Font Size: a A A

Research Of Security Protection Scheme Of Secondary System In Intelligent Substation

Posted on:2019-02-10Degree:MasterType:Thesis
Country:ChinaCandidate:Y G GengFull Text:PDF
GTID:2382330548489147Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the development of computer technology and automation technology,the scale of intelligent station construction is increasing.Compared with the conventional station,intelligent station secondary information digitization degree is higher.If security protection is not in place,secondary system of intelligent station will be more vulnerable to network information security threat,which leads to serious power grid failure.So this paper analyzed the security protection scheme of the intelligent station secondary system,which can provide guidance for intelligent station information security.First of all,it pointed out that the safety protection goal of intelligent substation secondary system is against to hackers,viruses and malicious code,malicious attacks and other illegal operations through a variety of forms such as damage to the substation secondary system;the protection is focused on strengthening border protection and internal security measures;the risk source is mainly the hacker,viruses,malicious code,etc.;the main features is dynamic and closed loop;the overall strategy is "safety partition,lateral isolation,network dedicated and vertical certification".Second,the principle and configuration of safety protection special technology and safety protection equipment are studied.Through the contrast research,it put forward the Gap technology,asymmetric encryption technology and VPN technology as the key technology of secondary system security protection scheme;then it studied the principle and configuration procedure of the switch,firewall,horizontal isolation device and vertical encryption device.It put forward four kinds of device adopted static routing configuration,security access to source IP address,purpose IP address and destination port respectively.Then it studied its specific configuration by Secure CRT tool under the Windows system for the simulation study.Finally,it designed the safety protection scheme to determine the protective target and main risk source.The secondary system is divided into three safety zones.The equipment and safety device configuration in each zone were studied and the topological graph of safety protection scheme is designed.It designed the vertical protection scheme and the lateral protection scheme.It studied the safety protection reinforcement scheme of the physical isolation device,encryption authenticated device,firewall,router/switch and host and other equipment.
Keywords/Search Tags:Intelligent substation, Secondary system, Perimeter security protection, procedure security protection, Trusted Computing
PDF Full Text Request
Related items