Network security threat evaluation method and system for substation monitoring system

A substation monitoring and system network technology, applied in transmission systems, electrical components, etc., can solve problems such as lack of assessment of substation network security, and achieve the effect of convenient defense measures

Inactive Publication Date: 2016-09-28
NR ELECTRIC CO LTD +1
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Researchers are often limited to the perspective of the electric power field, and lack the p...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security threat evaluation method and system for substation monitoring system
  • Network security threat evaluation method and system for substation monitoring system
  • Network security threat evaluation method and system for substation monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0042] A network security threat assessment method for a substation monitoring system, such as figure 1 shown, including the following steps:

[0043] Step 1: Read the UML diagram depicting the application scenario of the monitoring system, and identify the preliminary network security threats and attack targets of the substation monitoring system.

[0044] Specifically, it includes analyzing the use case diagram in the UML diagram to abstract the daily operation behavior of the monitoring system; analyzing the sequence diagram in the UML ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network security threat evaluation method for a substation monitoring system. The method comprises the steps of firstly, reading a UML graph which describes a monitoring system application scene, and identifying primary network security threats and attack objects of the substation monitoring system; then analyzing and combining the network security threats, outputting a monitoring system security threat model, and refining the model into an attack tree; and finally, carrying out formalized description on the attack processes and attack behaviors of the specific network security threats, and outputting the attack processes and attack behaviors in an Object-Z format. Correspondingly, the invention also provides a matched network security threat evaluation system for the substation monitoring system. According to the method provided by the invention, the network security threats of the monitoring system can be described qualitatively, and the network security threats are visual and clear; and the threat attack behaviors are described by use of a formalized mathematical language, and therefore, corresponding defensive measures can be provided.

Description

technical field [0001] The invention belongs to the field of network security control, in particular to a network security threat assessment method and system for a substation monitoring system. Background technique [0002] As the power dispatching automation system and substation monitoring system are basically networked, the network security issues of power dispatching system and substation monitoring system are becoming increasingly prominent. Accompanied by the sixteen-character proposal of "safe partition, dedicated network, horizontal isolation, and vertical encryption", the power system has successively deployed vertical encryption authentication devices and horizontal isolation devices on the power dispatching data network, strengthening the network boundary between substations and dispatching data networks However, the network security analysis and defense in the substation are often ignored. [0003] Traditional thinking holds that the substation monitoring syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 程夏胡绍谦汤震宇林青杨梅强尤小明曹翔
Owner NR ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products