Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerable main machine recognition method and device of power system

A power system and identification method technology, applied in circuit devices, transmission systems, digital transmission systems, etc., can solve problems such as low efficiency and identification of hidden danger hosts.

Inactive Publication Date: 2013-12-11
POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the efficiency of this method is not very high. Although the vulnerability scanning of the entire network is carried out under the entire industrial control system simulation platform, although the coverage is comprehensive, the huge vulnerability scanning results cannot help evaluators effectively identify hidden hosts, and then formulate More effective security controls

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerable main machine recognition method and device of power system
  • Vulnerable main machine recognition method and device of power system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to further illustrate the technical means adopted by the present invention and the achieved effects, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings and preferred embodiments.

[0020] see figure 1 , is a schematic flowchart of a method for identifying a hidden host in a power system according to the present invention.

[0021] The method for identifying a hidden danger host in a power system of the present invention comprises the following steps:

[0022] S101 Query system risks existing in the power system;

[0023] S102 takes the system risk as a top event, and uses a fault tree query method to query each bottom event that causes the top event;

[0024] S103 Calculate the occurrence probability of each bottom event by using the Bayesian network probability algorithm, and sort the bottom events according to the magnitude of the occurrence probability;

[0025] S10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerable main machine recognition method of a power system. The method includes the steps of inquiring a system risk existing in the power system, taking the system risk as a top event, inquiring bottom events causing the top event by means of a fault tree query method, calculating the occurrence probability of each bottom event by means of a Bayesian network probabilistic algorithm, sequencing the bottom events according to the occurrence probabilities, and recognizing a vulnerable main machine of the power system in the bottom events according to a sequencing result. Besides, the invention further discloses a vulnerable main machine recognition device of the power system. In the hidden risk recognizing process, the Bayesian network probabilistic algorithm is introduced to calculate the occurrence probabilities of the bottom events, the bottom events are sequenced according to the occurrence probabilities, the influence degree of each bottom event in a fault tree on the top event is quantified, and therefore the vulnerable main machine in the power system can be effectively and quickly recognized.

Description

technical field [0001] The invention relates to the technical field of power systems, in particular to a method for identifying a hidden host in a power system and a device for identifying a hidden host in a power system. Background technique [0002] For power systems, traditional hidden danger identification mainly uses vulnerability scanners to scan for vulnerabilities on-site in information systems. However, the power grid controls the operation of important national infrastructures such as industry, energy, and transportation. Once the power grid cannot provide services normally, the operation of these important infrastructures will also be paralyzed. Since the vulnerability scanning tool will send a lot of attack packets to the detection environment, it is likely to affect the normal service of the industrial control system, so in order to ensure reliability, it is impossible to use the vulnerability scanning tool to scan in the industrial control system environment, b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24G06F21/56H02J13/00
Inventor 李伟坚何杰张筱云亢中苗付佳佳李星南施展张珮明朱文红蒋康明
Owner POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products