CN116405328B - Multistage linkage network security supervision system and method for power monitoring system - Google Patents

Multistage linkage network security supervision system and method for power monitoring system Download PDF

Info

Publication number
CN116405328B
CN116405328B CN202310673313.2A CN202310673313A CN116405328B CN 116405328 B CN116405328 B CN 116405328B CN 202310673313 A CN202310673313 A CN 202310673313A CN 116405328 B CN116405328 B CN 116405328B
Authority
CN
China
Prior art keywords
module
monitoring system
network
threat information
linkage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310673313.2A
Other languages
Chinese (zh)
Other versions
CN116405328A (en
Inventor
孔令达
亢超群
李二霞
韩子龙
刘海涛
吕广宪
朱克琪
李玉凌
孙国齐
许保平
刘芸杉
吴殿亮
王利
杜金陵
樊勇华
周振华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Online Shanghai Energy Internet Research Institute Co ltd
Original Assignee
China Online Shanghai Energy Internet Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Online Shanghai Energy Internet Research Institute Co ltd filed Critical China Online Shanghai Energy Internet Research Institute Co ltd
Priority to CN202310673313.2A priority Critical patent/CN116405328B/en
Publication of CN116405328A publication Critical patent/CN116405328A/en
Application granted granted Critical
Publication of CN116405328B publication Critical patent/CN116405328B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The invention relates to a network security supervision system and method of a multistage linkage power monitoring system, wherein the system comprises a three-layer framework of a headquarter part, a network province part and a ground city part; the province part and the city part are at least provided with: the system comprises a flow monitoring module, a security threat sensing module, an alarm linkage module and a trusted defense linkage module; the headquarter section is provided with at least: the device comprises an analysis module, a pushing module and an online simulation module. The invention can realize multistage linkage and improve the network security monitoring and disposal capacity of the power distribution automation monitoring system.

Description

Multistage linkage network security supervision system and method for power monitoring system
Technical Field
The invention relates to the technical field of power distribution network safety, in particular to a network safety supervision system and method for a multi-level linkage power monitoring system.
Background
To address increasingly prominent network security issues, a variety of security devices are used to monitor a large number of risk events, security against the network, including intrusion detection systems, firewalls, vulnerability detection systems, and the like. These devices are limited to taking local detection and protection measures for attack, and lack of effective cooperation between devices, so that a network administrator cannot accurately locate a network vulnerability, cannot timely discover a malicious attack, and cannot comprehensively grasp the network security state.
The network security situation sensing process is to extract network data by sensing network environment, evaluate network security state and predict future development trend by understanding the data, obtain the evaluated and predicted data for making decision, and finally take corresponding measures to perform active defense, and feed back to the network environment to realize security protection, thereby improving network defense capacity.
The construction of the network security situation awareness model is divided into three parts, namely network environment awareness, situation understanding and situation prediction.
Network context awareness perceives network state by extracting network data. For complex and dynamic network environments and a lot of complicated data, researchers collect network data by adopting technologies such as antivirus software, vulnerability scanning, penetration testing, network scanning, password cracking tools, firewalls, intrusion detection systems and the like, or collect network data by means of asset lists, risk identification, investigation, event response reports and the like. In order to obtain comprehensive and accurate network data, researchers often preprocess raw data by using methods such as conditional random fields, evolutionary neural networks, cluster analysis and the like to extract the network data.
The situation understanding is to integrate the extracted network data, analyze the correlation between the data, locate the network weakness, evaluate the possibility of occurrence of the security event, obtain the evaluation data to make a decision, and perform active defense. The method is characterized in that the method is a core of network security situation awareness, researchers analyze different data by adopting different methods, wherein the method comprises an adaptive resonance theoretical model, a Bayesian network classifier, a game model and the like.
The situation prediction is based on network data output by situation understanding, predicts network security conditions, obtains prediction data to make decisions, and executes active defense. The method is a target of network security situation awareness, and not only is a network threat attack and the next action of an attacker predicted, but also dependence on data integrity is overcome, and the development trend of the network security state is predicted.
The prior patent publication CN112751927A discloses a network security monitoring system in a power monitoring system, which describes main functional points, module functions and methods of the network security monitoring system in the power monitoring system, and solves the problems that the network security situation of a single information system is monitored, and the current situations of linkage, pushing and dynamic starting of a plurality of system alarm information cannot be solved. The prior patent publication CN115250191A discloses a network security emergency response method, which is characterized in that after a client edits a short message, a system verifies user authority and issues a blocking instruction to blocking IP address equipment, and is a traditional blocking checking and killing method in a network security protection means.
Disclosure of Invention
The invention aims to solve the technical problem of providing a network security supervision system and method for a multi-stage linkage power monitoring system, which can realize multi-stage linkage and improve the network security monitoring and disposal capacity of a power distribution automation monitoring system.
The technical scheme adopted for solving the technical problems is as follows: the network safety supervision system of the multi-level linkage power monitoring system comprises a headquarter part, a network province part and a ground city part;
the provincial part and the local market part are at least configured with: the flow monitoring module is used for monitoring network flow of the power distribution automation monitoring system; the safety threat sensing module is used for sensing threat information of a host, a network, a terminal and an application in the power distribution automation monitoring system; the alarm linkage module is used for generating alarm information when the threat information is perceived, and uploading the alarm information and the threat information to the headquarter part together; the trusted defense linkage module is used for automatically triggering a trusted defense function based on a trusted computing method when threat information is perceived;
the headquarter section is provided with at least: the analysis module is used for analyzing according to the received threat information and determining the position of the threat information, the voltage level and the line position of the power grid network where the threat information is located and the equipment attribute information; the pushing module is used for pushing the analyzed threat information to a provincial part bordering the position where the threat information is located, and pushing the received alarm information to a local city part connected with the line position of the power grid network where the threat information is located; and the online simulation module is used for quickly establishing a terminal software and hardware environment based on the received threat information to perform online simulation.
The headquarter section is further configured with: a quantity configuration suggestion module for distributing the total asset value of the equipment in the automatic monitoring system according to the region rangef 1 Network total flow in t time of distribution automation monitoring system in region rangef 2 Automatic monitoring system for power distribution in regionTotal flow of plaintext data in t-thf 3 The distribution automation monitoring system in the region range interacts with other systems to request and be requested the total timesf 4 Trusted computing authentication interaction times used in distribution automation monitoring system in region rangef 5 Network security risk event occurrence times in distribution automation monitoring system in region rangef 6 And determining the number of the partial start-up of the province and the city in the regional scope.
The quantity configuration suggestion module includes: a score calculation unit for calculating a security situation comprehensive score in the region rangecThe calculation mode is as follows:c=F(f 1f 2f 3f 4f 5f 6 ) Wherein, the method comprises the steps of, wherein,F() Carrying out normalization processing on each index, carrying out weight assignment on each index and summing; a comparison unit for comprehensively scoring the security situationcComparing with the median of the scores of the combined sample sets within the geographical range being enabled; the quantity determining module is used for comprehensively scoring in the safety situationcAnd when the number is smaller than the median, calculating the increased number of the net province part and the city part.
The quantity determination module is used for determining the quantity of the liquid crystal display byThe number of activations of the provincial part and the municipality part is calculated, wherein,U k represented as the number of activations suggested by the number determination module,K 1K 2 andK 3 respectively represent the intensity coefficients of the increased number of values,e k representing the deviation of the system quantity enabled by the object with the current moment adjustment object system quantity and the security situation comprehensive score c as the system quantity enabled by the object with the median>Represented as an integrated deviation (c) and,kthe number of deviations is indicated and,e k -e k-1 representing the difference between the current time offset and the previous time offset.
The headquarter section is further configured with: the multistage linkage evaluation module, multistage linkage evaluation module includes: the first evaluation unit is used for evaluating the dynamic coverage rate of the safety monitoring points; the second evaluation unit is used for evaluating the credible defense density of the terminal; and the third evaluation unit is used for evaluating the timeliness of the emergency alarm linkage.
The first evaluation unit is used for evaluating the data byCalculating dynamic coverage rate of safety monitoring pointsDCM
The second evaluation unit is used for evaluating the quality of the productComputing terminal trust defense densityT2D2, wherein, the method comprises the steps of,T i represent the firstiThe number of class-terminals,nthe number of terminal types is indicated,w i represent the firstiThe security weight of the class of terminals,Sindicating the area of the geographical area.
The third evaluation unit is used for evaluating the quality of the productCalculating timeliness of emergency alert linkageTCAWherein, the method comprises the steps of, wherein,d m indicating the calendar days of the current month,kthe number of alarms in the current month is indicated,t d indicating the number of hours from the alert to the alert being uploaded to the headquarter section,t w and representing the business assessment window time.
The technical scheme adopted for solving the technical problems is as follows: a network security supervision method of a multi-stage linkage power monitoring system is applied to the multi-stage linkage power monitoring system network security supervision system, and comprises the following steps:
the security threat perception module of the provincial part or the local market part perceives threat information, transmits the threat information to the alarm linkage module, and automatically triggers the trusted defense linkage module to perform a trusted defense function based on a trusted computing method;
the alarm linkage module generates alarm information and reports the alarm information and threat information to a headquarter part;
the analysis module of the headquarter part analyzes the received threat information and determines the position of the threat information, the voltage level and the line position of the power grid network where the threat information is located and the equipment attribute information;
the headquarter pushes threat information to a provincial part bordering the position where the threat information is located through a pushing module, and pushes alarm information to a local city part connected with the line position of the power grid network where the threat information is located;
the headquarter inputs threat information into an online simulation module, and rapidly establishes a terminal software and hardware environment to perform online simulation.
Advantageous effects
Due to the adoption of the technical scheme, compared with the prior art, the invention has the following advantages and positive effects: the invention uses an internal multistage linkage mechanism, not only can sense security threat, but also can timely alarm and interact, and can quickly establish on-line simulation of threat information, thereby forming a good innovative effect of combining threat discovery, threat alarm and threat quick analysis, and improving the network security monitoring and handling capability of the power distribution automation monitoring system. The multi-level linkage evaluation index and the calculation method provided by the invention can dynamically evaluate the linkage effect of each system, give out the method and the efficiency of linkage between the systems from the perspective of quantitative analysis, and are beneficial to promoting coordination linkage between the systems and enhancing interactivity. The invention can evaluate the comprehensive score of the security situation according to the regional division, and gives out a calculation method for the starting proposal quantity of the provincial part and the local market part, the user can self-define the division region to evaluate the security situation, a more flexible regional division method is provided, and furthermore, the invention gives out a quantitative calculation method for suggesting to increase the starting quantity of the provincial part and the local market part (i.e. subsystems), and the adjustment process can be automatically implemented.
Drawings
FIG. 1 is an organization diagram of a multi-stage linked power monitoring system network security supervision system according to an embodiment of the present invention;
FIG. 2 is a block diagram of a province part and a city part in an embodiment of the invention;
fig. 3 is a block diagram of a headquarter portion in an embodiment of the invention.
Detailed Description
The invention will be further illustrated with reference to specific examples. It is to be understood that these examples are illustrative of the present invention and are not intended to limit the scope of the present invention. Further, it is understood that various changes and modifications may be made by those skilled in the art after reading the teachings of the present invention, and such equivalents are intended to fall within the scope of protection defined in the present application.
The embodiment of the invention relates to a multistage linkage network safety supervision system of a power monitoring system, which is shown in fig. 1 and comprises a headquarter part, a network province part and a ground city part. Wherein, the province part and the city part are at least configured with: the flow monitoring module is used for monitoring network flow of the power distribution automation monitoring system; the safety threat sensing module is used for sensing threat information of a host, a network, a terminal and an application in the power distribution automation monitoring system; the alarm linkage module is used for generating alarm information when the threat information is perceived, and uploading the alarm information and the threat information to the headquarter part together; the trusted defense linkage module is used for automatically triggering a trusted defense function based on a trusted computing method when threat information is perceived; the headquarter section is provided with at least: the analysis module is used for analyzing according to the received threat information and determining the position of the threat information, the voltage level and the line position of the power grid network where the threat information is located and the equipment attribute information; the pushing module is used for pushing the analyzed threat information to a provincial part bordering the position where the threat information is located, and pushing the received alarm information to a local city part connected with the line position of the power grid network where the threat information is located; and the online simulation module is used for quickly establishing a terminal software and hardware environment based on the received threat information to perform online simulation.
The network security supervision system of the multi-level linkage power monitoring system of the embodiment establishes a cooperative linkage mechanism, achieves the purposes of threat information sharing, headquarter unified convergence and threat information mastering at the first time, and can send push information only to the network province part and the local city part related to the threat information, so that a calculation strategy and a method are dynamically started, and moderate security benefit is obtained under the condition of considering the cost.
Taking a power distribution automation monitoring system as an example, the embodiment can construct a system structure connection mode of three layers of headquarter-net province-ground city according to a three-level deployment mode of the power distribution monitoring system, and the system structure connection mode realizes multi-level linkage functions including pushing shared alarm information, starting trusted verification, threat information pushing and the like by cooperatively matching a flow monitoring module, a security threat sensing module, an alarm linkage module, a trusted defense linkage module, an analysis module, a pushing module and an online simulation module.
The flow monitoring module is used for monitoring network flow of the power distribution automation monitoring system and comprises plaintext data and ciphertext data, wherein interaction data of the terminal equipment and the cloud equipment are IEC60870-101 104 protocol, the flow monitoring module is packaged into E text format on the basis of original service message protocol, and the packaged message is sent to a headquarter part.
The security threat perception module can perceive security threats of a host, a network, a terminal and an application in the power distribution automation monitoring system, wherein the security threats comprise vulnerability states, malicious program access behaviors, security access authentication success rates, network intrusion behaviors and security policy configuration conditions.
The alarm linkage module is used for generating alarm information and sending/receiving the alarm information, and can send the locally generated alarm information to the headquarter portion and simultaneously receive the alarm information pushed by the headquarter portion.
The trusted defense linkage module is a module based on a trusted computing method. When the security threat occurs locally, the trusted defense linkage module automatically triggers a trusted defense function, and specifically, enables a behavior measurement function for terminals in an area range near the geographic position where the security threat occurs.
The analysis module analyzes the received threat information and determines the position of the threat information, the voltage level and the line position of the power grid network of the threat information and the equipment attribute information.
The pushing module pushes the analyzed threat information to a network province part bordering the position where the threat information is located, and pushes the received alarm information to a city part connected with the line position of the power grid network where the threat information is located, so that the aim of personalized pushing is fulfilled.
The on-line simulation module is a module capable of establishing a terminal software and hardware environment to perform quick on-line simulation, and can provide information for security analysis personnel to perform quick analysis.
According to the embodiment, the internal linkage mechanism is used by the modules, so that safety threat can be perceived, timely alarm interaction can be realized, threat information can be quickly established in an online simulation mode, a good effect of combining threat discovery, threat alarm and threat quick analysis is formed, and the network safety monitoring and handling capacity of the power distribution automation monitoring system is improved.
In addition, the headquarter part is configured with a quantity configuration suggestion module, and the quantity configuration suggestion module can output quantity suggestions started by the provincial part and the local market part in the region range according to the total asset value of the power distribution automation equipment in the region range, the total network flow in the t time, the total plaintext data flow, the system interaction request times, the trusted computing authentication interaction times and the safety risk event occurrence times.
The quantity configuration suggestion module includes: a score calculation unit for calculating a security situation comprehensive score in the region rangecThe calculation mode is as follows:c=F(f 1f 2f 3f 4f 5f 6 ) Wherein, the method comprises the steps of, wherein,f 1 for the total asset value of equipment in the power distribution automation system within the geographic area,f 2 for the total network flow in the time t of the distribution automation monitoring system in the region range,f 3 for the plaintext number in the time t of the distribution automation monitoring system in the region rangeBased on the total flow rate,f 4 for the total number of requests and requests that the distribution automation monitoring system interacts with other systems within the geographic area,f 5 for the trusted calculation of the authentication interaction times in the distribution automation monitoring system in the region range,f 6 for the occurrence times of network security risk events in the distribution automation monitoring system in the region range,F() Carrying out normalization processing on each index, carrying out weight assignment on each index and summing; a comparison unit for comprehensively scoring the security situationcComparing the median of the calculated scores of the combined sample sets within the geographic region being enabled as stored in the system, assuming a security situation composite scorecIf the number is greater than or equal to the median, the current number of the net province part and the ground city part is reserved; the quantity determining module is used for comprehensively scoring in the safety situationcWhen the number of the network province part and the city part is smaller than the median, calculating the starting number of the network province part and the city part, and particularly the starting numberU k The calculation mode of (a) is as follows:
wherein, the liquid crystal display device comprises a liquid crystal display device,U k represented as the number of activations suggested by the number determination module,K 1K 2 andK 3 respectively represent the intensity coefficients of the increased number of values,e k the system quantity deviation of the current moment adjustment object system starting quantity and the system quantity started by the object with the security situation comprehensive score c being the median is represented,represented as an integrated deviation (c) and,kthe number of deviations is indicated and,e k -e k-1 representing the difference between the current time offset and the previous time offset.
According to the method, the safety situation comprehensive score is evaluated according to regional division, a calculation method of the system starting suggestion quantity is provided, a user can self-define the division region to evaluate the safety situation, a more flexible regional division method is provided, further, a quantitative calculation method of the suggestion of increasing the subsystem starting quantity is provided, and the adjustment process can be automatically implemented.
The headquarter part is also provided with a multi-stage linkage evaluation module, and the dynamic coverage rate of the safety monitoring points can be achieved through the multi-stage linkage evaluation moduleDCMTerminal trust defense densityT2D2. Emergency alert linkage timelinessTCAAnd evaluating the linkage state and the linkage level of the system.
The multistage linkage evaluation module in this embodiment includes: a first evaluation unit for dynamically covering the safety monitoring pointsDCMEvaluating; a second evaluation unit for credible defense density of the terminalT2D2, evaluating; a third evaluation unit for linking timeliness of emergency alarmTCAEvaluation was performed.
When the first evaluation unit evaluates the dynamic coverage rate of the safety monitoring points, calculation is performedtIn the time range, the safety monitoring point coverage situation is calculated by the following steps:
wherein the number of subsystems repeatedly enabled is indicated intRepeated samples counted over time.
When the second evaluation unit evaluates the terminal credible defense density, the second evaluation unit is used fortIn the time range, counting the proportion of the terminal weight which starts the trusted technology to defend the security threat in the target region range, wherein the specific calculation method comprises the following steps:
wherein, the liquid crystal display device comprises a liquid crystal display device,T i represent the firstiThe number of class-terminals,nindicates the number of terminal categories, including DTU, FTU, fault indicator, etc.,w i represent the firstiThe security weight of the class of terminals,Sindicating the area of the geographical area.
Timeliness of third evaluation unit to emergency alert linkageTCAWhen evaluation is carried out, the timeliness of pushing the emergency alarm event to the headquarter part is counted in the current month time range, and the specific calculation method is as follows:
wherein, the liquid crystal display device comprises a liquid crystal display device,d m indicating the calendar days of the current month,kthe number of alarms in the current month is indicated,t d indicating the number of hours from the alert to the alert being uploaded to the headquarter section,t w and representing the preset service check window time.
The multi-level linkage evaluation mode provided by the embodiment can dynamically evaluate the linkage effect of each system, gives out the method and the efficiency of linkage among the systems from the perspective of quantitative analysis, is beneficial to promoting coordination linkage among the systems and enhancing interactivity.
The multistage linkage power monitoring system network safety supervision system based on the embodiment mainly comprises the following steps of:
s1, a security threat perception module of a provincial part or a local market part perceives threat information, the threat information is transmitted to an alarm linkage module, and a trusted defense linkage module is automatically triggered to execute a trusted defense function based on a trusted computing method;
s2, the alarm linkage module generates alarm information and reports the alarm information and threat information to a headquarter part;
s3, analyzing the received threat information by an analysis module of the headquarter part, and determining the position of the threat information, the voltage level and the line position of the power grid network where the threat information is located and the equipment attribute information;
s4, pushing threat information to a provincial part bordering the position where the threat information is located by a headquarter part through a pushing module, and pushing alarm information to a local city part connected with the line position of a power grid network where the threat information is located;
s5, the headquarter part inputs threat information into an online simulation module, rapidly establishes a terminal software and hardware environment to perform online simulation, and provides the terminal software and hardware environment for security analysis personnel to perform rapid analysis.
It is easy to find that the invention uses the internal multistage linkage mechanism, not only can sense the security threat, but also can timely alarm and interact, and can quickly establish on-line simulation of threat information, thereby forming a good innovation effect of combining threat discovery, threat alarm and threat quick analysis, and improving the network security monitoring and handling capability of the distribution automation monitoring system. The multi-level linkage evaluation index and the calculation method provided by the invention can dynamically evaluate the linkage effect of each system, give out the method and the efficiency of linkage between the systems from the perspective of quantitative analysis, and are beneficial to promoting coordination linkage between the systems and enhancing interactivity. The invention can evaluate the security situation comprehensive score according to the regional division, and give a calculation method of the system starting proposal quantity, the user can self-define the division region to evaluate the security situation, a more flexible regional division method is provided, and furthermore, the invention gives a quantitative calculation method of the proposal for increasing the subsystem starting quantity, and the adjustment process can be automatically implemented.

Claims (6)

1. The network safety supervision system of the multi-level linkage power monitoring system is characterized by comprising a three-layer framework of a headquarter part, a network province part and a ground city part;
the provincial part and the local market part are at least configured with: the flow monitoring module is used for monitoring network flow of the power distribution automation monitoring system; the safety threat sensing module is used for sensing threat information of a host, a network, a terminal and an application in the power distribution automation monitoring system; the alarm linkage module is used for generating alarm information when the threat information is perceived, and uploading the alarm information and the threat information to the headquarter part together; the trusted defense linkage module is used for automatically triggering a trusted defense function based on a trusted computing method when threat information is perceived;
the headquarter section is provided with at least: the analysis module is used for analyzing according to the received threat information and determining the position of the threat information, the voltage level and the line position of the power grid network where the threat information is located and the equipment attribute information; the pushing module is used for pushing the analyzed threat information to a provincial part bordering the position where the threat information is located, and pushing the received alarm information to a local city part connected with the line position of the power grid network where the threat information is located; the on-line simulation module is used for rapidly establishing a terminal software and hardware environment based on the received threat information to perform on-line simulation;
the headquarter section is further configured with: a quantity configuration suggestion module for distributing the total asset value f of the equipment in the automatic monitoring system according to the region range 1 Network total flow f in time t of distribution automation monitoring system in region range 2 Clear text data total flow f in time t of distribution automation monitoring system in region range 3 The distribution automation monitoring system in the region range interacts with other systems to request and be requested for total times f 4 Trusted computing authentication interaction times f used in distribution automation monitoring system in region range 5 Network security risk event occurrence frequency f in distribution automation monitoring system in region range 6 Determining the number of subsystems started by the province part and the city part in the regional range;
the quantity configuration suggestion module includes: the score calculating unit is used for calculating the security situation comprehensive score c in the region range in the following calculation mode: c=f (F 1 ,f 2 ,f 3 ,f 4 ,f 5 ,f 6 ) Wherein F () represents that each index is normalized, and each index is assigned with weight and summed; the comparison unit is used for comparing the security situation comprehensive score c with the median of the calculated scores of the combined sample sets in the region range which is being started; the quantity determining module is used for calculating the quantity of subsystems started by the network province part and the city part when the security situation comprehensive score c is smaller than the median; the quantity determination module is used for determining the quantity of the liquid crystal display byCalculating a number of enabled subsystems of the provincial and the municipality portions, wherein U k Representing the number of activations, K, suggested by the number determination module 1 ,K 2 And K 3 Intensity coefficients, e, respectively representing the added number values k Representing the deviation of the system quantity enabled by the object with the current moment adjustment object system quantity and the security situation comprehensive score c as the system quantity enabled by the object with the median>Expressed as cumulative deviation, k represents the number of deviations, e k -e k-1 Representing the difference between the current time offset and the previous time offset.
2. The multi-stage linked power monitoring system network security supervision system according to claim 1, wherein the headquarter section is further configured with: the multistage linkage evaluation module, multistage linkage evaluation module includes: the first evaluation unit is used for evaluating the dynamic coverage rate of the safety monitoring points; the second evaluation unit is used for evaluating the credible defense density of the terminal; and the third evaluation unit is used for evaluating the timeliness of the emergency alarm linkage.
3. The multi-stage linked power monitoring system network security supervision system according to claim 2, wherein the first evaluation unit is configured to perform the first evaluation byAnd calculating the dynamic coverage DCM of the security monitoring points.
4. The multi-stage linked power monitoring system network security supervision system according to claim 2, wherein the second evaluation unit is configured to perform the evaluation byCalculating the trusted defense density T2D2 of the terminal, wherein T i Representing class iThe number of terminals, n represents the number of terminal types, w i The security weight of the i-th class of terminal is represented, and S represents the area of the regional range.
5. The multistage-linked power monitoring system network safety supervision system according to claim 2, wherein the third evaluation unit is configured to perform the following stepsCalculating timeliness TCA of emergency alert linkage, wherein d m Representing calendar days of the current month, k represents alarming times of the current month, t d Indicating the number of hours from the alarm to the time of uploading the alarm to the headquarter, t w And representing the business assessment window time.
6. A multistage linkage network security supervision method for a power monitoring system, which is characterized by being applied to the multistage linkage network security supervision system of the power monitoring system according to any one of claims 1 to 5, comprising the following steps:
the security threat perception module of the provincial part or the local market part perceives threat information, transmits the threat information to the alarm linkage module, and automatically triggers the trusted defense linkage module to perform a trusted defense function based on a trusted computing method;
the alarm linkage module generates alarm information and reports the alarm information and threat information to a headquarter part;
the analysis module of the headquarter part analyzes the received threat information and determines the position of the threat information, the voltage level and the line position of the power grid network where the threat information is located and the equipment attribute information;
the headquarter pushes threat information to a provincial part bordering the position where the threat information is located through a pushing module, and pushes alarm information to a local city part connected with the line position of the power grid network where the threat information is located;
the headquarter part inputs threat information into an online simulation module, and rapidly establishes a terminal software and hardware environment to perform online simulation;
the total part quantity configuration suggestion module is used for distributing the total asset value f of equipment in the automatic monitoring system according to the region range 1 Network total flow f in time t of distribution automation monitoring system in region range 2 Clear text data total flow f in time t of distribution automation monitoring system in region range 3 The distribution automation monitoring system in the region range interacts with other systems to request and be requested for total times f 4 Trusted computing authentication interaction times f used in distribution automation monitoring system in region range 5 Network security risk event occurrence frequency f in distribution automation monitoring system in region range 6 Determining the number of subsystems started by the province part and the city part in the regional range;
the quantity configuration suggestion module calculates a security situation comprehensive score c in the region range through a score calculation unit in the following calculation mode: c=f (F 1 ,f 2 ,f 3 ,f 4 ,f 5 ,f 6 ) Wherein F () represents that each index is normalized, and each index is assigned with weight and summed; the quantity configuration suggestion module compares the security situation comprehensive score c with the median of the calculated scores of the combined sample sets in the region range which is being started through a comparison unit; the quantity configuration suggestion module calculates the quantity of subsystems started by the net province part and the ground city part through the quantity determination module when the security situation comprehensive score c is smaller than the median, and the calculation mode is as follows:wherein U is k Representing the number of activations, K, suggested by the number determination module 1 ,K 2 And K 3 Intensity coefficients, e, respectively representing the added number values k Representing the deviation of the system quantity enabled by the object with the current moment adjustment object system quantity and the security situation comprehensive score c as the system quantity enabled by the object with the median>Represented asAccumulated deviation, k represents the deviation amount, e k -e k-1 Representing the difference between the current time offset and the previous time offset.
CN202310673313.2A 2023-06-08 2023-06-08 Multistage linkage network security supervision system and method for power monitoring system Active CN116405328B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310673313.2A CN116405328B (en) 2023-06-08 2023-06-08 Multistage linkage network security supervision system and method for power monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310673313.2A CN116405328B (en) 2023-06-08 2023-06-08 Multistage linkage network security supervision system and method for power monitoring system

Publications (2)

Publication Number Publication Date
CN116405328A CN116405328A (en) 2023-07-07
CN116405328B true CN116405328B (en) 2023-08-08

Family

ID=87016527

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310673313.2A Active CN116405328B (en) 2023-06-08 2023-06-08 Multistage linkage network security supervision system and method for power monitoring system

Country Status (1)

Country Link
CN (1) CN116405328B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187771A (en) * 2015-07-31 2015-12-23 山东创德软件技术有限公司 Plant-level comprehensive supervision platform
CN109587124A (en) * 2018-11-21 2019-04-05 国家电网有限公司 Processing method, the device and system of electric power networks
CN112953005A (en) * 2021-02-20 2021-06-11 国网上海能源互联网研究院有限公司 Safety monitoring system suitable for distribution secondary system
CN113037745A (en) * 2021-03-06 2021-06-25 国网河北省电力有限公司信息通信分公司 Intelligent substation risk early warning system and method based on security situation awareness
CN114143348A (en) * 2021-11-30 2022-03-04 中国电力科学研究院有限公司 Electric power Internet of things security defense method and system, storage medium and server
CN115883236A (en) * 2022-12-10 2023-03-31 国网福建省电力有限公司 Power grid intelligent terminal cooperative attack monitoring system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8856936B2 (en) * 2011-10-14 2014-10-07 Albeado Inc. Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187771A (en) * 2015-07-31 2015-12-23 山东创德软件技术有限公司 Plant-level comprehensive supervision platform
CN109587124A (en) * 2018-11-21 2019-04-05 国家电网有限公司 Processing method, the device and system of electric power networks
CN112953005A (en) * 2021-02-20 2021-06-11 国网上海能源互联网研究院有限公司 Safety monitoring system suitable for distribution secondary system
CN113037745A (en) * 2021-03-06 2021-06-25 国网河北省电力有限公司信息通信分公司 Intelligent substation risk early warning system and method based on security situation awareness
CN114143348A (en) * 2021-11-30 2022-03-04 中国电力科学研究院有限公司 Electric power Internet of things security defense method and system, storage medium and server
CN115883236A (en) * 2022-12-10 2023-03-31 国网福建省电力有限公司 Power grid intelligent terminal cooperative attack monitoring system

Also Published As

Publication number Publication date
CN116405328A (en) 2023-07-07

Similar Documents

Publication Publication Date Title
US20220124108A1 (en) System and method for monitoring security attack chains
CN110620759B (en) Multi-dimensional association-based network security event hazard index evaluation method and system
US20220078210A1 (en) System and method for collaborative cybersecurity defensive strategy analysis utilizing virtual network spaces
US20220210200A1 (en) Ai-driven defensive cybersecurity strategy analysis and recommendation system
US7172118B2 (en) System and method for overcoming decision making and communications errors to produce expedited and accurate group choices
CN112073389B (en) Cloud host security situation awareness system, method, device and storage medium
CN114584405B (en) Electric power terminal safety protection method and system
Bhattacharjee et al. $ QnQ $ Q n Q: Quality and Quantity Based Unified Approach for Secure and Trustworthy Mobile Crowdsensing
CN112153047B (en) Block chain-based network security operation and maintenance and defense method and system
CN111786950A (en) Situation awareness-based network security monitoring method, device, equipment and medium
Baig Multi-agent systems for protecting critical infrastructures: A survey
CN110620696A (en) Grading method and device for enterprise network security situation awareness
Li et al. Time series association state analysis method for attacks on the smart internet of electric vehicle charging network
Sen et al. On using contextual correlation to detect multi-stage cyber attacks in smart grids
CN115378711A (en) Industrial control network intrusion detection method and system
Zheng et al. Smart grid: Cyber attacks, critical defense approaches, and digital twin
CN116405328B (en) Multistage linkage network security supervision system and method for power monitoring system
CN115632884B (en) Network security situation perception method and system based on event analysis
Li et al. A distributed intrusion detection model based on cloud theory
CN115766235A (en) Network security early warning system and early warning method
Madsen et al. Evaluating the impact of intrusion sensitivity on securing collaborative intrusion detection networks against SOOA
CN113836564A (en) Block chain-based networked automobile information safety system
Cerullo et al. Enabling convergence of physical and logical security through intelligent event correlation
Zhang et al. Network security situation awareness technology based on multi-source heterogeneous data
Dai et al. Research on power mobile Internet security situation awareness model based on zero trust

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant