CN116132161B - Threat analysis and assessment method for power monitoring system - Google Patents

Threat analysis and assessment method for power monitoring system Download PDF

Info

Publication number
CN116132161B
CN116132161B CN202310094283.XA CN202310094283A CN116132161B CN 116132161 B CN116132161 B CN 116132161B CN 202310094283 A CN202310094283 A CN 202310094283A CN 116132161 B CN116132161 B CN 116132161B
Authority
CN
China
Prior art keywords
matrix
monitoring system
power monitoring
security feature
calculation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310094283.XA
Other languages
Chinese (zh)
Other versions
CN116132161A (en
Inventor
李建坡
王赫
王嘉骥
张秋实
李天阳
孟凡奇
朱新月
张华溢
王远洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeast Electric Power University
Original Assignee
Northeast Dianli University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeast Dianli University filed Critical Northeast Dianli University
Priority to CN202310094283.XA priority Critical patent/CN116132161B/en
Publication of CN116132161A publication Critical patent/CN116132161A/en
Application granted granted Critical
Publication of CN116132161B publication Critical patent/CN116132161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/16Matrix or vector computation, e.g. matrix-matrix or matrix-vector multiplication, matrix factorization
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computing arrangements based on specific mathematical models
    • G06N7/02Computing arrangements based on specific mathematical models using fuzzy logic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Biomedical Technology (AREA)
  • Fuzzy Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Supply And Distribution Of Alternating Current (AREA)

Abstract

The invention relates to a threat analysis and evaluation method for an electric power monitoring system, which is characterized by comprising the following steps: the method comprises the steps of calculating safety characteristic parameter weights based on absolute association degrees, calculating safety characteristic parameter risks based on three dimensions of information safety and calculating comprehensive threat assessment values of the power monitoring system. The method comprises the steps of firstly summarizing collected safety feature parameters, establishing an observation matrix by utilizing the safety feature parameters as a basis for threat analysis and evaluation, calculating the safety feature parameter weight by utilizing absolute association degree, then using CIA triples as analysis tuples to finish calculation of the safety feature parameter risks of the power monitoring system, and finally utilizing global influence weights of the safety feature parameters obtained by calculation and risk evaluation values respectively caused by attacks in CIA three dimensions to obtain comprehensive threat evaluation values of the power monitoring system and updating in real time. Has the advantages of scientific and reasonable method, strong applicability and good effect.

Description

Threat analysis and assessment method for power monitoring system
Technical Field
The invention belongs to the technical field of network security, and relates to a threat analysis and assessment method for an electric power monitoring system.
Background
In the prior art, an electric power monitoring system refers to intelligent equipment and a system which play a role in monitoring and controlling in the electric power production and transmission process, and are used for supporting the safe and stable operation of the electric power system and ensuring the reliable supply of electric power. The functions of the power monitoring system comprise user management, data acquisition and processing, event recording, fault alarming, remote signaling, remote control, remote measurement and the like. With the increasingly wide application of computer information technology in the power industry, the power monitoring system inevitably becomes a target of various network attacks due to the vulnerability and importance of the power monitoring system. Therefore, threat analysis and evaluation are performed on the power monitoring system, the safety of the power system is improved, and the problem to be solved in the field is to be solved in a urgent need. The threat analysis and evaluation method for the power monitoring system at present mainly has the following problems:
(1) The existing threat analysis method needs to scan system resources such as system logs in real time, which may cause overload of equipment;
(2) In the existing threat analysis method, when unified formatting is performed on multi-source heterogeneous data, the situation of carrying out false clipping on useful information can occur;
(3) Because of the complexity of the power monitoring system itself, the system may have delayed responses to some attacks, which may be unacceptable for certain devices with high real-time requirements.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a threat analysis and evaluation method for an electric power monitoring system, which can evaluate the influence degree and range of an attack on a target and can optimize in real-time and reliability.
The aim of the invention is optimally realized by the following technical scheme: a threat analysis and assessment method for an electric power monitoring system, the method comprising: the method comprises the steps of calculating safety characteristic parameter weights based on absolute association, calculating safety characteristic parameter risks based on information safety three dimensions and calculating comprehensive threat assessment values of a power monitoring system.
Further, the calculation of the security feature parameter weight based on the absolute association degree is to calculate the influence value of the security feature parameter in the network global, collect the collected security feature parameter, use the security feature parameter to establish an observation matrix as the basis of threat analysis and evaluation, and set m security feature parameters in total, where the m security feature parameters include system log analysis, attack alarm information, equipment abnormality analysis and comprehensive risk analysis, and the established observation matrix A is expressed as:
the i-th column of the matrix a, i=1, 2,..m, represents the influence value of the i-th security feature parameter at the T, t=1, 2,..t, moment, for making the data of each group more comparable to the element x of the matrix a i (t) performing initial value operation according to the formula (2) to obtain x i ′(t):
Wherein x is i (t) is the influence value, x of the ith safety feature parameter at the time t i (1) For the impact value of the ith security feature parameter at time t=1, i.e. the first row element of matrix a, an initialized matrix a' is thus obtained:
calculating the association coefficient of each sub-item based on a matrix A 'and forming an association matrix, wherein the first column in the matrix A' is a reference sequence, namely X 1 ={x 1 ′(1),x 1 ′(2),...,x 1 ′(T)}={1,x 1 ′(2),...,x 1 'T', the remaining columns being comparison sequences, X i ={x i ′(1),x i ′(2),...,x i ′(T)}={1,x i ′(2),...,x i ' T } i=2, 3,..m, one subtracting from the reference sequence by equations (4), (5)Generating Δx 1 (t) one subtraction of the comparison sequence to yield Δx i (t):
Δx 1 (t)=x 1 ′(t)-x 1 ′(t-1),t=2,3,....,T (4)
Δx i (t)=x i ′(t)-x i ′(t-1),i=2,3,...,m;t=2,3,...,T (5)
Then calculate the association coefficient gamma i (t):
Thereby obtaining an association matrix R:
obtaining any two safety characteristic parameters according to formulas (8), (9) and (10)And->Correlation between->
Thereby obtaining a new association matrix R':
the matrix R 'is a non-negative symmetric matrix of m x m, provided that the matrix R' has a maximum eigenvalue lambda max And there is a feature vector P such that lambda max P=R′P,P=[ω 12 ,...,ω m ] T Wherein ω is i And (3) representing the global influence weight of the ith security feature parameter, wherein i=1, 2,..m, and calculating the global influence weight of the m security feature parameters on the network according to the global influence weight.
Further, the calculation of the security feature parameter risk based on information security three dimensions is to realize the calculation of the security feature parameter risk value of the power monitoring system when the power monitoring system handles the attack, and the CIA triples are used, namely: confidentiality (importance), integrity (Integrity), availability (Availability) as analysis tuples, for element a in the underlying propagation hierarchy tuple 1 ,a 2 ,...,a n The importance comparison is carried out as shown in a specific formula (12):
wherein u is jk 、v jk And w jk The confidentiality fuzzy matrix M can be obtained by comparing the results of the elements with three dimensions of confidentiality, integrity and availability C Integrity fuzzy matrix M I And availability ambiguity matrix M A
Judging whether the matrix meets the fuzzy consistency, if the matrix is a fuzzy inconsistent matrix, adjusting the matrix into the fuzzy consistency matrix, and designating the difference between two rows of corresponding elements in the matrix as a constant according to the judging principle of the fuzzy consistency matrix, wherein the fuzzy consistency matrix is as follows:
wherein u is fg ,u fh ,u gh ∈M c ,v fg ,v fh ,v gh ∈M I ,w fg ,w fh ,w gh ∈M A F=1, 2, ··, n, g=1, 2, the terms, n, h=1, 2, n, f +.g +.h, the matrix is normalized according to equation (17):
wherein u' fg 、v′ fg And w' fg Respectively represent the fuzzy matrix M in three dimensions of confidentiality, integrity and availability C 、M I And M A A result of the element unification processing;
calculating threat assessment index of attack in CIA three dimensions:
after threat evaluation indexes of different dimensions are calculated, attack is performed on risk evaluation values f respectively caused by CIA three-dimensions C 、f I And f A The calculation formula is as follows:
wherein the value of the function T (x) increases with the number of attacks x, and the expression is defined as:
and accordingly, the calculation of the safety characteristic parameter risk of the power monitoring system is completed.
Further, the comprehensive threat assessment value of the power monitoring system is calculated by using the global influence weight omega of the m security feature parameters obtained by calculation i I=1, 2,..m, and risk assessment value f by attack on CIA three-dimension, respectively C 、f I And f A Finally, the comprehensive threat assessment value CT of the power monitoring system is obtained and updated in real time, and the calculation method is shown as a formula (21):
wherein x is i (t) is the influence value, omega, of the ith safety feature parameter at the time t i Global impact weight representing the i-th security feature parameter, i=1, 2,.. C 、f I And f A Is a risk evaluation value respectively caused by attacks in CIA three-dimension, and alpha, beta and χ are respectively used for measuring f C 、f I And f A Is a weight of (2).
The threat analysis and assessment method for the power monitoring system comprises the steps of firstly summarizing collected safety feature parameters, establishing an observation matrix by using the safety feature parameters, calculating the safety feature parameter weight by using absolute association, then using CIA triplets as analysis tuples, completing calculation of the risk of the safety feature parameters of the power monitoring system, and finally obtaining comprehensive threat assessment values of the power monitoring system by using global influence weights of the safety feature parameters obtained by calculation and risk assessment values respectively caused by attacks in CIA three dimensions. The influence degree and range of the attack on the target can be evaluated, and the real-time performance and reliability can be optimized. Has the advantages of scientific and reasonable method, strong applicability and good effect.
Drawings
FIG. 1 is a flow chart of a threat analysis and assessment method for an electrical monitoring system according to the present invention.
Detailed Description
The invention will be further described with reference to the drawings and the detailed description.
Referring to fig. 1, the threat analysis and assessment method for a power monitoring system provided by the invention includes: the method comprises the following specific contents of calculating the safety characteristic parameter weight based on the absolute association degree, calculating the safety characteristic parameter risk based on the information safety three dimensions and calculating the comprehensive threat assessment value of the power monitoring system:
1) Calculation of security feature parameter weights based on absolute relevance
In order to calculate the influence value of the security feature parameter in the network global, summarizing the collected security feature parameter, and taking the collected security feature parameter as the basis of threat analysis and evaluation, establishing an observation matrix by using the security feature parameter, and setting m security feature parameters in total, wherein the m security feature parameters comprise system log analysis, attack alarm information, equipment abnormality analysis and comprehensive risk analysis, and the established observation matrix A is expressed as:
the i-th column of the matrix a, i=1, 2,..m, represents the influence value of the i-th security feature parameter at the T, t=1, 2,..t, moment, for making the data of each group more comparable to the element x of the matrix a i (t) performing initial value operation according to the formula (2) to obtain x i ′(t):
Wherein x is i (t) is the influence value, x of the ith safety feature parameter at the time t i (1) For the impact value of the ith security feature parameter at time t=1, i.e. the first row element of matrix a, an initialized matrix a' is thus obtained:
calculating the association coefficient of each sub-item based on a matrix A 'and forming an association matrix, wherein the first column in the matrix A' is a reference sequence, namely X 1 ={x 1 ′(1),x 1 ′(2),...,x 1 ′(T)}={1,x 1 ′(2),...,x 1 'T', the remaining columns being comparison sequences, X i ={x i ′(1),x i ′(2),...,x i ′(T)}={1,x i ′(2),...,x i ' s (T) }, i=2, 3,..m, generating Deltax by one time subtracting the reference sequence by the formulas (4), (5) 1 (t) one subtraction of the comparison sequence to yield Δx i (t):
Δx 1 (t)=x 1 ′(t)-x 1 ′(t-1),t=2,3,....,T (4)
Δx i (t)=x i ′(t)-x i ′(t-1),i=2,3,...,m;t=2,3,...,T (5)
Then calculate the association coefficient gamma i (t):
Thereby obtaining an association matrix R:
obtaining any two safety characteristic parameters according to formulas (8), (9) and (10)And->Correlation between->
Thereby obtaining a new association matrix R':
the matrix R 'is a non-negative symmetric matrix of m x m, provided that the matrix R' has a maximum eigenvalue lambda max And there is a feature vector P such that lambda max P=R′P,P=[ω 12 ,...,ω m ] T Wherein ω is i Representing global influence weights of the ith security feature parameter, i=1, 2..m, and accordingly completing calculation of the global influence weights of the m security feature parameters on the network;
2) Information security three-dimensional based security feature parameter risk calculation
In order to realize the calculation of the risk value of the safety characteristic parameter of the power monitoring system when coping with the attack, CIA triples are used, namely: confidentiality (importance), integrity (Integrity), availability (Availability) as analysis tuples, for element a in the underlying propagation hierarchy tuple 1 ,a 2 ,...,a n The importance comparison is carried out as shown in a specific formula (12):
wherein u is jk 、v jk And w jk The confidentiality fuzzy matrix M can be obtained by comparing the results of the elements with three dimensions of confidentiality, integrity and availability C Integrity fuzzy matrix M I And availability ambiguity matrix M A
Judging whether the matrix meets the fuzzy consistency, if the matrix is a fuzzy inconsistent matrix, adjusting the matrix into the fuzzy consistency matrix, and designating the difference between two rows of corresponding elements in the matrix as a constant according to the judging principle of the fuzzy consistency matrix, wherein the fuzzy consistency matrix is as follows:
wherein u is fg ,u fh ,u gh ∈M c ,v fg ,v fh ,v gh ∈M I ,w fg ,w fh ,w gh ∈M A F=1, 2, ··, n, g=1, 2, the terms, n, h=1, 2, n, f +.g +.h, the matrix is normalized according to equation (17):
wherein u' fg 、v′ fg And w' fg Respectively represent the fuzzy matrix M in three dimensions of confidentiality, integrity and availability C 、M I And M A A result of the element unification processing;
calculating threat assessment index of attack in CIA three dimensions:
after threat evaluation indexes of different dimensions are calculated, attack is performed on risk evaluation values f respectively caused by CIA three-dimensions C 、f I And f A The calculation formula is as follows:
wherein the value of the function T (x) increases with the number of attacks x, and the expression is defined as:
the calculation of the safety characteristic parameter risk of the power monitoring system is completed according to the risk;
3) Calculation of comprehensive threat assessment value of power monitoring system
Global impact weight omega of m security feature parameters obtained by calculation i I=1, 2,..m, and risk assessment value f by attack on CIA three-dimension, respectively C 、f I And f A Finally, the comprehensive threat assessment value CT of the power monitoring system is obtained and updated in real time, and the calculation method is shown as a formula (21):
wherein x is i (t) is the influence value, omega, of the ith safety feature parameter at the time t i Global impact weight representing the i-th security feature parameter, i=1, 2,.. C 、f I And f A Is a risk evaluation value respectively caused by attacks in CIA three-dimension, and alpha, beta and χ are respectively used for measuring f C 、f I And f A Is a weight of (2).
The software programs to which the present invention applies are organized according to automation, network and computer processing techniques, familiar to those skilled in the art.
The detailed description of the invention is not intended to be exhaustive or to limit the scope of the claims, and other substantially equivalent substitutions will now occur to those skilled in the art from the teachings of the present embodiments without the exercise of inventive faculty, and are within the scope of the invention.

Claims (1)

1. A threat analysis and evaluation method for an electric power monitoring system is characterized in that: the method comprises the steps of calculating safety characteristic parameter weights based on absolute association, calculating safety characteristic parameter risks based on three dimensions of information safety and calculating comprehensive threat assessment values of a power monitoring system;
the calculation of the security feature parameter weight based on the absolute association degree is to calculate the influence value of the security feature parameter in the network global, collect the collected security feature parameter, use the security feature parameter to establish an observation matrix as the basis of threat analysis and evaluation, and set m security feature parameters in total, wherein the m security feature parameters comprise system log analysis, attack alarm information, equipment abnormality analysis and comprehensive risk analysis, and the established observation matrix A is expressed as:
wherein, the ith column, i of matrix AThe values of the influence of the ith safety feature parameter at T, t=1, 2,.. i (t) performing initial value operation according to the formula (2) to obtain x i ′(t):
Wherein x is i (t) is the influence value, x of the ith safety feature parameter at the time t i (1) For the impact value of the ith security feature parameter at time t=1, i.e. the first row element of matrix a, an initialized matrix a' is thus obtained:
calculating the association coefficient of each sub-item based on a matrix A 'and forming an association matrix, wherein the first column in the matrix A' is a reference sequence, namely X 1 ={x 1 ′(1),x 1 ′(2),...,x 1 ′(T)}={1,x 1 ′(2),...,x 1 'T', the remaining columns being comparison sequences, X i ={x i ′(1),x i ′(2),...,x i ′(T)}={1,x i ′(2),...,x i ' s (T) }, i=2, 3,..m, generating Deltax by one time subtracting the reference sequence by the formulas (4), (5) 1 (t) one subtraction of the comparison sequence to yield Δx i (t):
Δx 1 (t)=x 1 ′(t)-x 1 ′(t-1),t=2,3,....,T (4)
Δx i (t)=x i ′(t)-x i ′(t-1),i=2,3,...,m;t=2,3,...,T (5)
Then calculate the association coefficient gamma i (t):
Thereby obtaining an association matrix R:
obtaining any two safety characteristic parameters according to formulas (8), (9) and (10)And->Correlation between->
Thereby obtaining a new association matrix R':
the matrix R 'is a non-negative symmetric matrix of m x m, provided that the matrix R' has a maximum eigenvalue lambda max And there is a feature vector P such that lambda max P=R′P,P=[ω 12 ,...,ω m ] T Wherein ω is i Representing the security feature parameter of item iGlobal impact weight, i=1, 2,..m, accordingly, the calculation of the global influence weight of the m security feature parameters on the network is completed;
the calculation of the security feature parameter risk based on information security three dimensions is the calculation of the security feature parameter risk value of the power monitoring system when the power monitoring system is in response to attack, and CIA triples are used, namely: confidentiality (importance), integrity (Integrity), availability (Availability) as analysis tuples, for element a in the underlying propagation hierarchy tuple 1 ,a 2 ,...,a n The importance comparison is carried out as shown in a specific formula (12):
wherein u is jk 、v jk And w jk The confidentiality fuzzy matrix M can be obtained by comparing the results of the elements with three dimensions of confidentiality, integrity and availability C Integrity fuzzy matrix M I And availability ambiguity matrix M A
Judging whether the matrix meets the fuzzy consistency, if the matrix is a fuzzy inconsistent matrix, adjusting the matrix into the fuzzy consistency matrix, and designating the difference between two rows of corresponding elements in the matrix as a constant according to the judging principle of the fuzzy consistency matrix, wherein the fuzzy consistency matrix is as follows:
wherein u is fg ,u fh ,u gh ∈M c ,v fg ,v fh ,v gh ∈M I ,w fg ,w fh ,w gh ∈M A F=1, 2, ··, n, g=1, 2, the terms, n, h=1, 2, n, f +.g +.h, the matrix is normalized according to equation (17):
wherein u' fg 、v′ fg And w' fg Respectively represent the fuzzy matrix M in three dimensions of confidentiality, integrity and availability C 、M I And M A A result of the element unification processing;
calculating threat assessment index of attack in CIA three dimensions:
after threat evaluation indexes of different dimensions are calculated, attack is performed on risk evaluation values f respectively caused by CIA three-dimensions C 、f I And f A The calculation formula is as follows:
wherein the value of the function T (x) increases with the number of attacks x, and the expression is defined as:
the calculation of the safety characteristic parameter risk of the power monitoring system is completed according to the risk;
the calculation of the comprehensive threat assessment value of the power monitoring system is to utilize the global influence weight omega of m security feature parameters obtained by calculation i I=1, 2,..m, and risk assessment value f by attack on CIA three-dimension, respectively C 、f I And f A Finally, the comprehensive threat assessment value CT of the power monitoring system is obtained and updated in real time, and the calculation method is shown as a formula (21):
wherein x is i (t) is the influence value, omega, of the ith safety feature parameter at the time t i Global impact weight representing the i-th security feature parameter, i=1, 2,.. C 、f I And f A Is a risk evaluation value respectively caused by attacks in CIA three-dimension, and alpha, beta and χ are respectively used for measuring f C 、f I And f A Is a weight of (2).
CN202310094283.XA 2023-02-08 2023-02-08 Threat analysis and assessment method for power monitoring system Active CN116132161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310094283.XA CN116132161B (en) 2023-02-08 2023-02-08 Threat analysis and assessment method for power monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310094283.XA CN116132161B (en) 2023-02-08 2023-02-08 Threat analysis and assessment method for power monitoring system

Publications (2)

Publication Number Publication Date
CN116132161A CN116132161A (en) 2023-05-16
CN116132161B true CN116132161B (en) 2024-04-05

Family

ID=86311471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310094283.XA Active CN116132161B (en) 2023-02-08 2023-02-08 Threat analysis and assessment method for power monitoring system

Country Status (1)

Country Link
CN (1) CN116132161B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11720686B1 (en) * 2020-04-08 2023-08-08 Wells Fargo Bank, N.A. Security model utilizing multi-channel data with risk-entity facing cybersecurity alert engine and portal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657915A (en) * 2015-03-10 2015-05-27 国家电网公司 Dynamic self-adaptive power system terminal security threat evaluation method
WO2017044446A1 (en) * 2015-09-08 2017-03-16 Sikorsky Aircraft Corporation Cyber security system for a vehicle
CN111614615A (en) * 2020-04-16 2020-09-01 国网浙江省电力有限公司湖州供电公司 Network security quantitative evaluation method for transformer substation power monitoring system
CN113408114A (en) * 2021-06-04 2021-09-17 中国电力科学研究院有限公司 Method and system for evaluating vulnerability threat degree of power monitoring system equipment
CN114862267A (en) * 2022-05-31 2022-08-05 国家石油天然气管网集团有限公司 Evaluation method and system of oil and gas pipeline alarm management system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657915A (en) * 2015-03-10 2015-05-27 国家电网公司 Dynamic self-adaptive power system terminal security threat evaluation method
WO2017044446A1 (en) * 2015-09-08 2017-03-16 Sikorsky Aircraft Corporation Cyber security system for a vehicle
CN111614615A (en) * 2020-04-16 2020-09-01 国网浙江省电力有限公司湖州供电公司 Network security quantitative evaluation method for transformer substation power monitoring system
CN113408114A (en) * 2021-06-04 2021-09-17 中国电力科学研究院有限公司 Method and system for evaluating vulnerability threat degree of power monitoring system equipment
CN114862267A (en) * 2022-05-31 2022-08-05 国家石油天然气管网集团有限公司 Evaluation method and system of oil and gas pipeline alarm management system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于电力系统的信息安全风险评估机制研究;梁智强;林丹生;;信息网络安全;20170410(第04期);全文 *

Also Published As

Publication number Publication date
CN116132161A (en) 2023-05-16

Similar Documents

Publication Publication Date Title
CN108833416B (en) SCADA system information security risk assessment method and system
CN116132161B (en) Threat analysis and assessment method for power monitoring system
CN109767352B (en) Safety situation assessment method for electric power information physical fusion system
CN106453417A (en) Network attack target prediction method based on neighbor similarity
CN112949202A (en) Bayesian network-based rockburst probability prediction method
CN110636066B (en) Network security threat situation assessment method based on unsupervised generative reasoning
CN116842527A (en) Data security risk assessment method
CN113780443B (en) Threat detection-oriented network security situation assessment method
CN109767351A (en) A kind of security postures cognitive method of power information system daily record data
CN112596031A (en) Target radar threat degree assessment method based on knowledge graph
CN116955091B (en) Data center fault detection system based on machine learning
CN106713233A (en) Method for judging and protecting network security state
CN116644825B (en) Big data-based outpatient information inquiry reservation management system
CN102281163A (en) Network intrusion detection and alert method
CN116112283A (en) CNN-LSTM-based power system network security situation prediction method and system
CN109359234A (en) A kind of various dimensions network safety event grading plant
CN104239785B (en) Intrusion detection data classification method based on cloud model
CN115865708B (en) Complex social network information handling method based on SIR-D model
CN116545679A (en) Industrial situation security basic framework and network attack behavior feature analysis method
CN111158338A (en) Chemical risk monitoring method based on principal component analysis
Wang et al. Research of the early warning analysis of crop diseases and insect pests
Li et al. Research on network security risk assessment method based on improved AHP
CN109873786A (en) For the safety situation evaluation system of multi-source heterogeneous information cloud platform
Wang et al. Detection of network intrusion threat based on the probabilistic neural network model
Chi et al. Automatic and objective gradation of 114 183 terrorist attacks using a machine learning approach

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant