Priority-considered multi-level backup blocking method for attack exception of an industrial control system

An industrial control system and priority technology, applied in the transmission system, branch remote connection/disconnection, electrical components, etc., can solve the hidden dangers of the safe and stable operation of the power grid industrial control system, cannot guarantee the reliability of attack exception blocking, attack and abnormality Identify problems such as low accuracy, and achieve the effect of promoting large-scale applications, reducing economic losses, and reducing management difficulty

Inactive Publication Date: 2019-05-14
JIANGSU ELECTRIC POWER CO +2
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The accuracy of attack and abnormal identification is low;
[0004] 2. Single means of security defense;
[0005] 3. The reliability of blocking operation cannot be guaranteed
[0006] At present, the blocking methods for abnormal attacks are mainly based on equipment or fixed policies, which are prone to failure due to equipment failure and traffic congestion.
In addition, the backup blocking system based on business impact analysis is not considered, and the business impact is not analyzed and evaluated. The protection strategy between devices is fixed and lacks coordination, and the reliability of attack abnormal blocking cannot be guaranteed. The safe and stable operation of the power grid industrial control system involved has brought hidden dangers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Priority-considered multi-level backup blocking method for attack exception of an industrial control system
  • Priority-considered multi-level backup blocking method for attack exception of an industrial control system
  • Priority-considered multi-level backup blocking method for attack exception of an industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0051] The priority-considered multi-level backup blocking method for an industrial control system attack abnormality in this embodiment, wherein the industrial control system includes an intrusion detection module, a path reconstruction module, a blocking decision-making module, a distributed blocking module, and a database.

[0052] Based on the source-network-load network architecture, it is generally divided into master station layer, communication layer, city aggregation, access layer and user terminal layer. The specific contents of each part are as follows:

[0053] 1. The master station layer includes the production control area and the management information area, in which the production control area includes the EMS application system and the load control quick response subsystem, and the management information area includes the power consumption information collection system;

[0054] 2. The communication layer is composed of routers, responsible for connecting the m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a priority-considered industrial control system attack abnormity multistage backup blocking method. The method comprises the steps of intrusion detection, path reconstruction,blocking decision, rule optimization and the like. The method can effectively improve the network security analysis quality and efficiency of the power grid, guarantees the safe and stable operationof the power grid, can promote the large-scale application of the information security protection technology in each industry, improves the technical level in the field of industrial control security,and achieves the autonomous control of the industrial control security. The method has a certain application value for an existing source network load interaction industrial control system.

Description

technical field [0001] The invention relates to an event preprocessing method for integrating power grid information and physical abnormalities, and belongs to the technical field of electric power system security. Background technique [0002] With the construction of the global energy Internet, the rapid development of UHV power grids and distributed energy, micro-grids, controllable users, electric vehicles, etc. have the ability to interact with the power grid in two directions, and have the dual characteristics of "source" and "load". The proportion is also showing a rising trend. The spatio-temporal distribution characteristics of the grid power flow are also becoming more and more complex, and the importance and urgency of interactive collaborative control among the grid, power sources, and users is also increasing. In the context of source-grid-load interaction, the industrial control systems widely distributed in power supply companies, power plants, and substation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/12G06F21/55
Inventor 张明吴克河霍雪松陈兵何辉朱红勤费稼轩
Owner JIANGSU ELECTRIC POWER CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products