基于改进ADT的综合能源系统信息安全风险分析Information Security Risk Analysis of Integrated Energy System Based on Improved ADT
李朝阳,彭道刚,吕政权,张涵,王丹豪
LI Zhaoyang,PENG Daogang,LYU Zhenquan,ZHANG Han,WANG Danhao
摘要(Abstract):
在电力系统向综合能源转型与网络攻击技术演进的双重影响下,电力信息安全和防护形势日益严峻。归纳面向电网的攻防分布体系,提出了一种基于决策实验室分析法和攻击防御树模型的综合能源系统信息安全风险分析方法。该方法根据决策实验室分析法确定更适用于综合能源的叶节点安全多属性权重,结合现有攻防对抗策略与CVSS(通用漏洞评分体系),计算攻防树模型中攻击序列风险程度与灵敏度指标。通过城市光-储-充-换一体化智能电站进行信息安全威胁实例分析,结果表明,该方法威胁因素赋权科学,能自由添加删除攻击行为,凸显一定的可拓展性,安全属性等级评价客观。
Under the dual influences of the transformation of power system to integrated energy and the evolution of cyberattack technology, electric power information security and protection is faced with a severe situation. The paper summarizes the distribution system of attack and defense for power grid and proposes an information security risk analysis method for an integrated energy system based on decision-making trial and evaluation laboratory(DEMATEL) and attack defense tree(ADT) model. According to the DEMATEL, the security multi-attribute weight of leaf node more suitable for integrated energy is determined, and the vulnerability of attack sequence and the sensitivity index of leaf node in the ADT model are calculated by combined existing attack defense strategy and CVSS(common vulnerability scoring system). This paper analyzes the information security threat of the intelligent integrated solar-storage-charging-swamping station, and the result shows that the method, featuring scientific weight determination, can freely add or delete attacks, show expansibility and objectively evaluate security attribute level.
关键词(KeyWords):
综合能源系统;攻击防御树;决策实验室分析法;信息安全
integrated energy system;ADT;DEMATEL;information security
基金项目(Foundation): 上海市“科技创新行动计划”高新技术领域项目(185111105700);; 国网上海市电力公司科技项目(52097019001N)
作者(Author):
李朝阳,彭道刚,吕政权,张涵,王丹豪
LI Zhaoyang,PENG Daogang,LYU Zhenquan,ZHANG Han,WANG Danhao
DOI: 10.19585/j.zjdl.202012018
参考文献(References):
- [1]葛少云,曹雨晨,刘洪,等.考虑可靠性约束的综合能源微网供能能力评估[J].电力系统自动化,2020,44(7):31-41.
- [2]贾宏杰,穆云飞,余晓丹.对我国综合能源系统发展的思考[J].电力建设,2015,36(1):16-25.
- [3]曾鸣,杨雍琦,刘敦楠,等.能源互联网“源-网-荷-储”协调优化运营模式及关键技术[J].电网技术,2016,40(1):114-124.
- [4]SANI,ABUBAKAR SADIQ,YUAN,et al.Cyber security framework for internet of things-based energy internet[J].Future generation computer systems,2019,93(21):849-859.
- [5]丁伟,王国成,许爱东,等.能源区块链的关键技术及信息安全问题研究[J].中国电机工程学报,2018,38(4):1026-1034.
- [6]费禹,蒋文保.一种基于层次分析法的攻防树模型[J].中国科技论文,2018,13(14):1644-1648.
- [7]段旭晨,彭道刚,姚峻,等.基于SA-PSO-AHP的火电厂控制系统信息安全威胁评估[J].中国电力,2019,52(5):29-35.
- [8]彭道刚,卫涛,赵慧荣,等.基于D-AHP和TOPSIS的火电厂控制系统信息安全风险评估[J].控制与决策,2019,34(11):2445-2451.
- [9]张小松,牛伟纳,杨国武,等.基于树型结构的APT攻击预测方法[J].电子科技大学学报,2016,45(4):582-588.
- [10]王永光.基于Petri网的网络安全防御体系评估模型的研究[D].长沙:湖南大学,2014.
- [11]陈德成,付蓉,宋少群,等.基于攻击图的电网信息物理融合系统风险定量评估[J].电测与仪表,2020,57(2):62-68.
- [12]张心洁,葛少云,刘洪,等.智能配电网综合评估体系与方法[J].电网技术,2014,38(1):40-46.
- [13]黄慧萍,肖世德,梁红琴.基于AHP和攻防树的SCADA系统安全脆弱性评估[J].控制工程,2018,25(6):1091-1097.
- [14]孙力.电力企业信息安全管理研究[D].南京:南京邮电大学,2014.
- [15]国家电网公司.国家电网公司管理信息系统安全防护技术要求:Q/GDW 1594—2014[S].北京:中国电力出版社,2015.
- [16]SCHNEIER B.Attack trees:modeling security threats[J].Dr.Dobb′s Journal,1999,24(12):21-29.
- [17]GOTTUMUKKALA,MERCHANT,TAUZIN,et al.Cyberphysical system security of vehicle charging stations:2019 IEEE Green Technologies Conference[C].Lafayette:IEEE,2019.
- [18]NIST.Guide to industrial control system(ICS)security:SP800-82[S].Gaithersburg:National Institute of Standards and Technology,2011.
- [19]孙卓,刘东,肖安洪,等.基于攻击树模型的数字化控制系统信息安全分析[J].上海交通大学学报,2019,53(增刊1):68-73.
- [20]周飞,吴金城,郑东亚,等.考虑盲目攻击因子的电力SCADA系统安全脆弱性评估[J].浙江电力,2020,39(3):36-42.
- [21]郭仁超,徐玉韬.内外网数据安全交换技术在电网企业的应用研究[J].电力大数据2018,20(2):61-66.
- [22]靳斌,汪德军.基于本质安全理论的供电企业安全管理探索[J].电力大数据,2018,20(3):61-64.
- [23]刘珊,杨华,岳克明.大数据在电力信息安全的研究[J].山西电力,2018(4):45-47.
- [24]杨嘉湜,杨帆.面向四川电力业务运行的信息安全保障体系构建研究[J].四川电力技术,2018,41(3):88-91.