CN113542221A - Method and system for judging tampering of sensor data of intelligent substation, electronic equipment and storage medium - Google Patents

Method and system for judging tampering of sensor data of intelligent substation, electronic equipment and storage medium Download PDF

Info

Publication number
CN113542221A
CN113542221A CN202110661451.XA CN202110661451A CN113542221A CN 113542221 A CN113542221 A CN 113542221A CN 202110661451 A CN202110661451 A CN 202110661451A CN 113542221 A CN113542221 A CN 113542221A
Authority
CN
China
Prior art keywords
data
network communication
sensor
data packet
communication data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110661451.XA
Other languages
Chinese (zh)
Other versions
CN113542221B (en
Inventor
罗云锋
谢东
余骏阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Yingdesaike Technology Co ltd
Original Assignee
Sichuan Yingdesaike Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Yingdesaike Technology Co ltd filed Critical Sichuan Yingdesaike Technology Co ltd
Priority to CN202110661451.XA priority Critical patent/CN113542221B/en
Publication of CN113542221A publication Critical patent/CN113542221A/en
Application granted granted Critical
Publication of CN113542221B publication Critical patent/CN113542221B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Small-Scale Networks (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides a method and a system for judging tampering of sensor data of an intelligent substation, electronic equipment and a storage medium, wherein the method comprises the following steps: sending a network communication data packet through an MMS protocol to report sensor data and grouping the data packet; establishing a generated countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in a site through a neural network algorithm; and judging whether the network communication data packet transmitted in the process of reporting data by each sensor acquired in real time is tampered by adopting a discriminator in the generated countermeasure model. The method can find and detect the forged and tampered network communication packets in time without specially knowing the rules of the network communication protocol among the devices, thereby ensuring the safe and stable operation of the transformer substation and the power system.

Description

Method and system for judging tampering of sensor data of intelligent substation, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of sensor data security management of an intelligent substation, in particular to a method and a system for judging tampering of sensor data of the intelligent substation, electronic equipment and a storage medium.
Background
In the intelligent substation, a large number of power system automation devices are deployed for ensuring continuous and stable operation of a power grid. A large amount of network communication is performed among these devices for exchanging information, reporting data, sending regulation instructions, and the like. However, there is a possibility that data transmitted by these devices may be tampered with in the middle, thereby causing basic functions inside the substation to be disturbed and destroyed. How to model and judge whether the network communication data is tampered through the model is a problem to be solved. The current common scheme for identifying whether data tampering exists is specifically as follows: communication data of a large number of related devices are acquired, communication protocols used by the devices are analyzed, and byte codes at specific positions, generally version numbers of the protocols, are acquired. Or some number of consecutive bytes in the protocol are fixed values. Or the length of data as specified in the protocol; establishing a feature library according to the protocol version number, the fixed byte codes continuously appearing in the protocol, the data length recorded in the protocol and the actual data length; network data is acquired in real time, and whether the data is tampered or not is judged by detecting whether a specific byte code in a communication protocol is normal or not through the identification experience of a feature library.
These common tamper-identifying methods can only identify relatively crude tamper data. If the attacker knows the communication protocol, he can also summarize a feature library for identifying tampered data, and then the attacker can tamper the data based on the rules of the feature library, so that the data is modified without being discovered. Moreover, the establishment of the feature library requires some knowledge of the communication protocols used, and knowledge of the structure of these communication protocols.
Disclosure of Invention
The invention aims to provide a method and a system for judging whether sensor data of an intelligent substation is falsified, electronic equipment and a storage medium, so as to solve the technical problem that forged and falsified network communication packets can be found and detected in time under the condition that the rules of network communication protocols among equipment do not need to be known particularly, and thus the safe and stable operation of a substation and a power system is guaranteed.
The invention provides a method for judging tampering of sensor data of an intelligent substation, which comprises the following steps:
step S1, sending network communication data packets through MMS protocol to report sensor data and group the data packets;
step S2, constructing a generation countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in the site through a neural network algorithm, wherein the generation countermeasure model comprises a generator for generating forged data and a discriminator for checking whether the generated data is forged;
and step S3, judging whether the network communication data packet sent in the process of reporting data by each sensor collected in real time is tampered by adopting a discriminator in the generated countermeasure model.
Preferably, the method for grouping the data packets in step S1 specifically includes:
step S11, labeling a network communication data packet sent in the process of reporting data by each captured sensor, where the labeled network communication data packet information includes: an IP address of the transmitting device and an IP address of the receiving device;
step S12, combining the IP address of the sending device and the IP address of the receiving device into a packet ID, and grouping the network communication data packets according to the packet ID.
Preferably, in step S2, the method for creating a countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in the site includes:
step S21, using n random numbers generated randomly by the computer as the input of the generator, the training generator can generate the fake network communication data packet similar to the network communication data packet sent in the data reporting process of each sensor;
step S22, performing discriminator model training on the network communication data packet sent in the process of reporting data by each sensor in the discriminator receiving station and the forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet sent in the process of reporting data by each sensor is tampered.
Preferably, the method further comprises the following steps: if the network communication data packet sent in the process of reporting data by each sensor is found to be tampered, sending an alarm to an operator so as to check the reason in time; otherwise, no alarm is given.
The invention also provides a system for judging tampering of sensor data of the intelligent substation, which comprises the following steps:
the data acquisition unit is used for sending a network communication data packet through an MMS protocol to report sensor data and grouping the data packet;
the system comprises a model construction unit, a data analysis unit and a data analysis unit, wherein the model construction unit is used for constructing a generation countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in a site through a neural network algorithm, and the generation countermeasure model comprises a generator for generating forged data and a discriminator for checking whether the generated data are forged or not;
and the data judgment unit is used for judging whether the network communication data packet transmitted in the process of reporting the data by each sensor acquired in real time is tampered by adopting a discriminator in the generated countermeasure model.
Preferably, the data acquisition unit includes:
a capture marking module, configured to mark a network communication data packet sent in a process of reporting data by each captured sensor, where the marked network communication data packet includes: an IP address of the transmitting device and an IP address of the receiving device;
and the data grouping module is used for combining the IP address of the sending equipment and the IP address of the receiving equipment into a grouping ID and grouping the network communication data packet according to the grouping ID.
Preferably, the model building unit includes:
the generator constructs a training module, which is used for taking n random numbers randomly generated by a computer as the input of the generator, so that the training generator can generate a forged network communication data packet which is similar to the network communication data packet sent in the data reporting process of each sensor;
and the discriminator establishing training module is used for carrying out discriminator model training on a network communication data packet sent in the process of reporting data by each sensor in the receiving station of the discriminator and a forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet sent in the process of reporting data by each sensor is falsified.
Preferably, the method further comprises the following steps:
and the alarm unit is used for giving an alarm to an operator if the network communication data packet sent in the process of reporting data by each sensor is found to be tampered.
The present invention also provides an electronic device including:
a storage medium for storing a computer program;
a processor for running the computer program; the computer program executes the method for judging tampering of the sensor data of the intelligent substation.
The present invention further provides a storage medium, where a computer program is stored on the storage medium, and when the computer program runs, the method for determining that sensor data of an intelligent substation is tampered is performed.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
according to the technical scheme provided by the invention, under the condition that the network communication protocol rules among the devices do not need to be known particularly, only a certain number of normal network communication data packets within a certain time need to be obtained, the network communication data packets among the devices in the power grid can be detected through training of the generative countermeasure model, and the forged and tampered network communication packets can be found and detected in time, so that the safe and stable operation of the transformer substation and the power system is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart of a method for determining tampering of sensor data of an intelligent substation according to embodiment 1 of the present invention.
Fig. 2 is a flowchart illustrating a specific method of step S1 in embodiment 1 of the present invention.
Fig. 3 is a flowchart illustrating a specific method of step S2 in embodiment 1 of the present invention.
Fig. 4 is a framework diagram of a system for determining tampering of sensor data of an intelligent substation according to embodiment 2 of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
As shown in fig. 1, an embodiment of the present invention provides a method for determining tampering of sensor data of an intelligent substation, including the following steps:
step S1, sending network communication data packets through MMS protocol to report sensor data and group the data packets;
step S2, constructing a generation countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in the site through a neural network algorithm, wherein the generation countermeasure model comprises a generator for generating forged data and a discriminator for checking whether the generated data is forged; the neural network algorithm can be an RNN model, a CNN model, a fully connected network and the like.
And step S3, judging whether the network communication data packet sent in the process of reporting data by each sensor collected in real time is tampered by adopting a discriminator in the generated countermeasure model.
In the embodiment of the present invention, in order to facilitate the construction of a countermeasure model of a network communication data packet reported by a sensor of an intelligent substation, as shown in fig. 2, in step S1, the method for grouping the data packets specifically includes:
step S11, labeling a network communication data packet sent in the process of reporting data by each captured sensor, where the labeled network communication data packet information includes: an IP address of the transmitting device and an IP address of the receiving device;
step S12, combining the IP address of the sending device and the IP address of the receiving device into a packet ID, and grouping the network communication data packets according to the packet ID.
The method specifically comprises the following steps: in the embodiment of the invention, grouping is performed according to a transmission channel mode, for example, N sensors are provided, each sensor reports to M devices, there are N × M channels in total, the ID of each channel is formed by combining the IP address of a sending device and the IP address of a receiving device, and finally, the constructed countermeasure model has N × M models; therefore, the channel (or line) where each sensor reports data is detected by using the corresponding confrontation model.
As shown in fig. 3, in step S2, the method for creating a countermeasure model corresponding to the network communication data packet sent in the process of reporting data by each sensor in the site includes:
step S21, using n random numbers generated randomly by the computer as the input of the generator, the training generator can generate the fake network communication data packet similar to the network communication data packet sent in the data reporting process of each sensor;
step S22, performing discriminator model training on the network communication data packet sent in the process of reporting data by each sensor in the discriminator receiving station and the forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet reported by each sensor is tampered. In addition, the discrimination rules of the discriminator are obtained through a large amount of training data, so that the discriminator has good unpredictability and abstraction, and the risk of breaking the discrimination rules by attackers tampering with the data is reduced.
The generated countermeasure model corresponding to the network communication data packet sent in the process of reporting data by each sensor in the site is based on deep learning, the generated countermeasure network models communication data between devices, and the network communication data packet forged by the generator is highly similar to a real network communication data packet along with model training. The discriminator receives the fake network communication data packet and the real network communication data packet as input, and the fake network communication data packet and the real network communication data packet are confronted and evolved mutually through the generator and the discriminator, so that the discriminator can better and better distinguish the real data packet from the fake data packet.
Still another embodiment of the present invention further comprises: if the network communication data packet sent in the process of reporting data by each sensor is found to be tampered, sending an alarm to an operator so as to check the reason in time; otherwise, no alarm is given.
Example 2
As shown in fig. 4, an embodiment of the present invention provides a system for determining that sensor data of an intelligent substation is tampered, including:
the data acquisition unit 10 is used for sending a network communication data packet through an MMS protocol to report sensor data and grouping the data packet;
the model building unit 20 is configured to build, through a neural network algorithm, a generative confrontation model corresponding to a network communication data packet sent in a process of reporting data by each sensor in a site, where the generative confrontation model includes a generator for generating counterfeit data and a discriminator for checking whether the generated data is counterfeit;
and the data judgment unit 30 is configured to judge whether a network communication data packet sent in a process of reporting data by each sensor collected in real time is tampered with by using a discriminator in a generated countermeasure model.
The data acquisition unit 10 includes:
a capture marking module, configured to mark a network communication data packet sent in a process of reporting data by each captured sensor, where the marked network communication data packet includes: an IP address of the transmitting device and an IP address of the receiving device;
and the data grouping module is used for combining the IP address of the sending equipment and the IP address of the receiving equipment into a grouping ID and grouping the network communication data packet according to the grouping ID.
The model building unit 20 includes:
the generator constructs a training module, which is used for taking n random numbers randomly generated by a computer as the input of the generator, so that the training generator can generate a forged network communication data packet which is similar to the network communication data packet sent in the data reporting process of each sensor;
and the discriminator establishing training module is used for carrying out discriminator model training on a network communication data packet sent in the process of reporting data by each sensor in the receiving station of the discriminator and a forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet sent in the process of reporting data by each sensor is falsified.
The embodiment of the invention also comprises an alarm unit, wherein the alarm unit is used for giving an alarm to an operator if the network communication data packet reported by the sensor is found to be tampered.
The embodiment of the invention generates the countermeasure network based on deep learning, does not need the precondition of complex characteristic engineering, namely does not need to have high cognition and related experience on a communication protocol; namely, a characteristic library for identifying falsified data is not required to be analyzed and manufactured according to the rules of the network communication protocol, and modeling can be performed only by collecting a large amount of real data; the scheme for identifying the network data tampering behavior can be realized, the flow of characteristic engineering is simplified, and the implementation and popularization are facilitated. The ability of both the "tamperer" and the "recognizer" can be continually enhanced by creating a countermeasure network, so that the feature library of the final "recognizer" is very abstract and rich, and the "recognizer" cannot be easily fooled by the tamperer.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, systems, and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
From the above, another embodiment of the present invention further provides a storage medium, where the storage medium stores a computer program, and the computer program executes the method for determining that the sensor data of the intelligent substation is tampered with, according to embodiment 1.
Accordingly, another embodiment of the present invention further provides an electronic device, including:
a storage medium for storing a computer program;
a processor for running the computer program; when the computer program runs, the method for judging that the sensor data of the intelligent substation is tampered in embodiment 1 is executed.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for judging tampering of sensor data of an intelligent substation is characterized by comprising the following steps:
step S1, sending network communication data packets through MMS protocol to report sensor data and group the data packets;
step S2, constructing a generation countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in the site through a neural network algorithm, wherein the generation countermeasure model comprises a generator for generating forged data and a discriminator for checking whether the generated data is forged;
and step S3, judging whether the network communication data packet sent in the process of reporting data by each sensor collected in real time is tampered by adopting a discriminator in the generated countermeasure model.
2. The method for judging whether sensor data of the intelligent substation is tampered according to claim 1, wherein the grouping method of the data packets in step S1 is specifically as follows:
step S11, labeling a network communication data packet sent in the process of reporting data by each captured sensor, where the labeled network communication data packet information includes: an IP address of the transmitting device and an IP address of the receiving device;
step S12, combining the IP address of the sending device and the IP address of the receiving device into a packet ID, and grouping the network communication data packets according to the packet ID.
3. The method for judging the tampering of the sensor data of the intelligent substation according to claim 1, wherein the method for generating the countermeasure model corresponding to the network communication data packet sent in the process of constructing the data reported by each sensor in the site in step 2 comprises:
step S21, using n random numbers generated randomly by the computer as the input of the generator, the training generator can generate the fake network communication data packet similar to the network communication data packet sent in the process of reporting data by each sensor;
step S22, performing discriminator model training on the network communication data packet sent in the process of reporting data by each sensor in the discriminator receiving station and the forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet sent in the process of reporting data by each sensor is tampered.
4. The method for determining tampering of sensor data of an intelligent substation according to claim 1, further comprising: if the network communication data packet sent in the process of reporting data by each sensor is found to be tampered, sending an alarm to an operator so as to check the reason in time; otherwise, no alarm is given.
5. A system for judging whether sensor data of an intelligent substation is tampered is characterized by comprising the following steps:
the data acquisition unit is used for sending a network communication data packet through an MMS protocol to report sensor data and grouping the data packet;
the system comprises a model construction unit, a data analysis unit and a data analysis unit, wherein the model construction unit is used for constructing a generation countermeasure model corresponding to a network communication data packet sent in the process of reporting data by each sensor in a site through a neural network algorithm, and the generation countermeasure model comprises a generator for generating forged data and a discriminator for checking whether the generated data are forged or not;
and the data judgment unit is used for judging whether the network communication data packet transmitted in the process of reporting the data by each sensor acquired in real time is tampered by adopting a discriminator in the generated countermeasure model.
6. The system for determining tampering of sensor data of an intelligent substation according to claim 5, wherein the data acquisition unit includes:
a capture marking module, configured to mark a network communication data packet sent in a process of reporting data by each captured sensor, where the marked network communication data packet includes: an IP address of the transmitting device and an IP address of the receiving device;
and the data grouping module is used for combining the IP address of the sending equipment and the IP address of the receiving equipment into a grouping ID and grouping the network communication data according to the grouping ID.
7. The system for determining tampering of sensor data of an intelligent substation according to claim 5, wherein the model building unit includes:
the generator constructs a training module, which is used for taking n random numbers randomly generated by a computer as the input of the generator, so that the training generator can generate a forged network communication data packet which is similar to the network communication data packet sent in the data reporting process of each sensor;
and the discriminator establishing training module is used for carrying out discriminator model training on a network communication data packet sent in the process of reporting data by each sensor in the receiving station of the discriminator and a forged network communication data packet generated by the generator, so that the discriminator can distinguish whether the network communication data packet sent in the process of reporting data by each sensor is falsified.
8. The system for determining tampering of sensor data of an intelligent substation according to claim 5, further comprising:
and the alarm unit is used for giving an alarm to an operator if the network communication data packet sent in the process of reporting data by each sensor is found to be tampered.
9. An electronic device, comprising:
a storage medium for storing a computer program;
a processor for running the computer program; the computer program is run to execute the method for determining tampering of sensor data of an intelligent substation according to any one of claims 1 to 4.
10. A storage medium, characterized in that the storage medium has a computer program stored thereon, and the computer program is executed to execute the method for determining whether sensor data of an intelligent substation is tampered according to any one of claims 1 to 4.
CN202110661451.XA 2021-06-15 2021-06-15 Method and system for judging falsification of sensor data of intelligent substation, electronic equipment and storage medium Active CN113542221B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110661451.XA CN113542221B (en) 2021-06-15 2021-06-15 Method and system for judging falsification of sensor data of intelligent substation, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110661451.XA CN113542221B (en) 2021-06-15 2021-06-15 Method and system for judging falsification of sensor data of intelligent substation, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113542221A true CN113542221A (en) 2021-10-22
CN113542221B CN113542221B (en) 2023-11-03

Family

ID=78096078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110661451.XA Active CN113542221B (en) 2021-06-15 2021-06-15 Method and system for judging falsification of sensor data of intelligent substation, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113542221B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306896A (en) * 2018-03-29 2018-07-20 上海交通大学 A kind of substation's condition monitoring system and method with data protection function
CN109086658A (en) * 2018-06-08 2018-12-25 中国科学院计算技术研究所 A kind of sensing data generation method and system based on generation confrontation network
CN110012019A (en) * 2019-04-11 2019-07-12 鸿秦(北京)科技有限公司 A kind of network inbreak detection method and device based on confrontation model
CN110351536A (en) * 2019-08-20 2019-10-18 深圳江行联加智能科技有限公司 A kind of substation abnormality detection system, method and device
CN110379036A (en) * 2019-06-26 2019-10-25 广东康云科技有限公司 Intelligent substation patrol recognition methods, system, device and storage medium
CN110458185A (en) * 2019-06-26 2019-11-15 平安科技(深圳)有限公司 Image-recognizing method and device, storage medium, computer equipment
CN111049843A (en) * 2019-12-18 2020-04-21 国网浙江省电力有限公司宁波供电公司 Intelligent substation network abnormal flow analysis method
US20220198609A1 (en) * 2019-06-10 2022-06-23 Daniel M. Keysers Modifying sensor data using generative adversarial models

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108306896A (en) * 2018-03-29 2018-07-20 上海交通大学 A kind of substation's condition monitoring system and method with data protection function
CN109086658A (en) * 2018-06-08 2018-12-25 中国科学院计算技术研究所 A kind of sensing data generation method and system based on generation confrontation network
CN110012019A (en) * 2019-04-11 2019-07-12 鸿秦(北京)科技有限公司 A kind of network inbreak detection method and device based on confrontation model
US20220198609A1 (en) * 2019-06-10 2022-06-23 Daniel M. Keysers Modifying sensor data using generative adversarial models
CN110379036A (en) * 2019-06-26 2019-10-25 广东康云科技有限公司 Intelligent substation patrol recognition methods, system, device and storage medium
CN110458185A (en) * 2019-06-26 2019-11-15 平安科技(深圳)有限公司 Image-recognizing method and device, storage medium, computer equipment
CN110351536A (en) * 2019-08-20 2019-10-18 深圳江行联加智能科技有限公司 A kind of substation abnormality detection system, method and device
CN111049843A (en) * 2019-12-18 2020-04-21 国网浙江省电力有限公司宁波供电公司 Intelligent substation network abnormal flow analysis method

Also Published As

Publication number Publication date
CN113542221B (en) 2023-11-03

Similar Documents

Publication Publication Date Title
CN109167796B (en) Deep packet inspection platform based on industrial SCADA system
CN110597734B (en) Fuzzy test case generation method suitable for industrial control private protocol
CN109600363A (en) A kind of internet-of-things terminal network portrait and abnormal network access behavioral value method
CN109861988A (en) A kind of industrial control system intrusion detection method based on integrated study
CN101447991A (en) Test device used for testing intrusion detection system and test method thereof
CN110719275A (en) Method for detecting power terminal vulnerability attack based on message characteristics
CN104052730A (en) Intelligent Cyberphysical Intrusion Detection And Prevention Systems And Methods For Industrial Control Systems
CN111885060B (en) Internet of vehicles-oriented nondestructive information security vulnerability detection system and method
CN110086810A (en) Passive type industrial control equipment fingerprint identification method and device based on characteristic behavior analysis
CN114124478A (en) Power system industrial control flow abnormity detection method and system
CN113132392B (en) Industrial control network flow abnormity detection method, device and system
CN110324323A (en) A kind of new energy plant stand relates to net end real-time, interactive process exception detection method and system
CN112560029A (en) Website content monitoring and automatic response protection method based on intelligent analysis technology
CN101499928A (en) Network intrusion scene chart generation method based on cluster analysis
CN113259367B (en) Industrial control network flow multistage anomaly detection method and device
CN101552778B (en) Construction method of attacker model in automatic detection of safety protocol
CN113542221B (en) Method and system for judging falsification of sensor data of intelligent substation, electronic equipment and storage medium
Whalen et al. Hidden markov models for automated protocol learning
CN114124834B (en) Integrated learning device and method for ICMP hidden tunnel detection in industrial control network
KR102272863B1 (en) Apparatus and method for detecting abnormal status
Hoeve Detecting intrusions in encrypted control traffic
CN113159992A (en) Method and device for classifying behavior patterns of closed-source power engineering control system
CN113824724B (en) Method and device for judging tampered sensor data of intelligent substation and storage medium
CN116366512A (en) Test case generation method and device and computer readable storage medium
CN117978702A (en) Power protocol fuzzy test method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant