考虑盲目攻击因子的电力SCADA系统安全脆弱性评估Security Vulnerability Assessment of Power SCADA System Considering Blind Attack Factor
周飞,吴金城,郑东亚,董树锋
ZHOU Fei,WU Jincheng,ZHENG Dongya,DONG Shufeng
摘要(Abstract):
电力SCADA(数据采集与监控)系统在电网中发挥着重大作用,如果受到攻击会造成巨大的经济损失,因此需要对其进行安全性评估并采取防御性措施。首先,解析电网SCADA系统结构,建立其攻击树模型;然后,对每个叶子节点分别从设定的3个安全特征进行等级评定,通过评比和计算给这3个特征赋权,并解得每个叶子节点的激活概率;接着,考虑盲目攻击因子,求解模型中所有节点的激活概率;最后,得出系统脆弱性以及各叶子节点的脆弱性灵敏度,并根据脆弱性灵敏度对系统薄弱环节进行重点防护。算例分析结果验证了所提评估方法的有效性。
Power SCADA(supervisory control and data acquisition) system plays a major role in the power grid. Attack on the system may cause huge economic losses. Therefore, it is necessary to evaluate their safety and take defensive measures. This paper first analyzes the system structure of SCADA, establishes its attack tree model; then it grades each leaf node from the set three security features, and gives weights to these three features through evaluation and calculation to obtain the activation probability of each leaf node; besides, the blind attack factor is considered to obtain the attack success probability of all nodes in the model; finally, the system vulnerability and the vulnerability sensitivity of each leaf node are obtained, and the protection of the weakness of the system is defended according to the vulnerability sensitivity. The effectiveness of the evaluation method is illustrated by an example.
关键词(KeyWords):
SCADA系统;安全特征;盲目攻击因子;脆弱性灵敏度
SCADA system;security feature;blind attack factor;vulnerability sensitivity
基金项目(Foundation): 国家自然科学基金资助(51677165);; 群众性创新研究(NB020XT06)
作者(Author):
周飞,吴金城,郑东亚,董树锋
ZHOU Fei,WU Jincheng,ZHENG Dongya,DONG Shufeng
DOI: 10.19585/j.zjdl.202003006
参考文献(References):
- [1]陈柯任,文福拴,赵俊华,等.考虑物理-信息虚拟连接的电力信息物理融合系统的脆弱性评估[J].电力自动化设备,2017,37(12):67-72.
- [2]赵俊华,梁高琪,文福拴,等.乌克兰事件的启示:防范针对电网的虚假数据注入攻击[J].电力系统自动化,2016,40(7):149-151.
- [3]王琦,李梦雅,汤奕,等.电力信息物理系统网络攻击与防御研究综述(一)建模与评估[J].电力系统自动化,2019,43(9):9-21.
- [4]苏盛,吴长江,马钧,等.基于攻击方视角的电力CPS网络攻击模式分析[J].电网技术,2014,38(11):3115-3120.
- [5]石立宝,简洲.基于动态攻防博弈的电力信息物理融合系统脆弱性评估[J].电力系统自动化,2016,40(17):99-105.
- [6]TEN C W,GOVINDARASU M,LIU C C.Cybersecurity for electric power control and automation systems[C]//IEEE International Conference on Systems,Man and Cybernetics.Piscataway:IEEE,2007.
- [7]TEN C W,MANIMARAN G,LIU C C.Cybersecurity for critical infrastructures:attack and defense modeling[J].IEEE Transactions on Systems,Man and Cybernetics,Part A(Systems and Humans),2010,40(4):853-865.
- [8]黄慧萍,肖世德,梁红琴.基于AHP和攻防树的SCADA系统安全脆弱性评估[J].控制工程,2018,25(6):1091-1097.
- [9]张恺伦,江全元.基于攻击树模型的WAMS通信系统脆弱性评估[J].电力系统保护与控制,2013(7):116-122.
- [10]丁明,李晓静,张晶晶.面向SCADA的网络攻击对电力系统可靠性的影响[J].电力系统保护与控制,2018,46(11):42-50.
- [11]SCHNEIER B.Attack trees:modeling security threats[J].Dr Dobb′s Journal,1999,24(12):21-29.
- [12]符学葳.基于层次分析法的模糊综合评价研究和应用[D].哈尔滨:哈尔滨工业大学,2011.
- [13]姜帆.模糊层次分析法不一致性问题研究[D].北京:华北电力大学,2015.
- [14]张吉军.模糊层次分析法(FAHP)[J].模糊系统与数学,2000(2):80-88.
- [15]吕宗平,戚威,顾兆军.基于模糊层次分析法的攻击树模型[J].计算机工程与设计,2018,39(6):9-13.
- [16]刘珊,杨华,岳克明.大数据在电力信息安全的研究[J].山西电力,2018(4):45-47.
- [17]王尉军,陈德权.输电设备智能安全卫士系统研究[J].电力大数据,2017,20(11):22-28.
- [18]朱颖琪.数据加密技术在计算机网络安全中的应用研究[J].电力大数据,2017,20(11):62-65.
- [19]赖晓文.基于参数规划的电网运行安全经济协调评估方法[J].广东电力,2016,29(2):48-53.
- [20]刘颜颜.大数据时代背景下计算机信息处理技术分析[J].浙江水利水电学院学报,2019,31(5):77-81.
- [21]金巨波,葛雷,徐秀丽.计算机数据挖掘技术的开发及其应用[J].浙江水利水电学院学报,2019,31(6):68-72.