首页 | 官方网站   微博 | 高级检索  
     

基于攻击图的电网信息物理融合系统风险定量评估
引用本文:陈德成.基于攻击图的电网信息物理融合系统风险定量评估[J].电测与仪表,2020,57(2):62-68.
作者姓名:陈德成
作者单位:南京邮电大学自动化学院
基金项目:国家自然科学基金项目( 61633016)
摘    要:由于信息和通信技术的广泛应用,现代电网已成为一个实时感知、动态控制与信息服务的多维异构复杂系统,即电网信息物理融合系统(电网CPS)。信息系统与电力系统的深度融合使得电网面临更多的网络威胁。在此背景下,本文提出了虚假数据注入攻击下的电网信息物理融合系统风险定量评估方法。针对攻击建立了数据流传递的电力信息安全模型,将攻击分为两个过程:首先选择变电站注入虚假数据,然后基于通信拓扑图构建了流传递路径,采用攻击图量化攻击源信息传递模型,并基于故障下最优负荷削减策略对电力系统潜在后果进行了定量评估。最后通过算例研究,确定考虑网络攻击因素下系统的薄弱节点,验证了所提方法的可行性和有效性。

关 键 词:虚假数据注入攻击  电网信息物理融合系统  电力信息安全模型  攻击图  定量评估
收稿时间:2018/9/17 0:00:00
修稿时间:2018/9/17 0:00:00

Quantitative Risk Assessment for Cyber Physical Power System Based on Attack Graph
CHEN Decheng.Quantitative Risk Assessment for Cyber Physical Power System Based on Attack Graph[J].Electrical Measurement & Instrumentation,2020,57(2):62-68.
Authors:CHEN Decheng
Affiliation:College of Automation, Nanjing University of Posts and Telecommunications
Abstract:Due to the wide application of information and communication technology, the modern power grid has become a multi-dimensional heterogeneous complex system with real-time perception, dynamic control and information service, namely cyber physical power system(CPPS). Under the background of the deep integration of cyber system and power system, the power grid faces more network threats. In this context, a quantitative risk assessment method of grid cyber physical system under false data injection attack was proposed in this paper. Against the attack a power information security model for data flow delivery is established, which divides the attack into two processes: First, selecting the substation injection of false data, then based on the communication topology, a flow delivery path is constructed to simulate the attack source information transfer model. In addition, the attack graph is used to quantify the attack source information transfer model, and the potential consequences of the power system are quantitatively evaluated based on the optimal load reduction strategy under failure. Finally, through the case study, the weak nodes of the system were determined considering the factor of cyber-attack. It verifies the feasibility and effectiveness of the proposed method.
Keywords:false data injection attack  cyber physical power system  power cyber security model  attack graph  quantitative assessment
本文献已被 CNKI 等数据库收录!
点击此处可从《电测与仪表》浏览原始摘要信息
点击此处可从《电测与仪表》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号