Power network information physical potential safety hazard assessment method and system, and power system

A technology of power information and information physics, applied in transmission systems, electrical components, data processing applications, etc., can solve the problem of ignoring the security risk probability of power information network transmission risk probability, prone to false positives and false negatives, and only considering high-risk vulnerabilities. Utilization rate and other issues to achieve the effect of improving accuracy

Active Publication Date: 2020-09-08
HUNAN UNIV
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are many shortcomings in the current power network hidden danger assessment method: 1) lack of in-depth analysis of the behavior characteristics of the attacker, and do not fully consider factors such as time factors and network attack capabilities that reflect the game relationship between the attacker and the defender
2) In addition, the current evaluation method only considers the exploitability of high-risk vulnerabilities, ignoring the security risk probability of the network security defense measures and the transmission risk probability of t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power network information physical potential safety hazard assessment method and system, and power system
  • Power network information physical potential safety hazard assessment method and system, and power system
  • Power network information physical potential safety hazard assessment method and system, and power system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0077] Further as a preferred embodiment, step S1 includes:

[0078] Step S11: Input the high-risk vulnerability data on each power information device. The basic indicators include vulnerability access method, vulnerability access complexity, and vulnerability access conditions. The time indicator is the vulnerability exposure time. The device host operating system type and the attacker's familiarity with the power system.

[0079] Step S12: According to the basic indicator data in the high-risk vulnerability data on the power information equipment, calculate the basic indicators in the high-risk vulnerability assessment of the power information equipment, the specific formula is as follows:

[0080] Base=AV×AC×AU (3)

[0081] Among them, AV is the vulnerability access method, AC is the vulnerability access complexity, and AU is the vulnerability access condition, and its assignment is provided by the CVSS system.

[0082] Step S13: According to the vulnerability exposure ti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a power network information physical potential safety hazard assessment method, a power network information physical potential safety hazard assessment system and a power system. The power network information physical potential safety hazard assessment method comprises the steps of: comprehensively considering a basic index, a time index and a network attack capability index, and calculating high-risk vulnerability availability of power information equipment; establishing a power information equipment network security vulnerability assessment model, and calculating an attack success probability of defense measures of the power information equipment; establishing a network attack graph model according to the high-risk vulnerability availability of the power information equipment and the attack success probability of the defense measures of the power information equipment, and calculating an attack success probability of the power information equipment; and establishing a power information equipment-physical element failure association model, and assessing physical consequences caused by network attacks on the power information equipment. The power network information physical potential safety hazard assessment method overcomes the defects that an existing method is insufficient in attack behavior analysis and lacks consideration of power business features, and improves the accuracy and credibility of power network potential safety hazard risk assessment.

Description

technical field [0001] The invention relates to the field of power system network security analysis, in particular to a power network information physical security risk assessment method, system and power system. Background technique [0002] The safe operation of the power system is directly related to the national economy and national security. The in-depth application of information and communication technology in the power system has exposed more and more hidden dangers and loopholes in the current power network system, making it more vulnerable to network attacks. Malicious attackers can use the high-risk hidden vulnerabilities of the system to launch network attacks to gain control of the main control computer through email spoofing, phishing and other leakage methods, and then send malicious control instructions to the primary device, causing the primary device to malfunction and cause the line to be disconnected. A series of serious safety accidents such as line faul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06Q10/06G06Q50/06G06Q50/30
CPCG06Q10/0635G06Q10/06393G06Q50/06G06Q50/30H04L63/1416H04L63/1433H04L63/20
Inventor 刘绚严康张波田建伟车亮肖紫东
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products