A network security threat assessment method and system for a substation monitoring system

A substation monitoring and network security technology, applied in transmission systems, electrical components, etc., can solve problems such as lack of assessment of substation network security, and achieve the effect of convenient defense measures

Inactive Publication Date: 2019-09-27
NR ELECTRIC CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Researchers are often limited to the perspective of the electric power field, and lack the perspective of evaluating substation network security from the perspective of information security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network security threat assessment method and system for a substation monitoring system
  • A network security threat assessment method and system for a substation monitoring system
  • A network security threat assessment method and system for a substation monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The embodiments of the present invention are described in detail below. Examples of the embodiments are shown in the accompanying drawings, wherein the same or similar reference numerals indicate the same or similar elements or elements with the same or similar functions. The following embodiments described with reference to the accompanying drawings are exemplary, and are only used to explain the present invention, and cannot be construed as limiting the present invention.

[0042] A network security threat assessment method for substation monitoring system, such as figure 1 As shown, including the following steps:

[0043] Step 1: Read the UML diagram depicting the application scenario of the monitoring system, and identify the preliminary network security threats and attack targets of the substation monitoring system.

[0044] Specifically, it includes analyzing the use case diagram in the UML diagram to abstract the daily operation behavior of the monitoring system; analyz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network security threat evaluation method for a substation monitoring system. The method comprises the steps of firstly, reading a UML graph which describes a monitoring system application scene, and identifying primary network security threats and attack objects of the substation monitoring system; then analyzing and combining the network security threats, outputting a monitoring system security threat model, and refining the model into an attack tree; and finally, carrying out formalized description on the attack processes and attack behaviors of the specific network security threats, and outputting the attack processes and attack behaviors in an Object-Z format. Correspondingly, the invention also provides a matched network security threat evaluation system for the substation monitoring system. According to the method provided by the invention, the network security threats of the monitoring system can be described qualitatively, and the network security threats are visual and clear; and the threat attack behaviors are described by use of a formalized mathematical language, and therefore, corresponding defensive measures can be provided.

Description

Technical field [0001] The invention belongs to the field of network security control, in particular to a network security threat assessment method and system for a substation monitoring system. Background technique [0002] As the power dispatching automation system and the substation monitoring system are basically networked, the network security issues of the power dispatching system and the substation monitoring system have become increasingly prominent. With the sixteen-character proposal of "security partition, network dedicated, horizontal isolation, vertical encryption", the power system has successively deployed vertical encryption authentication devices and horizontal isolation devices on the power dispatch data network, strengthening the network boundary between the substation and the dispatch data network However, the network security analysis and defense in the substation are often ignored. [0003] Traditional thinking believes that the substation monitoring system n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 程夏胡绍谦汤震宇林青杨梅强尤小明曹翔
Owner NR ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products