CN113191674A - Security risk assessment method and device, storage medium and electronic equipment - Google Patents

Security risk assessment method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN113191674A
CN113191674A CN202110552975.5A CN202110552975A CN113191674A CN 113191674 A CN113191674 A CN 113191674A CN 202110552975 A CN202110552975 A CN 202110552975A CN 113191674 A CN113191674 A CN 113191674A
Authority
CN
China
Prior art keywords
security
level
safety
judgment matrix
hierarchy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110552975.5A
Other languages
Chinese (zh)
Inventor
李伟青
赵瑞锋
周安
石扬
叶汇镓
古钰冰
梅咏武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Power Grid Co Ltd
Meizhou Power Supply Bureau of Guangdong Power Grid Co Ltd
Original Assignee
Guangdong Power Grid Co Ltd
Meizhou Power Supply Bureau of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Meizhou Power Supply Bureau of Guangdong Power Grid Co Ltd filed Critical Guangdong Power Grid Co Ltd
Priority to CN202110552975.5A priority Critical patent/CN113191674A/en
Publication of CN113191674A publication Critical patent/CN113191674A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/35Utilities, e.g. electricity, gas or water
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • Water Supply & Treatment (AREA)
  • Primary Health Care (AREA)
  • Accounting & Taxation (AREA)
  • General Health & Medical Sciences (AREA)
  • Educational Administration (AREA)
  • Public Health (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention discloses a safety risk assessment method, a safety risk assessment device, a storage medium and electronic equipment, wherein the safety risk assessment method comprises the following steps: acquiring a security hierarchy structure model corresponding to a power distribution Internet of things system; wherein the security hierarchy model comprises at least two levels of security elements; aiming at each level of the security level structure model, determining the importance weight of each security element in the current level according to the sequence from low level to high level, and performing consistency check on a judgment matrix after constructing the judgment matrix corresponding to the current level; and when the judgment matrixes pass consistency check, performing safety risk assessment on the power distribution Internet of things system based on the importance weight of each safety element in each level. According to the technical scheme provided by the embodiment of the invention, the risk assessment can be carried out on the security threat of the power distribution Internet of things system more comprehensively and reasonably, and the accuracy of the security risk assessment on the power distribution Internet of things system is improved.

Description

Security risk assessment method and device, storage medium and electronic equipment
Technical Field
The embodiment of the invention relates to the technical field of electric power Internet of things safety, in particular to a safety risk assessment method and device, a storage medium and electronic equipment.
Background
The power distribution internet of things is a realization mode of the power internet of things in the field of power distribution, and the characteristics of complicated network architecture, cloud of a main station, internet of things of terminal equipment, flexible service expansion and the like of the power distribution internet of things system lead to the fact that the safety risk of the power distribution internet of things system is greatly changed compared with the traditional power distribution monitoring system. Nowadays, the network security situation is increasingly severe, and the security incidents of the internet of things and industrial control systems are increasing year by year. The current power distribution Internet of things system lacks safety protection terminal and technique, and the following problems mainly exist in the aspect of terminal safety protection:
1) the exposed surface of network security is large. The mass terminals and network interfaces are deployed to the user side and system nodes at all levels, so that many points can be physically contacted by a malicious attacker, and the points are difficult to monitor comprehensively and timely.
2) There are more trails that can be attacked. Network communication technologies such as wireless private network, satellite network, 5G, NB-IoT, near field communication, etc. will be widely used, which, although beneficial to terminal access cost reduction and convenience improvement, will also increase the number of network paths for attacks by malicious attackers.
3) The network security of the power distribution internet of things terminal has more loopholes, and a cutting system is generally adopted and does not have the safety protection capability basically.
Therefore, from a defense perspective, it becomes crucial to perform security risk assessment on the power distribution internet of things system. The common security risk assessment model of the internet of things comprises an artificial immunity detection model and a cloud transformation model, although the artificial immunity detection model can dynamically refresh the threat range in real time, and is efficient and accurate, the risk assessment is established on the detection result, so that the assessment result has strong dependence on the risk security detection result. Although the cloud transformation model can process a large amount of data and support qualitative and quantitative conversion, the difficulty of establishing the cloud transformation model is high and the cloud transformation model is not easy to realize.
Disclosure of Invention
The embodiment of the invention provides a safety risk assessment method and device, a storage medium and electronic equipment, which are used for accurately and reasonably assessing a safety risk of a power distribution internet of things.
In a first aspect, an embodiment of the present invention provides a security risk assessment method, including:
acquiring a security hierarchy structure model corresponding to a power distribution Internet of things system; wherein the security hierarchy model comprises at least two levels of security elements;
determining importance weights of all safety elements in the current level according to the sequence from low level to high level aiming at all levels of the safety level structure model, and carrying out consistency check on a judgment matrix after constructing the judgment matrix corresponding to the current level;
and when the judgment matrixes pass consistency check, performing safety risk assessment on the power distribution Internet of things system based on the importance weight of each safety element in each level.
In a second aspect, an embodiment of the present invention further provides a security risk assessment apparatus, including:
the structure model acquisition module is used for acquiring a security hierarchy structure model corresponding to the power distribution Internet of things system; wherein the security hierarchy model comprises at least two levels of security elements;
the consistency check module is used for determining the importance weight of each safety element in the current level according to the sequence from low level to high level aiming at each level of the safety level structure model, and performing consistency check on a judgment matrix after the judgment matrix corresponding to the current level is constructed;
and the safety risk evaluation module is used for carrying out safety risk evaluation on the power distribution Internet of things system based on the importance weight of each safety element in each level when each judgment matrix passes the consistency check.
In a third aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a security risk assessment method according to an embodiment of the present invention.
In a fourth aspect, an embodiment of the present invention provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the security risk assessment method according to the embodiment of the present invention.
According to the safety risk assessment scheme provided by the embodiment of the invention, a safety hierarchy structure model corresponding to a power distribution Internet of things system is obtained; wherein the security hierarchy model comprises at least two levels of security elements; determining importance weights of all safety elements in the current level according to the sequence from low level to high level aiming at all levels of the safety level structure model, and carrying out consistency check on a judgment matrix after constructing the judgment matrix corresponding to the current level; and when the judgment matrixes pass consistency check, performing safety risk assessment on the power distribution Internet of things system based on the importance weight of each safety element in each level. According to the technical scheme provided by the embodiment of the invention, the risk evaluation can be carried out on the security threat of the power distribution Internet of things system more comprehensively so as to reasonably judge the security level of the power distribution Internet of things system, and the accuracy of the security risk evaluation on the power distribution Internet of things system is improved.
Drawings
FIG. 1 is a flow chart of a security risk assessment method according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a security hierarchy model provided by an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a security risk assessment device according to another embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device in another embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present invention are shown in the drawings, it should be understood that the present invention may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present invention. It should be understood that the drawings and the embodiments of the present invention are illustrative only and are not intended to limit the scope of the present invention.
It should be understood that the various steps recited in the method embodiments of the present invention may be performed in a different order and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the invention is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present invention are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in the present invention are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that reference to "one or more" unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present invention are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
Fig. 1 is a flowchart of a security risk assessment method according to an embodiment of the present invention, where the method may be applied to security risk assessment for an internet of things system for power distribution, and the method may be executed by a security risk assessment apparatus, which may be composed of hardware and/or software and may be generally integrated in an electronic device. As shown in fig. 1, the method specifically includes the following steps:
step 110, acquiring a security hierarchy structure model corresponding to a power distribution Internet of things system; wherein the security hierarchy model comprises at least two levels of security elements.
In the embodiment of the invention, a safety hierarchy structure model corresponding to the power distribution internet of things system is obtained, wherein the safety hierarchy structure model can be a layered structure model constructed by layering the power distribution internet of things system according to the technology and/or the function. The security hierarchy model may be a tree structure model, and the security hierarchy model includes at least two levels of security elements.
Optionally, the security hierarchy model comprises two levels; the security elements of the highest level comprise a sensing layer, a network layer and an application layer; the lowest level of security elements includes: the intelligent sensor, the pluggable functional component, the distributed power supply, the edge Internet of things agent and the local communication access belong to the sensing layer, the communication network, the service network and the firewall grade belong to the network layer, and the application software safety, the application hardware safety, the development environment safety and the service safety belong to the application layer. Illustratively, fig. 2 is a schematic structural diagram of a security hierarchy structural model provided by an embodiment of the present invention. As shown in fig. 2, a sensing layer, a network layer and an application layer are used as the core of a power distribution internet of things system, security risks existing in the sensing layer, the network layer and the application layer are analyzed, and three layers (the sensing layer, the network layer and the application layer) are subdivided downwards by an analytic hierarchy process, wherein security elements of the sensing layer may include an intelligent sensor, a pluggable functional component, a distributed power supply, an edge internet of things agent and local communication access. The security elements of the network layer may include communication network, service network and firewall levels. Application layer security elements may include application software, application hardware, development environment, and business security.
And 120, determining importance weights of all safety elements in the current level according to the sequence from low level to high level aiming at all levels of the safety level structure model, and performing consistency check on a judgment matrix corresponding to the current level after the judgment matrix is constructed.
In the embodiment of the invention, the lowest level in a security hierarchy model is taken as the current level, the importance weight of each security element in the current level is determined, a judgment matrix corresponding to the current level is constructed, then the consistency check is carried out on the judgment matrix, when the judgment matrix passes the consistency check, the next level (higher than the current level) in the security hierarchy model is taken as the current level, and the importance weight of each security element in the current level is determined in a returning way until the consistency check is completed on the judgment matrix corresponding to the highest level in the security hierarchy model.
Optionally, when the current hierarchy is the lowest hierarchy in the security hierarchy model, the security score of each security element in the lowest hierarchy by a user (security risk assessment expert) may be obtained, and the importance weight of each security element in the lowest hierarchy is determined according to the security score. For example, the sum of the security scores of the respective security elements in the lowest hierarchy may be calculated, and the ratio of the security score of the respective security element in the lowest hierarchy to the sum may be used as the importance weight of the security element. For another example, the secure elements at the lowest level may be sorted in the order of the security scores from low to high, and the sorting numbers are determined, and then the ratio of the sorting number of each secure element at the lowest level to the sum of all the sorting numbers is used as the importance weight of each secure element.
For example, when the current level is the lowest level in the security hierarchy structural model, a judgment matrix corresponding to the lowest level may be constructed based on the importance weight of each security element in the lowest level; or constructing a judgment matrix corresponding to the lowest level based on the safety score of each safety element in the lowest level; and constructing a judgment matrix corresponding to the lowest level based on the determined sequencing numbers of the safety elements after sequencing the safety elements of the lowest level according to the sequence from low to high of the safety score. It should be noted that, in the embodiment of the present invention, a construction manner of the determination matrix corresponding to the lowest level is not limited.
Illustratively, constructing a judgment matrix corresponding to the lowest hierarchy based on the security score of each security element in the lowest hierarchy includes: and comparing every two safety scores of all safety elements in the lowest level, searching a comparison column scale table according to the comparison result, and determining the element value in the judgment matrix according to the search result. Illustratively, the element a in the decision matrixijThe determination method of the value is as follows: the safety scores of the ith safety element and the jth element are differentiated, and the element a is searched in the following comparison and ranking table according to the difference valueijThe value of (a).
Comparative scale table
Figure BDA0003075945200000071
It should be noted that, in the decision matrix,
Figure BDA0003075945200000072
the dimension of the decision matrix is the same as the number of security elements contained in the current hierarchy.
Illustratively, the lowest level is based on the order of low to high in the safety scoreAfter sequencing all the safety elements of the levels, the determined sequencing numbers of all the safety elements construct a judgment matrix corresponding to the lowest level, and the method comprises the following steps: calculating the element a in the judgment matrix according to the following formulaijThe value of (A) is as follows:
Figure BDA0003075945200000073
wherein, yiSequence number, y, representing the ith security elementjIndicating the ranking number of the jth security element. It should be noted that, in the decision matrix,
Figure BDA0003075945200000081
the dimension of the decision matrix is the same as the number of security elements contained in the current hierarchy.
Optionally, determining the importance weight of each security element in the current hierarchy includes: and calculating the security weight of each security element in the current level according to the security weight of each security element in the previous level and the security element belonging to the current level. Specifically, when the current hierarchy is a non-lowest hierarchy, the security weight of each secure element in the current hierarchy may be determined according to the security weight of the secure element in the previous hierarchy that belongs to the current hierarchy. For example, in the security hierarchy model, the security weight of the security element sensing layer in the highest hierarchy can be calculated according to the security weights of the smart sensor, the pluggable functional component, the distributed power supply, the edge internet of things agent and the local communication access which belong to the sensing layer. Namely, the security weight of the sensing layer is the sum of the security weights of the intelligent sensor, the pluggable functional component, the distributed power supply, the edge Internet of things agent and the local communication access.
Optionally, constructing a judgment matrix corresponding to the current hierarchy based on the importance weight of each security element in the current hierarchy includes: comparing the importance weights of all safety elements in the current level one by one, and determining the value of each element in the judgment matrix according to the comparison result; and the dimension of the judgment matrix is the same as the number of the safety elements contained in the current hierarchy. Illustratively, the element a in the judgment matrix corresponding to the current levelijThe determination method of the value may include: the safety weight of the ith safety element and the jth element in the current level is subtracted, and the element a is searched in the following comparison and ranking table according to the difference valueijThe value of (a). Similarly, in the judgment matrix corresponding to the current level,
Figure BDA0003075945200000082
in the embodiment of the invention, for each level of the security level structure model, according to the sequence from low level to high level, after the judgment matrix corresponding to the current level is constructed, the consistency check is carried out on the judgment matrix of the current level. Optionally, the consistency check of the judgment matrix includes: calculating the maximum eigenvalue of the judgment matrix; and determining a consistency verification result of the judgment matrix according to the maximum eigenvalue. For example, the maximum eigenvalue λ of the judgment matrix may be calculated based on a sum-product method, and the consistency check result of the judgment matrix may be determined according to the maximum eigenvalue λ. Determining a consistency verification result of the judgment matrix according to the maximum eigenvalue, wherein the consistency verification result comprises the following steps: calculating the consistency degree of a judgment matrix according to the maximum eigenvalue and the dimensionality of the judgment matrix; and calculating a consistency check result of the judgment matrix according to the consistency degree and a consistency check value corresponding to the judgment matrix. Specifically, calculating the consistency degree of the judgment matrix according to the maximum eigenvalue and the dimension of the judgment matrix includes: and calculating the consistency degree of the judgment matrix according to the following formula:
Figure BDA0003075945200000091
wherein, CI represents the consistency degree of the judgment matrix, lambda represents the maximum eigenvalue, and n represents the dimension of the judgment matrix. And taking the ratio of the consistency degree CI to the consistency check value RI corresponding to the judgment matrix as the consistency check result CR of the judgment matrix. The consistency check value RI corresponding to the judgment matrix may be determined according to an average random consistency index RI standard value table as shown below:
average random consistency index RI standard value table
Figure BDA0003075945200000092
And step 130, when the judgment matrixes pass consistency check, performing safety risk assessment on the power distribution Internet of things system based on the importance weight of each safety element in each level.
In the embodiment of the invention, the consistency check result CR is compared with a preset threshold value, when CR is smaller than the preset threshold value, the consistency check result is judged to pass through the judgment matrix, and when CR is larger than the preset threshold value, the consistency check result is judged not to pass through the judgment matrix. For example, if the preset threshold value can be set to 0.1, the consistency check result CR is less than 0.1, which indicates that the decision matrix passes the consistency check result. It should be noted that the preset thresholds set for different levels may be the same in size, or may be different in size.
In the embodiment of the invention, whether the judgment matrix corresponding to the current hierarchy passes the consistency check or not can be sequentially judged for each hierarchy of the security hierarchy structural model according to the sequence from low hierarchy to high hierarchy, after the judgment matrix corresponding to the current hierarchy passes the consistency check, the importance weight of each security element in the next hierarchy is determined, and whether the judgment matrix corresponding to the next hierarchy passes the consistency check or not is judged until the judgment of the highest hierarchy is completed. If the judgment matrix corresponding to the current level does not pass the consistency check, the safety scoring corresponding to each safety element in the lowest level in the safety level structure model is different, the safety risk assessment of the power distribution Internet of things system cannot be carried out, and an expert can be enabled to carry out safety scoring on each safety element in the lowest level in the safety level structure model again.
In the embodiment of the invention, when the judgment matrixes corresponding to the levels pass consistency check, the security evaluation can be performed on the power distribution Internet of things system based on the importance weight of each security element in each level, and the security risk evaluation can also be performed on the power distribution Internet of things system based on the importance weight of each security element in the highest level. For example, the proportion distribution of the importance weight of each safety element in the highest level is analyzed, and the safety risk assessment is carried out on the power distribution internet of things system according to the proportion distribution result. For example, when the proportional distribution deviation of the importance weight of each safety element in the highest level is large, it can be determined that the safety risk of the power distribution internet of things system is high; when the proportion distribution of the importance weight of each safety element in the highest level is uniform, the safety risk of the power distribution Internet of things system can be determined to be low.
According to the safety risk assessment scheme provided by the embodiment of the invention, a safety hierarchy structure model corresponding to a power distribution Internet of things system is obtained; wherein the security hierarchy model comprises at least two levels of security elements; determining importance weights of all safety elements in the current level according to the sequence from low level to high level aiming at all levels of the safety level structure model, and carrying out consistency check on a judgment matrix after constructing the judgment matrix corresponding to the current level; and when the judgment matrixes pass consistency check, performing safety risk assessment on the power distribution Internet of things system based on the importance weight of each safety element in each level. According to the technical scheme provided by the embodiment of the invention, the risk evaluation can be carried out on the security threat of the power distribution Internet of things system more comprehensively so as to reasonably judge the security level of the power distribution Internet of things system, and the accuracy of the security risk evaluation on the power distribution Internet of things system is improved.
Fig. 3 is a schematic structural diagram of a security risk assessment apparatus according to another embodiment of the present invention. As shown in fig. 3, the apparatus includes: a structural model acquisition module 310, a consistency check module 320, and a security risk assessment module 330. Wherein the content of the first and second substances,
the structure model obtaining module 310 is configured to obtain a security hierarchy structure model corresponding to the power distribution internet of things system; wherein the security hierarchy model comprises at least two levels of security elements;
the consistency check module 320 is configured to determine, for each level of the security hierarchy model, importance weights of security elements in a current level according to a sequence from a low level to a high level, and perform consistency check on a judgment matrix corresponding to the current level after the judgment matrix is constructed;
and the safety risk evaluation module 330 is configured to perform safety risk evaluation on the power distribution internet of things system based on the importance weights of the safety elements in the levels when it is determined that the judgment matrixes pass the consistency check.
The safety risk assessment device provided by the embodiment of the invention obtains a safety hierarchy structure model corresponding to a power distribution Internet of things system; wherein the security hierarchy model comprises at least two levels of security elements; determining importance weights of all safety elements in the current level according to the sequence from low level to high level aiming at all levels of the safety level structure model, and carrying out consistency check on a judgment matrix after constructing the judgment matrix corresponding to the current level; and when the judgment matrixes pass consistency check, performing safety risk assessment on the power distribution Internet of things system based on the importance weight of each safety element in each level. According to the technical scheme provided by the embodiment of the invention, the risk evaluation can be carried out on the security threat of the power distribution Internet of things system more comprehensively so as to reasonably judge the security level of the power distribution Internet of things system, and the accuracy of the security risk evaluation on the power distribution Internet of things system is improved.
Optionally, the consistency check module is configured to:
and calculating the security weight of each security element in the current level according to the security weight of each security element in the previous level and the security element belonging to the current level.
Optionally, the consistency check module includes:
and the judgment matrix construction unit is used for constructing a judgment matrix corresponding to the current hierarchy based on the importance weight of each safety element in the current hierarchy.
Optionally, the judgment matrix constructing unit is configured to:
comparing the importance weights of all safety elements in the current level one by one, and determining the value of each element in the judgment matrix according to the comparison result; and the dimension of the judgment matrix is the same as the number of the safety elements contained in the current hierarchy.
Optionally, the consistency check module includes:
the eigenvalue calculation unit is used for calculating the maximum eigenvalue of the judgment matrix;
and the verification result determining unit is used for determining the consistency verification result of the judgment matrix according to the maximum eigenvalue.
Optionally, the verification result determining unit is configured to:
calculating the consistency degree of a judgment matrix according to the maximum eigenvalue and the dimensionality of the judgment matrix;
and calculating a consistency check result of the judgment matrix according to the consistency degree and a consistency check value corresponding to the judgment matrix.
Optionally, the security hierarchy model comprises two levels; the security elements of the highest level comprise a sensing layer, a network layer and an application layer; the lowest level of security elements includes: the intelligent sensor, the pluggable functional component, the distributed power supply, the edge Internet of things agent and the local communication access belong to the sensing layer, the communication network, the service network and the firewall grade belong to the network layer, and the application software safety, the application hardware safety, the development environment safety and the service safety belong to the application layer.
The device can execute the methods provided by all the embodiments of the invention, and has corresponding functional modules and beneficial effects for executing the methods. For technical details which are not described in detail in the embodiments of the present invention, reference may be made to the methods provided in all the aforementioned embodiments of the present invention.
Embodiments of the present invention also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, perform a security risk assessment method, the method comprising:
acquiring a security hierarchy structure model corresponding to a power distribution Internet of things system; wherein the security hierarchy model comprises at least two levels of security elements;
determining importance weights of all safety elements in the current level according to the sequence from low level to high level aiming at all levels of the safety level structure model, and carrying out consistency check on a judgment matrix after constructing the judgment matrix corresponding to the current level;
and when the judgment matrixes pass consistency check, performing safety risk assessment on the power distribution Internet of things system based on the importance weight of each safety element in each level.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDRRAM, SRAM, EDORAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations, such as in different computer systems that are connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided by the embodiment of the present invention includes computer-executable instructions, and the computer-executable instructions are not limited to the above security risk assessment operations, and may also perform related operations in the security risk assessment method provided by any embodiment of the present invention.
The embodiment of the invention provides electronic equipment, wherein the safety risk assessment device provided by the embodiment of the invention can be integrated in the electronic equipment. Fig. 4 is a block diagram of an electronic device according to an embodiment of the present invention. The electronic device 400 may include: a memory 401, a processor 402 and a computer program stored on the memory 401 and executable by the processor, wherein the processor 402 implements the security risk assessment method according to the embodiment of the present invention when executing the computer program.
The electronic equipment provided by the embodiment of the invention acquires a security hierarchy structure model corresponding to a power distribution Internet of things system; wherein the security hierarchy model comprises at least two levels of security elements; determining importance weights of all safety elements in the current level according to the sequence from low level to high level aiming at all levels of the safety level structure model, and carrying out consistency check on a judgment matrix after constructing the judgment matrix corresponding to the current level; and when the judgment matrixes pass consistency check, performing safety risk assessment on the power distribution Internet of things system based on the importance weight of each safety element in each level. According to the technical scheme provided by the embodiment of the invention, the risk evaluation can be carried out on the security threat of the power distribution Internet of things system more comprehensively so as to reasonably judge the security level of the power distribution Internet of things system, and the accuracy of the security risk evaluation on the power distribution Internet of things system is improved.
The security risk assessment device, the storage medium and the electronic device provided in the above embodiments may execute the security risk assessment method provided in any embodiment of the present invention, and have corresponding functional modules and beneficial effects for executing the method. For technical details that are not described in detail in the above embodiments, reference may be made to a security risk assessment method provided in any embodiment of the present invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A security risk assessment method, comprising:
acquiring a security hierarchy structure model corresponding to a power distribution Internet of things system; wherein the security hierarchy model comprises at least two levels of security elements;
determining importance weights of all safety elements in the current level according to the sequence from low level to high level aiming at all levels of the safety level structure model, and carrying out consistency check on a judgment matrix after constructing the judgment matrix corresponding to the current level;
and when the judgment matrixes pass consistency check, performing safety risk assessment on the power distribution Internet of things system based on the importance weight of each safety element in each level.
2. The method of claim 1, wherein determining the importance weight of each security element in the current hierarchy comprises:
and calculating the security weight of each security element in the current level according to the security weight of each security element in the previous level and the security element belonging to the current level.
3. The method of claim 1, wherein constructing a decision matrix corresponding to the current level comprises:
and constructing a judgment matrix corresponding to the current level based on the importance weight of each safety element in the current level.
4. The method of claim 3, wherein constructing a decision matrix corresponding to a current hierarchy based on importance weights of security elements in the current hierarchy comprises:
comparing the importance weights of all safety elements in the current level one by one, and determining the value of each element in the judgment matrix according to the comparison result; and the dimension of the judgment matrix is the same as the number of the safety elements contained in the current hierarchy.
5. The method of claim 1, wherein performing a consistency check on the decision matrix comprises:
calculating the maximum eigenvalue of the judgment matrix;
and determining a consistency verification result of the judgment matrix according to the maximum eigenvalue.
6. The method of claim 5, wherein determining the consistency verification result of the decision matrix according to the maximum eigenvalue comprises:
calculating the consistency degree of a judgment matrix according to the maximum eigenvalue and the dimensionality of the judgment matrix;
and calculating a consistency check result of the judgment matrix according to the consistency degree and a consistency check value corresponding to the judgment matrix.
7. The method of any of claims 1-6, wherein the security hierarchy model comprises two levels; the security elements of the highest level comprise a sensing layer, a network layer and an application layer; the lowest level of security elements includes: the intelligent sensor, the pluggable functional component, the distributed power supply, the edge Internet of things agent and the local communication access belong to the sensing layer, the communication network, the service network and the firewall grade belong to the network layer, and the application software safety, the application hardware safety, the development environment safety and the service safety belong to the application layer.
8. A security risk assessment apparatus, comprising:
the structure model acquisition module is used for acquiring a security hierarchy structure model corresponding to the power distribution Internet of things system; wherein the security hierarchy model comprises at least two levels of security elements;
the consistency check module is used for determining the importance weight of each safety element in the current level according to the sequence from low level to high level aiming at each level of the safety level structure model, and performing consistency check on a judgment matrix after the judgment matrix corresponding to the current level is constructed;
and the safety risk evaluation module is used for carrying out safety risk evaluation on the power distribution Internet of things system based on the importance weight of each safety element in each level when each judgment matrix passes the consistency check.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processing device, carries out a security risk assessment method according to any one of claims 1-7.
10. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the security risk assessment method according to any one of claims 1-7 when executing the computer program.
CN202110552975.5A 2021-05-20 2021-05-20 Security risk assessment method and device, storage medium and electronic equipment Pending CN113191674A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110552975.5A CN113191674A (en) 2021-05-20 2021-05-20 Security risk assessment method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110552975.5A CN113191674A (en) 2021-05-20 2021-05-20 Security risk assessment method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN113191674A true CN113191674A (en) 2021-07-30

Family

ID=76982723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110552975.5A Pending CN113191674A (en) 2021-05-20 2021-05-20 Security risk assessment method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113191674A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113676486A (en) * 2021-08-27 2021-11-19 国网浙江桐乡市供电有限公司 Edge internet of things proxy security policy

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018053934A1 (en) * 2016-09-22 2018-03-29 北京国电通网络技术有限公司 Early-warning method and early-warning apparatus for devices in power grid
CN108881250A (en) * 2018-06-28 2018-11-23 广东电网有限责任公司 Powerline network security postures prediction technique, device, equipment and storage medium
CN109102163A (en) * 2018-07-20 2018-12-28 河海大学 Power distribution network CPS methods of risk assessment based on variable weight Fuzzy AHP
CN109118074A (en) * 2018-08-03 2019-01-01 广州供电局有限公司 Electric operating methods of risk assessment, device, computer equipment and storage medium
CN110084464A (en) * 2019-03-06 2019-08-02 中国矿业大学 A kind of smart city fire risk real time evaluating method based on Internet of Things
AU2019101535A4 (en) * 2019-12-07 2020-01-23 Karamoozian, Amirhossein Mr Risk assessment in construction projects by considering interdependencies between risk factors
CN111160732A (en) * 2019-12-14 2020-05-15 国网浙江省电力有限公司 Method suitable for comprehensive evaluation of multi-station fusion safety and benefit
CN112087445A (en) * 2020-09-04 2020-12-15 全球能源互联网研究院有限公司 Electric power Internet of things security vulnerability assessment method fusing business security

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018053934A1 (en) * 2016-09-22 2018-03-29 北京国电通网络技术有限公司 Early-warning method and early-warning apparatus for devices in power grid
CN108881250A (en) * 2018-06-28 2018-11-23 广东电网有限责任公司 Powerline network security postures prediction technique, device, equipment and storage medium
CN109102163A (en) * 2018-07-20 2018-12-28 河海大学 Power distribution network CPS methods of risk assessment based on variable weight Fuzzy AHP
CN109118074A (en) * 2018-08-03 2019-01-01 广州供电局有限公司 Electric operating methods of risk assessment, device, computer equipment and storage medium
CN110084464A (en) * 2019-03-06 2019-08-02 中国矿业大学 A kind of smart city fire risk real time evaluating method based on Internet of Things
AU2019101535A4 (en) * 2019-12-07 2020-01-23 Karamoozian, Amirhossein Mr Risk assessment in construction projects by considering interdependencies between risk factors
CN111160732A (en) * 2019-12-14 2020-05-15 国网浙江省电力有限公司 Method suitable for comprehensive evaluation of multi-station fusion safety and benefit
CN112087445A (en) * 2020-09-04 2020-12-15 全球能源互联网研究院有限公司 Electric power Internet of things security vulnerability assessment method fusing business security

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113676486A (en) * 2021-08-27 2021-11-19 国网浙江桐乡市供电有限公司 Edge internet of things proxy security policy

Similar Documents

Publication Publication Date Title
CN109922032B (en) Method, device, equipment and storage medium for determining risk of logging in account
CN108833458B (en) Application recommendation method, device, medium and equipment
CN103929330B (en) Domain name service method for evaluating quality and system
CN109218304B (en) Network risk blocking method based on attack graph and co-evolution
CN113780443B (en) Threat detection-oriented network security situation assessment method
CN111931047B (en) Artificial intelligence-based black product account detection method and related device
CN107231382A (en) A kind of Cyberthreat method for situation assessment and equipment
CN110874744B (en) Data anomaly detection method and device
CN111786974A (en) Network security assessment method and device, computer equipment and storage medium
CN113468034A (en) Data quality evaluation method and device, storage medium and electronic equipment
CN112839014A (en) Method, system, device and medium for establishing model for identifying abnormal visitor
CN114021188A (en) Method and device for interactive security verification of federated learning protocol and electronic equipment
CN107645510A (en) A kind of computational methods and computing device of regional safety prevention ability
CN117376228B (en) Network security testing tool determining method and device
CN115225336A (en) Vulnerability availability calculation method and device for network environment
CN113191674A (en) Security risk assessment method and device, storage medium and electronic equipment
CN114143035A (en) Attack resisting method, system, equipment and medium for knowledge graph recommendation system
CN116346638B (en) Data tampering inference method based on power grid power and alarm information interaction verification
CN116707859A (en) Feature rule extraction method and device, and network intrusion detection method and device
CN116846612A (en) Attack chain completion method and device, electronic equipment and storage medium
CN115879819A (en) Enterprise credit evaluation method and device
CN105487936A (en) Information system security evaluation method for classified protection under cloud environment
CN113516065B (en) Data weight measuring and calculating method and device based on block chain, server and storage medium
CN115225359A (en) Honeypot data tracing method and device, computer equipment and storage medium
CN114817928A (en) Network space data fusion analysis method and system, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210730