Security Situation Assessment Method for Cyber Physical Power System Considering Threat Propagation Characteristics
LI Gang,HUANG Peishuo,CHEN Yixiao,ZHENG Guping
School of Control and Computer Engineering, North China Electric Power University, Baoding 071003, Hebei Province, China
Online:2019-05-01
Supported by:
This work is supported by National Natural Science Foundation of China(No. 51407076)and Fundamental Research Funds for the Central Universities(No. 2018MS075).
LI Gang,HUANG Peishuo,CHEN Yixiao,ZHENG Guping. Security Situation Assessment Method for Cyber Physical Power System Considering Threat Propagation Characteristics[J]. Electric Power Construction, 2019, 40(5): 29-37.
[1]BULDYREV S V, PARSHANI R, PAUL G, et al. Catastrophic cascade of failures in interdependent networks[J]. Nature, 2010, 464(7291):1025.
[2]LANGNER R. Stuxnet: Dissecting a cyberwarfare weapon[J]. IEEE Security & Privacy, 2011, 9(3):49-51.
[3]汤奕, 李梦雅, 王琦,等. 电力信息物理系统网络攻击与防御研究综述(二)检测与保护[J/OL]. 电力系统自动化.[2018-08-08].http://www.aeps-info.com/aeps/ch/reader/view_abstract.aspx?edit_id=20181229062111906&flag=2&file_no=201809060000007&journal_id=aeps.
TANG Yi, LI Mengya, WANG Qi, et al. A review on research of cyber-attacks and defense in cyber physical power systems part two detection and protection[J/OL]. Automation of Electric Power Systems. [2018-08-08].http://www.aeps-info.com/aeps/ch/reader/view_abstract.aspx?edit_id=20181229062111906&flag=2&file_no=201809060000007&journal_id=aeps.
[4]ZHAO J, LI D, HILLEL S, et al. Spatio-temporal propagation of cascading overload failures in spatially embedded networks[J]. Nature Communications, 2016, 7:10094.
[5]叶夏明, 文福拴, 尚金成,等. 电力系统中信息物理安全风险传播机制[J]. 电网技术, 2015, 39(11):3072-3079.
YE Xiaming, WEN Fushuan, SHANG Jincheng, et al. Propagation mechanism of cyber physical security risks in power systems[J]. Power System Technology, 2015, 39(11):3072-3079.
[6]郑佩祥, 陈柯任, 文福拴,等. 电力信息物理系统中信息系统发生预想事故的影响[J]. 电力建设, 2018, 39(6): 89-95.
ZHENG Peixiang, CHEN Keren, WEN Fushuan, et al. Impacts of cyber contingencies on cyber physical power systems[J]. Electric Power Construction, 2018, 39(6): 89-95.
[7]陈柯任, 文福拴, 赵俊华,等. 考虑物理-信息虚拟连接的电力信息物理融合系统的脆弱性评估[J]. 电力自动化设备, 2017, 37(12):67-72.
CHEN Keren, WEN Fushuan, ZHAO Junhua, et al. Vulnerability assessment of cyber-physical power system considering virtual cyber-physical connections[J]. Electric Power Automation Equipment, 2017, 37(12):67-72.
[8]茹叶棋, 周斌, 吴亦贝,等. 考虑网络攻击因素的电网信息物理系统业务可靠性分析[J]. 电力建设, 2017, 38(5):38-45.
RU Yeqi, ZHOU Bin, WU Yibei, et al . Reliability analysis of business in grid cyber physical system considering the factors of cyber attacks[J]. Electric Power Construction, 2017, 38(5):38-45.
[9]王宇飞, 高昆仑, 赵婷,等. 基于改进攻击图的电力信息物理系统跨空间连锁故障危害评估[J]. 中国电机工程学报, 2016, 36(6):1490-1499.
WANG Yufei, GAO Kunlun, ZHAO Ting, et al . Assessing the harmfulness of cascading failures across space in electric cyber-physical system based on improved attack graph[J]. Proceedings of the CSEE, 2016, 36(6):1490-1499.
[10]WANG J W, RONG L L. A model for cascading failures in scale-free networks with a breakdown probability[J]. International Journal of Modern Physics C, 2009, 20(4):585-595.
[11]丁理杰, 曹一家, 刘美君. 复杂电力网络的连锁故障动态模型与分析[J]. 浙江大学学报(工学版), 2008, 42(4):641-646.
DING Lijie, CAO Yijia, LIU Meijun. Dynamic modeling and analysis on cascading failure of complex power grids[J]. Journal of Zhejiang University (Engineering Science), 2008, 42(4): 641-646.
[12]武文博, 康锐, 李梓. 基于攻击图的信息物理系统信息安全风险评估方法[J]. 计算机应用, 2016, 36(1): 203-206.
WU Wenbo, KANG Rui, LI Zi. Attack graph based risk assessment method for cyber security of cyber-physical system[J]. Journal of Computer Applications, 2016, 36(1):203-206.
[13]马刚, 杜宇鸽, 荣江,等. 基于威胁传播的复杂信息系统安全风险评估[J]. 清华大学学报(自然科学版), 2014, 54(1):35-43.
MA Gang, DU Yuge, RONG Jiang, et al. Risk assessment of complex information system security based on threat propagation[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(1):35-43.
[14]龚俭, 臧小东, 苏琪,等. 网络安全态势感知综述[J]. 软件学报, 2017, 28(4):1010-1026.
GONG Jian, ZANG Xiaodong, SU Qi, et al. Survey of network security situation awareness[J]. Journal of Software, 2017, 28(4):1010-1026.
[15]刘玉岭, 冯登国, 连一峰,等. 基于时空维度分析的网络安全态势预测方法[J]. 计算机研究与发展, 2014, 51(8):1681-1694.
LIU Yuling, FENG Dengguo, LIAN Yifeng, et al. Network situation prediction method based on spatial-time dimension analysis[J]. Journal of Computer Research and Development, 2014, 51(8):1681-1694.
[16]曹华阳. 关键基础设施网络安全模型与安全机制研究[D]. 长沙:国防科学技术大学, 2014.
CAO Huayang. Research on security models and mechanisms for critical infrastructure network[D]. Changsha: National University of Defense Technology, 2014.
[17]李雄伟, 于明, 杨义先,等. Fuzzy-AHP法在网络攻击效果评估中的应用[J]. 北京邮电大学学报, 2006, 29(1):124-127.
LI Xiongwei, YU Ming, YANG Yixian, et al. Application of fuzzy-AHP method in the effect evaluation of network attack[J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(1):124-127.
[18]叶春森, 汪传雷, 刘宏伟. 网络节点重要度评价方法研究[J]. 统计与决策, 2010(1): 22-24.
YE Chunsen, WANG Chuanlei, LIU Hongwei. Research onevaluation method of network node importance[J]. Statistics and Decision, 2010(1): 22-24.
[19]MELL P, SCARFONE K, ROMANOSKV S. Common vulnerability scoring system[J]. IEEE Security & Privacy, 2007, 4(6):85-89.
[20]刘欣然.一种新型网络攻击分类体系[J].通信学报,2006,27(2):160-167.
LIU Xinran. New network attack classification architecture[J]. Journal on Communications, 2006,27(2):160-167.
[21]马之力, 智勇, 张驯,等. 基于数据包分析的网络攻击诊断研[J].信息安全与技术,2016,7(7):54-57.
MA Zhili, ZHI Yong, ZHANG Xun, et al. The study on network attacks diagnosis based on data packets analysis[J]. Information Security and Technology, 2016, 7(7): 54-57.
[22]靳燕, 彭新光. 折中规划分类性能的少数类误分代价优化设计[J]. 计算机工程与应用, 2016, 52(16):51-55.
JIN Yan, PENG Xinguang. Optimization design of minorityclass misclassification cost based on classification performance compromise plan[J]. Computer Engineering and Applications, 2016, 52(16):51-55.
[23]吴际舜, 侯志俭.电力系统潮流计算的计算方法 [M].上海:上海交通大学出版社,2002. WU Jishun,HOU Zhijian.The algorithms of load flow solution for power system[M].Shanghai:Shanghai Jiaotong University Press,2002.