CN114844676A - Network security threat emergency disposal system and method for power monitoring system - Google Patents

Network security threat emergency disposal system and method for power monitoring system Download PDF

Info

Publication number
CN114844676A
CN114844676A CN202210345140.7A CN202210345140A CN114844676A CN 114844676 A CN114844676 A CN 114844676A CN 202210345140 A CN202210345140 A CN 202210345140A CN 114844676 A CN114844676 A CN 114844676A
Authority
CN
China
Prior art keywords
stop control
control
console
message
remote
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210345140.7A
Other languages
Chinese (zh)
Other versions
CN114844676B (en
Inventor
张晓�
李勃
王友怀
陈孝明
蔡勇
梁野
王春艳
宁志言
李慧勋
卢浩
高英健
邵立嵩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kedong Electric Power Control System Co Ltd
State Grid Hubei Electric Power Co Ltd
Original Assignee
Beijing Kedong Electric Power Control System Co Ltd
State Grid Hubei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kedong Electric Power Control System Co Ltd, State Grid Hubei Electric Power Co Ltd filed Critical Beijing Kedong Electric Power Control System Co Ltd
Priority to CN202210345140.7A priority Critical patent/CN114844676B/en
Publication of CN114844676A publication Critical patent/CN114844676A/en
Application granted granted Critical
Publication of CN114844676B publication Critical patent/CN114844676B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The invention discloses a power monitoring system network security threat emergency disposal system and a method thereof, wherein the system comprises a stop control console, a data exchange device and stop control equipment, the stop control console and the data exchange device and the stop control equipment are connected and communicated through a physical local area network, and the physical local area network is a small physical network formed by connecting in a physical mode. The emergency disposal system can accurately detect and diagnose when a threat event is happening in the power monitoring system network, and timely blocks further diffusion of the threat event, thereby preventing serious damage to the power monitoring system network safety and influencing the stable and stable operation of the power monitoring system.

Description

Network security threat emergency disposal system and method for power monitoring system
Technical Field
The invention relates to an electric power monitoring system network security threat emergency disposal system and method, and belongs to the technical field of electric power industry network and information security.
Background
In recent years, the development of the network and information safety work in the power industry is solid and effective, the safe and stable operation of a power monitoring system and the information safety level protection work are steadily promoted, the potential hazard investigation and the leak rectification of the power industrial control equipment are highly effective, the network and information safety special supervision effect is obvious, more than large network and information safety events do not occur, the safe and stable operation and reliable supply of the power system are powerfully guaranteed, and the social economic development and the people life needs are met. Conventional safety detection and protection means are deployed in a master station and a plant station of the power monitoring system, each level of scheduling unit completes the construction of a network safety management platform, nearly ten thousand plant stations complete the deployment of monitoring devices, a safety event perception technology is widely applied, the scheduling master station and the plant station monitoring system are brought into a monitoring range, and a network safety real-time monitoring early warning system and mechanism are preliminarily formed.
And an application system of hierarchical deployment and collaborative management and control of a network security management platform and a monitoring device is established. The plant station realizes the collection and processing of the network security events of the relevant equipment of the station control layer by deploying the network security monitoring device, and simultaneously sends the processing result to the network security management platform of the superior regulation and control mechanism by a communication means, thereby basically realizing the distributed deployment and the cooperative management and control of the network security of the power monitoring system.
In recent years, network security events occurring in industrial control systems have been diversified, and in order to deal with new security threats and challenges of electric power industrial control, on the basis of the existing network security protection system, the security protection technical measures of the electric power monitoring system basically achieve the goals of effective blocking of external intrusion, effective isolation of external force interference, effective containment of internal intrusion, and effective control of security risks.
Therefore, how to deal with network attacks which will or may occur in the future is one of the key tasks of network security protection in terms of how to isolate security risks within a minimum range in the face of various network attack behaviors which already occur, and how to reduce the range of influence on the service of the power system.
Disclosure of Invention
The technical problems to be solved by the invention are as follows: when a network security event occurs in the power monitoring system, how to block the diffusion of the threat event in time is realized, and the security risk is reduced.
In order to solve the technical problems, the invention provides an emergency handling system for network security threats of a power monitoring system, which comprises a stop control console, a data exchange device and stop control equipment, wherein the stop control console and the data exchange device and the stop control equipment are connected and communicated through a physical local area network, and the physical local area network is a small physical network formed by physical connection.
The invention achieves the following beneficial effects: according to the network security threat emergency disposal system of the power monitoring system, the physical local area network and one-key type stopping means are adopted, network intrusion and interference cannot occur, the safety and the real-time performance of emergency disposal implementation can be effectively guaranteed, when a threat event occurs in the power monitoring system network, the emergency disposal system can accurately detect and diagnose, further diffusion of the threat event can be blocked in time, the serious damage to the network security of the power monitoring system can be prevented, and the stable and stable operation of the power monitoring system can be prevented from being influenced.
Drawings
FIG. 1 is a schematic diagram of an emergency disposal system for network security threats of a power monitoring system according to the present invention;
FIG. 2 is a schematic front view of a park control console apparatus;
FIG. 3 is a rear view of the park bench apparatus.
Detailed Description
The technical scheme of the invention is further explained by combining the drawings and the specific embodiments.
The working principle of the invention is as follows: when a remote control command is illegally utilized, remote station equipment is abnormally operated, so that a safety accident is caused, if the safety accident is avoided at the source, the destructive influence range is limited, the intrinsic safety of a main network is ensured, a stop control center is arranged at a dispatching center, a stop control terminal is controlled through analog electric signals or optical information, control instructions such as stop control, bypass and recovery are sent to the stop control terminal equipment, and the function of one-key control of a dispatching main station is realized; the one-key type stopping control mode adopts related hardware devices and is connected in a non-network mode, and the stopping control console realizes the blocking of longitudinal boundary control messages of two different scenes, namely a longitudinal encryption authentication device and an encryption card, through a physical key; the stop control center adopts a one-key mode to carry out multi-level control on the control master station, the plant station, the area and the like aiming at different safety events. The stopping control center adopts identity authentication modes such as an identity card and fingerprints to prevent illegal personnel from maliciously controlling.
Example 1
Fig. 1 is a schematic diagram of an emergency disposal system for network security threats of a power monitoring system according to the present invention, which includes: the system comprises a stop control console, a data exchange device and stop control equipment, wherein the stop control console and the data exchange device and the stop control equipment are connected and communicated through a physical local area network, and the physical local area network is a small physical network formed by connecting in a physical mode.
The stopping control console and the data exchange device and the stopping control equipment are connected and communicated through the physical local area network, so that network intrusion and interference can be avoided, and the safety and the real-time performance of emergency treatment implementation can be effectively guaranteed.
The stop control equipment is a stop control longitudinal encryption authentication device or a stop control encryption card responding to the stop control command.
And the stopping control equipment simultaneously sends alarm information to the network security management platform in real time, wherein the alarm information comprises blocking information of a stopping control longitudinal encryption authentication device or a stopping control encryption card and the like, and the blocking information is used as basic data for the network security management platform to monitor the network security threat emergency disposal system of the power monitoring system in real time.
The stop control console is arranged on the dispatching console or the duty room, and when an emergency occurs and stop control needs to be implemented, operation can be performed at the first time; the data exchange device is arranged in a machine room of the dispatching automation system; the stop control equipment (stop control encryption card or stop control longitudinal encryption authentication device) is arranged in a boundary protection area between the master station and the plant station. The deployment positions of the stop control console, the data exchange device and the stop control equipment are considered from the aspects of equipment safety, equipment application and the like, and the stop control console is used by an attendant and used for guaranteeing the safe operation of the dispatching automation system, so that the stop control console is deployed in the daily workplace of the attendant, namely a dispatching console or an attendant room; the data exchange device belongs to gateway equipment and is generally deployed in a machine room of a dispatching automation system like other network equipment, so that unified deployment and management of a network administrator are facilitated; the stop control encryption card or the stop control longitudinal encryption authentication device belongs to boundary equipment and plays a role of boundary protection, so the stop control encryption card or the stop control longitudinal encryption authentication device is usually deployed in a boundary protection area between a main station and a station.
Fig. 2 is a schematic diagram of a front side of a stop control console device, fig. 3 is a schematic diagram of a back side of the stop control console device, a stop control device is indirectly connected with the stop control console through a data exchange device, the stop control console is of a one-key type and is provided with 2 physical buttons, the physical buttons are respectively a one-key blocking remote control message button and a one-key blocking remote control message button, a stop control command is issued by pressing a button lamp to light up, and a recovery stop control command is issued by bouncing the button lamp to light down. The stop control console sends stop control or recovery stop control instructions to the data exchange device through the physical buttons, then the stop control instructions are forwarded to the stop control equipment by the data exchange device, and the stop control equipment receives the stop control instructions and then confirms and responds according to the original route.
The stop control console is provided with a stop control interface, the data exchange device is provided with 2 groups of uplink SC interfaces, and the stop control interface is connected with the SC interface of the data exchange device through an optical fiber medium to realize the issuing of a stop control command.
The data exchange device is used for receiving and identifying the stop control command sent by the stop control console, and forwarding the stop control command to the corresponding stop control equipment in a non-network mode.
The control-stopping longitudinal encryption authentication device is used for identifying a control-stopping console instruction, normally operates in an original set working mode, starts a blocking mode to operate in an emergency through a non-network mode, blocks and intercepts remote control and remote adjustment commands of a plant station issued by a main station, and prevents network security events of the main station from being sent to the plant station to cause large-scale spreading of network security.
The shutdown control encryption card is an emergency processing card arranged on a master station dispatching automation system communication server, defaults to process a service message according to an encryption card principle, starts to work in an emergency through a non-network mode, blocks and intercepts remote control and remote regulation commands issued by a master station to prevent network security events of the master station from being sent to the plant station to cause large-scale spreading of network security.
SC interfaces are arranged on the shutdown control longitudinal encryption authentication device or the shutdown control encryption card, are connected with the SC interface of the data exchange device through optical fiber media, and receive shutdown control and recovery instructions issued by a shutdown control console in a non-network mode. The stop control equipment completes the analysis and identification of remote control and remote regulation control messages by a message analysis module of software, and blocks the messages, and does not affect the transmission of the corresponding remote control and remote signaling messages and the original encryption function of a longitudinal encryption authentication device or an encryption card.
The control-stop longitudinal encryption authentication device or the control-stop encryption card adopts a local maintenance mode and completes initialization by importing a console certificate, inputting a console ID and the like;
the SC interface of the shutdown control longitudinal encryption authentication device or the shutdown control encryption card receives a shutdown control or recovery command and sends alarm information to the network security management platform, wherein the alarm information comprises:
Identifying a control stopping command, and distinguishing remote control, remote regulation and recovery commands;
regularly sending the physical communication state between the stop control equipment and the stop control console;
and blocking the source address, the destination address, the source destination port number and the service identifier of the message.
A power monitoring system network security threat emergency disposal method comprises the following steps:
1) a data management module of a management center of a stop control console adds the ID of the stop control equipment needing to be stopped and inputs the initialization data of the stop control equipment; the data management module can also export a local certificate request file, import the signed certificate and import the certificate of the shutdown device;
2) after the initialization operation of the stopping device is completed, the stopping console initiates a detection message to the stopping device at regular time, and the stopping device responds after receiving the detection message to diagnose whether the stopping device is on line or not;
3) the data interaction device gathers all the stop control equipment to the same stop control console, binds the ID of the stop control equipment which is accessed with the access port, searches the forwarding port according to the ID of the stop control equipment in the instruction and sends the ID to the corresponding stop control equipment after receiving a stop control or recovery instruction sent by the stop control console, and forwards the stop control equipment response information to the stop control console after receiving the data interaction device;
4) When the stopping control equipment receives a stopping control instruction of a stopping control console, the master station enters a remote control or remote regulation message blocking mode, a message analysis module analyzes a remote control or remote regulation control message transmitted by the master station, a single-point remote control, a double-point remote control or double-point remote regulation is identified according to a feature code in the message, the remote regulation/remote control message transmitted by the master station is changed or replaced, the state of 'transmission reason' in the remote regulation/remote regulation message is modified into 'cancel', the plant station responds to a master station remote control/remote regulation cancel confirmation message after receiving the message, and the master station does not process the corresponding response message after receiving the corresponding response message;
when the stopping control equipment receives a recovery instruction sent by the stopping control console, the stopping control equipment is in a normal execution mode of a remote control/remote regulation instruction, and does not perform message blocking operation.
In the process of communicating with the stop control longitudinal encryption authentication device and the stop control encryption card, the stop control console encrypts by using a serial port communication protocol and an encryption algorithm, and the contents of a communication message are initiated by the stop control console in a one-time pad mode, wherein the specific process comprises the following steps:
1) the control stopping console generates a symmetric key for encrypting control message information;
2) the shutdown control console uses the shutdown device public key certificate to encrypt and protect the symmetric key;
3) And after receiving the corresponding communication message, the shutdown control equipment decrypts the symmetric key by using the private key, decrypts the communication message by using the symmetric key and executes the control command.
When the stop control console communicates with the stop control equipment, the SM4 algorithm is used for encrypting and decrypting the communication content.
In the embodiment, the server software and hardware configuration is as shown in table 1;
TABLE 1
Figure BDA0003580626610000061
Figure BDA0003580626610000071
The network security threat emergency disposal system of the power monitoring system can realize the following functions:
1) monitoring the off state:
clicking a one-key blocking remote control message button or a one-key blocking remote regulation message button of the stop control console to check the stop control state monitoring on the interface, recovering the one-key blocking remote control message button or the one-key blocking remote regulation message button, and checking the stop control state monitoring on the interface.
Issuing a remote control/remote regulation command, and blocking the interface for a number of times of the remote control/remote regulation plus 1; and when the remote control/remote control is recovered, the remote control/remote control recovery times on the interface are + 1.
2) Monitoring connection status
Checking the monitoring of the stop control state and checking the longitudinal controlled number of the stop control and the controlled number of the stop control encryption card in a host emergency control interface of a stop control console management center;
and respectively displaying the longitudinal and encrypted card controlled numbers in the normal connection number/connection number in the monitoring of the stop control state, and clicking a popup window of the connection number to display information such as the longitudinal and encrypted card controlled equipment list and the connection state.
3) And (3) switching alarm states:
clicking a one-key blocking remote control message button or a one-key blocking remote regulation message button of a shutdown control console to enter emergency management control-management control audit, screening the operation type of state switching, checking state switching alarm, generating a state switching log by the management control audit,
and generating corresponding state switching alarms by alarm monitoring, wherein the corresponding state switching alarms comprise remote control starting, remote control recovery, remote control starting and remote control recovery.
4) Blocking the alarm message:
clicking a one-key blocking remote control message button or a one-key blocking remote regulation message button of a stop control console, selecting the operation type as message blocking, checking message blocking alarm, and generating message blocking logs, including remote control blocking logs, remote regulation release logs/remote control release logs, remote regulation blocking logs/remote control and remote regulation blocking logs;
the alarm monitoring generates corresponding message blocking alarms according to the blocking state, including remote control blocking alarm, remote control release alarm/remote control release alarm, remote control blocking alarm/remote control and remote control blocking alarm.
According to the invention, the blocking control of the boundary equipment is realized through a one-key control means, so that effective treatment blocking can be performed when a threat event occurs, further diffusion of the threat event is blocked in time, further upgrading of the event is prevented, the network security of the electric power monitoring system is seriously damaged, and the stable and stable operation of the electric power monitoring system is influenced.
Example 2
In the emergency disposal method for network security threats of the power monitoring system, when the shutdown console and the shutdown device perform identity authentication, the shutdown console generates a public and private key pair, a public key certificate of the shutdown console is signed by a dispatching center certificate system and is led into the shutdown device, and the method specifically comprises the following steps:
1) verifying the identity of the stop control console at the stop control equipment end, adopting SM2 and SM3 to sign and verify labels, adopting a private key signature of the stop control console at the stop control console end, and adopting a public key certificate of the stop control console at the stop control equipment end to verify labels;
2) and performing identity authentication on the shutdown control console, similarly performing signature verification by adopting SM2 and SM3, performing signature verification by adopting a private key of the shutdown control device at the shutdown control console, and performing signature verification by adopting a public key of the shutdown control device at the shutdown control console.
Other technical features are the same as those of embodiment 1.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing shows and describes the general principles and broad features of the present invention and advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (12)

1. An electric power monitoring system network security threat emergency treatment system is characterized in that: the system comprises a stop control console, a data exchange device and stop control equipment, wherein the stop control console and the data exchange device and the stop control equipment are connected and communicated through a physical local area network, and the physical local area network is a small physical network formed by connecting in a physical mode.
2. The power monitoring system network security threat emergency treatment system of claim 1, wherein: the stop control equipment is a stop control longitudinal encryption authentication device or a stop control encryption card responding to the stop control command.
3. The power monitoring system network security threat emergency treatment system of claim 2, wherein: the method comprises the steps that a stopping control device sends alarm information to a network security management platform in real time, wherein the alarm information comprises blocking information of a stopping control longitudinal encryption authentication device or a stopping control encryption card, and the blocking information is used as basic data of the network security threat emergency disposal system of the power monitoring system to be monitored in real time by the network security management platform.
4. The power monitoring system network security threat emergency treatment system of claim 1, wherein: the stop control console is arranged on the dispatching console or the duty room; the data exchange device is deployed in a machine room of the dispatching automation system; the stop control equipment is deployed in a boundary protection area between the main station and the plant station.
5. The power monitoring system network security threat emergency treatment system of claim 1, wherein: the stop control console is provided with 2 physical buttons which are a one-key blocking remote control message button and a one-key blocking remote regulation message button respectively, a stop control command is issued by pressing a button lamp to light up, and a recovery stop control command is issued by bouncing the button lamp to turn off; the stop control console sends stop control or recovery stop control instructions to the data exchange device through the physical buttons, then the stop control instructions are forwarded to the stop control equipment by the data exchange device, and the stop control equipment receives the stop control instructions and then confirms and responds according to the original route.
6. The power monitoring system network security threat emergency treatment system of claim 1, wherein: the stop control console is provided with a stop control interface, the data exchange device is provided with 2 groups of uplink SC interfaces, and the stop control interface is connected with the SC interface of the data exchange device through an optical fiber medium.
7. The power monitoring system network security threat emergency treatment system of claim 2, wherein: the control stopping longitudinal encryption authentication device is used for identifying a control stopping console command, normally operates in an original set working mode, starts a blocking mode to operate in an emergency through a non-network mode, and blocks and intercepts remote control and remote regulation commands of a plant station issued by a main station.
8. The power monitoring system network security threat emergency treatment system of claim 2, wherein: the shutdown control encryption card is an emergency processing card arranged on a master station dispatching automation system communication server, defaults to process a service message according to an encryption card principle, starts to work in a non-network mode under an emergency condition, and blocks and intercepts a remote control and remote regulation command issued by a master station to a plant station.
9. The power monitoring system network security threat emergency treatment system of claim 2, wherein: and the stop control longitudinal encryption authentication device or the stop control encryption card is provided with an SC interface, is connected with the SC interface of the data exchange device through an optical fiber medium, receives stop control and recovery instructions sent by a stop control console, and a message analysis module of the stop control device completes analysis, identification, remote control and remote regulation control messages.
10. An emergency handling method for network security threats of a power monitoring system is characterized by comprising the following steps:
1) a data management module of a management center of a stop control console adds the ID of the stop control equipment needing to be stopped and inputs the initialization data of the stop control equipment;
2) after the initialization operation of the stopping device is completed, the stopping console initiates a detection message to the stopping device at regular time, and the stopping device responds after receiving the detection message to diagnose whether the stopping device is on line or not;
3) the data interaction device gathers all the stop control equipment to the same stop control console, binds the ID of the stop control equipment which is accessed with the access port, searches the forwarding port according to the ID of the stop control equipment in the instruction and sends the ID to the corresponding stop control equipment after receiving a stop control or recovery instruction sent by the stop control console, and forwards the stop control equipment response information to the stop control console after receiving the data interaction device;
4) when the stopping control equipment receives a stopping control instruction of a stopping control console, the master station enters a remote control or remote regulation message blocking mode, a message analysis module analyzes a remote control or remote regulation control message transmitted by the master station, a single-point remote control, a double-point remote control or double-point remote regulation is identified according to a feature code in the message, the remote regulation/remote control message transmitted by the master station is changed or replaced, the state of 'transmission reasons' in the remote regulation/remote regulation message is uniformly modified into 'cancel', the plant station responds to a master station remote control/remote regulation cancel confirmation message after receiving the message, and the master station does not process the corresponding response message after receiving the corresponding response message;
When the stopping control equipment receives a recovery instruction sent by the stopping control console, the stopping control equipment is in a normal execution mode of a remote control/remote regulation instruction, and does not perform message blocking operation.
11. The power monitoring system network security threat emergency handling method of claim 10, wherein: in the process of communicating the stop control console with the stop control longitudinal encryption authentication device and the stop control encryption card, a serial communication protocol and an encryption algorithm are used for encryption, and the specific process is as follows:
1) the stop control console generates a symmetric key for encrypting control message information;
2) the shutdown control console uses the shutdown device public key certificate to encrypt and protect the symmetric key;
3) and after receiving the corresponding communication message, the shutdown control equipment decrypts the symmetric key by using the private key, decrypts the communication message by using the symmetric key and executes the control command.
12. The power monitoring system network security threat emergency handling method of claim 10, wherein: when the control stop console and the control stop equipment perform identity authentication, the method specifically comprises the following steps:
1) verifying the identity of the stop control console at the stop control equipment end, adopting SM2 and SM3 to sign and verify labels, adopting a private key signature of the stop control console at the stop control console end, and adopting a public key certificate of the stop control console at the stop control equipment end to verify labels;
2) And at the stop control console end, performing identity authentication on the stop control equipment, similarly adopting SM2 and SM3 to perform signature verification, at the stop control equipment end, adopting a private key of the stop control equipment to perform signature, and at the stop control console end, adopting a public key of the stop control equipment to perform signature verification.
CN202210345140.7A 2022-04-02 2022-04-02 Emergency handling system and method for network security threat of power monitoring system Active CN114844676B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210345140.7A CN114844676B (en) 2022-04-02 2022-04-02 Emergency handling system and method for network security threat of power monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210345140.7A CN114844676B (en) 2022-04-02 2022-04-02 Emergency handling system and method for network security threat of power monitoring system

Publications (2)

Publication Number Publication Date
CN114844676A true CN114844676A (en) 2022-08-02
CN114844676B CN114844676B (en) 2023-12-05

Family

ID=82563070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210345140.7A Active CN114844676B (en) 2022-04-02 2022-04-02 Emergency handling system and method for network security threat of power monitoring system

Country Status (1)

Country Link
CN (1) CN114844676B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4962473A (en) * 1988-12-09 1990-10-09 Itt Corporation Emergency action systems including console and security monitoring apparatus
CN200962604Y (en) * 2006-09-14 2007-10-17 北京科东电力控制系统有限责任公司 Vertical encryption authentication gateway device special for power
WO2009079648A1 (en) * 2007-12-18 2009-06-25 Seth Cirker Threat based adaptable network and physical security system
JP2010176612A (en) * 2009-02-02 2010-08-12 West Japan Railway Co System for instructing emergency stop
US20120314063A1 (en) * 2007-03-14 2012-12-13 Seth Cirker Threat based adaptable network and physical security system
CN103368649A (en) * 2012-03-27 2013-10-23 北京华美煜力电力技术有限公司 Anti-interference transmission system for remote control signals of power grid
JP2018073247A (en) * 2016-11-01 2018-05-10 日本電信電話株式会社 Illegal intrusion preventing apparatus, illegal intrusion preventing method, and illegal intrusion preventing program
CN207719876U (en) * 2018-01-16 2018-08-10 西安佳中电子技术有限公司 Small power generation unit tele-control system and small power generation unit
CN111431862A (en) * 2020-02-28 2020-07-17 中国电子科技网络信息安全有限公司 Network security deep protection method and system for threat-driven power monitoring system
CN111525686A (en) * 2020-04-02 2020-08-11 国网江苏省电力有限公司 One-key stop control-based safety protection design and implementation method for electric power monitoring system
WO2021068453A1 (en) * 2019-10-09 2021-04-15 南京南瑞继保电气有限公司 Method employing packet replacement to implement security permission for remote operation of power grid dispatching
CN112910921A (en) * 2021-03-02 2021-06-04 中核武汉核电运行技术股份有限公司 Industrial control boundary network safety protection method
WO2021150379A1 (en) * 2020-01-22 2021-07-29 Siemens Industry, Inc. Real-time and independent cyber-attack monitoring and automatic cyber-attack response system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4962473A (en) * 1988-12-09 1990-10-09 Itt Corporation Emergency action systems including console and security monitoring apparatus
CN200962604Y (en) * 2006-09-14 2007-10-17 北京科东电力控制系统有限责任公司 Vertical encryption authentication gateway device special for power
US20120314063A1 (en) * 2007-03-14 2012-12-13 Seth Cirker Threat based adaptable network and physical security system
WO2009079648A1 (en) * 2007-12-18 2009-06-25 Seth Cirker Threat based adaptable network and physical security system
JP2010176612A (en) * 2009-02-02 2010-08-12 West Japan Railway Co System for instructing emergency stop
CN103368649A (en) * 2012-03-27 2013-10-23 北京华美煜力电力技术有限公司 Anti-interference transmission system for remote control signals of power grid
JP2018073247A (en) * 2016-11-01 2018-05-10 日本電信電話株式会社 Illegal intrusion preventing apparatus, illegal intrusion preventing method, and illegal intrusion preventing program
CN207719876U (en) * 2018-01-16 2018-08-10 西安佳中电子技术有限公司 Small power generation unit tele-control system and small power generation unit
WO2021068453A1 (en) * 2019-10-09 2021-04-15 南京南瑞继保电气有限公司 Method employing packet replacement to implement security permission for remote operation of power grid dispatching
WO2021150379A1 (en) * 2020-01-22 2021-07-29 Siemens Industry, Inc. Real-time and independent cyber-attack monitoring and automatic cyber-attack response system
CN111431862A (en) * 2020-02-28 2020-07-17 中国电子科技网络信息安全有限公司 Network security deep protection method and system for threat-driven power monitoring system
CN111525686A (en) * 2020-04-02 2020-08-11 国网江苏省电力有限公司 One-key stop control-based safety protection design and implementation method for electric power monitoring system
CN112910921A (en) * 2021-03-02 2021-06-04 中核武汉核电运行技术股份有限公司 Industrial control boundary network safety protection method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
胡朝辉;王方立;: "电力监控系统通信安全技术研究", 电子技术应用, no. 03 *
陈铁铮;: "电力监控系统网络安全防护现状及建议", 通信电源技术, no. 04 *
马晓杰;: "调度自动化系统的安全防护", 中国电力教育, no. 1 *

Also Published As

Publication number Publication date
CN114844676B (en) 2023-12-05

Similar Documents

Publication Publication Date Title
CN106789015B (en) Intelligent power distribution network communication safety system
CN103491108A (en) Method and system for security protection of industrial control network
CN110011848B (en) Mobile operation and maintenance auditing system
EP3179322B1 (en) A method and system for detecting attempted malicious re-programming of a plc in scada systems
CN104581008B (en) A kind of video monitoring system information security protection system and method
CN102842001A (en) System and method for detecting computer security information based on U disc authentication
CN109120599A (en) A kind of external connection managing and control system
CN110798474A (en) Power data transmission safety protection system based on Beidou short message communication mode
CN113347149A (en) Network safety protection device and system
CN109981568A (en) A kind of substation's remote operation safety protecting method based on binary channels authentication
CN115314286A (en) Safety guarantee system
CN204465588U (en) A kind of host monitor based on server architecture and auditing system
CN109672684A (en) A kind of management service system of network cryptographic machine
CN106549502A (en) A kind of safe distribution of electric power protecting, monitoring system
CN115174157A (en) Relay protection remote operation and maintenance network security multistage blocking method and system
CN114266081A (en) Operation and maintenance computer safety protection system and method of power monitoring system
CN114625074A (en) Safety protection system and method for DCS (distributed control System) of thermal power generating unit
CN101699456A (en) Computer security system and method thereof
CN104978302B (en) A kind of intelligent and safe USB interface control method based on TCM chips
CN114844676B (en) Emergency handling system and method for network security threat of power monitoring system
CN111236105B (en) Parking space lock management method, device and system and parking space lock
Braband What's Security Level got to do with Safety Integrity Level?
CN115361273A (en) Block chain-based electric power operation and maintenance safety supervision and emergency management and control system and method
CN100590569C (en) Computer I/O port control program
CN114143028A (en) Data cross-region safe transmission method and system based on electric power spot transaction service scene

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant