Font Size: a A A

Fabricated Traps Based Active Cyber Security Defense Against Targeted Cyber-attack In Electric Power Dispatching Systems

Posted on:2018-09-21Degree:MasterType:Thesis
Country:ChinaCandidate:Z Q LiFull Text:PDF
GTID:2382330548474567Subject:Electrical engineering
Abstract/Summary:PDF Full Text Request
Grid scheduling control and production management is highly dependent on information and communication systems,information system anomalies and network attacks can threaten the safe and stable operation of power systems.The power system is a high-value target of organized network attack,and there is a significant difference with the general information system in attack mode,attack route and destruction consequence.Because there is no absolute security in the field of network security,it is necessary from the perspective of risk management,taking the existing security measures as a prerequisite for failure to study the potential attack path,multi-perspective analysis to maximize the damage effect of the attack mode,Do not cause a large blackout and other vicious accidents as the bottom line,fill gaps,targeted deployment of security measures to achieve the power information physical integration system(Cyber-Physical System,CPS)network security risk effective control.The protection of power system information security is mainly aimed at electric power dispatching automation system.This paper puts forward the active information security protection method of fictitious trapping trap of electric power dispatching system by using the related theory knowledge of complex electric network theory,power grid vulnerability identification and computer network honeypot technology to improve the safety of power grid attack.Fictitious traps active safety protection method design for the hostile organization for the power dispatching automation system initiated by the bypass control trip attack,drawing on the idea of honeypot technology,based on fictitious important grid components decoy attack active security protection method,trick the invasion of malicious software attacks Fictitious bait,to achieve targeted attacks of intrusion detection and reliable security protection.This paper studies the theory and technology of fictitious trap survivability of the directional attack of the dispatching system,and effectively avoids the big blackout accident caused by the directional attack into the production control area.Targeted malware intrusion scheduling automation host does not cause a large blackout as the goal,to study the fictional seduction trap based on intrusive active safety protection as the last line of defense.The standard IEEE-118 system is used to simulate and analyze it.It is divided into two parts:real system and fictitious system According to the random attack and selective attack strategy adopted by malware,the fictitious line is used as a trick trap to induce malware attacks.Important components,and when the trap was attacked switch to the standby scheduling system to terminate the attack.Simulation analysis based on 118 nodes shows that fictional important components can not only shield the selective remote control tripping of real important components,but also can significantly reduce the harm of random attacks.
Keywords/Search Tags:Cyber-attack
PDF Full Text Request
Related items