| With the continuous development of thermal automation technology and Industrial Ethernet continues to popularize and apply in control networks.The thermal power plant control system has been separated from the independent control mode of each system,and a real-time database is used to collect,process and store the production data of the control system.The application of informatization in the control network of thermal power plants has effectively improved production efficiency,reduced power generation production costs,and improved control levels.However,it also makes it face huge threats to information security.As an important part of the industrial control system of thermal power plants,the coordinated control system of thermal power plants also has the risk of being attacked.This article starts from the perspective of the attacker,taking the coordinated control system of thermal power plant as the object,the covert attack and local covert attack program are designed.The purpose is to produce a stable deviation between the actual output value of the system and the observed value,and it will not be detected by the traditional anomaly detector.It is worth noting that this article mainly studies the security of the industrial control system of thermal power plants from the perspective of the attacker.The purpose is not to cause damage to it,but to understand the possible attack methods of the attacker and pave the way for the design of the detection mechanism in the future.Based on the in-depth study of the covert attack method,combined with the deficiencies of the existing research,this paper designs a covert attack method based on the Harris Hawk optimization algorithm.The purpose is to solve the unknown problem of the attack target model and the attack controller model in the covert attack structure.The article assumes that the control system uses a traditional residual-based anomaly detector to detect abnormal behaviors.Through simulation experiments with and without noise,Research the effectiveness of the designed covert attack method.Considering that the attacker may not be able to insert data in all the forward loops and feedback loops of the system,this paper designs a local covert attack method for the coordinated control system.The attacker can design the decoupling block transfer function in the attack framework according to the principle of decoupling,transfer the attack model into a triangle structure,and then calculate the attack signal according to the attack target,and insert the generated attack signal into part of the loop of the system.The result proves that the local covert method can cause deviation between the real output of the system and the measured value,and transfer the system to a new stable state without being detected,so as to achieve the effect of concealed attack.Finally,assuming that the attacker does not have an accurate model,the covert attack method and the local covert attack method are used to simulate the attack on the coordinated control system of the thermal power plant to compare the characteristics of the two attack models. |