CN116132161B - Threat analysis and assessment method for power monitoring system - Google Patents
Threat analysis and assessment method for power monitoring system Download PDFInfo
- Publication number
- CN116132161B CN116132161B CN202310094283.XA CN202310094283A CN116132161B CN 116132161 B CN116132161 B CN 116132161B CN 202310094283 A CN202310094283 A CN 202310094283A CN 116132161 B CN116132161 B CN 116132161B
- Authority
- CN
- China
- Prior art keywords
- matrix
- monitoring system
- power monitoring
- security feature
- calculation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 40
- 238000004458 analytical method Methods 0.000 title claims abstract description 29
- 238000000034 method Methods 0.000 title claims abstract description 16
- 239000011159 matrix material Substances 0.000 claims abstract description 82
- 238000004364 calculation method Methods 0.000 claims abstract description 29
- 238000011156 evaluation Methods 0.000 claims abstract description 20
- 238000012502 risk assessment Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 5
- 230000005856 abnormality Effects 0.000 claims description 3
- 230000004044 response Effects 0.000 claims description 2
- 230000000694 effects Effects 0.000 abstract description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/16—Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/02—Computing arrangements based on specific mathematical models using fuzzy logic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Algebra (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Automation & Control Theory (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Databases & Information Systems (AREA)
- Biomedical Technology (AREA)
- Fuzzy Systems (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Computation (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Supply And Distribution Of Alternating Current (AREA)
Abstract
The invention relates to a threat analysis and evaluation method for an electric power monitoring system, which is characterized by comprising the following steps: the method comprises the steps of calculating safety characteristic parameter weights based on absolute association degrees, calculating safety characteristic parameter risks based on three dimensions of information safety and calculating comprehensive threat assessment values of the power monitoring system. The method comprises the steps of firstly summarizing collected safety feature parameters, establishing an observation matrix by utilizing the safety feature parameters as a basis for threat analysis and evaluation, calculating the safety feature parameter weight by utilizing absolute association degree, then using CIA triples as analysis tuples to finish calculation of the safety feature parameter risks of the power monitoring system, and finally utilizing global influence weights of the safety feature parameters obtained by calculation and risk evaluation values respectively caused by attacks in CIA three dimensions to obtain comprehensive threat evaluation values of the power monitoring system and updating in real time. Has the advantages of scientific and reasonable method, strong applicability and good effect.
Description
Technical Field
The invention belongs to the technical field of network security, and relates to a threat analysis and assessment method for an electric power monitoring system.
Background
In the prior art, an electric power monitoring system refers to intelligent equipment and a system which play a role in monitoring and controlling in the electric power production and transmission process, and are used for supporting the safe and stable operation of the electric power system and ensuring the reliable supply of electric power. The functions of the power monitoring system comprise user management, data acquisition and processing, event recording, fault alarming, remote signaling, remote control, remote measurement and the like. With the increasingly wide application of computer information technology in the power industry, the power monitoring system inevitably becomes a target of various network attacks due to the vulnerability and importance of the power monitoring system. Therefore, threat analysis and evaluation are performed on the power monitoring system, the safety of the power system is improved, and the problem to be solved in the field is to be solved in a urgent need. The threat analysis and evaluation method for the power monitoring system at present mainly has the following problems:
(1) The existing threat analysis method needs to scan system resources such as system logs in real time, which may cause overload of equipment;
(2) In the existing threat analysis method, when unified formatting is performed on multi-source heterogeneous data, the situation of carrying out false clipping on useful information can occur;
(3) Because of the complexity of the power monitoring system itself, the system may have delayed responses to some attacks, which may be unacceptable for certain devices with high real-time requirements.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a threat analysis and evaluation method for an electric power monitoring system, which can evaluate the influence degree and range of an attack on a target and can optimize in real-time and reliability.
The aim of the invention is optimally realized by the following technical scheme: a threat analysis and assessment method for an electric power monitoring system, the method comprising: the method comprises the steps of calculating safety characteristic parameter weights based on absolute association, calculating safety characteristic parameter risks based on information safety three dimensions and calculating comprehensive threat assessment values of a power monitoring system.
Further, the calculation of the security feature parameter weight based on the absolute association degree is to calculate the influence value of the security feature parameter in the network global, collect the collected security feature parameter, use the security feature parameter to establish an observation matrix as the basis of threat analysis and evaluation, and set m security feature parameters in total, where the m security feature parameters include system log analysis, attack alarm information, equipment abnormality analysis and comprehensive risk analysis, and the established observation matrix A is expressed as:
the i-th column of the matrix a, i=1, 2,..m, represents the influence value of the i-th security feature parameter at the T, t=1, 2,..t, moment, for making the data of each group more comparable to the element x of the matrix a i (t) performing initial value operation according to the formula (2) to obtain x i ′(t):
Wherein x is i (t) is the influence value, x of the ith safety feature parameter at the time t i (1) For the impact value of the ith security feature parameter at time t=1, i.e. the first row element of matrix a, an initialized matrix a' is thus obtained:
calculating the association coefficient of each sub-item based on a matrix A 'and forming an association matrix, wherein the first column in the matrix A' is a reference sequence, namely X 1 ={x 1 ′(1),x 1 ′(2),...,x 1 ′(T)}={1,x 1 ′(2),...,x 1 'T', the remaining columns being comparison sequences, X i ={x i ′(1),x i ′(2),...,x i ′(T)}={1,x i ′(2),...,x i ' T } i=2, 3,..m, one subtracting from the reference sequence by equations (4), (5)Generating Δx 1 (t) one subtraction of the comparison sequence to yield Δx i (t):
Δx 1 (t)=x 1 ′(t)-x 1 ′(t-1),t=2,3,....,T (4)
Δx i (t)=x i ′(t)-x i ′(t-1),i=2,3,...,m;t=2,3,...,T (5)
Then calculate the association coefficient gamma i (t):
Thereby obtaining an association matrix R:
obtaining any two safety characteristic parameters according to formulas (8), (9) and (10)And->Correlation between->
Thereby obtaining a new association matrix R':
the matrix R 'is a non-negative symmetric matrix of m x m, provided that the matrix R' has a maximum eigenvalue lambda max And there is a feature vector P such that lambda max P=R′P,P=[ω 1 ,ω 2 ,...,ω m ] T Wherein ω is i And (3) representing the global influence weight of the ith security feature parameter, wherein i=1, 2,..m, and calculating the global influence weight of the m security feature parameters on the network according to the global influence weight.
Further, the calculation of the security feature parameter risk based on information security three dimensions is to realize the calculation of the security feature parameter risk value of the power monitoring system when the power monitoring system handles the attack, and the CIA triples are used, namely: confidentiality (importance), integrity (Integrity), availability (Availability) as analysis tuples, for element a in the underlying propagation hierarchy tuple 1 ,a 2 ,...,a n The importance comparison is carried out as shown in a specific formula (12):
wherein u is jk 、v jk And w jk The confidentiality fuzzy matrix M can be obtained by comparing the results of the elements with three dimensions of confidentiality, integrity and availability C Integrity fuzzy matrix M I And availability ambiguity matrix M A :
Judging whether the matrix meets the fuzzy consistency, if the matrix is a fuzzy inconsistent matrix, adjusting the matrix into the fuzzy consistency matrix, and designating the difference between two rows of corresponding elements in the matrix as a constant according to the judging principle of the fuzzy consistency matrix, wherein the fuzzy consistency matrix is as follows:
wherein u is fg ,u fh ,u gh ∈M c ,v fg ,v fh ,v gh ∈M I ,w fg ,w fh ,w gh ∈M A F=1, 2, ··, n, g=1, 2, the terms, n, h=1, 2, n, f +.g +.h, the matrix is normalized according to equation (17):
wherein u' fg 、v′ fg And w' fg Respectively represent the fuzzy matrix M in three dimensions of confidentiality, integrity and availability C 、M I And M A A result of the element unification processing;
calculating threat assessment index of attack in CIA three dimensions:
after threat evaluation indexes of different dimensions are calculated, attack is performed on risk evaluation values f respectively caused by CIA three-dimensions C 、f I And f A The calculation formula is as follows:
wherein the value of the function T (x) increases with the number of attacks x, and the expression is defined as:
and accordingly, the calculation of the safety characteristic parameter risk of the power monitoring system is completed.
Further, the comprehensive threat assessment value of the power monitoring system is calculated by using the global influence weight omega of the m security feature parameters obtained by calculation i I=1, 2,..m, and risk assessment value f by attack on CIA three-dimension, respectively C 、f I And f A Finally, the comprehensive threat assessment value CT of the power monitoring system is obtained and updated in real time, and the calculation method is shown as a formula (21):
wherein x is i (t) is the influence value, omega, of the ith safety feature parameter at the time t i Global impact weight representing the i-th security feature parameter, i=1, 2,.. C 、f I And f A Is a risk evaluation value respectively caused by attacks in CIA three-dimension, and alpha, beta and χ are respectively used for measuring f C 、f I And f A Is a weight of (2).
The threat analysis and assessment method for the power monitoring system comprises the steps of firstly summarizing collected safety feature parameters, establishing an observation matrix by using the safety feature parameters, calculating the safety feature parameter weight by using absolute association, then using CIA triplets as analysis tuples, completing calculation of the risk of the safety feature parameters of the power monitoring system, and finally obtaining comprehensive threat assessment values of the power monitoring system by using global influence weights of the safety feature parameters obtained by calculation and risk assessment values respectively caused by attacks in CIA three dimensions. The influence degree and range of the attack on the target can be evaluated, and the real-time performance and reliability can be optimized. Has the advantages of scientific and reasonable method, strong applicability and good effect.
Drawings
FIG. 1 is a flow chart of a threat analysis and assessment method for an electrical monitoring system according to the present invention.
Detailed Description
The invention will be further described with reference to the drawings and the detailed description.
Referring to fig. 1, the threat analysis and assessment method for a power monitoring system provided by the invention includes: the method comprises the following specific contents of calculating the safety characteristic parameter weight based on the absolute association degree, calculating the safety characteristic parameter risk based on the information safety three dimensions and calculating the comprehensive threat assessment value of the power monitoring system:
1) Calculation of security feature parameter weights based on absolute relevance
In order to calculate the influence value of the security feature parameter in the network global, summarizing the collected security feature parameter, and taking the collected security feature parameter as the basis of threat analysis and evaluation, establishing an observation matrix by using the security feature parameter, and setting m security feature parameters in total, wherein the m security feature parameters comprise system log analysis, attack alarm information, equipment abnormality analysis and comprehensive risk analysis, and the established observation matrix A is expressed as:
the i-th column of the matrix a, i=1, 2,..m, represents the influence value of the i-th security feature parameter at the T, t=1, 2,..t, moment, for making the data of each group more comparable to the element x of the matrix a i (t) performing initial value operation according to the formula (2) to obtain x i ′(t):
Wherein x is i (t) is the influence value, x of the ith safety feature parameter at the time t i (1) For the impact value of the ith security feature parameter at time t=1, i.e. the first row element of matrix a, an initialized matrix a' is thus obtained:
calculating the association coefficient of each sub-item based on a matrix A 'and forming an association matrix, wherein the first column in the matrix A' is a reference sequence, namely X 1 ={x 1 ′(1),x 1 ′(2),...,x 1 ′(T)}={1,x 1 ′(2),...,x 1 'T', the remaining columns being comparison sequences, X i ={x i ′(1),x i ′(2),...,x i ′(T)}={1,x i ′(2),...,x i ' s (T) }, i=2, 3,..m, generating Deltax by one time subtracting the reference sequence by the formulas (4), (5) 1 (t) one subtraction of the comparison sequence to yield Δx i (t):
Δx 1 (t)=x 1 ′(t)-x 1 ′(t-1),t=2,3,....,T (4)
Δx i (t)=x i ′(t)-x i ′(t-1),i=2,3,...,m;t=2,3,...,T (5)
Then calculate the association coefficient gamma i (t):
Thereby obtaining an association matrix R:
obtaining any two safety characteristic parameters according to formulas (8), (9) and (10)And->Correlation between->
Thereby obtaining a new association matrix R':
the matrix R 'is a non-negative symmetric matrix of m x m, provided that the matrix R' has a maximum eigenvalue lambda max And there is a feature vector P such that lambda max P=R′P,P=[ω 1 ,ω 2 ,...,ω m ] T Wherein ω is i Representing global influence weights of the ith security feature parameter, i=1, 2..m, and accordingly completing calculation of the global influence weights of the m security feature parameters on the network;
2) Information security three-dimensional based security feature parameter risk calculation
In order to realize the calculation of the risk value of the safety characteristic parameter of the power monitoring system when coping with the attack, CIA triples are used, namely: confidentiality (importance), integrity (Integrity), availability (Availability) as analysis tuples, for element a in the underlying propagation hierarchy tuple 1 ,a 2 ,...,a n The importance comparison is carried out as shown in a specific formula (12):
wherein u is jk 、v jk And w jk The confidentiality fuzzy matrix M can be obtained by comparing the results of the elements with three dimensions of confidentiality, integrity and availability C Integrity fuzzy matrix M I And availability ambiguity matrix M A :
Judging whether the matrix meets the fuzzy consistency, if the matrix is a fuzzy inconsistent matrix, adjusting the matrix into the fuzzy consistency matrix, and designating the difference between two rows of corresponding elements in the matrix as a constant according to the judging principle of the fuzzy consistency matrix, wherein the fuzzy consistency matrix is as follows:
wherein u is fg ,u fh ,u gh ∈M c ,v fg ,v fh ,v gh ∈M I ,w fg ,w fh ,w gh ∈M A F=1, 2, ··, n, g=1, 2, the terms, n, h=1, 2, n, f +.g +.h, the matrix is normalized according to equation (17):
wherein u' fg 、v′ fg And w' fg Respectively represent the fuzzy matrix M in three dimensions of confidentiality, integrity and availability C 、M I And M A A result of the element unification processing;
calculating threat assessment index of attack in CIA three dimensions:
after threat evaluation indexes of different dimensions are calculated, attack is performed on risk evaluation values f respectively caused by CIA three-dimensions C 、f I And f A The calculation formula is as follows:
wherein the value of the function T (x) increases with the number of attacks x, and the expression is defined as:
the calculation of the safety characteristic parameter risk of the power monitoring system is completed according to the risk;
3) Calculation of comprehensive threat assessment value of power monitoring system
Global impact weight omega of m security feature parameters obtained by calculation i I=1, 2,..m, and risk assessment value f by attack on CIA three-dimension, respectively C 、f I And f A Finally, the comprehensive threat assessment value CT of the power monitoring system is obtained and updated in real time, and the calculation method is shown as a formula (21):
wherein x is i (t) is the influence value, omega, of the ith safety feature parameter at the time t i Global impact weight representing the i-th security feature parameter, i=1, 2,.. C 、f I And f A Is a risk evaluation value respectively caused by attacks in CIA three-dimension, and alpha, beta and χ are respectively used for measuring f C 、f I And f A Is a weight of (2).
The software programs to which the present invention applies are organized according to automation, network and computer processing techniques, familiar to those skilled in the art.
The detailed description of the invention is not intended to be exhaustive or to limit the scope of the claims, and other substantially equivalent substitutions will now occur to those skilled in the art from the teachings of the present embodiments without the exercise of inventive faculty, and are within the scope of the invention.
Claims (1)
1. A threat analysis and evaluation method for an electric power monitoring system is characterized in that: the method comprises the steps of calculating safety characteristic parameter weights based on absolute association, calculating safety characteristic parameter risks based on three dimensions of information safety and calculating comprehensive threat assessment values of a power monitoring system;
the calculation of the security feature parameter weight based on the absolute association degree is to calculate the influence value of the security feature parameter in the network global, collect the collected security feature parameter, use the security feature parameter to establish an observation matrix as the basis of threat analysis and evaluation, and set m security feature parameters in total, wherein the m security feature parameters comprise system log analysis, attack alarm information, equipment abnormality analysis and comprehensive risk analysis, and the established observation matrix A is expressed as:
wherein, the ith column, i of matrix AThe values of the influence of the ith safety feature parameter at T, t=1, 2,.. i (t) performing initial value operation according to the formula (2) to obtain x i ′(t):
Wherein x is i (t) is the influence value, x of the ith safety feature parameter at the time t i (1) For the impact value of the ith security feature parameter at time t=1, i.e. the first row element of matrix a, an initialized matrix a' is thus obtained:
calculating the association coefficient of each sub-item based on a matrix A 'and forming an association matrix, wherein the first column in the matrix A' is a reference sequence, namely X 1 ={x 1 ′(1),x 1 ′(2),...,x 1 ′(T)}={1,x 1 ′(2),...,x 1 'T', the remaining columns being comparison sequences, X i ={x i ′(1),x i ′(2),...,x i ′(T)}={1,x i ′(2),...,x i ' s (T) }, i=2, 3,..m, generating Deltax by one time subtracting the reference sequence by the formulas (4), (5) 1 (t) one subtraction of the comparison sequence to yield Δx i (t):
Δx 1 (t)=x 1 ′(t)-x 1 ′(t-1),t=2,3,....,T (4)
Δx i (t)=x i ′(t)-x i ′(t-1),i=2,3,...,m;t=2,3,...,T (5)
Then calculate the association coefficient gamma i (t):
Thereby obtaining an association matrix R:
obtaining any two safety characteristic parameters according to formulas (8), (9) and (10)And->Correlation between->
Thereby obtaining a new association matrix R':
the matrix R 'is a non-negative symmetric matrix of m x m, provided that the matrix R' has a maximum eigenvalue lambda max And there is a feature vector P such that lambda max P=R′P,P=[ω 1 ,ω 2 ,...,ω m ] T Wherein ω is i Representing the security feature parameter of item iGlobal impact weight, i=1, 2,..m, accordingly, the calculation of the global influence weight of the m security feature parameters on the network is completed;
the calculation of the security feature parameter risk based on information security three dimensions is the calculation of the security feature parameter risk value of the power monitoring system when the power monitoring system is in response to attack, and CIA triples are used, namely: confidentiality (importance), integrity (Integrity), availability (Availability) as analysis tuples, for element a in the underlying propagation hierarchy tuple 1 ,a 2 ,...,a n The importance comparison is carried out as shown in a specific formula (12):
wherein u is jk 、v jk And w jk The confidentiality fuzzy matrix M can be obtained by comparing the results of the elements with three dimensions of confidentiality, integrity and availability C Integrity fuzzy matrix M I And availability ambiguity matrix M A :
Judging whether the matrix meets the fuzzy consistency, if the matrix is a fuzzy inconsistent matrix, adjusting the matrix into the fuzzy consistency matrix, and designating the difference between two rows of corresponding elements in the matrix as a constant according to the judging principle of the fuzzy consistency matrix, wherein the fuzzy consistency matrix is as follows:
wherein u is fg ,u fh ,u gh ∈M c ,v fg ,v fh ,v gh ∈M I ,w fg ,w fh ,w gh ∈M A F=1, 2, ··, n, g=1, 2, the terms, n, h=1, 2, n, f +.g +.h, the matrix is normalized according to equation (17):
wherein u' fg 、v′ fg And w' fg Respectively represent the fuzzy matrix M in three dimensions of confidentiality, integrity and availability C 、M I And M A A result of the element unification processing;
calculating threat assessment index of attack in CIA three dimensions:
after threat evaluation indexes of different dimensions are calculated, attack is performed on risk evaluation values f respectively caused by CIA three-dimensions C 、f I And f A The calculation formula is as follows:
wherein the value of the function T (x) increases with the number of attacks x, and the expression is defined as:
the calculation of the safety characteristic parameter risk of the power monitoring system is completed according to the risk;
the calculation of the comprehensive threat assessment value of the power monitoring system is to utilize the global influence weight omega of m security feature parameters obtained by calculation i I=1, 2,..m, and risk assessment value f by attack on CIA three-dimension, respectively C 、f I And f A Finally, the comprehensive threat assessment value CT of the power monitoring system is obtained and updated in real time, and the calculation method is shown as a formula (21):
wherein x is i (t) is the influence value, omega, of the ith safety feature parameter at the time t i Global impact weight representing the i-th security feature parameter, i=1, 2,.. C 、f I And f A Is a risk evaluation value respectively caused by attacks in CIA three-dimension, and alpha, beta and χ are respectively used for measuring f C 、f I And f A Is a weight of (2).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310094283.XA CN116132161B (en) | 2023-02-08 | 2023-02-08 | Threat analysis and assessment method for power monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310094283.XA CN116132161B (en) | 2023-02-08 | 2023-02-08 | Threat analysis and assessment method for power monitoring system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116132161A CN116132161A (en) | 2023-05-16 |
CN116132161B true CN116132161B (en) | 2024-04-05 |
Family
ID=86311471
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310094283.XA Active CN116132161B (en) | 2023-02-08 | 2023-02-08 | Threat analysis and assessment method for power monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116132161B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11720686B1 (en) * | 2020-04-08 | 2023-08-08 | Wells Fargo Bank, N.A. | Security model utilizing multi-channel data with risk-entity facing cybersecurity alert engine and portal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104657915A (en) * | 2015-03-10 | 2015-05-27 | 国家电网公司 | Dynamic self-adaptive power system terminal security threat evaluation method |
WO2017044446A1 (en) * | 2015-09-08 | 2017-03-16 | Sikorsky Aircraft Corporation | Cyber security system for a vehicle |
CN111614615A (en) * | 2020-04-16 | 2020-09-01 | 国网浙江省电力有限公司湖州供电公司 | Network security quantitative evaluation method for transformer substation power monitoring system |
CN113408114A (en) * | 2021-06-04 | 2021-09-17 | 中国电力科学研究院有限公司 | Method and system for evaluating vulnerability threat degree of power monitoring system equipment |
CN114862267A (en) * | 2022-05-31 | 2022-08-05 | 国家石油天然气管网集团有限公司 | Evaluation method and system of oil and gas pipeline alarm management system |
-
2023
- 2023-02-08 CN CN202310094283.XA patent/CN116132161B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104657915A (en) * | 2015-03-10 | 2015-05-27 | 国家电网公司 | Dynamic self-adaptive power system terminal security threat evaluation method |
WO2017044446A1 (en) * | 2015-09-08 | 2017-03-16 | Sikorsky Aircraft Corporation | Cyber security system for a vehicle |
CN111614615A (en) * | 2020-04-16 | 2020-09-01 | 国网浙江省电力有限公司湖州供电公司 | Network security quantitative evaluation method for transformer substation power monitoring system |
CN113408114A (en) * | 2021-06-04 | 2021-09-17 | 中国电力科学研究院有限公司 | Method and system for evaluating vulnerability threat degree of power monitoring system equipment |
CN114862267A (en) * | 2022-05-31 | 2022-08-05 | 国家石油天然气管网集团有限公司 | Evaluation method and system of oil and gas pipeline alarm management system |
Non-Patent Citations (1)
Title |
---|
基于电力系统的信息安全风险评估机制研究;梁智强;林丹生;;信息网络安全;20170410(第04期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN116132161A (en) | 2023-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108833416B (en) | SCADA system information security risk assessment method and system | |
CN116132161B (en) | Threat analysis and assessment method for power monitoring system | |
CN109767352B (en) | Safety situation assessment method for electric power information physical fusion system | |
CN106453417A (en) | Network attack target prediction method based on neighbor similarity | |
CN112949202A (en) | Bayesian network-based rockburst probability prediction method | |
CN110636066B (en) | Network security threat situation assessment method based on unsupervised generative reasoning | |
CN116842527A (en) | Data security risk assessment method | |
CN113780443B (en) | Threat detection-oriented network security situation assessment method | |
CN109767351A (en) | A kind of security postures cognitive method of power information system daily record data | |
CN112596031A (en) | Target radar threat degree assessment method based on knowledge graph | |
CN116955091B (en) | Data center fault detection system based on machine learning | |
CN106713233A (en) | Method for judging and protecting network security state | |
CN116644825B (en) | Big data-based outpatient information inquiry reservation management system | |
CN102281163A (en) | Network intrusion detection and alert method | |
CN116112283A (en) | CNN-LSTM-based power system network security situation prediction method and system | |
CN109359234A (en) | A kind of various dimensions network safety event grading plant | |
CN104239785B (en) | Intrusion detection data classification method based on cloud model | |
CN115865708B (en) | Complex social network information handling method based on SIR-D model | |
CN116545679A (en) | Industrial situation security basic framework and network attack behavior feature analysis method | |
CN111158338A (en) | Chemical risk monitoring method based on principal component analysis | |
Wang et al. | Research of the early warning analysis of crop diseases and insect pests | |
Li et al. | Research on network security risk assessment method based on improved AHP | |
CN109873786A (en) | For the safety situation evaluation system of multi-source heterogeneous information cloud platform | |
Wang et al. | Detection of network intrusion threat based on the probabilistic neural network model | |
Chi et al. | Automatic and objective gradation of 114 183 terrorist attacks using a machine learning approach |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |