Method, system and power system for assessing hidden dangers of information physical security in electric power network

A technology of power information and information physics, applied in transmission systems, electrical components, data processing applications, etc., can solve the problem of ignoring the probability of security risks, the probability of transmission risks of power information networks, the lack of failure relationship analysis of information equipment and physical components, and the proneness to errors. Reporting and missed reporting, etc., to improve accuracy, overcome the difficulty of dealing with large-scale system risk assessment, and simplify computational complexity

Active Publication Date: 2021-08-20
HUNAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are many shortcomings in the current power network hidden danger assessment method: 1) lack of in-depth analysis of the behavior characteristics of the attacker, and do not fully consider factors such as time factors and network attack capabilities that reflect the game relationship between the attacker and the defender
2) In addition, the current evaluation method only considers the exploitability of high-risk vulnerabilities, ignoring the security risk probability of the network security defense measures and the transmission risk probability of the power information network; 3) The current evaluation method lacks information on information equipment and physical components. The failure relationship analysis does not reflect the business characteristics of power in the modeling of attack consequences, and lacks quantitative evaluation of physical consequences
Therefore, the current power network hidden danger assessment method cannot fully reflect the security level of the system, and is prone to false positives and false positives. It is urgent to invent a new power network hidden danger assessment method and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and power system for assessing hidden dangers of information physical security in electric power network
  • Method, system and power system for assessing hidden dangers of information physical security in electric power network
  • Method, system and power system for assessing hidden dangers of information physical security in electric power network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0077] Further as a preferred embodiment, step S1 includes:

[0078] Step S11: Input the high-risk vulnerability data on each power information device. The basic indicators include vulnerability access method, vulnerability access complexity, and vulnerability access conditions. The time indicator is the vulnerability exposure time. The device host operating system type and the attacker's familiarity with the power system.

[0079] Step S12: According to the basic indicator data in the high-risk vulnerability data on the power information equipment, calculate the basic indicators in the high-risk vulnerability assessment of the power information equipment, the specific formula is as follows:

[0080] Base=AV×AC×AU (3)

[0081] Among them, AV is the vulnerability access method, AC is the vulnerability access complexity, and AU is the vulnerability access condition, and its assignment is provided by the CVSS system.

[0082] Step S13: According to the vulnerability exposure ti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, system and power system for assessing hidden dangers of power network information physical security, which comprehensively considers basic indicators, time indicators, and network attack ability indicators, and calculates the utilization rate of high-risk loopholes in power information equipment; establishes network security for power information equipment Vulnerability assessment model to calculate the attack success probability of power information equipment defense measures; according to the exploitability rate of high-risk vulnerabilities of power information equipment and the attack success probability of power information equipment defense measures, a network attack graph model is established to calculate the attack success probability of power information equipment ;Establish a power information equipment-physical component failure correlation model to evaluate the physical consequences of power information equipment being attacked by a network. The invention overcomes the deficiencies of the existing method in analyzing the attack behavior and the lack of consideration of the characteristics of the power service, and improves the accuracy and credibility of the risk assessment of the hidden danger of the power network security.

Description

technical field [0001] The invention relates to the field of power system network security analysis, in particular to a power network information physical security risk assessment method, system and power system. Background technique [0002] The safe operation of the power system is directly related to the national economy and national security. The in-depth application of information and communication technology in the power system has exposed more and more hidden dangers and loopholes in the current power network system, making it more vulnerable to network attacks. Malicious attackers can use the high-risk hidden vulnerabilities of the system to launch network attacks to gain control of the main control computer through email spoofing, phishing and other leakage methods, and then send malicious control instructions to the primary device, causing the primary device to malfunction and cause the line to be disconnected. A series of serious safety accidents such as line faul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06Q10/06G06Q50/06G06Q50/30
CPCG06Q10/0635G06Q10/06393G06Q50/06G06Q50/30H04L63/1416H04L63/1433H04L63/20
Inventor 刘绚严康张波田建伟车亮肖紫东
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products