CN110300099A - A kind of electric power industrial control system static state and dynamic leak analysis and digging technology - Google Patents

A kind of electric power industrial control system static state and dynamic leak analysis and digging technology Download PDF

Info

Publication number
CN110300099A
CN110300099A CN201910445750.2A CN201910445750A CN110300099A CN 110300099 A CN110300099 A CN 110300099A CN 201910445750 A CN201910445750 A CN 201910445750A CN 110300099 A CN110300099 A CN 110300099A
Authority
CN
China
Prior art keywords
electric power
control system
industrial control
data
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910445750.2A
Other languages
Chinese (zh)
Inventor
汪繁荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University of Technology
Original Assignee
Hubei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University of Technology filed Critical Hubei University of Technology
Publication of CN110300099A publication Critical patent/CN110300099A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Supply And Distribution Of Alternating Current (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)

Abstract

The invention discloses a kind of electric power industrial control system static state and dynamic leak analysis and digging technology, China's electric power industrial control system hair, it is defeated, become, match, reconcile in terms of six, system takes the network structure that dedicated network and public network combine.Wherein, SPDnet(scheduling information net) and SPnet(Electricity Information Network) it is private network of electric power system network.Under the premise of can guarantee the network information security, it is connect with Internet.In order to ensure the safety of electric system, degree is required according to difference of the electric system each section to safety, electric power networks information system is divided into three floor, 4th area.In subsequent research process, the feature extraction for typical loophole should improve theory analysis techniques, the appraisement system of building triggering loophole factor, and the feature of typical loophole is analyzed in stratification.

Description

A kind of electric power industrial control system static state and dynamic leak analysis and digging technology
The present invention relates to power domain more particularly to a kind of electric power industrial control system static state and dynamic leak analysis and Mining Technology Art.
Background technique
In recent years, with the continuous development of information technology, the work commonly used, based on IEEE802.3 of windows platform The spreading of industrial Ethernet, large quantities of TCP(UDP)/IP agreement is selected, industrial control field industrialization and information-based continuous infiltration Development, industrial control system begin to use measured embedded platform, the various common network equipments, business software and hard Part, an opening state is presented in information-based depth development, industrial control system in addition, and industrial control system is no longer one Seat " isolated island " forms and promotes industrialization with informationization, drives information-based plyability to industrialize trend to industrialize, has section High, good in economic efficiency, the low in resources consumption feature of skill content.On the other hand, due to the opening of industrial control system, complexity And the loophole of system itself, so that the safety of industrial control system faces bigger threat and challenge.With electric power industrial control system For the industrial control system feature having the same of representative.
2008, hacker kidnapped one national grid control system of South America, extorted government, after being rejected, attack State's grid control system causes power breakdown a few minutes.2008, Homeland Security office, the U.S. carried out several times electric system Penetration testing, a generator produces physical damage after its control system is attacked in test process.2010, Iran Extensive " shake net " virus of outburst, simatic WINCC system vulnerability and several 0day loopholes are utilized, so that industrial control system It is under attack, postpone the nuclear programme of Iran 2 years.2013, USB virus attack U.S. Liang Zuo power plant, so that Power Plant Power generation was delayed to more than 6 hours.
Various security incidents show threat of the electric power industrial control system by hostile force, terroristic organization, offender etc., Its safety has been raised to State-level.The key problem of power industry control system information security is exactly power industry control system Loophole.Different from the loophole of traditional IT system, the loophole of industrial control system, which is once utilized, will directly contribute economic damage It loses, explosion even casualties.In addition, the important control system of electricity power enterprise can threaten national security when being destroyed, sternly Civil order and public interest are damaged again.So to improve the protective capacities of industrial control system, the security study of electric power industry control has Important meaning.
The technical problems to be solved by the invention
1. typical event is analyzed
It is angularly analyzed in power-off event from the process of Ukraine's grid power blackout event and " shake net " event, attack tool, sample Electric power industrial control system mechanism under attack is laid for subsequent typical case's loophole of carrying out from event in the feature of electric power industrial control system Basis.
2. electric power industrial control system loophole signature analysis
According to the analysis conclusion hereinbefore to typical event, in conjunction with loophole classification to that may be present in electric power industrial control system Loophole conducts a research, and according to the difference of the description of loophole and mechanism, establishes and induces the dangerous function set that loophole generates, after being Carry out bug excavation technology in text and the typical loophole feature of the industrial control system containing electric power is provided, improves the science of bug excavation.
3. typical scene bug excavation emulation platform building
By analyzing the power generation of electric power industrial control system, transmission of electricity, power transformation, scheduling, the security deployment of six links of distribution and electricity consumption, build The bug excavation emulation in the electric power industrial control system surface layer face of vertical " security partitioning, private network is dedicated, lateral isolation, longitudinal to authenticate " is flat Platform;By taking substation in six links as an example, the power transformation website level bug excavation emulation platform of " three layer of two net " is established.Other rings Section similarly, establishes the electric power industrial control system typical scene bug excavation emulation platform to link work at selected spots with that in entire areas.For hereinafter carry out dynamic and Static bug excavation technology simulating, verifying provides technical support.
4. bug excavation technology typical scene application simulation
Above to typical scene emulation platform building on the basis of, using the static bug excavation technology based on protocal analysis Carry out dynamic and static bug excavation emulation with the dynamic fuzzy measuring technology based on electric power industrial control system typical case's loophole feature, leads to Crossing artificial analog simulation platform, there are the loopholes of certain induced environment to realize statically known bug excavation verifying, contains allusion quotation by building The test case of type electric power industrial control system loophole feature, and made a variation using genetic algorithm, test case library is generated, realizes dynamic not Know that bug excavation is verified.
Summary of the invention
The purpose of the present invention is to solve the quality and efficiency of lead iodide polycrystalline film preparation, and a kind of electricity proposed Power industrial control system static state and dynamic leak analysis and digging technology.
To achieve the goals above, present invention employs following technical solutions:
China's electric power industrial control system hair, it is defeated, become, match, reconcile in terms of six, system takes dedicated network and public network The network structure that network combines.Wherein, SPDnet(scheduling information net) and SPnet(Electricity Information Network) it is private network of electric power system network. Under the premise of can guarantee the network information security, it is connect with Internet.In order to ensure the safety of electric system, according to power train System each section requires degree to the difference of safety, and electric power networks information system is divided into three floor, 4th area.
According to informational function, electric power industrial control system information service can be divided into three layers, by three layer functions and power information Network structure, which is mapped, generates four area of safety operaton: safety zone I is the automated system of SPDnet support, all to have The system of real-time monitoring and control or in which monitoring function part should belong to the area.Such as, dispatch automated system, phasor are synchronous Measuring system, electrical power distribution automatization system, electric substation automation system, power plant automatic monitored control system etc., are power system securities The emphasis of protection.Safety zone II is the production management system of SPDnet support, does not have the production business of control function in principle Belong to the area with wholesaler trade operation system, e.g., waterpower scheduling automation, electric energy metering system, Generation Side of Power Market are handed over Easy system etc..Safety zone III is the carry out production management system of SPnet support, generates scheduling.Safety zone IV is SPnet support Power management information system, such as MIS and OAS.
Test cases technology module
Fuzz testing will solve the problems, such as the source of test case first.This project analyzes the network in electric control system Data.Wherein Electric control industrial control software passes through the core logic of programming Control hardware device, and programming data can touch electric power The operating system of industrial control system hardware device, more can effectively excavate loophole, and this project is chosen the data and tested as fuzz testing Use-case source.
In traditional dynamic fuzzy test Test cases technology module, the generation of test case does not have characteristics of objects Property, therefore the validity of test case is low.This project is during Test cases technology, in conjunction with electric power industrial control system typical case's loophole Signature analysis generates and has the test case of the typical case's loophole feature of industrial control system containing electric power, by the directionality of test case into one Step is clear, improves the validity of test case.
Data variation module based on genetic algorithm
Data variation is the core of fuzz testing, and function is exactly to generate a large amount of unexpected data, these unexpected data Be possible to the security breaches of hardware device in triggering electric power industrial control system.This project is according to the spy of electric power software and hardware programming data Point carries out the design of data variation method using genetic algorithm.
Memory fuzzy device module
The module is for implementation of test cases.After the first two resume module is complete, unexpected data are obtained, these data It is sent on target device by memory fuzzy device module.The a large amount of wasting of resources is caused to avoid blindly giving out a contract for a project, is improved efficiency, It needs to analyze goal systems, be adjusted for goal systems, establish the validity that testing process improves fuzz testing.It can adopt The improved use internal storage data fuzz testing method of one kind, which is devised, with the method for carrying out reverse-engineering to programming software executes survey Example on probation.
Abnormal monitoring module
This is the key component of each fuzz testing, and an important behaviour of loophole triggering is exactly abnormal, abnormal monitoring occur Exactly it is used to catch the exception, and then analyzing is security breaches.
Preferably, the electric power industrial control system information service can be divided into three layers, first layer: automated system, and second Layer: production management system, third layer: Power management information system and the office automation system.
Preferably, the data are divided into three classes: Electric control software and hardware programming data, power SCADA software and hardware The data of monitoring data, power management software and information management system.
Preferably, the dynamic fuzzy test is by sending a large amount of half valid data to test target program and observing Result is exported come what is realized, it sends data in the way of semi-automatic or is automatic.
Preferably, the dispatching production management system, thunder and lightning detection system, weather information access and customer service etc..
Compared with prior art, the present invention provides a kind of electric power industrial control system static state and dynamic leak analysis and Mining Technology Art, have it is following the utility model has the advantages that
The analysis of typical event
In the analysis of typical event, this report is mainly opened from event procedure, attack step, attack tool and the several angles of summary Analysis is opened up, but since to the main body in event, i.e., the structure of other side's electric power industrial control system lacks data analysis, therefore analyzes knot The loophole utilized in detailed analysis outgoing event generating process comprehensively is difficult in fruit.And the process using loophole, such as right In the analytic process of Ukraine's grid power blackout event, due to not knowing the subregion knot of Ukraine's dispatching of power netwoks link Yu other links Structure and security deployment, therefore can not determine attacker is how to get around scheduling link directly to attack I area's equipment of safety.Existing point It generally believes that attacker has started transregional attack by private establishing network for springboard in analysis document, but passes through the research of this report point Analysis, it may be possible to which dispatching security isolation and certification link in link, there are loopholes.It, can be with detailed analytical attack in follow-up study Process, in conjunction with the structure feature of Ukraine's power grid, the induction mechanism of detailed analysis loophole.
Electric power industrial control system typical case's loophole feature of combining information security incident feature
This report extracts the feature of typical loophole mainly according to loophole in analysis electric power industrial control system typical case loophole characteristic procedure Trigger mechanism construct dangerous data information.But since there may be layers for the extensive loophole triggering of electric power industrial control system constitution element Factor between secondary, therefore in subsequent research process, the feature extraction for typical loophole should improve theory analysis techniques, The feature of typical loophole is analyzed in the appraisement system of building triggering loophole factor, stratification.
Electric power industrial control system bug excavation emulation platform is built
The security deployment according to subregion and certification constructs electric power industrial control system bug excavation emulation platform herein, is with substation Example is longitudinally unfolded according to " three layer of two net " structure.It is the more comprehensive bug excavation emulation of vector construction by communication protocol Platform.In follow-up study, also needs further to refine with regard to the simplified link of structure of electric power industrial control system, be built in this report Bug excavation emulation platform is not enough to carry out simulating, verifying experiment to all typical loopholes, improves taking for bug excavation emulation platform Building is the basis for verifying other typical loophole emulation cases.
Detailed description of the invention
Fig. 1 is a kind of research mesh of electric power industrial control system static state and dynamic leak analysis and digging technology proposed by the present invention Mark is intended to;
Fig. 2 is a kind of electric power industry control system of electric power industrial control system static state and dynamic leak analysis and digging technology proposed by the present invention It unites and simplifies topological structure;
A kind of position Fig. 3 Communication Set frame of electric power industrial control system static state and dynamic leak analysis and digging technology proposed by the present invention Schematic diagram.
Specific embodiment
Below in conjunction with the attached drawing in the present invention, the technical solution in the present invention is clearly and completely described, is shown So, described invention is only present invention a part invention, rather than whole inventions.
In the description of the present invention, it is to be understood that, term " on ", "lower", "front", "rear", "left", "right", The orientation or positional relationship of the instructions such as "top", "bottom", "inner", "outside" is to be based on the orientation or positional relationship shown in the drawings, and is only For the convenience of describing the present invention and simplifying the description, rather than the device or element of indication or suggestion meaning must have specific side Position is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.
Referring to Fig.1-3, a kind of electric power industrial control system static state and dynamic leak analysis and digging technology, including including following step It is rapid:
China's electric power industrial control system hair, it is defeated, become, match, reconcile in terms of six, system takes dedicated network and public network The network structure that network combines.Wherein, SPDnet(scheduling information net) and SPnet(Electricity Information Network) it is private network of electric power system network. Under the premise of can guarantee the network information security, it is connect with Internet.In order to ensure the safety of electric system, according to power train System each section requires degree to the difference of safety, and electric power networks information system is divided into three floor, 4th area.
According to informational function, electric power industrial control system information service can be divided into three layers, by three layer functions and power information Network structure, which is mapped, generates four area of safety operaton: safety zone I is the automated system of SPDnet support, all to have The system of real-time monitoring and control or in which monitoring function part should belong to the area.Such as, dispatch automated system, phasor are synchronous Measuring system, electrical power distribution automatization system, electric substation automation system, power plant automatic monitored control system etc., are power system securities The emphasis of protection.Safety zone II is the production management system of SPDnet support, does not have the production business of control function in principle Belong to the area with wholesaler trade operation system, e.g., waterpower scheduling automation, electric energy metering system, Generation Side of Power Market are handed over Easy system etc..Safety zone III is the carry out production management system of SPnet support, generates scheduling.Safety zone IV is SPnet support Power management information system, such as MIS and OAS.
Test cases technology module
Fuzz testing will solve the problems, such as the source of test case first.This project analyzes the network in electric control system Data.Wherein Electric control industrial control software passes through the core logic of programming Control hardware device, and programming data can touch electric power The operating system of industrial control system hardware device, more can effectively excavate loophole, and this project is chosen the data and tested as fuzz testing Use-case source.
In traditional dynamic fuzzy test Test cases technology module, the generation of test case does not have characteristics of objects Property, therefore the validity of test case is low.This project is during Test cases technology, in conjunction with electric power industrial control system typical case's loophole Signature analysis generates and has the test case of the typical case's loophole feature of industrial control system containing electric power, by the directionality of test case into one Step is clear, improves the validity of test case.
Data variation module based on genetic algorithm
Data variation is the core of fuzz testing, and function is exactly to generate a large amount of unexpected data, these unexpected data Be possible to the security breaches of hardware device in triggering electric power industrial control system.This project is according to the spy of electric power software and hardware programming data Point carries out the design of data variation method using genetic algorithm.
Memory fuzzy device module
The module is for implementation of test cases.After the first two resume module is complete, unexpected data are obtained, these data It is sent on target device by memory fuzzy device module.The a large amount of wasting of resources is caused to avoid blindly giving out a contract for a project, is improved efficiency, It needs to analyze goal systems, be adjusted for goal systems, establish the validity that testing process improves fuzz testing.It can adopt The improved use internal storage data fuzz testing method of one kind, which is devised, with the method for carrying out reverse-engineering to programming software executes survey Example on probation.
Abnormal monitoring module
This is the key component of each fuzz testing, and an important behaviour of loophole triggering is exactly abnormal, abnormal monitoring occur Exactly it is used to catch the exception, and then analyzing is security breaches, the electric power industrial control system information service can be divided into three Layer, first layer: automated system, the second layer: production management system, third layer: Power management information system and office automation System, the data are divided into three classes: Electric control software and hardware programming data, power SCADA software and hardware monitoring data, The data of power management software and information management system, the dynamic fuzzy test are a large amount of by sending to test target program Half valid data and observe output result come what is realized, it sends data, the tune in the way of semi-automatic or is automatic Spend production management system, thunder and lightning detection system, weather information access and customer service etc..
In the present embodiment,
Manufacture message specification (MMS) is selected to communicate as application layer protocol with substation control system.It is based in all IED IEC61850 establish object and service model be all mapped to object and service general in MMS, as data object reading, It writes, define and creates and file operation etc..The support that MMS defines object-oriented data, becoming the data self-described can Can, change traditional data description method towards point.Because data are per se with explanation, therefore transmitting can not be by predetermined Limitation, simplifies data management and maintenance work.Ethernet communication standard and MMS are combined, in addition the application description of IEC61850, Electric substation automation system is become into open system.
Network layer/transport layer
High-level interface of the ICP/IP protocol of select facts standard as work IED in standing, realizes the Intranet/ of IED in standing Internetization, so that the data transmit-receive of IED can be carried out in a manner of TCP/IP in standing.In this way, master station or remote dispatching Center can obtain the data in substation by wide area network (WAN) even Internet using ICP/IP protocol.Meanwhile it adopting Interior work IED can be guaranteed to stand with good interoperability with the data access mode of standard.
Physical layer/data link layer
The main reason for selecting physical layer and data link layer of the Ethernet as communication system is Ethernet in technology and market On be in dominant position.In addition, as Fast Ethernet, G- bit ethernet technology are gradually mature, to the automation of transformation substations For, network bandwidth is no longer restraining factors, and the transmission delay stochastic problems caused by colliding have been desalinated.
Once there is a kind of viewpoint, it is believed that because Ethernet has the essence of Carrier Sense Multiple Access (CSMA/CD), to " real When " information transmission causes the unpredictable of randomness of delay, thus is not able to satisfy the needs of real-time system.Because two or more A ethernet node will cause data collision when accessing shared transmission medium Local Area Network simultaneously, all conflicts at this time Node can be then attempt to access medium again by back off algorithm (backoffalgorithm) the random delay regular hour, with Obtain the access right of medium.Random Waiting Time needed for thus can not definitely estimating conflicting nodes, thus be possible to make It is invalid at the transmission of " real-time " information.
In order to qualitatively illustrate this problem, this is studied by EPRI-Electric Power Research Institute (EPRI), it is specific " most It badly " compared the performance of Ethernet and 12M token passing Profibus net under situation.Result of study shows to pass through switch type The 10M Ethernet of HUB connection is fully able to meet the requirement of electric substation automation system network communication " real-time " property, and ether Net is faster than 12M token passing Profibus network.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (5)

1. a kind of electric power industrial control system static state and dynamic leak analysis and digging technology, which is characterized in that
China's electric power industrial control system hair, it is defeated, become, match, reconcile in terms of six, system takes dedicated network and public network The network structure that network combines,
Wherein, SPDnet(scheduling information net) and SPnet(Electricity Information Network) it is private network of electric power system network,
Under the premise of can guarantee the network information security, it is connect with Internet,
In order to ensure the safety of electric system, degree is required according to difference of the electric system each section to safety, by electric power networks Information system is divided into three floor, 4th area,
According to informational function, electric power industrial control system information service can be divided into three layers, by three layer functions and Power Information Network Structure, which is mapped, generates four area of safety operaton: safety zone I is the automated system of SPDnet support, all to have in real time The system of monitoring function or in which monitoring function part should belong to the area,
Such as, dispatch automated system, phasor synchronized measurement system, electrical power distribution automatization system, electric substation automation system, power plant Automatic monitored control system etc. is the emphasis of power system security protection,
Safety zone II is the production management system of SPDnet support, does not have the production business and wholesale friendship of control function in principle Easy operation system belongs to the area, e.g., waterpower scheduling automation, electric energy metering system, Generation Side of Power Market transaction system etc.,
Safety zone III is the carry out production management system of SPnet support, generates scheduling,
The Power management information system that safety zone IV supports for SPnet, such as MIS and OAS,
Test cases technology module
Fuzz testing will solve the problems, such as the source of test case first,
This project analyzes the network data in electric control system,
Wherein Electric control industrial control software passes through the core logic of programming Control hardware device, and programming data can touch electric power work The operating system for controlling system hardware equipment, more can effectively excavate loophole, and this project chooses the data as fuzz testing and tests use Example source,
In traditional dynamic fuzzy test Test cases technology module, the generation of test case does not have characteristics of objects, because The validity of this test case is low,
During Test cases technology, in conjunction with electric power industrial control system typical case's loophole signature analysis, generation has containing electricity this project The test case of power industrial control system typical case's loophole feature, the directionality of test case is further clarified, test case is improved Validity,
Data variation module based on genetic algorithm
Data variation is the core of fuzz testing, and function is exactly to generate a large amount of unexpected data, these unexpected data The security breaches of hardware device in triggering electric power industrial control system are possible to,
The characteristics of this project is according to electric power software and hardware programming data carries out the design of data variation method using genetic algorithm,
Memory fuzzy device module
The module be for implementation of test cases,
After the first two resume module is complete, unexpected data are obtained, these data are sent to mesh by memory fuzzy device module On marking device,
The a large amount of wasting of resources is caused to avoid blindly giving out a contract for a project, is improved efficiency, is needed to analyze goal systems, be done for goal systems It adjusts out, establishes the validity that testing process improves fuzz testing,
The method for carrying out reverse-engineering to programming software can be used to devise, and one kind is improved to use internal storage data fuzz testing Method implementation of test cases,
Abnormal monitoring module
This is the key component of each fuzz testing, and an important behaviour of loophole triggering is exactly abnormal, abnormal monitoring occur Exactly it is used to catch the exception, and then analyzing is security breaches.
2. a kind of electric power industrial control system static state according to claim 1 and dynamic leak analysis and digging technology, feature It is, the electric power industrial control system information service can be divided into three layers, first layer: automated system, the second layer: production management System, third layer: Power management information system and the office automation system.
3. a kind of electric power industrial control system static state according to claim 1 and dynamic leak analysis and digging technology, feature It is, the data are divided into three classes: Electric control software and hardware programming data, power SCADA software and hardware monitoring data, The data of power management software and information management system.
4. a kind of electric power industrial control system static state according to claim 1 and dynamic leak analysis and digging technology, feature Be, dynamic fuzzy test be by send a large amount of half valid data to test target program and observe output result come It realizes, it sends data in the way of semi-automatic or is automatic.
5. a kind of electric power industrial control system static state according to claim 1 and dynamic leak analysis and digging technology, feature It is, the dispatching production management system, thunder and lightning detection system, weather information access and customer service etc..
CN201910445750.2A 2018-11-26 2019-05-27 A kind of electric power industrial control system static state and dynamic leak analysis and digging technology Pending CN110300099A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811415868 2018-11-26
CN2018114158682 2018-11-26

Publications (1)

Publication Number Publication Date
CN110300099A true CN110300099A (en) 2019-10-01

Family

ID=68027214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910445750.2A Pending CN110300099A (en) 2018-11-26 2019-05-27 A kind of electric power industrial control system static state and dynamic leak analysis and digging technology

Country Status (1)

Country Link
CN (1) CN110300099A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112054995A (en) * 2020-08-05 2020-12-08 浙江大丰实业股份有限公司 Static and dynamic vulnerability analysis system of industrial control system of stage performance equipment
CN113392402A (en) * 2021-05-24 2021-09-14 国网湖北省电力有限公司电力科学研究院 Power Internet of things protocol vulnerability detection system and method based on fuzzy test

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112054995A (en) * 2020-08-05 2020-12-08 浙江大丰实业股份有限公司 Static and dynamic vulnerability analysis system of industrial control system of stage performance equipment
CN113392402A (en) * 2021-05-24 2021-09-14 国网湖北省电力有限公司电力科学研究院 Power Internet of things protocol vulnerability detection system and method based on fuzzy test

Similar Documents

Publication Publication Date Title
Sun et al. Cyber security of a power grid: State-of-the-art
Suleiman et al. Integrated smart grid systems security threat model
Liu et al. Intruders in the grid
Gupta et al. A survey on smart power grid: frameworks, tools, security issues, and solutions
Peng et al. Cyber-physical system risk assessment
Ustun et al. Artificial intelligence based intrusion detection system for IEC 61850 sampled values under symmetric and asymmetric faults
Sun et al. A co-simulation environment for integrated cyber and power systems
Cai et al. Review of cyber-attacks and defense research on cyber physical power system
Mashima et al. Artificial command delaying for secure substation remote control: Design and implementation
Hussain et al. Vulnerabilities and countermeasures in electrical substations
Siddiqi et al. On practical threat scenario testing in an electric power ICS testbed
CN110300099A (en) A kind of electric power industrial control system static state and dynamic leak analysis and digging technology
Zhang et al. Reliability analysis of power grids with cyber vulnerability in SCADA system
Chen et al. Risk assessment of cyber attacks on power grids considering the characteristics of attack behaviors
Ten et al. Cybersecurity for electric power control and automation systems
Tuinema et al. Cyber-physical system modeling for assessment and enhancement of power grid cyber security, resilience, and reliability
Duman et al. Factor of security (FoS): quantifying the security effectiveness of redundant smart grid subsystems
CN105391066A (en) Smart power grid stimulation operation system
Hahn Cyber security of the smart grid: Attack exposure analysis, detection algorithms, and testbed evaluation
Palahalli et al. Analysis of cyber security threat of using IEC61850 in digital substations involving DERMS
Li et al. Risk Assessment of Cyber Physical Power System considering Attack Model
Barnes et al. Introduction to SCADA protection and vulnerabilities
Li Detection of false data injection attacks in smart grid cyber-physical systems
Yang et al. Implementation of risk-aggregated substation testbed using generative adversarial networks
Hussain et al. A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191001

WD01 Invention patent application deemed withdrawn after publication