Electric power information network vulnerability threat evaluation model establishment method faced to electric power CPS risk evaluation and evaluation system based on the model

A technology for power information and risk assessment, applied in transmission systems, electrical components, electrical digital data processing, etc., can solve the inherent logic, network structure and security requirements that do not give the algorithm to determine the weight, taking into account the inapplicable vulnerability Threat assessment and other issues to achieve the effect of improving risk prevention capabilities, ensuring effectiveness and safety, and improving accuracy and timeliness

Active Publication Date: 2016-07-13
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +3
View PDF9 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

CVSS is a general evaluation system. It does not give the internal logic of determining the weight in the algorithm. It cannot take its network structure and security requirements into account when evaluating the vulnerabilities in the power information network. Therefore, the evaluation results have large errors and are not suitable for Vulnerability Threat Evaluation in Electric Power Information Network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power information network vulnerability threat evaluation model establishment method faced to electric power CPS risk evaluation and evaluation system based on the model
  • Electric power information network vulnerability threat evaluation model establishment method faced to electric power CPS risk evaluation and evaluation system based on the model
  • Electric power information network vulnerability threat evaluation model establishment method faced to electric power CPS risk evaluation and evaluation system based on the model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042]The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments; however, a power information network vulnerability threat assessment model and system oriented to power CPS risk assessment of the present invention are not limited to the embodiments.

[0043] Embodiment, please refer to the accompanying drawings, a power information network vulnerability threat assessment model and system oriented to power CPS risk assessment of the present invention, its vulnerability scanning system includes distributed scanning agents scattered in various security areas and arranged in Servers in Zone III;

[0044] figure 1 It is a system logic model diagram of the present invention. As shown in the figure, the functions completed by the server arranged in Zone III include: formulating scanning tasks, obtaining scanning reports, assessing vulnerability threats and maintaining security policies; the communicator in the server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electric power information network vulnerability threat evaluation model establishment method faced to electric power CPS risk evaluation and an evaluation system based on the model, the model selects three groups of security vulnerability evaluation factors including vulnerability distribution threat degree, access approach and utilization complexity; an analytic hierarchy process is adopted to establish a vulnerability threat degree evaluation model, and a parameter construction method is provided; on the basis of quantitative evaluation, the evaluation result defines a vulnerability threat level, and the objectivity of quantitative evaluation and visibility of qualitative evaluation are considered; and the system related to the invention comprises a vulnerability detection part and a server part which adopt distributed structure. According to the invention, a vulnerability scanning system and a security area of the electric power information network are combined, an electric power information network vulnerability threat evaluation algorithm based on CVSS and analytic hierarchy process is adopted to perform vulnerability threat evaluation, so that the system can be safer and more accurate for performing vulnerability scanning and safety evaluation on the electric power information network.

Description

technical field [0001] The invention relates to a vulnerability threat assessment model, in particular to a power information network vulnerability threat assessment system and assessment method oriented to power information security risk assessment. Background technique [0002] Various vulnerabilities (loopholes) in the power information network are important internal causes of power CPS information space security risks. Vulnerabilities exist in all levels and links of the power information network. Once exploited by malicious subjects, it will affect the normal operation of the power information system and its services, and may affect the reliable operation of the power primary system through the power information business. As a result, huge losses are caused, and vulnerability scanning of the power information network is a necessary step to ensure the security of the power system. [0003] Traditional network vulnerability scanners are generally stand-alone systems, whi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/57
CPCG06F21/577H04L63/1433
Inventor 王宇飞赵婷李俊娥刘剑杨国泰茹叶棋吴亦贝
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products