CN110300099A - A kind of electric power industrial control system static state and dynamic leak analysis and digging technology - Google Patents
A kind of electric power industrial control system static state and dynamic leak analysis and digging technology Download PDFInfo
- Publication number
- CN110300099A CN110300099A CN201910445750.2A CN201910445750A CN110300099A CN 110300099 A CN110300099 A CN 110300099A CN 201910445750 A CN201910445750 A CN 201910445750A CN 110300099 A CN110300099 A CN 110300099A
- Authority
- CN
- China
- Prior art keywords
- electric power
- control system
- industrial control
- data
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Supply And Distribution Of Alternating Current (AREA)
- Remote Monitoring And Control Of Power-Distribution Networks (AREA)
Abstract
The invention discloses a kind of electric power industrial control system static state and dynamic leak analysis and digging technology, China's electric power industrial control system hair, it is defeated, become, match, reconcile in terms of six, system takes the network structure that dedicated network and public network combine.Wherein, SPDnet(scheduling information net) and SPnet(Electricity Information Network) it is private network of electric power system network.Under the premise of can guarantee the network information security, it is connect with Internet.In order to ensure the safety of electric system, degree is required according to difference of the electric system each section to safety, electric power networks information system is divided into three floor, 4th area.In subsequent research process, the feature extraction for typical loophole should improve theory analysis techniques, the appraisement system of building triggering loophole factor, and the feature of typical loophole is analyzed in stratification.
Description
The present invention relates to power domain more particularly to a kind of electric power industrial control system static state and dynamic leak analysis and Mining Technology
Art.
Background technique
In recent years, with the continuous development of information technology, the work commonly used, based on IEEE802.3 of windows platform
The spreading of industrial Ethernet, large quantities of TCP(UDP)/IP agreement is selected, industrial control field industrialization and information-based continuous infiltration
Development, industrial control system begin to use measured embedded platform, the various common network equipments, business software and hard
Part, an opening state is presented in information-based depth development, industrial control system in addition, and industrial control system is no longer one
Seat " isolated island " forms and promotes industrialization with informationization, drives information-based plyability to industrialize trend to industrialize, has section
High, good in economic efficiency, the low in resources consumption feature of skill content.On the other hand, due to the opening of industrial control system, complexity
And the loophole of system itself, so that the safety of industrial control system faces bigger threat and challenge.With electric power industrial control system
For the industrial control system feature having the same of representative.
2008, hacker kidnapped one national grid control system of South America, extorted government, after being rejected, attack
State's grid control system causes power breakdown a few minutes.2008, Homeland Security office, the U.S. carried out several times electric system
Penetration testing, a generator produces physical damage after its control system is attacked in test process.2010, Iran
Extensive " shake net " virus of outburst, simatic WINCC system vulnerability and several 0day loopholes are utilized, so that industrial control system
It is under attack, postpone the nuclear programme of Iran 2 years.2013, USB virus attack U.S. Liang Zuo power plant, so that Power Plant
Power generation was delayed to more than 6 hours.
Various security incidents show threat of the electric power industrial control system by hostile force, terroristic organization, offender etc.,
Its safety has been raised to State-level.The key problem of power industry control system information security is exactly power industry control system
Loophole.Different from the loophole of traditional IT system, the loophole of industrial control system, which is once utilized, will directly contribute economic damage
It loses, explosion even casualties.In addition, the important control system of electricity power enterprise can threaten national security when being destroyed, sternly
Civil order and public interest are damaged again.So to improve the protective capacities of industrial control system, the security study of electric power industry control has
Important meaning.
The technical problems to be solved by the invention
1. typical event is analyzed
It is angularly analyzed in power-off event from the process of Ukraine's grid power blackout event and " shake net " event, attack tool, sample
Electric power industrial control system mechanism under attack is laid for subsequent typical case's loophole of carrying out from event in the feature of electric power industrial control system
Basis.
2. electric power industrial control system loophole signature analysis
According to the analysis conclusion hereinbefore to typical event, in conjunction with loophole classification to that may be present in electric power industrial control system
Loophole conducts a research, and according to the difference of the description of loophole and mechanism, establishes and induces the dangerous function set that loophole generates, after being
Carry out bug excavation technology in text and the typical loophole feature of the industrial control system containing electric power is provided, improves the science of bug excavation.
3. typical scene bug excavation emulation platform building
By analyzing the power generation of electric power industrial control system, transmission of electricity, power transformation, scheduling, the security deployment of six links of distribution and electricity consumption, build
The bug excavation emulation in the electric power industrial control system surface layer face of vertical " security partitioning, private network is dedicated, lateral isolation, longitudinal to authenticate " is flat
Platform;By taking substation in six links as an example, the power transformation website level bug excavation emulation platform of " three layer of two net " is established.Other rings
Section similarly, establishes the electric power industrial control system typical scene bug excavation emulation platform to link work at selected spots with that in entire areas.For hereinafter carry out dynamic and
Static bug excavation technology simulating, verifying provides technical support.
4. bug excavation technology typical scene application simulation
Above to typical scene emulation platform building on the basis of, using the static bug excavation technology based on protocal analysis
Carry out dynamic and static bug excavation emulation with the dynamic fuzzy measuring technology based on electric power industrial control system typical case's loophole feature, leads to
Crossing artificial analog simulation platform, there are the loopholes of certain induced environment to realize statically known bug excavation verifying, contains allusion quotation by building
The test case of type electric power industrial control system loophole feature, and made a variation using genetic algorithm, test case library is generated, realizes dynamic not
Know that bug excavation is verified.
Summary of the invention
The purpose of the present invention is to solve the quality and efficiency of lead iodide polycrystalline film preparation, and a kind of electricity proposed
Power industrial control system static state and dynamic leak analysis and digging technology.
To achieve the goals above, present invention employs following technical solutions:
China's electric power industrial control system hair, it is defeated, become, match, reconcile in terms of six, system takes dedicated network and public network
The network structure that network combines.Wherein, SPDnet(scheduling information net) and SPnet(Electricity Information Network) it is private network of electric power system network.
Under the premise of can guarantee the network information security, it is connect with Internet.In order to ensure the safety of electric system, according to power train
System each section requires degree to the difference of safety, and electric power networks information system is divided into three floor, 4th area.
According to informational function, electric power industrial control system information service can be divided into three layers, by three layer functions and power information
Network structure, which is mapped, generates four area of safety operaton: safety zone I is the automated system of SPDnet support, all to have
The system of real-time monitoring and control or in which monitoring function part should belong to the area.Such as, dispatch automated system, phasor are synchronous
Measuring system, electrical power distribution automatization system, electric substation automation system, power plant automatic monitored control system etc., are power system securities
The emphasis of protection.Safety zone II is the production management system of SPDnet support, does not have the production business of control function in principle
Belong to the area with wholesaler trade operation system, e.g., waterpower scheduling automation, electric energy metering system, Generation Side of Power Market are handed over
Easy system etc..Safety zone III is the carry out production management system of SPnet support, generates scheduling.Safety zone IV is SPnet support
Power management information system, such as MIS and OAS.
Test cases technology module
Fuzz testing will solve the problems, such as the source of test case first.This project analyzes the network in electric control system
Data.Wherein Electric control industrial control software passes through the core logic of programming Control hardware device, and programming data can touch electric power
The operating system of industrial control system hardware device, more can effectively excavate loophole, and this project is chosen the data and tested as fuzz testing
Use-case source.
In traditional dynamic fuzzy test Test cases technology module, the generation of test case does not have characteristics of objects
Property, therefore the validity of test case is low.This project is during Test cases technology, in conjunction with electric power industrial control system typical case's loophole
Signature analysis generates and has the test case of the typical case's loophole feature of industrial control system containing electric power, by the directionality of test case into one
Step is clear, improves the validity of test case.
Data variation module based on genetic algorithm
Data variation is the core of fuzz testing, and function is exactly to generate a large amount of unexpected data, these unexpected data
Be possible to the security breaches of hardware device in triggering electric power industrial control system.This project is according to the spy of electric power software and hardware programming data
Point carries out the design of data variation method using genetic algorithm.
Memory fuzzy device module
The module is for implementation of test cases.After the first two resume module is complete, unexpected data are obtained, these data
It is sent on target device by memory fuzzy device module.The a large amount of wasting of resources is caused to avoid blindly giving out a contract for a project, is improved efficiency,
It needs to analyze goal systems, be adjusted for goal systems, establish the validity that testing process improves fuzz testing.It can adopt
The improved use internal storage data fuzz testing method of one kind, which is devised, with the method for carrying out reverse-engineering to programming software executes survey
Example on probation.
Abnormal monitoring module
This is the key component of each fuzz testing, and an important behaviour of loophole triggering is exactly abnormal, abnormal monitoring occur
Exactly it is used to catch the exception, and then analyzing is security breaches.
Preferably, the electric power industrial control system information service can be divided into three layers, first layer: automated system, and second
Layer: production management system, third layer: Power management information system and the office automation system.
Preferably, the data are divided into three classes: Electric control software and hardware programming data, power SCADA software and hardware
The data of monitoring data, power management software and information management system.
Preferably, the dynamic fuzzy test is by sending a large amount of half valid data to test target program and observing
Result is exported come what is realized, it sends data in the way of semi-automatic or is automatic.
Preferably, the dispatching production management system, thunder and lightning detection system, weather information access and customer service etc..
Compared with prior art, the present invention provides a kind of electric power industrial control system static state and dynamic leak analysis and Mining Technology
Art, have it is following the utility model has the advantages that
The analysis of typical event
In the analysis of typical event, this report is mainly opened from event procedure, attack step, attack tool and the several angles of summary
Analysis is opened up, but since to the main body in event, i.e., the structure of other side's electric power industrial control system lacks data analysis, therefore analyzes knot
The loophole utilized in detailed analysis outgoing event generating process comprehensively is difficult in fruit.And the process using loophole, such as right
In the analytic process of Ukraine's grid power blackout event, due to not knowing the subregion knot of Ukraine's dispatching of power netwoks link Yu other links
Structure and security deployment, therefore can not determine attacker is how to get around scheduling link directly to attack I area's equipment of safety.Existing point
It generally believes that attacker has started transregional attack by private establishing network for springboard in analysis document, but passes through the research of this report point
Analysis, it may be possible to which dispatching security isolation and certification link in link, there are loopholes.It, can be with detailed analytical attack in follow-up study
Process, in conjunction with the structure feature of Ukraine's power grid, the induction mechanism of detailed analysis loophole.
Electric power industrial control system typical case's loophole feature of combining information security incident feature
This report extracts the feature of typical loophole mainly according to loophole in analysis electric power industrial control system typical case loophole characteristic procedure
Trigger mechanism construct dangerous data information.But since there may be layers for the extensive loophole triggering of electric power industrial control system constitution element
Factor between secondary, therefore in subsequent research process, the feature extraction for typical loophole should improve theory analysis techniques,
The feature of typical loophole is analyzed in the appraisement system of building triggering loophole factor, stratification.
Electric power industrial control system bug excavation emulation platform is built
The security deployment according to subregion and certification constructs electric power industrial control system bug excavation emulation platform herein, is with substation
Example is longitudinally unfolded according to " three layer of two net " structure.It is the more comprehensive bug excavation emulation of vector construction by communication protocol
Platform.In follow-up study, also needs further to refine with regard to the simplified link of structure of electric power industrial control system, be built in this report
Bug excavation emulation platform is not enough to carry out simulating, verifying experiment to all typical loopholes, improves taking for bug excavation emulation platform
Building is the basis for verifying other typical loophole emulation cases.
Detailed description of the invention
Fig. 1 is a kind of research mesh of electric power industrial control system static state and dynamic leak analysis and digging technology proposed by the present invention
Mark is intended to;
Fig. 2 is a kind of electric power industry control system of electric power industrial control system static state and dynamic leak analysis and digging technology proposed by the present invention
It unites and simplifies topological structure;
A kind of position Fig. 3 Communication Set frame of electric power industrial control system static state and dynamic leak analysis and digging technology proposed by the present invention
Schematic diagram.
Specific embodiment
Below in conjunction with the attached drawing in the present invention, the technical solution in the present invention is clearly and completely described, is shown
So, described invention is only present invention a part invention, rather than whole inventions.
In the description of the present invention, it is to be understood that, term " on ", "lower", "front", "rear", "left", "right",
The orientation or positional relationship of the instructions such as "top", "bottom", "inner", "outside" is to be based on the orientation or positional relationship shown in the drawings, and is only
For the convenience of describing the present invention and simplifying the description, rather than the device or element of indication or suggestion meaning must have specific side
Position is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.
Referring to Fig.1-3, a kind of electric power industrial control system static state and dynamic leak analysis and digging technology, including including following step
It is rapid:
China's electric power industrial control system hair, it is defeated, become, match, reconcile in terms of six, system takes dedicated network and public network
The network structure that network combines.Wherein, SPDnet(scheduling information net) and SPnet(Electricity Information Network) it is private network of electric power system network.
Under the premise of can guarantee the network information security, it is connect with Internet.In order to ensure the safety of electric system, according to power train
System each section requires degree to the difference of safety, and electric power networks information system is divided into three floor, 4th area.
According to informational function, electric power industrial control system information service can be divided into three layers, by three layer functions and power information
Network structure, which is mapped, generates four area of safety operaton: safety zone I is the automated system of SPDnet support, all to have
The system of real-time monitoring and control or in which monitoring function part should belong to the area.Such as, dispatch automated system, phasor are synchronous
Measuring system, electrical power distribution automatization system, electric substation automation system, power plant automatic monitored control system etc., are power system securities
The emphasis of protection.Safety zone II is the production management system of SPDnet support, does not have the production business of control function in principle
Belong to the area with wholesaler trade operation system, e.g., waterpower scheduling automation, electric energy metering system, Generation Side of Power Market are handed over
Easy system etc..Safety zone III is the carry out production management system of SPnet support, generates scheduling.Safety zone IV is SPnet support
Power management information system, such as MIS and OAS.
Test cases technology module
Fuzz testing will solve the problems, such as the source of test case first.This project analyzes the network in electric control system
Data.Wherein Electric control industrial control software passes through the core logic of programming Control hardware device, and programming data can touch electric power
The operating system of industrial control system hardware device, more can effectively excavate loophole, and this project is chosen the data and tested as fuzz testing
Use-case source.
In traditional dynamic fuzzy test Test cases technology module, the generation of test case does not have characteristics of objects
Property, therefore the validity of test case is low.This project is during Test cases technology, in conjunction with electric power industrial control system typical case's loophole
Signature analysis generates and has the test case of the typical case's loophole feature of industrial control system containing electric power, by the directionality of test case into one
Step is clear, improves the validity of test case.
Data variation module based on genetic algorithm
Data variation is the core of fuzz testing, and function is exactly to generate a large amount of unexpected data, these unexpected data
Be possible to the security breaches of hardware device in triggering electric power industrial control system.This project is according to the spy of electric power software and hardware programming data
Point carries out the design of data variation method using genetic algorithm.
Memory fuzzy device module
The module is for implementation of test cases.After the first two resume module is complete, unexpected data are obtained, these data
It is sent on target device by memory fuzzy device module.The a large amount of wasting of resources is caused to avoid blindly giving out a contract for a project, is improved efficiency,
It needs to analyze goal systems, be adjusted for goal systems, establish the validity that testing process improves fuzz testing.It can adopt
The improved use internal storage data fuzz testing method of one kind, which is devised, with the method for carrying out reverse-engineering to programming software executes survey
Example on probation.
Abnormal monitoring module
This is the key component of each fuzz testing, and an important behaviour of loophole triggering is exactly abnormal, abnormal monitoring occur
Exactly it is used to catch the exception, and then analyzing is security breaches, the electric power industrial control system information service can be divided into three
Layer, first layer: automated system, the second layer: production management system, third layer: Power management information system and office automation
System, the data are divided into three classes: Electric control software and hardware programming data, power SCADA software and hardware monitoring data,
The data of power management software and information management system, the dynamic fuzzy test are a large amount of by sending to test target program
Half valid data and observe output result come what is realized, it sends data, the tune in the way of semi-automatic or is automatic
Spend production management system, thunder and lightning detection system, weather information access and customer service etc..
In the present embodiment,
Manufacture message specification (MMS) is selected to communicate as application layer protocol with substation control system.It is based in all IED
IEC61850 establish object and service model be all mapped to object and service general in MMS, as data object reading,
It writes, define and creates and file operation etc..The support that MMS defines object-oriented data, becoming the data self-described can
Can, change traditional data description method towards point.Because data are per se with explanation, therefore transmitting can not be by predetermined
Limitation, simplifies data management and maintenance work.Ethernet communication standard and MMS are combined, in addition the application description of IEC61850,
Electric substation automation system is become into open system.
Network layer/transport layer
High-level interface of the ICP/IP protocol of select facts standard as work IED in standing, realizes the Intranet/ of IED in standing
Internetization, so that the data transmit-receive of IED can be carried out in a manner of TCP/IP in standing.In this way, master station or remote dispatching
Center can obtain the data in substation by wide area network (WAN) even Internet using ICP/IP protocol.Meanwhile it adopting
Interior work IED can be guaranteed to stand with good interoperability with the data access mode of standard.
Physical layer/data link layer
The main reason for selecting physical layer and data link layer of the Ethernet as communication system is Ethernet in technology and market
On be in dominant position.In addition, as Fast Ethernet, G- bit ethernet technology are gradually mature, to the automation of transformation substations
For, network bandwidth is no longer restraining factors, and the transmission delay stochastic problems caused by colliding have been desalinated.
Once there is a kind of viewpoint, it is believed that because Ethernet has the essence of Carrier Sense Multiple Access (CSMA/CD), to " real
When " information transmission causes the unpredictable of randomness of delay, thus is not able to satisfy the needs of real-time system.Because two or more
A ethernet node will cause data collision when accessing shared transmission medium Local Area Network simultaneously, all conflicts at this time
Node can be then attempt to access medium again by back off algorithm (backoffalgorithm) the random delay regular hour, with
Obtain the access right of medium.Random Waiting Time needed for thus can not definitely estimating conflicting nodes, thus be possible to make
It is invalid at the transmission of " real-time " information.
In order to qualitatively illustrate this problem, this is studied by EPRI-Electric Power Research Institute (EPRI), it is specific " most
It badly " compared the performance of Ethernet and 12M token passing Profibus net under situation.Result of study shows to pass through switch type
The 10M Ethernet of HUB connection is fully able to meet the requirement of electric substation automation system network communication " real-time " property, and ether
Net is faster than 12M token passing Profibus network.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (5)
1. a kind of electric power industrial control system static state and dynamic leak analysis and digging technology, which is characterized in that
China's electric power industrial control system hair, it is defeated, become, match, reconcile in terms of six, system takes dedicated network and public network
The network structure that network combines,
Wherein, SPDnet(scheduling information net) and SPnet(Electricity Information Network) it is private network of electric power system network,
Under the premise of can guarantee the network information security, it is connect with Internet,
In order to ensure the safety of electric system, degree is required according to difference of the electric system each section to safety, by electric power networks
Information system is divided into three floor, 4th area,
According to informational function, electric power industrial control system information service can be divided into three layers, by three layer functions and Power Information Network
Structure, which is mapped, generates four area of safety operaton: safety zone I is the automated system of SPDnet support, all to have in real time
The system of monitoring function or in which monitoring function part should belong to the area,
Such as, dispatch automated system, phasor synchronized measurement system, electrical power distribution automatization system, electric substation automation system, power plant
Automatic monitored control system etc. is the emphasis of power system security protection,
Safety zone II is the production management system of SPDnet support, does not have the production business and wholesale friendship of control function in principle
Easy operation system belongs to the area, e.g., waterpower scheduling automation, electric energy metering system, Generation Side of Power Market transaction system etc.,
Safety zone III is the carry out production management system of SPnet support, generates scheduling,
The Power management information system that safety zone IV supports for SPnet, such as MIS and OAS,
Test cases technology module
Fuzz testing will solve the problems, such as the source of test case first,
This project analyzes the network data in electric control system,
Wherein Electric control industrial control software passes through the core logic of programming Control hardware device, and programming data can touch electric power work
The operating system for controlling system hardware equipment, more can effectively excavate loophole, and this project chooses the data as fuzz testing and tests use
Example source,
In traditional dynamic fuzzy test Test cases technology module, the generation of test case does not have characteristics of objects, because
The validity of this test case is low,
During Test cases technology, in conjunction with electric power industrial control system typical case's loophole signature analysis, generation has containing electricity this project
The test case of power industrial control system typical case's loophole feature, the directionality of test case is further clarified, test case is improved
Validity,
Data variation module based on genetic algorithm
Data variation is the core of fuzz testing, and function is exactly to generate a large amount of unexpected data, these unexpected data
The security breaches of hardware device in triggering electric power industrial control system are possible to,
The characteristics of this project is according to electric power software and hardware programming data carries out the design of data variation method using genetic algorithm,
Memory fuzzy device module
The module be for implementation of test cases,
After the first two resume module is complete, unexpected data are obtained, these data are sent to mesh by memory fuzzy device module
On marking device,
The a large amount of wasting of resources is caused to avoid blindly giving out a contract for a project, is improved efficiency, is needed to analyze goal systems, be done for goal systems
It adjusts out, establishes the validity that testing process improves fuzz testing,
The method for carrying out reverse-engineering to programming software can be used to devise, and one kind is improved to use internal storage data fuzz testing
Method implementation of test cases,
Abnormal monitoring module
This is the key component of each fuzz testing, and an important behaviour of loophole triggering is exactly abnormal, abnormal monitoring occur
Exactly it is used to catch the exception, and then analyzing is security breaches.
2. a kind of electric power industrial control system static state according to claim 1 and dynamic leak analysis and digging technology, feature
It is, the electric power industrial control system information service can be divided into three layers, first layer: automated system, the second layer: production management
System, third layer: Power management information system and the office automation system.
3. a kind of electric power industrial control system static state according to claim 1 and dynamic leak analysis and digging technology, feature
It is, the data are divided into three classes: Electric control software and hardware programming data, power SCADA software and hardware monitoring data,
The data of power management software and information management system.
4. a kind of electric power industrial control system static state according to claim 1 and dynamic leak analysis and digging technology, feature
Be, dynamic fuzzy test be by send a large amount of half valid data to test target program and observe output result come
It realizes, it sends data in the way of semi-automatic or is automatic.
5. a kind of electric power industrial control system static state according to claim 1 and dynamic leak analysis and digging technology, feature
It is, the dispatching production management system, thunder and lightning detection system, weather information access and customer service etc..
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811415868 | 2018-11-26 | ||
CN2018114158682 | 2018-11-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110300099A true CN110300099A (en) | 2019-10-01 |
Family
ID=68027214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910445750.2A Pending CN110300099A (en) | 2018-11-26 | 2019-05-27 | A kind of electric power industrial control system static state and dynamic leak analysis and digging technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110300099A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112054995A (en) * | 2020-08-05 | 2020-12-08 | 浙江大丰实业股份有限公司 | Static and dynamic vulnerability analysis system of industrial control system of stage performance equipment |
CN113392402A (en) * | 2021-05-24 | 2021-09-14 | 国网湖北省电力有限公司电力科学研究院 | Power Internet of things protocol vulnerability detection system and method based on fuzzy test |
-
2019
- 2019-05-27 CN CN201910445750.2A patent/CN110300099A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112054995A (en) * | 2020-08-05 | 2020-12-08 | 浙江大丰实业股份有限公司 | Static and dynamic vulnerability analysis system of industrial control system of stage performance equipment |
CN113392402A (en) * | 2021-05-24 | 2021-09-14 | 国网湖北省电力有限公司电力科学研究院 | Power Internet of things protocol vulnerability detection system and method based on fuzzy test |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun et al. | Cyber security of a power grid: State-of-the-art | |
Suleiman et al. | Integrated smart grid systems security threat model | |
Liu et al. | Intruders in the grid | |
Gupta et al. | A survey on smart power grid: frameworks, tools, security issues, and solutions | |
Peng et al. | Cyber-physical system risk assessment | |
Ustun et al. | Artificial intelligence based intrusion detection system for IEC 61850 sampled values under symmetric and asymmetric faults | |
Sun et al. | A co-simulation environment for integrated cyber and power systems | |
Cai et al. | Review of cyber-attacks and defense research on cyber physical power system | |
Mashima et al. | Artificial command delaying for secure substation remote control: Design and implementation | |
Hussain et al. | Vulnerabilities and countermeasures in electrical substations | |
Siddiqi et al. | On practical threat scenario testing in an electric power ICS testbed | |
CN110300099A (en) | A kind of electric power industrial control system static state and dynamic leak analysis and digging technology | |
Zhang et al. | Reliability analysis of power grids with cyber vulnerability in SCADA system | |
Chen et al. | Risk assessment of cyber attacks on power grids considering the characteristics of attack behaviors | |
Ten et al. | Cybersecurity for electric power control and automation systems | |
Tuinema et al. | Cyber-physical system modeling for assessment and enhancement of power grid cyber security, resilience, and reliability | |
Duman et al. | Factor of security (FoS): quantifying the security effectiveness of redundant smart grid subsystems | |
CN105391066A (en) | Smart power grid stimulation operation system | |
Hahn | Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation | |
Palahalli et al. | Analysis of cyber security threat of using IEC61850 in digital substations involving DERMS | |
Li et al. | Risk Assessment of Cyber Physical Power System considering Attack Model | |
Barnes et al. | Introduction to SCADA protection and vulnerabilities | |
Li | Detection of false data injection attacks in smart grid cyber-physical systems | |
Yang et al. | Implementation of risk-aggregated substation testbed using generative adversarial networks | |
Hussain et al. | A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20191001 |
|
WD01 | Invention patent application deemed withdrawn after publication |