CN113542221A - Method and system for judging tampering of sensor data of intelligent substation, electronic equipment and storage medium - Google Patents
Method and system for judging tampering of sensor data of intelligent substation, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN113542221A CN113542221A CN202110661451.XA CN202110661451A CN113542221A CN 113542221 A CN113542221 A CN 113542221A CN 202110661451 A CN202110661451 A CN 202110661451A CN 113542221 A CN113542221 A CN 113542221A
- Authority
- CN
- China
- Prior art keywords
- data
- network communication
- sensor
- data packet
- communication data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 79
- 238000004891 communication Methods 0.000 claims abstract description 105
- 230000008569 process Effects 0.000 claims abstract description 46
- 238000013528 artificial neural network Methods 0.000 claims abstract description 8
- 238000012549 training Methods 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 19
- 238000010276 construction Methods 0.000 claims description 5
- 238000007405 data analysis Methods 0.000 claims description 4
- 238000002372 labelling Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 3
- 238000013135 deep learning Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000019771 cognition Effects 0.000 description 1
- 238000013527 convolutional neural network Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/21—Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
- G06F18/214—Generating training patterns; Bootstrap methods, e.g. bagging or boosting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Small-Scale Networks (AREA)
- Alarm Systems (AREA)
Abstract
The invention provides a method and a system for judging tampering of sensor data of an intelligent substation, electronic equipment and a storage medium, wherein the method comprises the following steps: sending a network communication data packet through an MMS protocol to report sensor data and grouping the data packet; establishing a generated countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in a site through a neural network algorithm; and judging whether the network communication data packet transmitted in the process of reporting data by each sensor acquired in real time is tampered by adopting a discriminator in the generated countermeasure model. The method can find and detect the forged and tampered network communication packets in time without specially knowing the rules of the network communication protocol among the devices, thereby ensuring the safe and stable operation of the transformer substation and the power system.
Description
Technical Field
The invention relates to the technical field of sensor data security management of an intelligent substation, in particular to a method and a system for judging tampering of sensor data of the intelligent substation, electronic equipment and a storage medium.
Background
In the intelligent substation, a large number of power system automation devices are deployed for ensuring continuous and stable operation of a power grid. A large amount of network communication is performed among these devices for exchanging information, reporting data, sending regulation instructions, and the like. However, there is a possibility that data transmitted by these devices may be tampered with in the middle, thereby causing basic functions inside the substation to be disturbed and destroyed. How to model and judge whether the network communication data is tampered through the model is a problem to be solved. The current common scheme for identifying whether data tampering exists is specifically as follows: communication data of a large number of related devices are acquired, communication protocols used by the devices are analyzed, and byte codes at specific positions, generally version numbers of the protocols, are acquired. Or some number of consecutive bytes in the protocol are fixed values. Or the length of data as specified in the protocol; establishing a feature library according to the protocol version number, the fixed byte codes continuously appearing in the protocol, the data length recorded in the protocol and the actual data length; network data is acquired in real time, and whether the data is tampered or not is judged by detecting whether a specific byte code in a communication protocol is normal or not through the identification experience of a feature library.
These common tamper-identifying methods can only identify relatively crude tamper data. If the attacker knows the communication protocol, he can also summarize a feature library for identifying tampered data, and then the attacker can tamper the data based on the rules of the feature library, so that the data is modified without being discovered. Moreover, the establishment of the feature library requires some knowledge of the communication protocols used, and knowledge of the structure of these communication protocols.
Disclosure of Invention
The invention aims to provide a method and a system for judging whether sensor data of an intelligent substation is falsified, electronic equipment and a storage medium, so as to solve the technical problem that forged and falsified network communication packets can be found and detected in time under the condition that the rules of network communication protocols among equipment do not need to be known particularly, and thus the safe and stable operation of a substation and a power system is guaranteed.
The invention provides a method for judging tampering of sensor data of an intelligent substation, which comprises the following steps:
step S1, sending network communication data packets through MMS protocol to report sensor data and group the data packets;
step S2, constructing a generation countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in the site through a neural network algorithm, wherein the generation countermeasure model comprises a generator for generating forged data and a discriminator for checking whether the generated data is forged;
and step S3, judging whether the network communication data packet sent in the process of reporting data by each sensor collected in real time is tampered by adopting a discriminator in the generated countermeasure model.
Preferably, the method for grouping the data packets in step S1 specifically includes:
step S11, labeling a network communication data packet sent in the process of reporting data by each captured sensor, where the labeled network communication data packet information includes: an IP address of the transmitting device and an IP address of the receiving device;
step S12, combining the IP address of the sending device and the IP address of the receiving device into a packet ID, and grouping the network communication data packets according to the packet ID.
Preferably, in step S2, the method for creating a countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in the site includes:
step S21, using n random numbers generated randomly by the computer as the input of the generator, the training generator can generate the fake network communication data packet similar to the network communication data packet sent in the data reporting process of each sensor;
step S22, performing discriminator model training on the network communication data packet sent in the process of reporting data by each sensor in the discriminator receiving station and the forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet sent in the process of reporting data by each sensor is tampered.
Preferably, the method further comprises the following steps: if the network communication data packet sent in the process of reporting data by each sensor is found to be tampered, sending an alarm to an operator so as to check the reason in time; otherwise, no alarm is given.
The invention also provides a system for judging tampering of sensor data of the intelligent substation, which comprises the following steps:
the data acquisition unit is used for sending a network communication data packet through an MMS protocol to report sensor data and grouping the data packet;
the system comprises a model construction unit, a data analysis unit and a data analysis unit, wherein the model construction unit is used for constructing a generation countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in a site through a neural network algorithm, and the generation countermeasure model comprises a generator for generating forged data and a discriminator for checking whether the generated data are forged or not;
and the data judgment unit is used for judging whether the network communication data packet transmitted in the process of reporting the data by each sensor acquired in real time is tampered by adopting a discriminator in the generated countermeasure model.
Preferably, the data acquisition unit includes:
a capture marking module, configured to mark a network communication data packet sent in a process of reporting data by each captured sensor, where the marked network communication data packet includes: an IP address of the transmitting device and an IP address of the receiving device;
and the data grouping module is used for combining the IP address of the sending equipment and the IP address of the receiving equipment into a grouping ID and grouping the network communication data packet according to the grouping ID.
Preferably, the model building unit includes:
the generator constructs a training module, which is used for taking n random numbers randomly generated by a computer as the input of the generator, so that the training generator can generate a forged network communication data packet which is similar to the network communication data packet sent in the data reporting process of each sensor;
and the discriminator establishing training module is used for carrying out discriminator model training on a network communication data packet sent in the process of reporting data by each sensor in the receiving station of the discriminator and a forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet sent in the process of reporting data by each sensor is falsified.
Preferably, the method further comprises the following steps:
and the alarm unit is used for giving an alarm to an operator if the network communication data packet sent in the process of reporting data by each sensor is found to be tampered.
The present invention also provides an electronic device including:
a storage medium for storing a computer program;
a processor for running the computer program; the computer program executes the method for judging tampering of the sensor data of the intelligent substation.
The present invention further provides a storage medium, where a computer program is stored on the storage medium, and when the computer program runs, the method for determining that sensor data of an intelligent substation is tampered is performed.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
according to the technical scheme provided by the invention, under the condition that the network communication protocol rules among the devices do not need to be known particularly, only a certain number of normal network communication data packets within a certain time need to be obtained, the network communication data packets among the devices in the power grid can be detected through training of the generative countermeasure model, and the forged and tampered network communication packets can be found and detected in time, so that the safe and stable operation of the transformer substation and the power system is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart of a method for determining tampering of sensor data of an intelligent substation according to embodiment 1 of the present invention.
Fig. 2 is a flowchart illustrating a specific method of step S1 in embodiment 1 of the present invention.
Fig. 3 is a flowchart illustrating a specific method of step S2 in embodiment 1 of the present invention.
Fig. 4 is a framework diagram of a system for determining tampering of sensor data of an intelligent substation according to embodiment 2 of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
As shown in fig. 1, an embodiment of the present invention provides a method for determining tampering of sensor data of an intelligent substation, including the following steps:
step S1, sending network communication data packets through MMS protocol to report sensor data and group the data packets;
step S2, constructing a generation countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in the site through a neural network algorithm, wherein the generation countermeasure model comprises a generator for generating forged data and a discriminator for checking whether the generated data is forged; the neural network algorithm can be an RNN model, a CNN model, a fully connected network and the like.
And step S3, judging whether the network communication data packet sent in the process of reporting data by each sensor collected in real time is tampered by adopting a discriminator in the generated countermeasure model.
In the embodiment of the present invention, in order to facilitate the construction of a countermeasure model of a network communication data packet reported by a sensor of an intelligent substation, as shown in fig. 2, in step S1, the method for grouping the data packets specifically includes:
step S11, labeling a network communication data packet sent in the process of reporting data by each captured sensor, where the labeled network communication data packet information includes: an IP address of the transmitting device and an IP address of the receiving device;
step S12, combining the IP address of the sending device and the IP address of the receiving device into a packet ID, and grouping the network communication data packets according to the packet ID.
The method specifically comprises the following steps: in the embodiment of the invention, grouping is performed according to a transmission channel mode, for example, N sensors are provided, each sensor reports to M devices, there are N × M channels in total, the ID of each channel is formed by combining the IP address of a sending device and the IP address of a receiving device, and finally, the constructed countermeasure model has N × M models; therefore, the channel (or line) where each sensor reports data is detected by using the corresponding confrontation model.
As shown in fig. 3, in step S2, the method for creating a countermeasure model corresponding to the network communication data packet sent in the process of reporting data by each sensor in the site includes:
step S21, using n random numbers generated randomly by the computer as the input of the generator, the training generator can generate the fake network communication data packet similar to the network communication data packet sent in the data reporting process of each sensor;
step S22, performing discriminator model training on the network communication data packet sent in the process of reporting data by each sensor in the discriminator receiving station and the forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet reported by each sensor is tampered. In addition, the discrimination rules of the discriminator are obtained through a large amount of training data, so that the discriminator has good unpredictability and abstraction, and the risk of breaking the discrimination rules by attackers tampering with the data is reduced.
The generated countermeasure model corresponding to the network communication data packet sent in the process of reporting data by each sensor in the site is based on deep learning, the generated countermeasure network models communication data between devices, and the network communication data packet forged by the generator is highly similar to a real network communication data packet along with model training. The discriminator receives the fake network communication data packet and the real network communication data packet as input, and the fake network communication data packet and the real network communication data packet are confronted and evolved mutually through the generator and the discriminator, so that the discriminator can better and better distinguish the real data packet from the fake data packet.
Still another embodiment of the present invention further comprises: if the network communication data packet sent in the process of reporting data by each sensor is found to be tampered, sending an alarm to an operator so as to check the reason in time; otherwise, no alarm is given.
Example 2
As shown in fig. 4, an embodiment of the present invention provides a system for determining that sensor data of an intelligent substation is tampered, including:
the data acquisition unit 10 is used for sending a network communication data packet through an MMS protocol to report sensor data and grouping the data packet;
the model building unit 20 is configured to build, through a neural network algorithm, a generative confrontation model corresponding to a network communication data packet sent in a process of reporting data by each sensor in a site, where the generative confrontation model includes a generator for generating counterfeit data and a discriminator for checking whether the generated data is counterfeit;
and the data judgment unit 30 is configured to judge whether a network communication data packet sent in a process of reporting data by each sensor collected in real time is tampered with by using a discriminator in a generated countermeasure model.
The data acquisition unit 10 includes:
a capture marking module, configured to mark a network communication data packet sent in a process of reporting data by each captured sensor, where the marked network communication data packet includes: an IP address of the transmitting device and an IP address of the receiving device;
and the data grouping module is used for combining the IP address of the sending equipment and the IP address of the receiving equipment into a grouping ID and grouping the network communication data packet according to the grouping ID.
The model building unit 20 includes:
the generator constructs a training module, which is used for taking n random numbers randomly generated by a computer as the input of the generator, so that the training generator can generate a forged network communication data packet which is similar to the network communication data packet sent in the data reporting process of each sensor;
and the discriminator establishing training module is used for carrying out discriminator model training on a network communication data packet sent in the process of reporting data by each sensor in the receiving station of the discriminator and a forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet sent in the process of reporting data by each sensor is falsified.
The embodiment of the invention also comprises an alarm unit, wherein the alarm unit is used for giving an alarm to an operator if the network communication data packet reported by the sensor is found to be tampered.
The embodiment of the invention generates the countermeasure network based on deep learning, does not need the precondition of complex characteristic engineering, namely does not need to have high cognition and related experience on a communication protocol; namely, a characteristic library for identifying falsified data is not required to be analyzed and manufactured according to the rules of the network communication protocol, and modeling can be performed only by collecting a large amount of real data; the scheme for identifying the network data tampering behavior can be realized, the flow of characteristic engineering is simplified, and the implementation and popularization are facilitated. The ability of both the "tamperer" and the "recognizer" can be continually enhanced by creating a countermeasure network, so that the feature library of the final "recognizer" is very abstract and rich, and the "recognizer" cannot be easily fooled by the tamperer.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, systems, and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
From the above, another embodiment of the present invention further provides a storage medium, where the storage medium stores a computer program, and the computer program executes the method for determining that the sensor data of the intelligent substation is tampered with, according to embodiment 1.
Accordingly, another embodiment of the present invention further provides an electronic device, including:
a storage medium for storing a computer program;
a processor for running the computer program; when the computer program runs, the method for judging that the sensor data of the intelligent substation is tampered in embodiment 1 is executed.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A method for judging tampering of sensor data of an intelligent substation is characterized by comprising the following steps:
step S1, sending network communication data packets through MMS protocol to report sensor data and group the data packets;
step S2, constructing a generation countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in the site through a neural network algorithm, wherein the generation countermeasure model comprises a generator for generating forged data and a discriminator for checking whether the generated data is forged;
and step S3, judging whether the network communication data packet sent in the process of reporting data by each sensor collected in real time is tampered by adopting a discriminator in the generated countermeasure model.
2. The method for judging whether sensor data of the intelligent substation is tampered according to claim 1, wherein the grouping method of the data packets in step S1 is specifically as follows:
step S11, labeling a network communication data packet sent in the process of reporting data by each captured sensor, where the labeled network communication data packet information includes: an IP address of the transmitting device and an IP address of the receiving device;
step S12, combining the IP address of the sending device and the IP address of the receiving device into a packet ID, and grouping the network communication data packets according to the packet ID.
3. The method for judging the tampering of the sensor data of the intelligent substation according to claim 1, wherein the method for generating the countermeasure model corresponding to the network communication data packet sent in the process of constructing the data reported by each sensor in the site in step 2 comprises:
step S21, using n random numbers generated randomly by the computer as the input of the generator, the training generator can generate the fake network communication data packet similar to the network communication data packet sent in the process of reporting data by each sensor;
step S22, performing discriminator model training on the network communication data packet sent in the process of reporting data by each sensor in the discriminator receiving station and the forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet sent in the process of reporting data by each sensor is tampered.
4. The method for determining tampering of sensor data of an intelligent substation according to claim 1, further comprising: if the network communication data packet sent in the process of reporting data by each sensor is found to be tampered, sending an alarm to an operator so as to check the reason in time; otherwise, no alarm is given.
5. A system for judging whether sensor data of an intelligent substation is tampered is characterized by comprising the following steps:
the data acquisition unit is used for sending a network communication data packet through an MMS protocol to report sensor data and grouping the data packet;
the system comprises a model construction unit, a data analysis unit and a data analysis unit, wherein the model construction unit is used for constructing a generation countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in a site through a neural network algorithm, and the generation countermeasure model comprises a generator for generating forged data and a discriminator for checking whether the generated data are forged or not;
and the data judgment unit is used for judging whether the network communication data packet transmitted in the process of reporting the data by each sensor acquired in real time is tampered by adopting a discriminator in the generated countermeasure model.
6. The system for determining tampering of sensor data of an intelligent substation according to claim 5, wherein the data acquisition unit includes:
a capture marking module, configured to mark a network communication data packet sent in a process of reporting data by each captured sensor, where the marked network communication data packet includes: an IP address of the transmitting device and an IP address of the receiving device;
and the data grouping module is used for combining the IP address of the sending equipment and the IP address of the receiving equipment into a grouping ID and grouping the network communication data according to the grouping ID.
7. The system for determining tampering of sensor data of an intelligent substation according to claim 5, wherein the model building unit includes:
the generator constructs a training module, which is used for taking n random numbers randomly generated by a computer as the input of the generator, so that the training generator can generate a forged network communication data packet which is similar to the network communication data packet sent in the data reporting process of each sensor;
and the discriminator establishing training module is used for carrying out discriminator model training on a network communication data packet sent in the process of reporting data by each sensor in the receiving station of the discriminator and a forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet sent in the process of reporting data by each sensor is falsified.
8. The system for determining tampering of sensor data of an intelligent substation according to claim 5, further comprising:
and the alarm unit is used for giving an alarm to an operator if the network communication data packet sent in the process of reporting data by each sensor is found to be tampered.
9. An electronic device, comprising:
a storage medium for storing a computer program;
a processor for running the computer program; the computer program is run to execute the method for determining tampering of sensor data of an intelligent substation according to any one of claims 1 to 4.
10. A storage medium, characterized in that the storage medium has a computer program stored thereon, and the computer program is executed to execute the method for determining whether sensor data of an intelligent substation is tampered according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110661451.XA CN113542221B (en) | 2021-06-15 | 2021-06-15 | Method and system for judging falsification of sensor data of intelligent substation, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110661451.XA CN113542221B (en) | 2021-06-15 | 2021-06-15 | Method and system for judging falsification of sensor data of intelligent substation, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113542221A true CN113542221A (en) | 2021-10-22 |
CN113542221B CN113542221B (en) | 2023-11-03 |
Family
ID=78096078
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110661451.XA Active CN113542221B (en) | 2021-06-15 | 2021-06-15 | Method and system for judging falsification of sensor data of intelligent substation, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113542221B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108306896A (en) * | 2018-03-29 | 2018-07-20 | 上海交通大学 | A kind of substation's condition monitoring system and method with data protection function |
CN109086658A (en) * | 2018-06-08 | 2018-12-25 | 中国科学院计算技术研究所 | A kind of sensing data generation method and system based on generation confrontation network |
CN110012019A (en) * | 2019-04-11 | 2019-07-12 | 鸿秦(北京)科技有限公司 | A kind of network inbreak detection method and device based on confrontation model |
CN110351536A (en) * | 2019-08-20 | 2019-10-18 | 深圳江行联加智能科技有限公司 | A kind of substation abnormality detection system, method and device |
CN110379036A (en) * | 2019-06-26 | 2019-10-25 | 广东康云科技有限公司 | Intelligent substation patrol recognition methods, system, device and storage medium |
CN110458185A (en) * | 2019-06-26 | 2019-11-15 | 平安科技(深圳)有限公司 | Image-recognizing method and device, storage medium, computer equipment |
CN111049843A (en) * | 2019-12-18 | 2020-04-21 | 国网浙江省电力有限公司宁波供电公司 | Intelligent substation network abnormal flow analysis method |
US20220198609A1 (en) * | 2019-06-10 | 2022-06-23 | Daniel M. Keysers | Modifying sensor data using generative adversarial models |
-
2021
- 2021-06-15 CN CN202110661451.XA patent/CN113542221B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108306896A (en) * | 2018-03-29 | 2018-07-20 | 上海交通大学 | A kind of substation's condition monitoring system and method with data protection function |
CN109086658A (en) * | 2018-06-08 | 2018-12-25 | 中国科学院计算技术研究所 | A kind of sensing data generation method and system based on generation confrontation network |
CN110012019A (en) * | 2019-04-11 | 2019-07-12 | 鸿秦(北京)科技有限公司 | A kind of network inbreak detection method and device based on confrontation model |
US20220198609A1 (en) * | 2019-06-10 | 2022-06-23 | Daniel M. Keysers | Modifying sensor data using generative adversarial models |
CN110379036A (en) * | 2019-06-26 | 2019-10-25 | 广东康云科技有限公司 | Intelligent substation patrol recognition methods, system, device and storage medium |
CN110458185A (en) * | 2019-06-26 | 2019-11-15 | 平安科技(深圳)有限公司 | Image-recognizing method and device, storage medium, computer equipment |
CN110351536A (en) * | 2019-08-20 | 2019-10-18 | 深圳江行联加智能科技有限公司 | A kind of substation abnormality detection system, method and device |
CN111049843A (en) * | 2019-12-18 | 2020-04-21 | 国网浙江省电力有限公司宁波供电公司 | Intelligent substation network abnormal flow analysis method |
Also Published As
Publication number | Publication date |
---|---|
CN113542221B (en) | 2023-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109167796B (en) | Deep packet inspection platform based on industrial SCADA system | |
CN110597734B (en) | Fuzzy test case generation method suitable for industrial control private protocol | |
CN109600363A (en) | A kind of internet-of-things terminal network portrait and abnormal network access behavioral value method | |
CN109861988A (en) | A kind of industrial control system intrusion detection method based on integrated study | |
CN101447991A (en) | Test device used for testing intrusion detection system and test method thereof | |
CN110719275A (en) | Method for detecting power terminal vulnerability attack based on message characteristics | |
CN104052730A (en) | Intelligent Cyberphysical Intrusion Detection And Prevention Systems And Methods For Industrial Control Systems | |
CN111885060B (en) | Internet of vehicles-oriented nondestructive information security vulnerability detection system and method | |
CN110086810A (en) | Passive type industrial control equipment fingerprint identification method and device based on characteristic behavior analysis | |
CN114124478A (en) | Power system industrial control flow abnormity detection method and system | |
CN113132392B (en) | Industrial control network flow abnormity detection method, device and system | |
CN110324323A (en) | A kind of new energy plant stand relates to net end real-time, interactive process exception detection method and system | |
CN112560029A (en) | Website content monitoring and automatic response protection method based on intelligent analysis technology | |
CN101499928A (en) | Network intrusion scene chart generation method based on cluster analysis | |
CN113259367B (en) | Industrial control network flow multistage anomaly detection method and device | |
CN101552778B (en) | Construction method of attacker model in automatic detection of safety protocol | |
CN113542221B (en) | Method and system for judging falsification of sensor data of intelligent substation, electronic equipment and storage medium | |
Whalen et al. | Hidden markov models for automated protocol learning | |
CN114124834B (en) | Integrated learning device and method for ICMP hidden tunnel detection in industrial control network | |
KR102272863B1 (en) | Apparatus and method for detecting abnormal status | |
Hoeve | Detecting intrusions in encrypted control traffic | |
CN113159992A (en) | Method and device for classifying behavior patterns of closed-source power engineering control system | |
CN113824724B (en) | Method and device for judging tampered sensor data of intelligent substation and storage medium | |
CN116366512A (en) | Test case generation method and device and computer readable storage medium | |
CN117978702A (en) | Power protocol fuzzy test method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |