Font Size: a A A

Research On Information Security Access Control Model Of Wind Farm SCADA System

Posted on:2021-01-10Degree:MasterType:Thesis
Country:ChinaCandidate:H WangFull Text:PDF
GTID:2392330632458429Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the deepening of the national sustainable development strategic goals and the rapid development of new energy technologies in recent years,wind power generation has gradually moved from coastal high wind speed areas to inland low wind speed areas,and the geographical distribution of wind power generation systems in low wind speed mountain areas is more scattered,Which increases the difficulty of data collection of wind farm operation status and remote operation of equipment.Supervisory Control and Data Acquisition(SCADA)system is favored by the wind power industry because it can solve such problems.At present,wind farms generally use SCADA system as the core of their information systems.This paper combines the practical experience of wind farms,sums up the problems existing in the information security access control of the SCADA system of a wind farm in a certain area,and systematically analyzes the causes and possible impacts of the problems.In order to prevent the wind farm SCADA system from being invaded by criminals or encountering network attacks and causing the system to be paralyzed,this article discusses the information security access control in SCADA system identity authentication and defense in depth.The main content can be divided into the following aspects:1.Aiming at the problem that the existing SCADA system of a local wind farm lacks an identity authentication mechanism during the user login process,this paper designs an identity authentication system that integrates username-password authentication technology and USB-Key technology.The USB-Key based identity authentication process uses the public key infrastructure(PKI)system as the basic framework,and completes user identity authentication through a "challenge-response"approach.The private key is stored inside UKEY and cannot be exported to ensure the security of the private key.Practical results show that this identity authentication mode can realize the indispensable authentication functions of user name,password and UKEY.Compared with the previous simple user name-password verification,the identity authentication threshold of UKEY hardware equipment is increased,which can effectively guarantee the security of the system.At present,biometrics recognition technology is developing rapidly.The next step can be to directly apply user biometrics to unlock.Compared with UKEY technology,biometrics can avoid the system risk caused by the loss of hardware identification devices.2.This paper builds and improves the SCADA system architecture of a wind farm,designs the system information security access control boundary,studies the information security protection strategy of the SCADA system internal network and the information security protection strategy of the open server,and provides solutions for all parties to use SCADA system users.The attack risk strategy faced by the terminal.Through the division of the SCADA system information security access control boundary,the access rules of each server or each area within the SCADA system are clarified to avoid the hidden danger of information security caused by unrestricted mutual server access due to the unreasonable system structure.3.This article divides the wind farm SCADA system into internal network,isolated area and external network by establishing the system security boundary.According to the information security access control and defense strategy of the entire system,each regional protection module is designed separately.The internal network of the SCADA system uses the isolation zone for internal and external network isolation,and the whitelist protection module is used to protect the SCADA server.Adopt the support vector machine(SVM)based flood attack intrusion detection method to protect the open server placed in the isolated area from SYN Flood attacks.Through experimental tests,this defense strategy can effectively resist SYN Flood attacks,and the entire defense-in-depth system can achieve its intended goal.The next step is still to have research space in terms of access identification.When a SYN Flood attack and a normal user's first access are conducted at the same time,the SCADA system needs to have the capability of intelligent identification.
Keywords/Search Tags:SCADA system, USB-Key, defense in depth, security boundary, SYN Flood attack
PDF Full Text Request
Related items