Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SMV (sampled measured value) network attack grading detection method applicable to digital substation bay level

A technology of network attack and detection method, which is applied in the field of power system information security, and can solve problems such as security accidents, false data injection attacks, and refusal to operate

Pending Publication Date: 2017-05-17
STATE GRID ZHEJIANG ELECTRIC POWER CO LTD SHAOXING POWER SUPPLY CO +3
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The original sampling message of SMV (Sampled Measured Values) is a true reflection of the operation of the primary side equipment in the power system; substations have high requirements for real-time transmission of SMV (no more than 4ms), and currently MU (Merging Unit) often does not add any information to SMV Security protection measures, so there is a high possibility of false data injection attacks; protection SMV messages are maliciously tampered with and replayed, which may cause the relay protection system to malfunction or refuse to operate, leading to major security accidents; measurement and control SMV messages, It is the main basis for the SCADA / EMS state estimation of the data acquisition and monitoring system of the control center. It is maliciously tampered with and replayed, which may cause SCADA / EMS to make wrong or even dangerous decisions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SMV (sampled measured value) network attack grading detection method applicable to digital substation bay level
  • SMV (sampled measured value) network attack grading detection method applicable to digital substation bay level
  • SMV (sampled measured value) network attack grading detection method applicable to digital substation bay level

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Such as figure 1 As shown, a method for grading detection of SMV network attacks applicable to digital substation bay layer includes the following steps:

[0022] Step 1. Packet decryption: Perform digital signature verification on the digitally signed SMV packet of MU, and process the data packet according to the encryption and decryption rules;

[0023] Step 2. Packet filtering: Since GOOSE / SMV has high requirements on real-time performance, GOOSE / SMV message transmission is directly from the application layer to the data link layer, without using UDP / TCP / IP protocol, so it needs to be started according to the SMV data packet MVC Different addresses, filter out SMV packets;

[0024] Step 3. Packet analysis: peel off the MAC address protocol on the outer layer of the SMV data packet, extract the data in the packet, and send the MAC address and packet data to the packet anomaly detection module.

[0025] Step 4. MAC address anomaly detection: All MAC addresses arrivin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SMV (sampled measured value) network attack grading detection method applicable to a digital substation bay level. The method includes steps of packet decryption, packet filtering, packet analysis, MAC (media access control) address abnormity detection, specification-based intrusion detection and historical event based data detection and further includes a final step that final detection results are classified and written into normal event logs and alarm logs and stored after abnormality evident acquisition, abnormal evaluation index calculation is performed according to intrusion data, and alarm and intrusion data and abnormal evaluation indexes are sent to a master station or local alarm display is performed. The SMV network attack grading detection method applicable to the digital substation bay level has advantages that by arrangement of various indicators for abnormal states including MAC address abnormality, SMV bad data, data packet logic detection, data traffic threshold abnormality, primary failure similarity, network attack similarity, uploading SMV faking, uploading SMV tampering and the like, intrusion forms and possible intrusion positions can be determined conveniently and quickly, and dispatch side operation monitoring personnel can be informed conveniently and quickly.

Description

technical field [0001] The invention relates to a method for hierarchical detection of network attacks on SMV messages of digital substations under the interval layer, and belongs to the field of power system information security. Background technique [0002] The original sampling message of SMV (Sampled Measured Values) is a true reflection of the operation of the primary side equipment in the power system; substations have high requirements for real-time transmission of SMV (no more than 4ms), and currently MU (Merging Unit) often does not add any information to SMV Security protection measures, so there is a high possibility of false data injection attacks; protection SMV messages are maliciously tampered with and replayed, which may cause the relay protection system to malfunction or refuse to operate, leading to major security accidents; measurement and control SMV messages, It is the main basis for the SCADA / EMS state estimation of the data acquisition and monitoring ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1441
Inventor 朱玛张亮杨才明章坚民金乃正李勇侯连全金渊文许海峰
Owner STATE GRID ZHEJIANG ELECTRIC POWER CO LTD SHAOXING POWER SUPPLY CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products