CN110334507A - A kind of method, apparatus and electronic equipment detecting network system safety - Google Patents

A kind of method, apparatus and electronic equipment detecting network system safety Download PDF

Info

Publication number
CN110334507A
CN110334507A CN201910530425.6A CN201910530425A CN110334507A CN 110334507 A CN110334507 A CN 110334507A CN 201910530425 A CN201910530425 A CN 201910530425A CN 110334507 A CN110334507 A CN 110334507A
Authority
CN
China
Prior art keywords
network system
state
control instruction
measurement data
current measurement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910530425.6A
Other languages
Chinese (zh)
Inventor
胡堰
田直
杨红
李凯斌
陈晓宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing China Science And Technology Federation Safety Technology Co Ltd
Original Assignee
Beijing China Science And Technology Federation Safety Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing China Science And Technology Federation Safety Technology Co Ltd filed Critical Beijing China Science And Technology Federation Safety Technology Co Ltd
Priority to CN201910530425.6A priority Critical patent/CN110334507A/en
Publication of CN110334507A publication Critical patent/CN110334507A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the present invention discloses a kind of method, apparatus and electronic equipment for detecting network system safety, is related to Internet of Things field of information security technology, is able to detect network system to the repellence of advanced concealed attack.The method of the detection network system safety includes: to carry out simulation attack to the network system for test according to predetermined attack strategy;The simulation attack is realized by altering normal measurement data and the normal control instruction of the network system;Whether the state for judging the network system after simulation is attacked is precarious position, if so, determining that the network system is dangerous.The present invention is suitable for the safety detection of various network systems.

Description

A kind of method, apparatus and electronic equipment detecting network system safety
Technical field
The present invention relates to Internet of Things field of information security technology more particularly to a kind of sides for detecting network system safety Method, device and electronic equipment.
Background technique
Industrial control system (referred to as " industrial control system ", Industrial Control Systems, ICS) has been widely used In numerous key areas (such as electric power, water conservancy, manufacture, the energy, traffic, finance, military project) of national critical infrastructures.In early days Industrial control system because of features such as its independence, closure, extraneous malicious attacker is difficult to intrude into inside industrial control system.So And with the rapid development of information technology, industrial control system is constantly merged with Internet technology, industrial control system can be sufficiently sharp It is convenient with internet and information technology bring.At the same time, as cyberspace security situation is increasingly serious, Industry Control system System is exposed to the visual field of the public more and more, provides more invasion chances to extraneous malicious attacker, gives Industry Control System brings serious information security hidden danger.
Smart electric grid system is a kind of typical industrial control system.Power supply chain is generally divided into 3 subsystems: hair Electricity, transmission of electricity and distribution.From power station to there is high voltage transmission line main power distribution station, high pressure converted is again low by power distribution station Pressure carries out power supply to ordinary user.Assuming that attacker in man-machine interface (Human Machine Interface, HMI) and Programmable logic controller (PLC) (Programmable Logic Controller, PLC) or remote-terminal unit (Remote Terminal Unit, RTU) between communication line on carry out go-between (Man-In-The-Middle, MITM) attack, can be with Eavesdropping or data interception stream, and can be injected, delete, delayed data packet, it might even be possible to adapter tube HMI refers to issue false control It enables, to achieve the purpose that damage physical equipment.Art of attack and defense for network system is always what industrial control field was paid close attention to Focus.
If network system is constantly in normal operating condition, attacker can not be implanted into the malicious instructions being not present originally Lead to systemic breakdown, while " reading " can not also be instructed and distort into " writing " instruction, because the implantation of such malicious instructions and distorting It is easy to be detected by existing intruding detection system, cannot achieve the purpose of concealed attack.Attacker can do be only Normal metric data or the key variables value of normal control order in grid are distorted, and the variable-value after distorting It still needs to belong in the normal value set of system permission, only could effectively hide the inspection of intruding detection system in this way It surveys.It is carried out currently, being able to detect network system not yet and whether can hide by distorting measured data values and control instruction The method of the advanced concealed attack of attack.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of method, apparatus and electronic equipment for detecting network system safety, Network system is able to detect to the repellence of advanced concealed attack, risk and loophole existing for network system is explored, is further It designs network system safety prevention measure and basis is provided.
In a first aspect, the embodiment of the present invention provides a kind of method for detecting network system safety, comprising:
Simulation attack is carried out to the network system for test according to predetermined attack strategy;The simulation attack is by altering The normal measurement data and normal control of the network system instruct to realize;
Whether the state for judging the network system after simulation is attacked is precarious position;The precarious position is to preset The network system do not allow occur state;
If the network system state is precarious position after simulation attack, it is determined that the network system is dangerous.
With reference to first aspect, in the first embodiment of first aspect, it is described according to predetermined attack strategy to being used for The network system of test carries out simulation attack, comprising:
Identify the state of presently described network system;
If identifying, the network system is in normal condition, monitors and intercepts and captures the network system remote terminal list The first voltage and current measurement data that member is sent to man-machine interface, it is that the first voltage and current measurement data, which are distorted, Two voltage and current measurement data are sent to the man-machine interface;The second voltage and current measurement data are the power grid system Voltage and current measurement data of the system under non-normal working;
The first control instruction that the man-machine interface is sent to the remote-terminal unit is intercepted and captured, first control is referred to Order, which is distorted, is sent to the remote-terminal unit for the second control instruction;First control instruction is for controlling the power grid system System is entered malfunction and is repaired with the failure to the second voltage and current measurement data reaction, and second control refers to It enables and is converted to precarious position from normal condition for controlling the network system;The malfunction is passes through institute after fault restoration The state of normal condition can be returned by stating network system.
The first embodiment with reference to first aspect, in second of embodiment of first aspect, by described One control instruction is distorted to be sent to after the remote-terminal unit for the second control instruction, further includes:
Identify the state of presently described network system;
If identifying, the state of the network system is malfunction, monitors and intercepts and captures the network system medium-long range end The tertiary voltage and current measurement data that end unit is sent to man-machine interface, the tertiary voltage and current measurement data are distorted The man-machine interface is sent to for the 4th voltage and current measurement data;The 4th voltage and current measurement data are for characterizing institute The failure for stating second voltage and current measurement data reaction is in the fault recovery stage;
Intercepting and capturing the third control instruction that the man-machine interface is sent to the remote-terminal unit and being distorted is the 4th 4th control instruction is sent to the remote-terminal unit by control instruction;The third control instruction is for controlling institute It states network system to restore from malfunction to normal condition, the 4th control instruction is for controlling the network system from failure State is converted to precarious position.
With reference to first aspect the first or second of embodiment, in the third embodiment of first aspect, Before carrying out simulation attack to the network system for test according to predetermined attack strategy, further includes:
Obtain the crucial operable state duration set of the network system;
Define the state control instruction value that state control is carried out to the crucial operable state amount;
Define current time quantity of state parameter value and previous moment quantity of state parameter value and state control in the network system Calculated relationship between instruction value processed;
Construct the normal condition vector set, fault state vector collection and precarious position vector set of the network system;
It determines that the network system converts required state control instruction value between different conditions, obtains the power grid system The state transition graph of system;
Wherein, second control instruction, the 4th control instruction are obtained according to the state transition graph.
With reference to first aspect the first or second of embodiment are led in the 4th kind of embodiment of first aspect Man-in-the-middle attack is crossed to refer to the voltage and current measurement data or control transmitted between the remote-terminal unit and man-machine interface Order is distorted.
Second aspect, the embodiment of the present invention provide a kind of device for detecting network system safety, comprising:
Simulation attack module, for carrying out simulation attack to the network system for test according to predetermined attack strategy;Institute Simulation attack is stated by altering normal measurement data and the normal control instruction of the network system to realize;
Judgment module, for judging whether the state of the network system after simulation is attacked is precarious position;The danger State is that the preset network system does not allow the state occurred;
Determining module, for when the judgment result of the judgment module is yes, determining that the network system is dangerous.
In conjunction with second aspect, in the first embodiment of second aspect, module is attacked in the simulation, comprising:
State recognition of system and record sub module for identification and record the state of presently described network system;
Measurement data distorts submodule, for identifying institute in the state recognition of system and record sub module the last time When stating network system and being in normal condition, monitors and intercept and capture what the network system remote terminal unit was sent to man-machine interface First voltage and current measurement data distort the first voltage and current measurement data for second voltage and current measurement number According to being sent to the man-machine interface;The second voltage and current measurement data are that the network system is under non-normal working Voltage and current measurement data;
Submodule is altered in instruction, refers to for intercepting and capturing the first control that the man-machine interface is sent to the remote-terminal unit It enables, first control instruction is distorted and is sent to the remote-terminal unit for the second control instruction;First control refers to Enable for control the network system enter malfunction with to the second voltage and current measurement data reaction failure into Row is repaired, and second control instruction is converted to precarious position from normal condition for controlling the network system;The failure State is that the state of normal condition can be returned by network system described after fault restoration.
In conjunction with the first embodiment of second aspect, in second of embodiment of second aspect, the measurement number According to submodule is distorted, it is also used to identify at the network system in the state recognition of system and record sub module the last time When malfunction, tertiary voltage and electricity that the network system remote terminal unit is sent to man-machine interface are monitored and intercepted and captured Flow measurement data, the tertiary voltage and current measurement data are distorted be sent to for the 4th voltage and current measurement data it is described Man-machine interface;The 4th voltage and current measurement data are used to characterize the failure of the second voltage and current measurement data reaction In the fault recovery stage;
Described instruction alters submodule, is also used to intercept and capture the third that the man-machine interface is sent to the remote-terminal unit Control instruction is simultaneously distorted as the 4th control instruction, and the 4th control instruction is sent to the remote-terminal unit;Institute It states third control instruction to restore from malfunction to normal condition for controlling the network system, the 4th control instruction is used Precarious position is converted to from malfunction in controlling the network system.
In conjunction with the first or second of embodiment of second aspect, in the third embodiment of second aspect, institute State device further include:
Quantity of state obtains module, for obtaining the crucial operable state duration set of the network system;
First definition module, for defining the state control instruction for carrying out state control to the crucial operable state amount Value;
Second definition module, for defining current time quantity of state parameter value and previous moment state in the network system Measure the calculated relationship between parameter value and state control instruction value;
State vector collection constructs module, for constructing normal condition vector set, the fault state vector of the network system Collection and precarious position vector set;
State transition graph obtains module, for determining that the network system converts required state control between different conditions Instruction value processed obtains the state transition graph of the network system;
Wherein, described instruction alters the state transition graph that submodule is obtained according to state transition graph acquisition module Generate second control instruction, the 4th control instruction.
In conjunction with the first or second of embodiment of second aspect, in the 4th kind of embodiment of second aspect, institute State simulation attack module, further includes: the go-between being implanted between the network system remote terminal unit and man-machine interface Attack submodule;
The measurement data distorts submodule, soft with specific reference to the man-in-the-middle attack of man-in-the-middle attack submodule carrying The voltage and current measurement data that part sends the remote-terminal unit to man-machine interface is altered;
Described instruction alters submodule, with specific reference to the man-in-the-middle attack software pair of man-in-the-middle attack submodule carrying The first control instruction that the man-machine interface is sent to the remote-terminal unit is altered.
The third aspect, the embodiment of the present invention provide a kind of electronic equipment, and the electronic equipment includes: shell, processor, deposits Reservoir, circuit board and power circuit, wherein circuit board is placed in the space interior that shell surrounds, processor and memory setting On circuit boards;Power circuit, for each circuit or the device power supply for above-mentioned electronic equipment;Memory is for storing and can hold Line program code;Processor is run and executable program code pair by reading the executable program code stored in memory The program answered, the method for executing detection network system safety described in aforementioned any embodiment.
A kind of method, apparatus and electronic equipment detecting network system safety provided in an embodiment of the present invention, according to pre- Determine attack strategies and simulation attack is carried out to the network system for test, judges that the state of the network system after simulation is attacked is No is precarious position;The precarious position is that the preset network system does not allow the state occurred;If simulation attack The network system state is precarious position afterwards, it is determined that the network system is dangerous.The simulation attack is by altering The normal measurement data and normal control for stating network system instruct to realize, the present invention can targetedly detect power grid system System is directed to the safety of such attack, finds network system loophole in time, and it is anti-to facilitate the more powerful power grid security of subsequent design Protection mechanism.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow chart of embodiment of the method one for detecting network system safety provided by the invention;
Fig. 2 is a kind of implementation method flow figure of step 102 in Fig. 1;
Fig. 3 is another implementation method flow figure of step 102 in Fig. 1;
Fig. 4 is a kind of flow chart of embodiment of the method two for detecting network system safety provided by the invention;
Fig. 5 is network system state transition graph provided by the invention;
Fig. 6 is the network system schematic diagram provided in an embodiment of the present invention with Liang Tiao power supply line;
Fig. 7 is provided in an embodiment of the present invention for network system condition conversion figure shown in Fig. 6;
Fig. 8 is a kind of structural schematic diagram for the Installation practice one for detecting network system safety of the present invention;
Fig. 9 is a kind of structural schematic diagram for the Installation practice two for detecting network system safety of the present invention;
Figure 10 is a kind of structural schematic diagram for the Installation practice three for detecting network system safety of the present invention;
Figure 11 is a kind of structural schematic diagram for the Installation practice four for detecting network system safety of the present invention;
Figure 12 is the structural schematic diagram of electronic equipment one embodiment of the present invention.
Specific embodiment
The method, apparatus and electronic equipment of detection network system safety a kind of to the embodiment of the present invention with reference to the accompanying drawing It is described in detail.
It will be appreciated that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Base Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its Its embodiment, shall fall within the protection scope of the present invention.
Fig. 1 is a kind of flow chart of embodiment of the method one for detecting network system safety provided by the invention, such as Fig. 1 institute Show, the method for the present embodiment may include:
Step 101 carries out simulation attack to the network system for test according to predetermined attack strategy;
Wherein, the simulation attack is by the normal measurement data for altering the network system and normal control instruction come real It is existing.
In the present embodiment, transmitted by predetermined attack software between network system remote terminal unit and man-machine interface Measurement data or control instruction value altered, to realize to the simulation attack of the advanced concealment of network system.
Whether step 102, the state for judging the network system after simulation is attacked are precarious positions;If so, executing step Rapid 103.
In the present invention, the state of network system is defined as normal condition, malfunction and three kinds of precarious position, wherein Malfunction is that the state of normal condition can be returned by network system described after fault restoration, and precarious position is to preset The network system do not allow occur state, precarious position be attacker wish the system mode reached, once there is this Kind state, system suffer from massive losses, such as large area blackout is a kind of precarious position.
Step 103 determines that the network system is dangerous.
The present embodiment is instructed by the normal measurement data and normal control of altering the network system come to test electricity consumption The problem of net system carries out simulation attack, can find network system in time, such as after the completion of network system design, can be used Method provided in an embodiment of the present invention is tested to verify its safety.
Fig. 2 be Fig. 1 in step 102 a kind of implementation method flow figure, as shown in Fig. 2, according to predetermined attack strategy to May include: in the method that the network system of test carries out simulation attack
The state of step 201, the presently described network system of identification, if identifying, the network system is in normal condition, Then continue to execute step 202.
The first voltage that the network system remote terminal unit is sent to man-machine interface is monitored and intercepted and captured to step 202 And current measurement data, the first voltage and current measurement data are distorted and are sent to for second voltage and current measurement data The man-machine interface.
Wherein, RTU is sent normal to HMI when first voltage and current measurement data are in normal condition for network system Measurement data, and the second voltage and current measurement data after distorting are to characterize the network system to be under non-normal working Voltage and current measurement data.Then, the system manager at HMI sentences according to the second voltage and current measurement data that receive Determine system fault conditions, the first control instruction for being directed to this kind of fault condition can be sent, to RTU by HMI then to control electricity Net system carries out fault restoration.First control instruction enters malfunction to described for controlling the network system The failure of two voltage and current measurement data reaction is repaired.Preferably, can by man-in-the-middle attack to RTU and HMI it Between the voltage and current measurement data transmitted distorted.
Step 203 intercepts and captures the first control instruction that the man-machine interface is sent to the remote-terminal unit, by described the One control instruction, which is distorted, is sent to the remote-terminal unit for the second control instruction.
Wherein, second control instruction is converted to precarious position from normal condition for controlling the network system.
It in the present embodiment, is distorted by the instruction of normal control from HMI to RTU that send as malice control instruction, RTU is being received To after the second control instruction, state control can be carried out according to partial status amount of the control instruction to network system, thus by electric Net system is converted to precarious position by normal condition, realizes the advanced concealed attack to test network system.
Fig. 3 be Fig. 1 in step 102 another implementation method flow figure, Fig. 3 on the basis of Fig. 2, step 203 it Afterwards, can with the following steps are included:
The state of step 204, the presently described network system of identification;If identifying, the state of the network system is failure shape State then performs the next step rapid 205.
The tertiary voltage that the network system remote terminal unit is sent to man-machine interface is monitored and intercepted and captured to step 205 And current measurement data, the tertiary voltage and current measurement data are distorted and are sent to for the 4th voltage and current measurement data The man-machine interface.
Wherein, the 4th voltage and current measurement data be used for characterize the second voltage and current measurement data reaction Failure is in the fault recovery stage.In the present embodiment, if the attack of step 202-203 fails, i.e., network system is according to the first control System instruction is converted to malfunction, then distorts again to RTU to the HMI tertiary voltage sent and current measurement data, with So that system manager is mistakenly considered system and carrying out fault recovery, after waiting system managers to think that fault restoration is completed, will lead to It crosses HMI and sends third control instruction to RTU, so that network system is restored again from malfunction to normal operating condition, it is described Third control instruction is restored from malfunction to normal condition for controlling the network system.
Step 206 is intercepted and captured third control instruction that the man-machine interface is sent to the remote-terminal unit and is usurped It is changed to the 4th control instruction, the 4th control instruction is sent to the remote-terminal unit.
Wherein, the 4th control instruction is converted to precarious position from malfunction for controlling the network system.
The present embodiment, after primary attack failure, if network system enters malfunction by normal condition, again by Distort the measurement data and control instruction value transmitted between RTU and HMI, can attempt to by network system from malfunction convert to Precarious position realizes second of advanced concealed attack to test network system.
Preferably, in Fig. 2 and embodiment illustrated in fig. 3, HM I can be referred to the control that RTU is transmitted by man-in-the-middle attack Order is distorted, the state transition graph converted between different conditions when distorting according to the network system being previously obtained (or shape State conversion and the set of correspondences of control instruction) control instruction after distorting is selected, and control instruction and former control after distorting Need to meet preset relation between system instruction, the preset relation will be described in detail below with specific embodiment.
Fig. 4 is a kind of flow chart of embodiment of the method two for detecting network system safety provided by the invention, such as Fig. 4 institute Show, the method for the present embodiment may include:
Step 401, the crucial operable state duration set for obtaining the network system;
In the present embodiment, the crucial operable state duration set for obtaining the network system is denoted as { x1, x2..., xN}.Shape State amount is being embodied between transmission line and substation, between transmission line different location, different transmission lines in network system Line switching, control instruction can be sent to RTU by HMI, control certain opens by system manager according to specific scene The disconnection and closure of pass, to realize the specific function of network system.Since switching value only disconnects and is closed two states, X is set in the present embodimenti∈ { -1,1 } (i=1,2 ..., N), wherein 1 indicates that switch is in closed state, -1 is indicated at switch In off-state, N indicates the number of all operable state amounts.
Step 402, definition carry out the state control instruction value of state control to the crucial operable state amount;
In the present embodiment, the operation that system manager can carry out the crucial operable state amount is defined, by state Control instruction value is denoted as variable a ∈ { -1,0,1 }.A=-1 indicates that controlling corresponding operable state amount " disconnecting switch " operation refers to It enables, a=1 indicates to control corresponding operable state amount " closure switch " operational order, and a=0 indicates to control corresponding operable state " remaining stationary " operation is measured, without sending any control instruction when a=0.Multiple quantity of states are carried out with the control of operation control simultaneously System instruction then can be by operation vector a=[a1, a2... aN] indicate, wherein ai∈ { -1,0,1 } (i ∈ { 1,2 ..., N }) expression pair The control operation of i-th of quantity of state.
Step 403 defines current time quantity of state parameter value and previous moment quantity of state parameter value in the network system Calculated relationship between state control instruction value;
In the present embodiment, the rule change of quantity of state in network system is defined: when single status amount is current in network system The value at quarterValue depending on its previous momentThe operation that the quantity of state is carried out with Systems OperatorI.e.Wherein operatorIt is expressed as follows computation rule: ifOr -1, thenIf Then
Normal condition vector set, fault state vector collection and the precarious position vector of step 404, the building network system Collection;
In the present embodiment, the possibility value of all quantity of states in network system normal course of operation is defined, is constituted normal State vector setWherein,It indicates in l kind normal condition Under, the vector that each quantity of state is constituted, i.e.,
The possibility value of all quantity of states in network system failure process is defined, fault state vector set is constitutedWhereinIndicate each quantity of state structure under kth kind malfunction At vector, i.e.,
The possibility value that network system is in all quantity of states in dangerous process is defined, precarious position vector set is constitutedWhereinIndicate each quantity of state under m kind precarious position The vector of composition, i.e.,
Step 405 determines that the network system converts required state control instruction value between different conditions, obtains institute State the state transition graph of network system;
In the present embodiment, the state transition graph of network system as shown in figure 5, network system can be converted from normal condition to Malfunction is converted from malfunction and is converted respectively to normal condition, from normal condition and malfunction to precarious position, Fig. 5 In,For system fromCorresponding normal condition is transformed intoIt is corresponding Malfunction needed for state control instruction,For system fromCorresponding malfunction turns It changes toState control instruction needed for corresponding normal condition,For system fromCorresponding malfunction is transformed intoNeeded for corresponding precarious position State control instruction,For system fromCorresponding normal condition is transformed intoState control instruction needed for corresponding precarious position.
The state of step 406, the presently described network system of identification, if identifying, the network system is in normal condition, Then continue to execute step 407.Alternatively, further, the network system is in malfunction if identifying, jumps and execute step Rapid 410.
Step 407 is monitored and intercepts and captures in the network system RTU to the HMI first voltage sent and current measurement data, The first voltage and current measurement data are distorted and are sent to HMI for second voltage and current measurement data.
In the present embodiment, the process of step 407 is similar with the step 202 of above method embodiment, and details are not described herein again.
Step 408 intercepts and captures the first control instruction that HMI is sent to RTU, and first control instruction is distorted as the second control System instruction is sent to RTU.
In the present embodiment, system manager is according to the HMI second voltage received and current measurement data, by HMI to RTU Send the first control instructionCertain line switchings are disconnected or be closed, network system is made to enter the fault restoration stage.This When, intercept and capture the first control instructionAnd distorted into the second control instruction of maliceSo that system is directly entered danger Dangerous state.Wherein, the first control instruction and the second control instruction should meet preset relation:(| a | indicating will Each element of vector a takes absolute value) andThe i.e. described preset relation are as follows: the control instruction after distorting is corresponding Vector is not equal to former control instruction and corresponds to vector, but the element absolute value in two vectors at same position is equal.
The state of step 409, the presently described network system of identification;
In this step, if the state for identifying the network system is malfunction, rapid 410 are performed the next step;If knowing Not Chu the network system state be precarious position, then jump out simulation attack process, execute step 412.
Step 410 is monitored and intercepts and captures in the network system RTU to the HMI tertiary voltage sent and current measurement data, The tertiary voltage and current measurement data are distorted and are sent to HMI for the 4th voltage and current measurement data.
In this step, monitors and intercept and capture in the network system RTU to the HMI tertiary voltage sent and current measurement number According to the tertiary voltage and current measurement data are distorted as the 4th voltage and current measurement data, second voltage and electricity are simulated Flow measurement data correspond to the fault recovery stage electric current and voltage change situation, wait system managers think fault restoration complete with Afterwards, HMI will send third control instruction to RTUSo that network system is restored from malfunction again to normal operation shape State.
Step 411 is intercepted and captured the third control instruction that sends to RTU of HMI and is distorted as the 4th control instruction, will described in 4th control instruction is sent to RTU.
In this step, by third control instructionDistort into the 4th control instruction of maliceThird control refers to Preset relation must be met between the 4th control instruction by enabling:AndSo that the network system Enter precarious position from malfunction.
Whether step 412, the state for judging the network system are precarious positions;If so, thening follow the steps 413.
Step 413 determines that the network system is dangerous.
In the present embodiment, if judging, the state of the network system is safe condition, it is determined that the network system needle It is safe for distorting the attack pattern of measured data values and control instruction.It is if judging the state of the network system Malfunction then searches failure cause, to determine that failure is the normal failure of network system itself or due to step 406-411 Simulation attack caused by.
The present embodiment, by obtaining the operable state duration set of network system key, then defining system manager can With the operation carried out to quantity of state, the rule change of quantity of state in network system is defined, defines network system normal course of operation In all quantity of states possibility value, constitute normal condition vector set, define network system failure process in all shapes The possibility value of state amount constitutes fault state vector set, defines network system and is in all quantity of states in dangerous process Possible value constitutes precarious position vector set, defines the state transition graph of network system, distort finally by man-in-the-middle attack The voltage and current measurement value that RTU is sent to HMI makes system manager be mistakenly considered the certain parts of network system and breaks down, is being During the administrator that unites sends troubleshooting and fault recovery control instruction by HMI, HMI hair is distorted by man-in-the-middle attack Control instruction out makes system enter precarious position from normal or malfunction, so that simulation is to the advanced hidden of network system Attack is covered, method provided in this embodiment can detecte network system to characterized by distorting measured data values and control instruction The phylactic power defensive power of advanced hidden attack, is conducive to us and analyzes the fragility of the network system, find the electricity in time Make where the loophole of net system and in advance corresponding defensive measure.
A specific embodiment is used below, and the technical solution of embodiment of the method shown in Fig. 4 is described in detail.
Fig. 6 show the network system with Liang Tiao power supply line.This Liang Tiao power supply line is by the same power transformation Station is powered, above five line switchings being controlled by RTU01~RTU05 of a No.1 route and connection electric wire form, under Four line switchings and connection electric wire that No. two routes in one, face are controlled by RTU08~RTU11 form, and each RTU may be implemented Power supply line's specific position connects or disconnects.Under normal circumstances, RTU01~RTU05 and RTU08~RTU11 is in normally closed State, RTU07 are in normally open.When a failure in Liang Tiao power supply line, then faulty line and substation are disconnected Between connection (even No.1 route breaks down, and disconnects RTU01, if No. two routes break down, disconnects RTU11), simultaneously RTU07 is connected, is powered using regular link for faulty line, to execute certain necessary failure recovery operations, until therefore Barrier excludes, and the connection being then again switched between former faulty line and substation simultaneously switches off RTU07, makes entire network system Restore normal condition.
It is that power grid to be tested implements method provided in an embodiment of the present invention with Fig. 6, comprising the following steps:
1) the operable state duration set of network system key is obtained, be in this network system RTU01, RTU07, RTU11 }, system manager can send control instruction to these three RTU by HMI and control the connection or break that corresponding line switchs It opens, realizes the conversion between system different conditions.
2) operation that system manager can carry out the crucial operable state amount is defined, by state control instruction value It is denoted as variable a ∈ { -1,0,1 }.A=-1 indicates to control corresponding operable state amount " disconnecting switch " operational order, a=1 expression Corresponding operable state amount " closure switch " operational order is controlled, a=0 indicates to control corresponding operable state amount " remaining stationary " Operation, without sending any control instruction when a=0.The control instruction that multiple quantity of states are carried out with operation control simultaneously then can be by Operate vector a=[a1, a2... aN] indicate, wherein ai∈ { -1,0,1 } (i ∈ { 1,2 ..., N }) is indicated to i-th quantity of state Operation.
3) rule change of quantity of state in network system is defined: the value at single status amount current time in network system Value depending on its previous momentThe operation that the quantity of state is carried out with Systems OperatorI.e.Its Middle operatorIt is expressed as follows computation rule: ifOr -1, thenIfThen
4) the possibility value for defining all quantity of states in network system normal course of operation constitutes the normal shape of the system State vector set is { [1, -1,1] }, indicates that RTU01 and RTU11 is in connection status, RTU07 is in an off state.Define power grid The possibility value of all quantity of states during the system failure, constitute the fault state vector collection be [- 1,1,1], [1,1 ,- 1] }, [- 1,1,1] indicates No.1 line fault above, therefore disconnects RTU01 and connect RTU07, and [1,1, -1] indicates following two Number line fault, therefore disconnect RTU11 and connect RTU07.It defines network system and is in all quantity of states in dangerous process Possible value, the precarious position vector set for constituting this system be combined into [- 1, -1, -1], [- 1, -1,1], [- 1,1, -1], [1, - 1, -1], [1,1,1] }, this is the set being made of the state in addition to normal condition and malfunction, most of precarious position It will cause a wide range of power outages accident.
5) state transition graph of network system is defined.As shown in fig. 7, normal condition can turn via specific control instruction Change malfunction or precarious position into, for example normal condition [1, -1,1] is converted into failure shape by control instruction [- 1,1,0] State [- 1,1,1], normal condition [1, -1,1] are converted into precarious position [- 1, -1, -1] by control instruction [- 1,0, -1], i.e., and two Route powers off on a large scale;Malfunction can also be converted to normal condition or dangerous shape via specific control instruction State, such as malfunction [- 1,1,1] can be converted normal condition [1, -1,1] by control instruction [1, -1,0], can also be through It crosses control instruction [0, -1,1] and is converted into precarious position [- 1, -1,1], is i.e. No.1 route powers off on a large scale.System operated normally Cheng Zhong, system only can mutually be converted between normal condition and malfunction, if system is by malicious attack, it is likely that transfer To precarious position.
6) line voltage distribution, the current measurement value that HMI is sent to by RTU are distorted by man-in-the-middle attack means, such as by one The normal voltage value of number route, current value is distorted is 0, and system manager then thinks No.1 line failure;
7) system manager sends specific control instruction [- 1,1,0] to RTU by HMI, it is intended that disconnects RTU01, closure RTU07 makes system enter malfunction and carries out fault restoration.At this point, distorting above-metioned instruction value by man-in-the-middle attack, become [- 1, -1,0] is sent to RTU, then system will enter precarious position [- 1, -1,1], such No.1 route occurs a wide range of disconnected Electricity;
If 8) realize advanced concealed attack not successfully in previous step, network system is disconnected according to control instruction [- 1,1,0] RTU01 is closed RTU07, into malfunction, then intercepts and captures the electric current and voltage survey that RTU is sent on the No.1 route of HMI again The Current Voltage value of intercepting and capturing is modeled as characterizing the number of the electric current of the line fault Restoration stage and voltage change situation by magnitude According to, wait system managers think fault restoration complete after, control instruction [1, -1,0] will be sent by HMI, makes network system It is restored to normal condition, at this point, intercepting and capturing and distorting control instruction [1, -1,0] again, it is made to become [- 1, -1,0], then System will be converted into precarious position [- 1, -1,1] from malfunction [- 1,1,1], and a wide range of power-off occurs in No.1 route at this time.
Corresponding to the method for detection network system safety provided in an embodiment of the present invention, the embodiment of the present invention also provides one The device of kind detection network system safety, Fig. 8 are a kind of Installation practice one for detecting network system safety of the present invention Structural schematic diagram, as shown in figure 8, the device of the present embodiment may include:
Simulation attack module 11, for carrying out simulation attack to the network system for test according to predetermined attack strategy; The simulation attack is realized by altering normal measurement data and the normal control instruction of the network system;
Judgment module 12, for judging whether the state of the network system after simulation is attacked is precarious position;The danger Dangerous state is that the preset network system does not allow the state occurred;
Determining module 13 is when being, to determine that the network system is dangerous for the judging result in judgment module 12.
The device of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 1, realization principle and skill Art effect is similar, and details are not described herein again.
Fig. 9 is a kind of structural schematic diagram for the Installation practice two for detecting network system safety of the present invention, such as Fig. 9 institute Show, on the basis of the device of the present embodiment apparatus structure shown in Fig. 8, further, simulation attack module 12, comprising:
State recognition of system and record sub module 121 for identification and record the state of presently described network system;
Measurement data distorts submodule 122, for identifying in state recognition of system and 121 the last time of record sub module When the network system is in normal condition, monitors and intercept and capture the network system remote terminal unit to man-machine interface transmission First voltage and current measurement data, the first voltage and current measurement data are distorted as second voltage and current measurement Data are sent to the man-machine interface;The second voltage and current measurement data are that the network system is in non-normal working Under voltage and current measurement data;
Instruction alter submodule 123, for measurement data distort submodule 122 to man-machine interface send second voltage and After current measurement data, the first control instruction that the man-machine interface is sent to the remote-terminal unit is monitored and intercepts and captures, it will First control instruction, which is distorted, is sent to the remote-terminal unit for the second control instruction;First control instruction is used for Control the network system enter malfunction with to the second voltage and current measurement data reaction failure repair, Second control instruction is converted to precarious position from normal condition for controlling the network system;The malfunction is logical The state of normal condition can be returned by crossing the network system after fault restoration.
The device of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 1 and Fig. 2, realize former Reason is similar with technical effect, and details are not described herein again.
In an alternative embodiment, the measurement data in Fig. 9 distorts submodule 122, is also used to know in the system mode When not identifying that the network system is in malfunction with record sub module the last time, monitors and intercept and capture the network system The tertiary voltage and current measurement data that remote terminal unit is sent to man-machine interface, by the tertiary voltage and current measurement Data tampering is that the 4th voltage and current measurement data is sent to the man-machine interface;The 4th voltage and current measurement data are used The fault recovery stage is in the failure for characterizing the second voltage and current measurement data reaction;Submodule 123 is altered in instruction, Be also used to measurement data distort submodule 122 to man-machine interface send the 4th voltage and current measurement data after, monitor simultaneously cut It obtains the third control instruction that the man-machine interface is sent to the remote-terminal unit and is distorted as the 4th control instruction, general 4th control instruction is sent to the remote-terminal unit;The third control instruction for control the network system from Malfunction is restored to normal condition, and the 4th control instruction is converted to danger from malfunction for controlling the network system Dangerous state.
Figure 10 is a kind of structural schematic diagram for the Installation practice three for detecting network system safety of the present invention, such as Figure 10 institute Show, on the basis of the device of the present embodiment apparatus structure shown in Fig. 9, further, further includes:
Quantity of state obtains module 14, for obtaining the crucial operable state duration set of the network system;
First definition module 15, for define to the quantity of state obtain module 14 obtain crucial operable state amount into The state control instruction value of row state control;
Second definition module 16, for defining current time quantity of state parameter value and previous moment shape in the network system Calculated relationship between state amount parameter value and state control instruction value;
State vector collection constructs module 17, and the calculated relationship for being defined according to the second definition module 16 is calculated, structure Build the normal condition vector set, fault state vector collection and precarious position vector set of the network system;
State transition graph obtains module 18, for determining what the network system was constructed in state vector collection building module 17 Required state control instruction value is converted between state vector in different conditions vector set, obtains the state of the network system Transition diagram;
Wherein, submodule 123 is altered in instruction, obtains the state that module 18 obtains with specific reference to state transition graph and converts Figure generates second control instruction, the 4th control instruction.
The device of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 4, realization principle and skill Art effect is similar, and details are not described herein again.
Figure 11 is a kind of structural schematic diagram for the Installation practice four for detecting network system safety of the present invention, such as Figure 11 institute Show, on the basis of the device of the present embodiment apparatus structure shown in Fig. 9, further, simulation attack module 12, further includes: plant Enter the man-in-the-middle attack submodule 124 between the network system remote terminal unit and man-machine interface;Wherein, number is measured According to distorting submodule 121, the man-in-the-middle attack software carried with specific reference to man-in-the-middle attack submodule 124 is to the remote terminal The voltage and current measurement data that unit is sent to man-machine interface is altered;Submodule 123 is altered in instruction, with specific reference to centre People attacks first that the man-in-the-middle attack software that submodule 124 carries sends the man-machine interface to the remote-terminal unit Control instruction is altered.
The embodiment of the present invention also provides a kind of electronic equipment, and the electronic equipment includes dress described in aforementioned any embodiment It sets.
Figure 12 is the structural schematic diagram of electronic equipment one embodiment of the present invention, be may be implemented real shown in Fig. 1-4 of the present invention The process of example is applied, as shown in figure 4, above-mentioned electronic equipment may include: shell 21, processor 22, memory 23,24 and of circuit board Power circuit 25, wherein circuit board 24 is placed in the space interior that shell 21 surrounds, and processor 22 and memory 23 are arranged in electricity On road plate 24;Power circuit 25, for each circuit or the device power supply for above-mentioned electronic equipment;Memory 23 can for storing Execute program code;Processor 22 is run by reading the executable program code stored in memory 23 and executable program The corresponding program of code, the method for executing detection network system safety described in aforementioned any embodiment.Processor 22 Specific implementation procedure and processor 22 to above-mentioned steps by operation executable program code come the step of further execution, It may refer to the description of Fig. 1-4 illustrated embodiment of the present invention, details are not described herein.
The electronic equipment exists in a variety of forms, including but not limited to:
(1) mobile communication equipment: the characteristics of this kind of equipment is that have mobile communication function, and to provide speech, data Communication is main target.This Terminal Type includes: smart phone (such as iPhone), multimedia handset, functional mobile phone and low Hold mobile phone etc..
(2) super mobile personal computer equipment: this kind of equipment belongs to the scope of personal computer, there is calculating and processing function Can, generally also have mobile Internet access characteristic.This Terminal Type includes: PDA, MID and UMPC equipment etc., such as iPad.
(3) portable entertainment device: this kind of equipment can show and play multimedia content.Such equipment include: audio, Video player (such as iPod), handheld device, e-book and intelligent toy and portable car-mounted navigation equipment.
(4) server: providing the equipment of the service of calculating, and the composition of server includes that processor, hard disk, memory, system are total Line etc., server is similar with general computer architecture, but due to needing to provide highly reliable service, in processing energy Power, stability, reliability, safety, scalability, manageability etc. are more demanding.
(5) other electronic equipments with data interaction function.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any In the technical scope disclosed by the present invention, any changes or substitutions that can be easily thought of by those familiar with the art, all answers It is included within the scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (10)

1. a kind of method for detecting network system safety characterized by comprising
Simulation attack is carried out to the network system for test according to predetermined attack strategy;The simulation attack is described by altering The normal measurement data and normal control of network system instruct to realize;
Whether the state for judging the network system after simulation is attacked is precarious position;The precarious position is preset institute Stating network system not allows the state occurred;
If the network system state is precarious position after simulation attack, it is determined that the network system is dangerous.
2. the method for detection network system safety according to claim 1, which is characterized in that described according to predetermined attack Strategy carries out simulation attack to the network system for test, comprising:
Identify the state of presently described network system;
If identifying, the network system is in normal condition, monitor and intercept and capture the network system remote terminal unit to The first voltage and current measurement data that man-machine interface is sent distort the first voltage and current measurement data for the second electricity Pressure and current measurement data are sent to the man-machine interface;The second voltage and current measurement data are at the network system Voltage and current measurement data under non-normal working;
The first control instruction that the man-machine interface is sent to the remote-terminal unit is intercepted and captured, first control instruction is usurped It is changed to the second control instruction and is sent to the remote-terminal unit;First control instruction for control the network system into Enter malfunction to repair with the failure to the second voltage and current measurement data reaction, second control instruction is used Precarious position is converted to from normal condition in controlling the network system;The malfunction is to pass through electricity described after fault restoration Net system can return the state of normal condition.
3. the method for detection network system safety according to claim 2, which is characterized in that controlled by described first Instruction is distorted to be sent to after the remote-terminal unit for the second control instruction, further includes:
Identify the state of presently described network system;
If the state for identifying the network system is malfunction, monitors and intercept and capture the network system remote terminal list The tertiary voltage and current measurement data that member is sent to man-machine interface, it is that the tertiary voltage and current measurement data, which are distorted, Four voltage and current measurement data are sent to the man-machine interface;The 4th voltage and current measurement data are for characterizing described the The failure of two voltage and current measurement data reaction is in the fault recovery stage;
It intercepts and captures the third control instruction that the man-machine interface is sent to the remote-terminal unit and is distorted as the 4th control Instruction, is sent to the remote-terminal unit for the 4th control instruction;The third control instruction is for controlling the electricity Net system is restored from malfunction to normal condition, and the 4th control instruction is for controlling the network system from malfunction Be converted to precarious position.
4. the method for detection network system safety according to claim 2 or 3, which is characterized in that attacked according to predetermined It hits before strategy carries out simulation attack to the network system for test, further includes:
Obtain the crucial operable state duration set of the network system;
Define the state control instruction value that state control is carried out to the crucial operable state amount;
Current time quantity of state parameter value in the network system is defined to refer to previous moment quantity of state parameter value and state control Enable the calculated relationship between value;
Construct the normal condition vector set, fault state vector collection and precarious position vector set of the network system;
It determines that the network system converts required state control instruction value between different conditions, obtains the network system State transition graph;
Wherein, second control instruction, the 4th control instruction are obtained according to the state transition graph.
5. the method for detection network system safety according to claim 2 or 3, which is characterized in that attacked by go-between It hits and the voltage and current measurement data or control instruction transmitted between the remote-terminal unit and man-machine interface is distorted.
6. a kind of device for detecting network system safety characterized by comprising
Simulation attack module, for carrying out simulation attack to the network system for test according to predetermined attack strategy;The mould Quasi- attack is realized by altering normal measurement data and the normal control instruction of the network system;
Judgment module, for judging whether the state of the network system after simulation is attacked is precarious position;The precarious position The state occurred is not allowed for the preset network system;
Determining module, for when the judgment result of the judgment module is yes, determining that the network system is dangerous.
7. the device of detection network system safety according to claim 6, which is characterized in that mould is attacked in the simulation Block, comprising:
State recognition of system and record sub module for identification and record the state of presently described network system;
Measurement data distorts submodule, for identifying the electricity in the state recognition of system and record sub module the last time When net system is in normal condition, monitors and intercept and capture the network system remote terminal unit is sent to man-machine interface first Voltage and current measurement data distorts the first voltage and current measurement data for second voltage and current measurement data hair Give the man-machine interface;The second voltage and current measurement data are that the network system is in the electricity under non-normal working Pressure and current measurement data;
Submodule is altered in instruction, the first control instruction sent for intercepting and capturing the man-machine interface to the remote-terminal unit, First control instruction is distorted and is sent to the remote-terminal unit for the second control instruction;First control instruction is used Enter malfunction in the control network system to repair with the failure to the second voltage and current measurement data reaction Multiple, second control instruction is converted to precarious position from normal condition for controlling the network system;The malfunction For the state that can return normal condition by network system described after fault restoration.
8. the device of detection network system safety according to claim 7, which is characterized in that the measurement data is distorted Submodule is also used to identify that the network system is in failure in the state recognition of system and record sub module the last time When state, monitors and intercept and capture tertiary voltage and current measurement that the network system remote terminal unit is sent to man-machine interface The tertiary voltage and current measurement data are distorted and are sent to the human-machine interface for the 4th voltage and current measurement data by data Mouthful;The 4th voltage and current measurement data are used to characterize the second voltage and the failure of current measurement data reaction is in event Hinder Restoration stage;
Described instruction alters submodule, is also used to intercept and capture the third control that the man-machine interface is sent to the remote-terminal unit It instructs and is distorted as the 4th control instruction, the 4th control instruction is sent to the remote-terminal unit;Described Three control instructions are restored from malfunction to normal condition for controlling the network system, and the 4th control instruction is for controlling It makes the network system and is converted to precarious position from malfunction.
9. the device of detection network system safety according to claim 7 or 8, which is characterized in that further include:
Quantity of state obtains module, for obtaining the crucial operable state duration set of the network system;
First definition module, for defining the state control instruction value for carrying out state control to the crucial operable state amount;
Second definition module is joined for defining current time quantity of state parameter value and previous moment quantity of state in the network system Calculated relationship between numerical value and state control instruction value;
State vector collection constructs module, for construct the normal condition vector set of the network system, fault state vector collection and Precarious position vector set;
State transition graph obtains module, refers to for determining that the network system converts required state control between different conditions Value is enabled, the state transition graph of the network system is obtained;
Wherein, described instruction is altered submodule and is generated according to the state transition graph that state transition graph acquisition module obtains Second control instruction, the 4th control instruction.
10. the device of detection network system safety according to claim 7 or 8, which is characterized in that the simulation attack Module, further includes: the man-in-the-middle attack submodule being implanted between the network system remote terminal unit and man-machine interface;
The measurement data distorts submodule, with specific reference to the man-in-the-middle attack software pair of man-in-the-middle attack submodule carrying The voltage and current measurement data that the remote-terminal unit is sent to man-machine interface is altered;
Described instruction alters submodule, with specific reference to the man-in-the-middle attack submodule carrying man-in-the-middle attack software to described The first control instruction that man-machine interface is sent to the remote-terminal unit is altered.
CN201910530425.6A 2019-06-18 2019-06-18 A kind of method, apparatus and electronic equipment detecting network system safety Pending CN110334507A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910530425.6A CN110334507A (en) 2019-06-18 2019-06-18 A kind of method, apparatus and electronic equipment detecting network system safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910530425.6A CN110334507A (en) 2019-06-18 2019-06-18 A kind of method, apparatus and electronic equipment detecting network system safety

Publications (1)

Publication Number Publication Date
CN110334507A true CN110334507A (en) 2019-10-15

Family

ID=68142540

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910530425.6A Pending CN110334507A (en) 2019-06-18 2019-06-18 A kind of method, apparatus and electronic equipment detecting network system safety

Country Status (1)

Country Link
CN (1) CN110334507A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112634604A (en) * 2020-11-16 2021-04-09 中国电力科学研究院有限公司 Attack testing method and system for electricity consumption information acquisition system
CN115118477A (en) * 2022-06-22 2022-09-27 四川数字经济产业发展研究院 Smart grid state recovery method and system based on deep reinforcement learning

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8433768B1 (en) * 2004-10-14 2013-04-30 Lockheed Martin Corporation Embedded model interaction within attack projection framework of information system
CN104638724A (en) * 2015-01-30 2015-05-20 广东亿纬赛恩斯新能源系统有限公司 CAN (Controller Area Network) communication-based battery management system
CN105049403A (en) * 2015-05-20 2015-11-11 广东电网有限责任公司电力科学研究院 Power distribution network control system safety protection method and system
CN105429133A (en) * 2015-12-07 2016-03-23 国网智能电网研究院 Information network attack-oriented vulnerability node evaluation method for power grid
CN107360133A (en) * 2017-06-08 2017-11-17 全球能源互联网研究院 A kind of network attack emulation mode and system towards electric network information physical system
CN107612927A (en) * 2017-10-13 2018-01-19 中国电力科学研究院 The safety detection method of electric power scheduling automatization system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8433768B1 (en) * 2004-10-14 2013-04-30 Lockheed Martin Corporation Embedded model interaction within attack projection framework of information system
CN104638724A (en) * 2015-01-30 2015-05-20 广东亿纬赛恩斯新能源系统有限公司 CAN (Controller Area Network) communication-based battery management system
CN105049403A (en) * 2015-05-20 2015-11-11 广东电网有限责任公司电力科学研究院 Power distribution network control system safety protection method and system
CN105429133A (en) * 2015-12-07 2016-03-23 国网智能电网研究院 Information network attack-oriented vulnerability node evaluation method for power grid
CN107360133A (en) * 2017-06-08 2017-11-17 全球能源互联网研究院 A kind of network attack emulation mode and system towards electric network information physical system
CN107612927A (en) * 2017-10-13 2018-01-19 中国电力科学研究院 The safety detection method of electric power scheduling automatization system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112634604A (en) * 2020-11-16 2021-04-09 中国电力科学研究院有限公司 Attack testing method and system for electricity consumption information acquisition system
CN112634604B (en) * 2020-11-16 2022-07-01 中国电力科学研究院有限公司 Attack testing method and system for electricity consumption information acquisition system
CN115118477A (en) * 2022-06-22 2022-09-27 四川数字经济产业发展研究院 Smart grid state recovery method and system based on deep reinforcement learning
CN115118477B (en) * 2022-06-22 2024-05-24 四川数字经济产业发展研究院 Smart grid state recovery method and system based on deep reinforcement learning

Similar Documents

Publication Publication Date Title
Liu et al. Intruders in the grid
Pei et al. PMU placement protection against coordinated false data injection attacks in smart grid
CN104573510B (en) A kind of intelligent grid malicious data injection attacks and detection method
Wei et al. Greenbench: A benchmark for observing power grid vulnerability under data-centric threats
Shekari et al. RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid.
Xie et al. Physical and cybersecurity in a smart grid environment
CN110334507A (en) A kind of method, apparatus and electronic equipment detecting network system safety
Khan et al. The cyberphysical power system resilience testbed: Architecture and applications
CN109660550B (en) System and method for security defense of embedded terminal
CN109031980A (en) A kind of emulation test method and system of the valve control device based on FPGA
CN107563227A (en) The terminal device that anti-data are stolen secret information
Wang et al. Deducing cascading failures caused by cyberattacks based on attack gains and cost principle in cyber-physical power systems
CN107171830A (en) Power information physical hardware is in ring security simulation test platform
Chen et al. Reliability assessment of distribution network considering cyber attacks
Chawla et al. Denial-of-service resilient frameworks for synchrophasor-based wide area monitoring systems
CN105391066B (en) A kind of intelligent grid the simulative running system
CN108964020A (en) A kind of physical isolation type lightning-protection system and physical isolation type lightening arresting method
CN106054115A (en) Safety authentication function testing method and system of charge-control electric energy meter
CN106529824A (en) Method for analyzing functional damage degrees of secondary equipment and secondary system of intelligent substation
CN103955200B (en) Movable mould test method for self-healing control function of power distribution network
CN109031981A (en) A kind of emulation test method and system of the valve control device based on FPGA
CN113326204A (en) Transformer substation system testing method and device, terminal equipment and storage medium
Chukwuka et al. Bad data injection attack propagation in cyber-physical power delivery systems
CN110601261B (en) Microgrid controller service logic consistency analysis method based on sensing control logic
CN111029914B (en) Active first-aid repair system based on ubiquitous Internet of things construction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191015

RJ01 Rejection of invention patent application after publication