Unlock instant, AI-driven research and patent intelligence for your innovation.

Scada intrusion detection method for power dispatching based on active deception of virtual components

A power dispatching and intrusion detection technology, applied to electrical components, transmission systems, etc., can solve problems such as lack of defense means, difficulty in accurate capture, anti-virus software cannot be killed, etc., to achieve high recognition accuracy and improve active protection of information security effect of ability

Active Publication Date: 2016-08-31
CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, the virus can bypass the security boundary and attack physically isolated industrial control systems with the help of the enhanced design of the USB flash drive transmission mechanism; The software cannot be checked and killed; finally, because the Stuxnet virus has precise damage targets and has a deep understanding of the target system, it will not spread like ordinary viruses and Trojan horses, and can accurately modify the control parameters of the attack target without communication probing , Carrying out damage, this behavior pattern is obviously different from general malware and viruses, and it is difficult for existing passive intrusion detection systems to accurately capture
To sum up, there is currently a lack of targeted defense against Stuxnet-like malware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scada intrusion detection method for power dispatching based on active deception of virtual components

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention is an intrusion detection method of power dispatching SCADA based on the active deception of virtual components. Generator, then insert the relevant virtual circuit breaker and its remote control IP address, MAC address and port number, and point these IP addresses, MAC address and port number to the intrusion detection system of the SCADA system of the existing actual power grid. When malware invades and sends a control command signal to the remote control IP address, MAC address and port number corresponding to the virtual circuit breaker, the intrusion detection system can detect and determine that there is malware intrusion, and block or switch the SCADA system control function to the standby The SCADA system can prevent intruding malicious software from remotely controlling the important generators, transformers and lines of the actual power grid out of operation, ensuring the safety of the power grid. And according to the function of the intr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an active deception type power dispatching SCADA intrusion detection method based on virtual components. Data of virtual power transmission and distribution lines, generators and transformer components and data of related circuit breaker components are inserted in the existing practical power dispatching SCADA database table; therefore, a power dispatching SCADA system generates corresponding virtual lines, generators, transformers and circuit breakers, such that malicious software intruding into the SCADA system is deceptive to remotely control the virtual components to trip; and the remote control IP address, the MAC address and the port number of the virtual circuit breakers point to an intrusion detection system of the power dispatching SCADA system. When the malicious software intrudes and sends a control command signal to the IP address, the MAC address and the port number relative to the virtual circuit breakers, the intrusion detection system can judge that the malicious software intrudes; the control function of the power dispatching SCADA system is closed or switched to a spare system; the intruded malicious software is prevented from remotely controlling practical important generators, transformers and lines, such that the power grid security is ensured; and the active information security protective capability of the SCADA system can be obviously increased.

Description

technical field [0001] The invention relates to an intrusion detection method of a power dispatching SCADA system, in particular to an intrusion detection method based on active deception and virtual important components to lure intruders to attack. Background technique [0002] As a critical infrastructure of modern society, power systems are high-value targets for cyber attacks. In the process of digitalization and network development of the power system, the power system has gradually developed into a hybrid system composed of information systems and physical grids. Among them, the scheduling control and production management of the power grid are highly dependent on the information system, and the possible consequences of information security incidents have increased significantly. The United States has also set up a special cyber command, specializing in cyber attack and defense research in fields such as electric power. [0003] At present, the research on power syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/145
Inventor 苏盛李志强马钧吴长江曾祥君曹一家
Owner CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY