CN116066754A - Oil and gas pipeline information physical security intelligent risk identification method, device and equipment - Google Patents

Oil and gas pipeline information physical security intelligent risk identification method, device and equipment Download PDF

Info

Publication number
CN116066754A
CN116066754A CN202310063998.9A CN202310063998A CN116066754A CN 116066754 A CN116066754 A CN 116066754A CN 202310063998 A CN202310063998 A CN 202310063998A CN 116066754 A CN116066754 A CN 116066754A
Authority
CN
China
Prior art keywords
information
node
determining
oil
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310063998.9A
Other languages
Chinese (zh)
Inventor
胡瑾秋
张来斌
李瑜环
肖尚蕊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Petroleum Beijing
Original Assignee
China University of Petroleum Beijing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Petroleum Beijing filed Critical China University of Petroleum Beijing
Priority to CN202310063998.9A priority Critical patent/CN116066754A/en
Publication of CN116066754A publication Critical patent/CN116066754A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F17STORING OR DISTRIBUTING GASES OR LIQUIDS
    • F17DPIPE-LINE SYSTEMS; PIPE-LINES
    • F17D5/00Protection or supervision of installations
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F17STORING OR DISTRIBUTING GASES OR LIQUIDS
    • F17DPIPE-LINE SYSTEMS; PIPE-LINES
    • F17D5/00Protection or supervision of installations
    • F17D5/005Protection or supervision of installations of gas pipelines, e.g. alarm

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides an oil and gas pipeline information physical security intelligent risk identification method, device and equipment, wherein the method comprises the following steps: constructing a system model corresponding to an oil and gas pipeline system; accidents possibly generated when the information security threat system is operated and corresponding processing strategies are predicted. Constructing an oil and gas pipeline system model according to the control logic relation among the nodes of the oil and gas pipeline system; and determining executable actions, accessible information and preparation information of nodes in the model, so that the feedback control relation of the model is more concise; meanwhile, accidents occurring when different nodes of the information security threat attack system are predicted according to the model, the comprehensiveness of predicting risk accidents is improved, corresponding processing strategies are formulated according to the accidents and the control logic relations of the nodes in the model, the accuracy of the strategies is improved, the capability of the oil and gas pipeline system for coping with the information security threats is improved, and the security of the oil and gas pipeline system is improved.

Description

Oil and gas pipeline information physical security intelligent risk identification method, device and equipment
Technical Field
The invention relates to the field of oil and gas, in particular to an oil and gas pipeline information physical security intelligent risk identification method, device and equipment.
Background
Along with the development of intelligent and digital pipeline systems, the intelligent oil gas pipeline system combines a computer network, a control system and an oil gas long-distance transmission system, and as intelligent pipelines need to be connected to the Internet, the intelligent oil gas system is exposed under an open system, and can have factors threatening information security to damage information security in the system, thereby affecting the security of physical functions in the system.
At present, a database is built according to known information security threats and accidents to build a security management system and a security emergency system aiming at the information security risk analysis method of the oil gas intelligent pipeline, but the problem of poor security still exists.
Disclosure of Invention
The embodiment of the invention provides an oil and gas pipeline information physical security intelligent risk identification method, device and equipment, so as to improve the safety of a system.
In a first aspect, an embodiment of the present invention provides a method for identifying risk of physical security and intellectualization of information of an oil and gas pipeline, where the method includes:
determining a system model corresponding to an oil and gas pipeline system; the system model comprises a plurality of layers, each layer comprises at least one node, the nodes are used for representing equipment or personnel, and directed connecting lines between the nodes are used for representing feedback information or control information;
Determining executable actions, accessible information and preparation information corresponding to each node according to the system model; wherein the executable action is control information executable by the node; the accessible information is information according to which the node executes actions; the preparation information is control information of an upper layer level of the node;
determining possible accidents and corresponding processing strategies during the running of the system according to the executable action, the accessible information and the preparation information of each node;
and executing the corresponding processing strategy when the accident occurs in the system operation process according to the accident which can be generated and the corresponding processing strategy.
Optionally, determining a system model corresponding to the oil and gas pipeline system includes:
acquiring an overall layout of the oil and gas pipeline system;
determining at least one functional route of the oil and gas pipeline system according to the overall layout;
determining the system model according to the nodes contained in the at least one functional route;
wherein each functional route includes at least one hierarchy of nodes.
Optionally, the at least one functional route includes: production route, safety emergency route and overall coordination route; determining at least one functional route of the oil and gas pipeline system according to the overall layout, comprising:
Determining production equipment, safety emergency equipment and overall coordination equipment in the oil and gas pipeline system;
determining the production route according to the production equipment and nodes with upstream-downstream relation with the production equipment based on the overall layout;
determining the safety emergency route according to the safety emergency equipment and nodes with upstream-downstream relation with the safety emergency equipment;
and determining the overall coordination route according to the overall coordination equipment and the nodes with upstream-downstream relation with the overall coordination equipment.
Optionally, determining possible incidents generated during the system running and corresponding processing strategies according to the executable actions, the accessible information and the preparation information of each node comprises:
traversing nodes in the system model, determining changes of executable actions, accessible information and preparation information of the nodes after at least one type of information security threat attacks the nodes aiming at each traversed node, and determining possible accidents during system operation according to the changes;
determining a corresponding processing strategy according to the possibly generated accident;
wherein the at least one type of information security threat comprises: at least one of personnel operation errors, tampering process parameters and tampering control information.
Optionally, after determining, for each node, that at least one type of information security threat attacks the node, changes in executable actions, accessible information, and preparation information of the node, and determining possible incidents generated when the system is running according to the changes that occur, including:
determining, for each node, changes in executable actions, accessible information, and provisioning information of the node after at least one type of information security threat attacks the node;
and determining whether the change can cause node failure, and if so, determining that the accident caused by the change is the possible accident.
Optionally, determining a corresponding processing policy according to the possible accident includes:
aiming at each information security threat, determining a processing strategy of the node and/or related nodes according to the corresponding incidents after the information security threat attacks the node, so that after the processing strategy is executed, executable actions, accessible information and preparation information of the node recover the state before being attacked, or eliminating the incidents;
wherein the related node is a node of a level above the node and/or a node of a level below the node.
In a second aspect, an embodiment of the present invention provides an oil and gas pipeline information physical security intelligent risk identification device, where the device includes:
the first determining module is used for determining a system model corresponding to the oil and gas pipeline system; the system model comprises a plurality of layers, each layer comprises at least one node, the nodes are used for representing equipment or personnel, and directed connecting lines between the nodes are used for representing feedback information or control information;
the second determining module is used for determining executable actions, accessible information and preparation information corresponding to each node according to the system model; wherein the executable action is control information executable by the node; the accessible information is information according to which the node executes actions; the preparation information is control information of an upper layer level of the node;
a third determining module, configured to determine, according to the executable action, the accessible information, and the preparation information of each node, an incident that may occur when the system is running, and a corresponding processing policy;
and the execution module is used for executing the corresponding processing strategy when the accident occurs in the system operation process according to the possibly generated accident and the corresponding processing strategy.
In a third aspect, an embodiment of the present invention provides an electronic device, including: a memory and at least one processor;
the memory stores computer-executable instructions;
the at least one processor executes computer-executable instructions stored by the memory, such that the at least one processor performs the method for identifying risk of physical security and intellectualization of oil and gas pipeline information as described in any of the above aspects.
In a fourth aspect, an embodiment of the present invention provides a computer readable storage medium, where a computer executing instruction is stored in the computer readable storage medium, and when a processor executes the computer executing instruction, the method for identifying the risk of physical security and intellectualization of oil and gas pipeline information according to any one of the above aspects is implemented.
In a fifth aspect, an embodiment of the present invention provides a computer program product, which includes a computer program, where the computer program when executed by a processor implements the method for identifying risk of oil and gas pipeline information physical security and intellectualization according to any of the above aspects.
The embodiment of the invention provides an oil and gas pipeline information physical security intelligent risk identification method, device and equipment, wherein the method comprises the following steps: determining a system model corresponding to an oil and gas pipeline system; determining executable actions, accessible information and preparation information corresponding to each node of the system model; determining possible accidents and corresponding processing strategies during the running of the system according to the executable action, the accessible information and the preparation information of each node; and executing corresponding processing strategies when the accident occurs in the running process of the system. The oil and gas pipeline system model is constructed according to the control logic relation among the nodes of the oil and gas pipeline system, and executable actions, accessible information and preparation information of the nodes in the model are determined, so that the feedback control relation of the model is more concise; meanwhile, accidents occurring when different nodes of the information security threat attack system are predicted according to the model, the comprehensiveness of predicting risk accidents is improved, corresponding treatment strategies are formulated according to the accidents and the control logic relations of the nodes in the model, the accuracy of the strategies is improved, new risk accidents caused by redundant security measures or error security measures are avoided, and therefore the capability of the oil and gas pipeline system for coping with the information security threats is improved, and the safety of the oil and gas pipeline system is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions of the prior art, the drawings that are needed in the embodiments or the description of the prior art will be briefly described below, it will be obvious that the drawings in the following description are some embodiments of the present invention, and that other drawings can be obtained according to these drawings without inventive effort to a person skilled in the art.
FIG. 1 is a diagram of an application scenario provided in an embodiment of the present invention;
FIG. 2 is a schematic flow chart of an accident handling method for an intelligent oil and gas pipeline system according to an embodiment of the present invention;
FIG. 3 is a flowchart of a system model for determining a corresponding oil and gas intelligent pipeline system according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of an intelligent oil and gas pipeline system according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a system model for primary station metering and voltage regulation according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of node role expressions of a system model for primary station metering and voltage regulation according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of node role expressions of a system model for head station metering and voltage regulation according to an embodiment of the present invention;
FIG. 8 is a schematic flow chart of determining an accident according to an embodiment of the present invention;
FIG. 9 is a schematic diagram of a user interface provided by an embodiment of the present invention;
FIG. 10 is a block diagram illustrating an accident handling apparatus for intelligent oil and gas pipelines according to an embodiment of the present invention;
fig. 11 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The method can be used for identifying the physical safety and intelligent risk of the information of the oil and gas pipeline system, processing accidents caused by the information safety risk of the oil and gas pipeline system, especially aiming at the risk accidents that the intelligent risk caused by the information safety threat causes the failure of physical equipment in the system, and formulating targeted measures by identifying the source and the reason of the intelligent information risk causing the accidents, thereby improving the safety of the oil and gas intelligent pipeline system.
The oil gas pipeline system can also be called as an oil gas intelligent pipeline system, and the oil gas intelligent pipeline system is based on standard unification and pipeline digitization, and aims at comprehensively unifying data, realizing perception interaction visualization, integrating interconnection of systems, accurately matching supply, intelligent and high-efficiency operation and controllable prediction and early warning, integrates pipeline full life cycle data through a system architecture of 'end + cloud + big data', provides intelligent analysis and decision support, realizes visualization, networking and intelligent management of pipelines, and finally forms an intelligent oil gas pipeline network with comprehensive perception, automatic prejudgement, intelligent optimization and self-regulation capabilities.
The oil gas intelligent pipeline system combines a computer network, a control system and an oil gas long-distance transmission system, and when the physical function safety of the oil gas long-distance transmission system is considered, the information safety threat on the oil gas long-distance transmission physical system cannot be considered. The threat possibly generated by the information security of the oil gas intelligent pipeline is not only considered comprehensively, but also accurately monitored and early-warned and countermeasure measures are provided. Because the intelligent pipeline needs to be connected to the Internet, the oil gas intelligent system is exposed to the open system, and in the network space, any person can only break through the oil gas intelligent pipeline system to be equivalent to the actual space to enter the oil gas process field, and the oil gas intelligent pipeline system protects the person entering the intelligent pipeline system from accidents such as leakage, but the person entering the intelligent pipeline system can change any process through the oil gas intelligent pipeline system, so that information threat is brought to the oil gas intelligent pipeline system.
The existing information security risk analysis method aiming at the oil gas intelligent pipeline system mainly comprises the steps of constructing a database, constructing a security management system and a security emergency system, constructing a digital model of a transmission and distribution system, constructing a failure database, and constructing a security management system from the aspect of gas pipeline integrity management; from the perspective of intelligent modules of the system, analyzing the influence of the construction of different intelligent modules on the improvement of the comprehensive safety of the pipe network; the intelligent gas management platform is used for building targets, discussing system architecture, emergency requirements and safety emergency systems, improving the capacities of dynamic management, monitoring and early warning, emergency rescue and the like of urban gas, and constructing the safety emergency system of the intelligent gas management platform from an emergency angle.
However, these methods fail to detect new information threats, and also fail to detect sources and causes of risk, resulting in failure to make targeted security measures.
In order to solve the problems, the invention provides an accident handling method of an oil gas intelligent pipeline system, which is used for analyzing the functional logic relation of different nodes in the oil gas intelligent pipeline system according to the composition of the oil gas intelligent pipeline system and establishing an oil gas intelligent pipeline system model according to the information feedback and control relation among different components; according to the model, intelligent information risk factors are identified from the point of failure of the physical functions of the nodes, accidents caused by risks are predicted when the oil gas pipeline system runs through identifying the intelligent risks of the physical safety of the information, accident scenes are deduced, corresponding plan countermeasures are formulated, the comprehensiveness of the identified intelligent information safety risks is improved, the effectiveness and the accuracy of strategies for handling the risks of the accidents are improved, and therefore the safety of the whole oil gas intelligent pipeline system is improved.
Fig. 1 is an application scenario diagram provided in an embodiment of the present invention. Oil and gas pipeline systems include a variety of equipment and a variety of personnel responsible for different tasks. As shown in fig. 1, the control device may analyze the oil and gas pipeline system, establish a corresponding system model by simulating the state of the oil and gas pipeline system when the oil and gas pipeline system is in normal operation, and deduce the risk accident caused by the information security threat suffered by the system model when the system model is in operation by simulating the information security threat on the system model, and formulate a corresponding processing strategy. The control device may present the system model and/or the processing policy to the user, who may make adjustments or confirmations. The control equipment is communicated with the oil and gas pipeline system, a corresponding treatment strategy can be sent to the oil and gas pipeline system, and the oil and gas pipeline system can execute the strategy to treat accidents, so that the safety of the oil and gas pipeline system is improved.
Some embodiments of the present invention are described in detail below with reference to the accompanying drawings. In the case where there is no conflict between the embodiments, the following embodiments and features in the embodiments may be combined with each other.
FIG. 2 is a schematic flow chart of an accident handling method for an oil and gas intelligent pipeline system according to an embodiment of the present invention. As shown in fig. 2, the accident handling method of the oil gas intelligent pipeline system comprises the following steps:
Step 201, determining a system model corresponding to an oil gas intelligent pipeline system; the system model comprises a plurality of layers, each layer comprises at least one node, the nodes are used for representing equipment or personnel, and directed connecting lines between the nodes are used for representing feedback information or control information.
Specifically, the system model is determined according to the composition of the oil gas intelligent pipeline system and the information interaction state of each node when the oil gas intelligent pipeline system is in normal operation, i.e. has no information security threat, the system model can correctly reflect the information interaction condition of the oil gas intelligent pipeline system, the system model can be used as the foundation of the establishment of the accident processing method, subsequent steps of deducing accidents, formulating strategies and the like can be carried out through the system model, and complex work can be reduced on the premise of ensuring the accuracy of results.
According to the positions of equipment or personnel in the oil gas intelligent pipeline system, determining the hierarchy of the oil gas intelligent pipeline system, and layering the equipment or personnel at different positions according to the control relation. The device or person is a node of the system model.
Optionally, the oil gas intelligent pipeline system comprises a plurality of devices or personnel, and the purpose of constructing the system model is to form physical failure, so that from the viewpoint of the process functionality of the oil gas intelligent pipeline system, devices and facilities which have influence on the normal process flow are selected, or the devices and facilities which maintain and ensure the normal process flow are used for constructing the system model, and the devices or personnel which are subjected to information security threat in the oil gas intelligent pipeline system and cannot generate accidents or physical functional failure are not considered in constructing the system model.
Therefore, before the system model is built, important equipment or personnel for building the system model in the oil gas intelligent pipeline system can be identified. The important equipment or personnel are equipment or personnel for maintaining and guaranteeing the normal process flow and equipment or personnel having influence on the normal process flow.
Optionally, fig. 3 is a flowchart of determining a system model corresponding to an oil gas intelligent pipeline system according to an embodiment of the present invention, where, as shown in fig. 3, determining the system model corresponding to the oil gas intelligent pipeline system includes:
step 301, obtaining an overall layout of the oil gas intelligent pipeline system.
Specifically, when building a model, an overall map of the oil and gas intelligent pipeline system may be obtained first, where the overall map may be obtained from a server or a memory in the system. The overall layout includes data information such as responsibilities, locations, information interaction processes, etc. of all devices or persons of the system.
Step 302, determining at least one functional route of the oil gas intelligent pipeline system according to the overall layout.
In particular, the oil and gas intelligent piping system may perform a variety of functions, each of which requires the participation of multiple devices or personnel. The functional route is made up of the equipment or personnel required by the system to perform the function. By analyzing the system layout diagram, different functional routes are analyzed, and the important equipment or personnel are combed out from the different functional routes. Wherein each functional route includes at least one hierarchy of nodes.
Optionally, the device or person participating in the function of the functional route and the device or person which is physically disabled after being threatened by information security and thus affects the functional route to execute the function are used as the important device or person to be used as the node for constructing the system model on the functional route.
There are many specific implementations of determining at least one functional route from the overall map.
In an alternative implementation, the overall map may carry information about functional routes of the system and equipment or personnel information for each of the functional routes.
In another alternative implementation manner, different functional routes can be automatically analyzed according to the overall layout, equipment influencing the technological process or maintaining and guaranteeing the technological process and equipment executing actual functions are combed out from the different functional routes, other equipment or personnel having information interaction with the equipment are analyzed, the other equipment or personnel are used as important equipment or personnel together, and nodes are determined.
Optionally, the at least one functional route includes: production route, safety emergency route and overall coordination route; determining at least one functional route of the oil and gas pipeline system according to the overall layout, comprising:
And determining production equipment, safety emergency equipment and overall coordination equipment in the oil and gas pipeline system.
Determining the production route according to the production equipment and nodes with upstream-downstream relation with the production equipment based on the overall layout;
determining the safety emergency route according to the safety emergency equipment and nodes with upstream-downstream relation with the safety emergency equipment;
and determining the overall coordination route according to the overall coordination equipment and the nodes with upstream-downstream relation with the overall coordination equipment.
The production route ensures the automatic production of normal technological processes, and is a core functional route of the whole oil gas intelligent pipeline system. Starting from a technological process, the production equipment is a process field, according to a general layout diagram, wherein a controller is used for controlling the process field, an HMI (Human Machine Interface, human-computer interaction interface) is used for realizing interaction between a person and the process field, a PCS (Process Control Systems, a process control system) is used for controlling the production process of the process field, and a SCADA (Supervisory Control And Data Acquisition, a data acquisition and monitoring system) provides decision basis for the PCS; the controller, HMI, field personnel operating the man-machine interface, and PCS and SCADA are therefore upstream and downstream nodes of the process site, together with the process site, constitute a production route.
Therefore, the nodes included on the production line for constructing the system model are: the process field, a controller controlling the process field, an HMI, field personnel operating a human-machine interface, and PCS and SCADA of a production route.
Similarly, based on the overall layout diagram, the safety emergency device and the overall coordination device, a safety emergency route and an overall coordination route can be respectively determined, and corresponding nodes can be determined.
Specifically, the safety emergency route is started when abnormality is eliminated after the system alarms, and mainly comprises an alarm route and an elimination route, wherein the alarm route starts from the alarm of the data acquisition and monitoring system, and an alarm report is sent to an operator station; the elimination route is to send an elimination action to the intelligent production route to eliminate the abnormality after the operator station receives the alarm, and for unknown abnormality which is difficult to eliminate, the operator station report refers to the engineer station, and the engineer station directs the elimination of the abnormality. Thus, the important equipment facilities in the emergency function route are primarily operator stations for monitoring field anomalies, reporting proper anomaly removal to field personnel or directly controlling the process control system removal, and for handling anomalies that cannot be handled by the operator, taking command actions in conjunction with operator reports and SCADA, and sending the actions to the operator's engineer stations.
Therefore, the nodes included on the safety emergency route for constructing the system model are: operator and engineer stations, and may also include upstream and downstream nodes.
Specifically, the overall coordination route provides a layer of protection for the safe operation of the system, and the coordination of the system paralysis is performed by the coordination parties. Thus, the important equipment facilities in the overall coordination route are mainly computer stations for storing all process-related data (including operation data, sensor data, etc.), and a scheduling center for overall scheduling of all personnel when the system is down.
Therefore, the nodes included in the overall coordination route for constructing the system model are: the computer station and the dispatch center may also include upstream and downstream nodes.
Step 303, determining the system model according to the nodes contained in the at least one functional route.
Specifically, when the system model is constructed, the hierarchy of the system model is determined according to the positions of nodes forming the oil gas intelligent pipeline system, and the nodes at different positions are layered according to the control relation. And feedback information and control information among nodes are represented by directional connecting lines. The feedback information comprises data information of each node, the direction of the connecting line is used for representing the data receiving and transmitting directions, the control information comprises control actions of each node, and the direction of the connecting line is used for representing the action directions.
Fig. 4 is a schematic diagram of an oil gas intelligent pipeline system according to an embodiment of the invention. As shown in fig. 4, the solid line represents control information, and the broken line represents feedback information. Determining a process field, a controller and field personnel at the bottommost layer according to the positions of the nodes; the operator station and the engineer are positioned at the upper layer, the SCADA and the PCS are inserted in the middle layer for realizing the interaction of the operator and the engineer on the site, and the computer station and the dispatching center for data storage are not easy to start and are positioned at the uppermost layer. The hierarchy of the system model and the nodes of each hierarchy are: the process field, the controller, the field personnel and the HMI are at the bottommost layer; SCADA and PCS are on the upper layer; the console operator station and engineers stand on a higher level; the computer station and dispatch center are at the top level.
Illustratively, at a process site, field personnel may perform inspection control by entering the process site, and the field personnel may monitor and control the site with a controller via a human-machine interface.
In the normal production process, the process data are transmitted to a data acquisition and monitoring system and a process control system through a controller, the data acquisition and monitoring system transmits information to the process control system, the information is compared and checked in the process control system to make correct control actions, the control information is transmitted to the data acquisition and monitoring system, and a process site is controlled through the controller.
When an abnormality occurs, the data acquisition system gives an alarm, and after the operator station finds the abnormality, the operator station sends an abnormality elimination action to the process control system, and the abnormality is eliminated through the controller. Or the abnormal-eliminating action information is sent from the field personnel. When the operator does not know the elimination measures for the newly-appearing abnormality, the engineer station transmits an abnormality elimination action to the operator.
Through analyzing the overall layout of the system, and screening out the nodes for constructing the model according to the production route, the safety emergency route and the overall coordination route, the equipment or personnel corresponding to the nodes are ensured to have influence on the process flow of the normal system, and the accuracy of risk prediction and accident deduction through the system model in the aspect of physical failure is improved.
Step 202, determining executable actions, accessible information and preparation information corresponding to each node according to the system model; wherein the executable action is control information executable by the node; the accessible information is information according to which the node executes the action, and specifically may include feedback information of a lower node; the preparation information is control information of an upper layer hierarchy of the node.
Specifically, in order to clearly express the information interaction relationship of different nodes in the system model and the relationship between each node and the system operation, it is necessary to perform role expression on each node in the system model, and optionally, perform role expression on each node from three aspects of executable action, accessible information and preparation information. Wherein the accessible information of a node is from a lower node of the node, and the preparation information of a node is from an upper node of the node.
Table 1 is a node role expression table provided in an embodiment of the present invention. Table 1 lists the executable actions, accessible information, and preparation information corresponding to each node of the above-constructed system model.
TABLE 1 node role expression table
Figure BDA0004073603070000051
Figure BDA0004073603070000061
In order to describe the roles of the nodes in the system model in detail, an embodiment of the invention takes a metering and voltage regulating process of a certain gas transmission head station as an example, and describes the role allocation of the nodes in detail. Fig. 5 is a schematic diagram of a system model for metering and voltage regulation of a head station according to an embodiment of the present invention. As shown in fig. 5, a system model is constructed according to the method, and the hierarchy of the system model is: the bottommost layer is equipment required by metering and pressure regulating of the first station; the upper layer is a field personnel, an HMI and a controller; the upper layer is PCS and SCADA; the topmost layer is an operator station and an engineer station.
Fig. 6 is a schematic diagram of node role expression of a system model for metering and voltage regulation of a head station according to an embodiment of the present invention. When the head station metering voltage regulation is executed, executable actions, accessible information and preparation information corresponding to each node of the system model are shown in fig. 6. The various nodes in the system operate in accordance with the executable actions, the accessible information, and the provisioning information shown in fig. 5.
Fig. 7 is a schematic diagram of node role expression of a system model for head station metering and voltage regulation according to another embodiment of the present invention. Fig. 7 shows a schematic diagram of information feedback and control about the head station metering regulator, controller and PCS in the system model of fig. 6. As shown in fig. 7, the pressure gauge 1 feeds back current pressure information to the pressure regulating inlet equipment of the controller, wherein the information is accessible information of the controller; the controller feeds back the received pressure information to the PCS, wherein the information is accessible information of the PCS; the PCS controls the controller according to the pressure information fed back by the controller, and the controller realizes the control of the valve 1 according to the control of the PCS, wherein the executable action of the PCS is realized by the controller. And similarly, each node works according to the corresponding executable action, the accessible information and the preparation information, so that the system operates normally. In the system model, the working principle of each node is similar to that described above.
Step 203, determining possible accidents and corresponding processing strategies during the system operation according to the executable actions, the accessible information and the preparation information of each node.
Specifically, when the system is attacked by the information security threat, the information feedback and control between the nodes are changed relative to the normal operation, which may result in a change of executable actions and/or accessible information and/or preparation information of part of the nodes, thereby generating an accident. And deducing accidents by simulating the influence on the system operation when the information security threat attack is simulated in the oil gas intelligent pipeline model, and making a corresponding planning strategy according to the accidents.
Optionally, determining possible incidents generated during the system running and corresponding processing strategies according to the executable actions, the accessible information and the preparation information of each node comprises:
traversing nodes in the system model, determining changes of executable actions, accessible information and preparation information of the nodes after at least one type of information security threat attacks the nodes aiming at each traversed node, and determining possible accidents during system operation according to the changes;
Determining a corresponding processing strategy according to the possibly generated accident;
wherein the at least one type of information security threat comprises: at least one of personnel operation errors, tampering process parameters and tampering control information.
Wherein, the technological parameters are the parameter information required by the normal operation of the system. Specifically, when the information security threat attacks the oil gas intelligent pipeline system, three aspects of personnel, equipment and environment of the oil gas intelligent pipeline system can be finally caused to generate faults, so that the types of the information security threat can be divided into three types of personnel operation errors, tampering process parameters and tampering control information.
The unsafe actions corresponding to the personnel operation errors comprise that personnel (remote operators and field personnel) cannot send or send error instructions due to the loss or forging of process parameters and the like; the personnel cause larger accidents when taking remedial measures; operator's misoperation occurs for physiological or psychological reasons.
The unsafe behavior corresponding to the tampering process parameters comprises that the tampering process parameters enable the nodes to execute error actions according to the error parameter information; the node that results from the delay, loss or replay of the process parameters performs the wrong action. The information security threat behavior of the tampering process parameter type is that the node is in error by tampering with the relevant data.
The unsafe behavior corresponding to the falsification control information comprises falsifying the control information or feedback information of the node to make the node or other nodes make error actions; delaying or losing control information or feedback information of a node, thereby causing the node or other nodes to make false actions. The information security threat behavior of the tampered control information type is direct attack node, so that false action occurs.
Optionally, fig. 8 is a schematic flow chart of determining an accident according to an embodiment of the present invention. As shown in fig. 8, after determining, for each node, that at least one type of information security threat attacks the node, changes in executable actions, accessible information, and preparation information of the node, and determining possible incidents occurring when the system is running according to the changes that occur, including:
step 801, after determining, for each node, that at least one type of information security threat attacks the node, changes in executable actions, accessible information, and provisioning information of the node occur.
Specifically, the system model is constructed under the condition that the system is normally operated, and each node in the system model works according to the corresponding executable action, the accessible information and the preparation information. Alternatively, the system model may be attacked by information security threat, where the corresponding executable actions, accessible information and preparation information of the nodes are changed, and feedback or control information of the nodes are changed, so that the nodes or other nodes in the model make a false action, thereby causing the system to generate an accident.
Step 802, determining whether the change will cause node failure, if so, determining that the accident caused by the change is the possible accident.
Specifically, the node failure is from the physical function point of view, and the failed node performs an erroneous action or feeds back erroneous information to other nodes.
Optionally, when a node receives an attack, the failed node is the node or other nodes.
In the above-mentioned first station metering and pressure regulating system model, the controller is attacked by tampering with the information security threat of the control information type, and the executable action of the controller is changed, and in a normal state, the executable action should be to open the valve, but after being attacked, the executable action is to open the valve, which may result in the corresponding valve being opened to be small, so that the pressure of the pipeline becomes large, and the danger such as fire may occur.
The nodes in the system are invalid after the nodes of the system model are attacked by the information security threat, so that accidents generated after the nodes are invalid are determined, the information security threat identified according to the system model is ensured, the risk of physical invalidation can be caused when the system is operated, and the accuracy of predicting the accidents is improved.
According to the information security threat attack system model, accidents which can be generated after the intelligent system of the oil-gas intelligent pipeline is attacked by the information security threat are predicted, corresponding processing strategies are formulated for each accident, and when the strategies are executed, the information security threat can be effectively applied or the accidents can be solved.
Optionally, determining a corresponding processing policy according to the possible accident includes:
aiming at each information security threat, determining a processing strategy of the node and/or related nodes according to the corresponding incidents after the information security threat attacks the node, so that after the processing strategy is executed, executable actions, accessible information and preparation information of the node recover the state before being attacked, or eliminating the incidents;
wherein the related node is a node of a level above the node and/or a node of a level below the node.
For example, in the above-mentioned head station metering and voltage regulating system model, by tampering with the information security threat attack controller of the control information type, the executable action of the controller is changed, and in a normal state, the executable action should be to open the valve big, but after being attacked, the executable action is to open the valve small, which would result in the corresponding valve opening small.
Optionally, strategy 1 can be formulated for the controller, and strategy 1 is executed to correct the executable action of the controller to a correct state, so that the valve is opened;
alternatively, strategy 2 may be formulated for a valve, and strategy 2 may be performed, while the controller's executable actions remain erroneous, the valve remains working properly, thus eliminating the incident.
By formulating the processing strategy for the accident from the perspective of eliminating the accident, the accuracy and the comprehensiveness of the processing strategy corresponding to the accident are improved.
Based on the executable actions of the nodes in the system model, the accessible information and the accidents generated after different nodes suffer from different types of information security threats when the information prediction system is prepared to run, the comprehensiveness of risk prediction is improved, corresponding processing strategies are formulated, redundant steps in the processing strategies are avoided, the pertinence of the processing strategies is improved, and the efficiency of coping with the information security threats is improved.
Step 204, executing the corresponding processing strategy when the accident occurs in the system operation process according to the accident which can be generated and the corresponding processing strategy.
Optionally, the accident predicted by the system model analysis and the corresponding processing strategy are summarized into a strategy table, and when the oil gas intelligent pipeline system runs, if the accident occurs due to the information security threat, the corresponding processing strategy is queried and executed according to the strategy table, so that the capability and the efficiency of the system for coping with the information security threat are improved.
Illustratively, according to the method, the strategy tables formulated for the pipeline for metering and regulating the pressure of the gas transmission head station are table 2, table 3 and table 4. Table 2 is a policy table of information security threat types for personnel operation errors; table 3 is a policy table of the information security threat type of the tampering process parameter, and table 4 is a policy table of the information security threat type of the tampering control information.
TABLE 2 policy table for information security threat types for personnel mishandling
Figure BDA0004073603070000081
TABLE 2 policy table of information security threat type for personnel to operate errors
Figure BDA0004073603070000091
TABLE 2 policy table of information security threat type for personnel to operate errors
Figure BDA0004073603070000101
TABLE 2 policy table of information security threat type for personnel to operate errors
Figure BDA0004073603070000111
TABLE 2 policy table of information security threat type for personnel to operate errors
Figure BDA0004073603070000121
TABLE 2 policy table of information security threat type for personnel to operate errors
Figure BDA0004073603070000122
TABLE 3 policy table for information security threat types for tampering process parameters
Figure BDA0004073603070000131
/>
TABLE 3 policy table (follow-up) for type of information security threat for tampering with process parameters
Figure BDA0004073603070000132
TABLE 4 policy table for information security threat types of tamper control information
Figure BDA0004073603070000141
TABLE 4 policy table (follow-up) for information security threat type of tamper control information
Figure BDA0004073603070000151
TABLE 4 policy table (follow-up) for information security threat type of tamper control information
Figure BDA0004073603070000161
TABLE 4 policy table (follow-up) for information security threat type of tamper control information
Figure BDA0004073603070000171
TABLE 4 policy table (follow-up) for information security threat type of tamper control information
Figure BDA0004073603070000181
TABLE 4 policy table (follow-up) for information security threat type of tamper control information
Figure BDA0004073603070000191
Optionally, when risk prediction is performed through a system model, accidents are deduced, and corresponding processing strategies are formulated, a database can be preset in advance, wherein the database comprises information of historical successful experiences of accidents caused by information security threat of the system, accident strategy information which can be directly deduced according to information interaction relations among nodes, and when accidents are predicted and strategies are formulated, all or part of results are directly obtained according to the database. For new risk incidents identified according to the system model and risk incidents of uncertain strategies, the new risk incidents can be fed back to the user, and the user formulates corresponding strategies and synchronizes the strategies into the database. Meanwhile, the user can change the strategy obtained through the database according to the safety requirement of the system operation, for example, the corresponding strategy of the accident is changed according to different process functions of the system. Optionally, an embodiment of the present invention provides a user interface, and fig. 9 is a schematic diagram of a user interface provided by an embodiment of the present invention. As shown in fig. 9, a user may view or adjust a system model or an overall layout diagram corresponding to the oil gas intelligent pipeline oil gas pipeline system through the user interface, for example, select important nodes on the illustrated overall layout diagram so that the control device builds the system model according to the important nodes; the user can also view or adjust executable actions, accessible information and preparation information corresponding to each node; meanwhile, the deduced incidents and corresponding strategies can be displayed to the user through the page, and the user can change or confirm the incidents and strategies on the page.
The oil and gas pipeline system model is constructed according to the control logic relation among the nodes of the oil and gas pipeline system, and executable actions, accessible information and preparation information of the nodes in the model are determined, so that the feedback control relation of the model is more concise; meanwhile, accidents occurring when different nodes of the information security threat attack system are predicted according to the model, the comprehensiveness of predicting risk accidents is improved, corresponding treatment strategies are formulated according to the accidents and the control logic relations of the nodes in the model, the accuracy of the strategies is improved, new risk accidents caused by redundant security measures or error security measures are avoided, and therefore the capability of the oil and gas pipeline system for coping with the information security threats is improved, and the safety of the oil and gas pipeline system is improved.
Optionally, the execution main body of the oil and gas pipeline information physical security intelligent risk identification method provided by the embodiment of the invention may be control equipment, the control equipment builds a model, deduces an accident, formulates a corresponding processing policy, and when the system runs and accidents happen, controls corresponding nodes in the system to execute the corresponding policy.
Optionally, the execution subject of the oil and gas pipeline information physical security intelligent risk identification method provided by the embodiment of the invention may also be equipment with overall coordination and data processing functions in the oil and gas intelligent pipeline system, such as a computer station. The device is capable of controlling nodes in the system or of sending information to nodes in the system.
Optionally, the method for identifying the risk of the physical security of the oil and gas pipeline information provided by the embodiment of the invention can be jointly executed by control equipment and equipment in an oil and gas intelligent pipeline system, for example, the control equipment is used for constructing a model, deducing an accident and making a strategy; the equipment in the oil gas intelligent pipeline system correspondingly executes to treat accidents according to strategy information formulated by the control equipment, so as to deal with information security threat.
Corresponding to the oil and gas pipeline information physical security intelligent risk identification method provided by the embodiment, the embodiment of the invention also provides an oil and gas pipeline information physical security intelligent risk identification device. Fig. 10 is a block diagram of an oil and gas pipeline information physical security intelligent risk identification device according to an embodiment of the present invention. For convenience of explanation, only portions relevant to the embodiments of the present invention are shown. Referring to fig. 10, the apparatus includes:
a first determining module 1001, configured to determine a system model corresponding to an oil gas intelligent pipeline system; the system model comprises a plurality of layers, each layer comprises at least one node, the nodes are used for representing equipment or personnel, and directed connecting lines between the nodes are used for representing feedback information or control information;
A second determining module 1002, configured to determine, according to the system model, executable actions, accessible information, and preparation information corresponding to each node; wherein the executable action is control information executable by the node; the accessible information is information according to which the node executes actions; the preparation information is control information of an upper layer level of the node;
a third determining module 1003, configured to determine, according to the executable action, the accessible information, and the preparation information of each node, an accident that may occur when the system is running, and a corresponding processing policy;
and the execution module 1004 is configured to execute, in a system operation process, a corresponding processing policy when the accident occurs according to the possible accident and the corresponding processing policy.
Optionally, the first determining module 1001 is specifically configured to, when determining a system model corresponding to the oil gas intelligent pipeline system:
acquiring an overall layout of the oil and gas pipeline system;
determining at least one functional route of the oil and gas pipeline system according to the overall layout;
determining the system model according to the nodes contained in the at least one functional route;
Wherein each functional route includes at least one hierarchy of nodes.
Optionally, the at least one functional route includes: production route, safety emergency route and overall coordination route; the first determining module 1001 is specifically configured to, when determining at least one functional route of the oil and gas pipeline system according to the overall layout diagram:
determining production equipment, safety emergency equipment and overall coordination equipment in the oil and gas pipeline system;
determining the production route according to the production equipment and nodes with upstream-downstream relation with the production equipment based on the overall layout;
determining the safety emergency route according to the safety emergency equipment and nodes with upstream-downstream relation with the safety emergency equipment;
and determining the overall coordination route according to the overall coordination equipment and the nodes with upstream-downstream relation with the overall coordination equipment.
Optionally, the third determining module 1003 is specifically configured to, when determining, according to the executable action, the accessible information and the preparation information of each node, an accident that may occur when the system is running, and a corresponding processing policy:
traversing nodes in the system model, determining changes of executable actions, accessible information and preparation information of the nodes after at least one type of information security threat attacks the nodes aiming at each traversed node, and determining possible accidents during system operation according to the changes;
Determining a corresponding processing strategy according to the possibly generated accident;
wherein the at least one type of information security threat comprises: at least one of personnel operation error, tampering process parameters and tampering control information.
Optionally, the third determining module 1003 is configured to, after determining, for each node, that at least one type of information security threat attacks the node, change the executable action, the accessible information, and the preparation information of the node, and determine, according to the change that occurs, an accident that may occur when the system is running, when the system is specifically configured to:
determining, for each node, changes in executable actions, accessible information, and provisioning information of the node after at least one type of information security threat attacks the node;
and determining whether the change can cause node failure, and if so, determining that the accident caused by the change is the possible accident.
Optionally, the third determining module 1003 is specifically configured to, when determining the corresponding processing policy according to the possible generated incident:
aiming at each information security threat, determining a processing strategy of the node and/or related nodes according to the corresponding incidents after the information security threat attacks the node, so that after the processing strategy is executed, executable actions, accessible information and preparation information of the node recover the state before being attacked, or eliminating the incidents;
Wherein the related node is a node of a level above the node and/or a node of a level below the node.
The device provided in the embodiment of the present invention may be used to implement the technical solutions of the embodiments shown in fig. 1 to 9, and its implementation principle and technical effects are similar, and this embodiment will not be described herein again.
The above description is only illustrative of the preferred embodiments of the present invention and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the invention referred to in the present invention is not limited to the specific combinations of the technical features described above, but also covers other technical features formed by any combination of the technical features described above or their equivalents without departing from the inventive concept described above. Such as the above-mentioned features and the technical features disclosed in the present invention (but not limited to) having similar functions are replaced with each other.
Moreover, although operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limiting the scope of the invention. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Corresponding to the method for identifying the physical security and the intelligent risk of the oil and gas pipeline information provided by the embodiment, the embodiment of the invention provides electronic equipment. Fig. 11 is a block diagram of an electronic device according to an embodiment of the present invention. For convenience of explanation, only portions relevant to the embodiments of the present invention are shown. Fig. 11 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. As shown in fig. 11, the electronic device of the present embodiment may include:
a memory 1101 and at least one processor 1102;
the memory 1101 stores computer-executable instructions;
the at least one processor 1102 executes the computer-executable instructions stored in the memory such that the at least one processor 1102 performs the method of any one of the preceding embodiments.
The implementation principle and technical effects of the electronic device provided in this embodiment may be referred to the foregoing embodiments, and will not be described herein again.
Furthermore, the present invention provides a computer-readable storage medium having stored therein computer-executable instructions which, when executed by a processor, are adapted to carry out the method of any of the above embodiments.
The invention also provides a computer program product comprising a computer program which, when executed by a processor, implements the method according to any of the above embodiments.
In the several embodiments provided by the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple modules may be combined or integrated into another system, or some features may be omitted or not performed.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The integrated modules, which are implemented in the form of software functional modules, may be stored in a computer readable storage medium. The software functional modules described above are stored in a storage medium and include instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or processor to perform some of the steps of the methods described in the various embodiments of the invention.
It should be appreciated that the processor may be a central processing unit (Central Processing Unit, CPU for short), other general purpose processors, digital signal processor (Digital Signal Processor, DSP for short), application specific integrated circuit (Application Specific Integrated Circuit, ASIC for short), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present application may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in a processor for execution. The memory may comprise a high-speed RAM memory, and may further comprise a non-volatile memory NVM, such as at least one magnetic disk memory, and may also be a U-disk, a removable hard disk, a read-only memory, a magnetic disk or optical disk, etc.
The storage medium may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an application specific integrated circuit (Application Specific Integrated Circuits, ASIC for short). It is also possible that the processor and the storage medium reside as discrete components in an electronic device or a master device. An embodiment of the present invention provides a computer readable storage medium, where computer executable instructions are stored, and when executed by a processor, implement a method according to any of the embodiments above.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are example forms of implementing the claims.

Claims (10)

1. An oil and gas pipeline information physical security intelligent risk identification method comprises the following steps:
determining a system model corresponding to an oil and gas pipeline system; the system model comprises a plurality of layers, each layer comprises at least one node, the nodes are used for representing equipment or personnel, and directed connecting lines between the nodes are used for representing feedback information or control information;
determining executable actions, accessible information and preparation information corresponding to each node according to the system model; wherein the executable action is control information executable by the node; the accessible information is information according to which the node executes actions; the preparation information is control information of an upper layer level of the node; determining possible accidents and corresponding processing strategies during the running of the system according to the executable action, the accessible information and the preparation information of each node;
And executing the corresponding processing strategy when the accident occurs in the system operation process according to the accident which can be generated and the corresponding processing strategy.
2. The method of claim 1, wherein determining a corresponding system model of the oil and gas pipeline system comprises:
acquiring an overall layout of the oil and gas pipeline system;
determining at least one functional route of the oil and gas pipeline system according to the overall layout;
determining the system model according to the nodes contained in the at least one functional route;
wherein each functional route includes at least one hierarchy of nodes.
3. The method of claim 2, wherein the at least one functional route comprises: production route, safety emergency route and overall coordination route; determining at least one functional route of the oil and gas pipeline system according to the overall layout, comprising:
determining production equipment, safety emergency equipment and overall coordination equipment in the oil and gas pipeline system;
determining the production route according to the production equipment and nodes with upstream-downstream relation with the production equipment based on the overall layout;
Determining the safety emergency route according to the safety emergency equipment and nodes with upstream-downstream relation with the safety emergency equipment;
and determining the overall coordination route according to the overall coordination equipment and the nodes with upstream-downstream relation with the overall coordination equipment.
4. A method according to any of claims 1-3, characterized in that determining possible incidents of the system operation and corresponding processing strategies from the executable actions, the accessibility information and the preparation information of each node comprises:
traversing nodes in the system model, determining changes of executable actions, accessible information and preparation information of the nodes after at least one type of information security threat attacks the nodes aiming at each traversed node, and determining possible accidents during system operation according to the changes;
determining a corresponding processing strategy according to the possibly generated accident;
wherein the at least one type of information security threat comprises: at least one of personnel operation errors, tampering process parameters and tampering control information.
5. The method of claim 4, wherein determining, for each node, changes in the node's executable actions, accessible information, and provisioning information after at least one type of information security threat attacks the node, and determining possible incidents that may occur when the system is operating based on the changes that occur, comprises:
Determining, for each node, changes in executable actions, accessible information, and provisioning information of the node after at least one type of information security threat attacks the node;
and determining whether the change can cause node failure, and if so, determining that the accident caused by the change is the possible accident.
6. The method of claim 4, wherein determining a corresponding processing policy based on the possible incidents comprises:
aiming at each information security threat, determining a processing strategy of the node and/or related nodes according to the corresponding incidents after the information security threat attacks the node, so that after the processing strategy is executed, executable actions, accessible information and preparation information of the node recover the state before being attacked, or eliminating the incidents;
wherein the related node is a node of a level above the node and/or a node of a level below the node.
7. An oil and gas pipeline information physical security intelligent risk identification device, which is characterized by comprising:
the first determining module is used for determining a system model corresponding to the oil and gas pipeline system; the system model comprises a plurality of layers, each layer comprises at least one node, the nodes are used for representing equipment or personnel, and directed connecting lines between the nodes are used for representing feedback information or control information;
The second determining module is used for determining executable actions, accessible information and preparation information corresponding to each node according to the system model; wherein the executable action is control information executable by the node; the accessible information is information according to which the node executes actions; the preparation information is control information of an upper layer level of the node;
a third determining module, configured to determine, according to the executable action, the accessible information, and the preparation information of each node, an incident that may occur when the system is running, and a corresponding processing policy;
and the execution module is used for executing the corresponding processing strategy when the accident occurs in the system operation process according to the possibly generated accident and the corresponding processing strategy.
8. An electronic device, comprising: a memory and at least one processor;
the memory stores computer-executable instructions;
the at least one processor executing computer-executable instructions stored in the memory, causing the at least one processor to perform the oil and gas pipeline information physical security intelligent risk identification method of any one of claims 1-6.
9. A computer readable storage medium, wherein computer executable instructions are stored in the computer readable storage medium, and when a processor executes the computer executable instructions, the method for identifying the physical security and intellectualization risk of the oil and gas pipeline information according to any one of claims 1-6 is realized.
10. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the oil and gas pipeline information physical security intelligent risk identification method according to any one of claims 1-6.
CN202310063998.9A 2023-01-11 2023-01-11 Oil and gas pipeline information physical security intelligent risk identification method, device and equipment Pending CN116066754A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310063998.9A CN116066754A (en) 2023-01-11 2023-01-11 Oil and gas pipeline information physical security intelligent risk identification method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310063998.9A CN116066754A (en) 2023-01-11 2023-01-11 Oil and gas pipeline information physical security intelligent risk identification method, device and equipment

Publications (1)

Publication Number Publication Date
CN116066754A true CN116066754A (en) 2023-05-05

Family

ID=86183344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310063998.9A Pending CN116066754A (en) 2023-01-11 2023-01-11 Oil and gas pipeline information physical security intelligent risk identification method, device and equipment

Country Status (1)

Country Link
CN (1) CN116066754A (en)

Similar Documents

Publication Publication Date Title
JP6647824B2 (en) Error diagnosis system and error diagnosis method
EP3301528B1 (en) Plant operation system and plant operation method
NO331420B1 (en) Procedures and means for increasing the security integrity level of a control system
JP6812312B2 (en) Plant support evaluation system and plant support evaluation method
CN116664113A (en) Intelligent safety supervision system for electric power metering standardized operation
CN114859839B (en) Coal production safety monitoring system and method
Shaban et al. A systems-theoretic hazard analysis for safety-critical medical gas pipeline and oxygen supply systems
EP3510450B1 (en) Emergency shutdown system for dynamic and high integrity operations
CN116066754A (en) Oil and gas pipeline information physical security intelligent risk identification method, device and equipment
O’Hara et al. The effects of degraded digital instrumentation and control systems on human-system interfaces and operator performance
CN113934135B (en) Compound monitored control system based on electric power piping lane
EP3885853A1 (en) I/o mesh architecture for a safety instrumented system
CN113684868A (en) City utility tunnel early warning system
CN114864125A (en) Failure processing method and device for fire information of nuclear power plant and computer equipment
CN111401760A (en) Safety and stability control device exception handling decision method and device
CN113806909B (en) Scene selection method and device for nuclear power comprehensive scene verification, and nuclear power comprehensive scene verification method and system
Kościelny et al. Modern measures of risk reduction in industrial processes
Lin et al. Research on quality and safety intelligent system under ship navigation
CN108596341A (en) A kind of method for diagnosing faults based on expert system
Hollnagel et al. Input Requirements to a Performance Monitoring System
US20240153657A1 (en) Device for controlling a plurality of nuclear reactors
US20230118891A1 (en) Device for controlling a plurality of nuclear reactors in clusters
Almadi et al. Safety Instrumented System Design Philosophy Paradigm Shift to Achieve Safe Operations of Interconnected Operating Sites
CN117575309A (en) Safety risk online monitoring method and device
Nyman Operational Data Framework for Safety Instrumented Systems: A Case Study in Functional Safety and Reliability

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination