Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power attack test system based on attack topology

An attack test, power technology, applied in transmission systems, electrical components, etc., can solve problems such as the inability to provide simulated attack samples

Active Publication Date: 2021-03-30
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no complete attack sample library that can face the topology of the power system, and it is impossible to provide simulated attack samples for the power system security attack and defense platform.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power attack test system based on attack topology
  • Power attack test system based on attack topology
  • Power attack test system based on attack topology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following description serves to disclose the present invention to enable those skilled in the art to carry out the present invention. The preferred embodiments described below are only examples, and those skilled in the art can devise other obvious variations. The basic principles of the present invention defined in the following description can be applied to other embodiments, variations, improvements, equivalents and other technical solutions without departing from the spirit and scope of the present invention.

[0023] Such as figure 1 As shown, the construction process of the power attack test system of the present invention includes the following steps:

[0024] 1) Construction of power attack sample database:

[0025] ① Data acquisition: There are two types of data sources for the power attack sample database. One is the basic data, which comes from the China National Information Security Vulnerability Sharing Platform, the National Information Security Vul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power attack test system based on attack topology, and belongs to the technical field of power network security. According to the method, a complete power attack sample database is constructed for a topological structure of a power system, corresponding attack samples are provided for all links in the power system, including a construction method of the power attack database; moreover, a user interaction interface is constructed, an attack channel module is established to implement targeted attacks, and the power system security is improved; and finally, the attack and defense sample expansion module and the defense platform are linked to autonomously expand the sample. According to the invention, a standardized place for storage, testing and drilling is established for information security of the power industry and the industrial control system.

Description

technical field [0001] The invention relates to the technical field of power network security, in particular to a power attack test system based on attack topology. Background technique [0002] With the development of my country's electric power industry, especially the acceleration of informationization, network technology is playing an increasingly important role in the power system. In particular, our country is in a critical period of industrial transformation and upgrading, and information technology is fully infiltrating into the industrial field. Therefore, the security defense of large-scale industrial control systems including the power industry has become a part of the national security strategy. [0003] At present, power systems are vulnerable to security threats such as DDoS attacks and SCADA vulnerability attacks. Therefore, many units involved in information security have established security attack and defense drill platforms in the field to simulate externa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/20
Inventor 许爱东李立浧蒋屹新张宇南徐文渊冀晓宇吴之昊李鹏习伟
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products