首页 | 官方网站   微博 | 高级检索  
     

网络攻击影响电力基础设施的原因与实例分析
引用本文:殷红旭,吕奋飞,刘念,张建华.网络攻击影响电力基础设施的原因与实例分析[J].电力信息化,2013,11(5):1-8.
作者姓名:殷红旭  吕奋飞  刘念  张建华
作者单位:1. 德州供电公司,山东德州,253000
2. 新能源电力系统国家重点实验室(华北电力大学),北京,102206
基金项目:国家自然科学基金资助项目
摘    要:随着电力技术、信息技术和军事技术的发展,网络攻击对电力基础设施的影响逐渐成为国内外关注的热点问题。文章首先从3个方面分析了网络攻击对电力基础设施产生影响的主要原因:由于电力基础设施对信息基础设施的依存性,使得信息域的网络攻击问题有可能影响到电力域;对于潜在的威胁源,向电力基础设施发动网络攻击具有可观的效益;电力基础设施面对网络攻击存在脆弱性。在此基础上,对各种网络攻击方式的特点,及其发生在电力基础设施上的可能性进行了分类论述。最后,针对近年来公开报道的网络攻击实例,从威胁源、脆弱性和攻击方式等方面进行分析总结。

关 键 词:网络攻击  电力基础设施  信息基础设施  依存性  脆弱性

Cause and Case Analysis of Impact of Network Attacks on Electric Power Infrastructure
YIN Hong-xu , LV Fen-fei , LIU Nian , ZHANG Jian-hua.Cause and Case Analysis of Impact of Network Attacks on Electric Power Infrastructure[J].Electric Power Information Technology,2013,11(5):1-8.
Authors:YIN Hong-xu  LV Fen-fei  LIU Nian  ZHANG Jian-hua
Affiliation:1. Dezhou Power Company, Dezhou 253000, China; 2. State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources (North China Electric Power University), Beijing 102206, China)
Abstract:With the development of electric power technologies, information technologies and military technologies, the impact of cyber attacks on electric power infrastructure has increasingly become a hot issue got attention from domestic and overseas. First, this paper analyzes three main causes resulting in the impact of network attacks on power infrastructure. The first cause is that the dependency between power infrastructure and information infrastructure makes network attacks on the information domain impact the power domain. The second one is that because of the existence of threats, network attacks on power infrastructure generate considerable benefits. The last one is that electric power infrastructure is vulnerable to cyber attacks. According to the characteristics of various network attack ways, this paper describes the possibility of the appearance of each attack by categories. At last, taking the open published network attack events in recent years for an example, threat sources, vulnerabilities and attack modes are analyzed and summarized.
Keywords:network attack  electric power infrastructure  information infrastructure  dependency  vulnerability
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号