Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Power Attack Test System Based on Attack Topology

An attack test and electric power technology, which is applied in the transmission system, digital transmission system, electrical components, etc., can solve the problem of not being able to provide simulated attack samples

Active Publication Date: 2022-06-17
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no complete attack sample library that can face the topology of the power system, and it is impossible to provide simulated attack samples for the power system security attack and defense platform.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Power Attack Test System Based on Attack Topology
  • A Power Attack Test System Based on Attack Topology
  • A Power Attack Test System Based on Attack Topology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following description serves to disclose the invention to enable those skilled in the art to practice the invention. The preferred embodiments described below are given by way of example only, and other obvious modifications will occur to those skilled in the art. The basic principles of the invention defined in the following description may be applied to other embodiments, variations, improvements, equivalents, and other technical solutions without departing from the spirit and scope of the invention.

[0023] like figure 1 As shown, the construction process of the power attack test system of the present invention includes the following steps:

[0024] 1) Construction of power attack sample database:

[0025] ①Data acquisition: The data sources of the power attack sample database are divided into two types. One is basic data, the source of which is China's National Information Security Vulnerability Sharing Platform, National Information Security Vulnerability D...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power attack test system based on attack topology, which belongs to the technical field of power network security. Oriented to the topological structure of the power system, the present invention constructs a complete database of power attack samples, provides corresponding attack samples for each link in the power system, includes a construction method of the power attack database, and builds a user interface to establish a The channel module implements targeted attacks, and finally adopts the attack and defense sample expansion module and the defense platform to independently expand the samples. The invention establishes a standardized place for storage, testing and exercise for the information security of electric power industry and industrial control system.

Description

technical field [0001] The invention relates to the technical field of power network security, in particular to a power attack test system based on attack topology. Background technique [0002] With the development of my country's electric power industry, especially the acceleration of the informatization process, network technology is playing an increasingly important role in the power system. In particular, my country is in a critical period of industrial transformation and upgrading, and information technology is infiltrating into the industrial field in an all-round way. Therefore, the security defense of large-scale industrial control systems including the power industry has become a part of the national security strategy. [0003] At present, the power system is vulnerable to security threats such as DDoS attacks and SCADA vulnerability attacks. Therefore, many units involved in information security have established security attack and defense drill platforms in the f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1441H04L63/20
Inventor 许爱东李立浧蒋屹新张宇南徐文渊冀晓宇吴之昊李鹏习伟
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products