首页> 外文会议>IEEE International Conference on Big Data Computing Service and Applications >Security Risk Control of Water Power Generation Industrial Control Network Based on Attack and Defense Map
【24h】

Security Risk Control of Water Power Generation Industrial Control Network Based on Attack and Defense Map

机译:基于攻防图的水力发电工业控制网安全风险控制

获取原文

摘要

With the latest development of hydroelectric power generation system, the industrial control network system of hydroelectric power generation has undergone the transformation from the dedicated network, using proprietary protocols to an increasingly open network, adopting standard protocols, and increasing integration with hydroelectric power generation system. It generally believed that with the improvement of the smart grid, the future hydroelectric power generation system will rely more on the powerful network system. The general application of standardized communication protocol and intelligent electronic equipment in industrial control network provides a technical guarantee for realizing the intellectualization of hydroelectric power generation system but also brings about the network security problems that cannot be ignored. In order to solve the vulnerability of the system, we analyze and quantitatively evaluate the industrial control network of hydropower generation as a whole, and propose a set of attack and defense strategies. The method of vulnerability assessment with high diversity score proposed by us avoids the indifference of different vulnerability score to the greatest extent. At the same time, we propose an optimal attack and defense decision algorithm, which generates the optimal attack and defense strategy. The work of this paper can distinguish the actual hazards of vulnerable points more effectively.
机译:随着水力发电系统的最新发展,水力发电的工业控制网络系统经历了从专用网络,使用专有协议到日益开放的网络,采用标准协议以及与水力发电系统的日益集成的转变。人们普遍认为,随着智能电网的完善,未来的水力发电系统将更多地依赖于强大的网络系统。标准化通信协议和智能电子设备在工业控制网络中的普遍应用为实现水力发电系统的智能化提供了技术保障,同时也带来了不可忽视的网络安全问题。为了解决该系统的脆弱性,我们对整个水力发电的工业控制网络进行了分析和定量评估,并提出了一套攻防策略。我们提出的具有高多样性评分的脆弱性评估方法可以最大程度地避免不同脆弱性评分的漠不关心。同时,提出了一种最优的攻防决策算法,可以生成最优的攻防策略。本文的工作可以更有效地区分脆弱点的实际危害。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号