首页 | 官方网站   微博 | 高级检索  
     

智能变电站嵌入式终端的网络攻击类型研究及验证
引用本文:何金栋,王宇,赵志超,李俊娥,谢新志,张锐文,柳玙卿,裘德熙. 智能变电站嵌入式终端的网络攻击类型研究及验证[J]. 中国电力, 2020, 53(1): 81-91. DOI: 10.11930/j.issn.1004-9649.201912050
作者姓名:何金栋  王宇  赵志超  李俊娥  谢新志  张锐文  柳玙卿  裘德熙
作者单位:1. 国网福建省电力有限公司电力科学研究院, 福建 福州 350007;2. 空天信息安全与可信计算教育部重点实验室(武汉大学 国家网络安全学院), 湖北 武汉 430072
基金项目:国家自然科学基金资助项目(协同网络攻击下电网CPS跨空间级联故障演化机理及早期防御研究,51977155);国网福建省电力公司科技项目(智能变电站网络安全测试技术研究,SGFJDK00NYJS1900308)
摘    要:全面掌握智能变电站嵌入式终端可能遭受的网络攻击方式及其对电力一次系统的影响,是建立有效安全防护措施的基础。目前,有关智能变电站嵌入式终端网络攻击的研究大都针对单一类型的网络攻击,且仅停留在理论分析阶段,未对提出的网络攻击类型进行验证。在分析智能变电站嵌入式终端及其通信环境的脆弱性的基础上,从攻击检测所需要的数据源和检测方法角度总结了终端可能遭受的网络攻击类型;提出了实物与仿真相结合的攻击验证方案;分析了泛洪类和报文类主要攻击的原理,给出了相应攻击工具的构造方法;使用所构造的攻击工具在验证方案设计的实验环境中进行了测试,结果证明这些攻击会对智能变电站嵌入式终端及电力一次设备造成影响,且终端抵御泛洪类攻击能力较差。

关 键 词:智能变电站  嵌入式终端  网络攻击  攻击验证  
收稿时间:2019-12-10

Type and Verification of Network Attacks on Embedded Terminals of Intelligent Substation
HE Jindong,WANG Yu,ZHAO Zhichao,LI June,XIE Xinzhi,ZHANG Ruiwen,LIU Yuqing,QIU Dexi. Type and Verification of Network Attacks on Embedded Terminals of Intelligent Substation[J]. Electric Power, 2020, 53(1): 81-91. DOI: 10.11930/j.issn.1004-9649.201912050
Authors:HE Jindong  WANG Yu  ZHAO Zhichao  LI June  XIE Xinzhi  ZHANG Ruiwen  LIU Yuqing  QIU Dexi
Affiliation:1. State Grid Fujian Electric Power Research Institute, Fuzhou 350007, China;2. Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
Abstract:A comprehensive understanding of the ways of network attacks on the embedded terminals of intelligent substation and their impacts on the primary power system is the basis for taking effective security protection measures. At present, most researches on the embedded terminal attack of intelligent substation focus on the single type of network attack and stay in the theoretical analysis stage, and no verification is conducted on the presented types of network attack. Based on a vulnerability analysis of the embedded terminals of intelligent substation and their communication environment, the types of network attacks on the terminals are summarized in terms of the data sources and detection methods required for attack detection. Then, an attack verification scheme is proposed with combination of physical testing and simulation. Meanwhile, the principles of flooding and message attacks are analyzed, and the construction methods of the corresponding attack tools are presented. Finally, the constructed attack tools are tested in the experiment environment of the designed verification scheme. The test results show that the presented two attacks can affect the embedded terminals of intelligent substation and the primary equipment, and the embedded terminals are poor in resisting flooding attack.
Keywords:intelligent substation  embedded terminal  network attack  attack verification  
本文献已被 CNKI 维普 等数据库收录!
点击此处可从《中国电力》浏览原始摘要信息
点击此处可从《中国电力》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号