Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security and function security association analysis method

A technology of information security and correlation analysis, applied in the field of information security, can solve the problem of lack of integrated risk assessment method of cyber-physical mixed-layer system, and achieve the effect of enhancing authority and scientificity, enhancing quantification, and avoiding errors

Active Publication Date: 2020-05-08
STATE GRID SICHUAN ELECTRIC POWER CORP ELECTRIC POWER RES INST +1
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Security risk analysis for smart substation systems is a key link in establishing a safe, reliable, stable, and efficient substation industrial control system, but traditional risk analysis methods and technologies are mainly implemented for the information system itself, and the analysis of its asset value, vulnerability, and threat Taking information system objects as the starting point, there is a lack of holistic risk assessment methods for cyber-physical mixed-layer systems such as industrial control systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security and function security association analysis method
  • Information security and function security association analysis method
  • Information security and function security association analysis method

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0036] Use the industrial control system vulnerability scanning tool to scan the industrial control system vulnerabilities of a smart device and perform the following operations:

[0037] (1) According to the data generated by the information system where the vulnerability is located, map to all logical nodes that use the data, and then map the functions corresponding to this part of the logical nodes.

[0038] (2) Find the fault information corresponding to the function mapped in (1) and its CIA value from the functional fault CIA information database.

[0039] (3) Calculate the vector distance from the vulnerability CIA value to the fault information CIA value obtained in (2) by Euclidean distance.

[0040] (4) Select the shortest set of vectors in (3) as the association between vulnerabilities and faults.

[0041] In this way, the functional failures that may be caused by system vulnerabilities and the confidentiality threat value (C value), integrity threat value (I value...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information security and function security association analysis method, and belongs to the field of information security. The method comprises the following steps that: anintelligent equipment information system security risk assessment model, an intelligent equipment function fault security analysis model and an information security and function fault matching model are included, and the intelligent equipment information system security risk assessment model is mainly used for collecting authoritative known industrial control information system security vulnerability information and establishing a CIA information base for the vulnerability information. The equipment function fault safety analysis model is used for calculating a confidentiality threat value, anintegrity threat value and an availability threat value of a logic node function according to description of the logic node function fault of the intelligent equipment involved in the IEC 61850 standard; and a logic node function fault CIA threat library is established. The information security and function fault matching model is used for establishing a corresponding relation calculation methodof information system security CIA and intelligent equipment security CIA threat values.

Description

technical field [0001] The invention belongs to the field of information security and relates to a correlation analysis method between information security and functional security. Background technique [0002] Smart substations are widely used in the power industry. The structure of smart substations has the characteristics of mixed layers of information systems and physical systems, which are manifested in: 1. The station control layer at the top is a typical information monitoring system; 2. The interval layer in the middle The main function is to play the role of scheduling, connection, management, and transmission between the upper information system and the lower process layer system, and it is the fusion point of the information system and the physical system; 3. The process layer system at the bottom layer is directly oriented to physical facilities system level. [0003] The continuous integration of smart substation systems with traditional computer systems and ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F11/26
CPCG06F21/577G06F11/26
Inventor 王胜柴继文唐勇梁晖辉张凌浩张颉唐超王海刘珊梅郑永康张靖夏晓峰胡兵
Owner STATE GRID SICHUAN ELECTRIC POWER CORP ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products