Attack path parallel prediction method for power system network

A technology of attack path and prediction method, which is applied in the direction of transmission system, digital transmission system, information technology support system, etc., can solve security loopholes, increase system security risks, and attackers are easy to launch attacks, etc., to achieve the effect of strengthening security

Pending Publication Date: 2022-08-09
国网西藏电力有限公司电力科学研究院
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the above-mentioned prior art, SCADA is interconnected with commercial networks such as enterprise networks and the Internet to share transmission data, which causes a large number of security holes in the entire network system of SCADA, making it easier for attackers to launch attacks and increasing the security of the system risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0023] A method for parallel prediction of attack paths oriented to power system networks, comprising the following steps: (1) assuming an attack target of an attacker: identifying security vulnerabilities existing in SCADA that the attacker can exploit;

[0024] (2) Identify possible security vulnerabilities in SCADA and construct an attack tree: the root node of the attack tree corresponds to the attacker's final attack target, the child nodes correspond to the sub-targets that need to be achieved before reaching the final target, and the leaf node is the most important target to reach the target. basic matter;

[0025] (3) Evaluate the security status of each leaf node and calculate the attack success probability of each leaf node: Using the attribute point of view, each leaf node is given three attributes: the cost of the attack, the difficulty of the attack, and the possibility of the attack being discovered. sex;

[0026] (4) Calculate the attack success probability of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attack path parallel prediction method for a power system network, and relates to the field of industrial control system security, and the technical scheme is as follows: (1) assuming an attack target of an attacker: identifying security vulnerabilities existing in SCADA (Supervisory Control And Data Acquisition) which can be utilized by the attacker; (2) identifying possible security vulnerabilities in SCADA and constructing an attack tree; (3) evaluating the safety condition of each leaf node, and calculating the attack success probability of each leaf node; and (4) the attack success probability of each attack path is calculated, and the security of the SCADA system is enhanced.

Description

technical field [0001] The invention relates to the field of industrial control system security, and more particularly, to a parallel prediction method of attack paths oriented to power system networks. Background technique [0002] As computer network technology is widely used in the power system, the power system is closely related to the information system. The network security is as important as the physical security, because the reliability of the power system can be affected by attacking key network assets. As a key network asset, SCADA is There are a wide range of applications in industrial monitoring and power system control. More and more software and hardware of IT systems are integrated into SCADA. Servers and engineering stations, remote terminal units (RTUs), and intelligent electronic devices (IEDs) in SCADA are used. Commercial off-the-shelf products or technologies, and network protocols are gradually being made public. [0003] However, in the above-mention...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/12H04L41/14H04L41/147
CPCH04L63/1433H04L63/1416H04L63/1458H04L63/1441H04L67/12H04L63/1408H04L41/145H04L41/147Y04S40/20
Inventor 曾凡明
Owner 国网西藏电力有限公司电力科学研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products