计及网络攻击影响的安全稳定控制系统风险评估方法
作者:
作者单位:

作者简介:

通讯作者:

中图分类号:

TM715

基金项目:

国家重点研发计划资助项目(2017YFB09030);国家电网有限公司总部科技项目(5100-202040440A-0-0-00)


Risk assessment method of security and stability control system considering the impact of cyber attacks
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    安全稳定控制系统(稳控系统)是保证电网可靠运行的重要防线,针对稳控系统的网络攻击会造成严重的物理后果。为了量化评估稳控系统遭受网络攻击的影响,解决现有风险评估方法未充分考虑网络攻击易发性的问题,文中提出一种计及网络攻击影响的稳控系统风险评估方法。文中首先分析了稳控系统的层次结构;然后,从攻击对象、攻击方式、攻击后果3个角度分析了稳控装置本体与稳控装置站间通信的网络攻击风险点;其次,基于模糊层次分析法对网络攻击易发性进行量化,并结合由Petri网建立的网络攻击防护单元模型建立针对稳控系统的网络攻击成功概率模型;最后,结合物理后果和攻击成功概率,对标准系统和实际系统进行风险评估,计算了正常运行和网络攻击2种情况下的风险值,验证了所提模型的有效性。

    Abstract:

    The security and stability control system is an important defense line to ensure the reliable operation of the power grid. Serious physical consequences can be caused by cyber attacks against the security and stability control system. In order to quantitatively evaluate the impact of cyber attacks on security and stability control system and solve the problem that the existing risk assessment methods do not fully consider the susceptibility of cyber attacks,a risk assessment method of security and stability control system considering the impact of cyber attacks is proposed. Firstly,the hierarchical structure of the security and stability control system is analyzed. Then,the risk points of cyber attacks on the stability control device body and device's inter-station communication from the three perspectives of attack object,attack methods,and attack consequences are analyzed. Secondly,the susceptibility of cyber attacks is quantified based on the fuzzy analytic hierarchy process,and a successful probability model of cyber attacks for security and stability control system is established combined with the defense unit model of cyber attacks built by Petri nets. Finally,the risk assessment is carried out on the standard and actual systems combined with the physical consequences and the probability of successful attacks. The risk values under two conditions of normal operation and cyber attack are calculated to verify the validity of the proposed model.

    参考文献
    相似文献
    引证文献
引用本文

钱胜,王琦,颜云松,封科,夏海峰.计及网络攻击影响的安全稳定控制系统风险评估方法[J].电力工程技术,2022,41(3):14-21

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2022-01-12
  • 最后修改日期:2022-03-27
  • 录用日期:2022-04-07
  • 在线发布日期: 2022-05-24
  • 出版日期: 2022-05-28
文章二维码