoded Vulnerability Mining Method in a Simulated Environment Based on Router Backdoor Detection Technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20141001 Termination date: 20170928 |