Font Size: a A A

Research On Coordinated Cyber-physical Cyber-attack Defense Strategy For Power Internet Of Things

Posted on:2022-07-06Degree:MasterType:Thesis
Country:ChinaCandidate:A N ZhaoFull Text:PDF
GTID:2492306740994669Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
In order to meet the requirements of the development of Energy Internet for the power system,the Power Internet of Things(PIo T)based on the new generation of information and communication technologies emerges as the times require.The PIo T not only realizes the integration of "information flow","energy flow" and " business flow",but also creates favorable conditions for network attacks.The existing monitoring and security system of PIo T is passive protection composed of firewall,antivirus software,encryption algorithm and intrusion detection system,which mainly defends against known threats or viruses.In the face of the complex environment of PIo T and the rapid development of hacker technology,they are increasingly not suitable for the current PIo T.Therefore,it is necessary to study more active detection and protection strategies,so as to provide guarantee for the safe and stable operation of PIo T.Different from the cyber security protection for traditional information field,the protection for PIo T needs to pay more attention to the stable operation of power business(physical side),so it is need the coordinated cyber-physical security protection.This paper studies the cyber-attack defense strategy for PIo T.The main work is presented as follows:1)Aiming at the four-layer structure.the cyber technology and the possible security challenges are analyzed.Based on information security analysis,the cyber security risk model and assessment framework of PIo T are proposed.Considering the multi-objective characteristics of security risk elements,an evaluation method based on AHP is proposed.Aiming at the complexity cyber structure and business diversity,the node importance evaluation method based on business importance is proposed.The process comprehensively considers the factors of cyber level and business level,and realizes the coordinated cyberphysical cyber security risk assessment.2)On the basis of the risk assessment,an active defense strategy based on cyber deception is proposed.Based on the defense mechanism and application scenarios,the cyber deception composition structure and construction method for PIo T are analyzed.And the feasibility is verified by an example.Focusing on the problem of deployment based on experience,considering the limitation of supporting resources,combined with the defense mechanism,an optimal deployment method of cyber deception resource is proposed.3)Considering the limited information and the dynamic of attack-defense activities,a cyber deception game model based on signal game is proposed,and the optimal strategy of both sides is solved.Combined with the defense effect of cyber risk state and the game model,a defense strategy selection model is proposed.Finally,the change of defense strategy under different conditions is analyzed to provide the underlie for optimal deployment of deception defense.
Keywords/Search Tags:Power Internet of things, cyber security risk assessment, cyber deception, game theory
PDF Full Text Request
Related items