Movatterモバイル変換


[0]ホーム

URL:


CN109194505A - A kind of power network security defence warning system - Google Patents

A kind of power network security defence warning system
Download PDF

Info

Publication number
CN109194505A
CN109194505ACN201810927871.6ACN201810927871ACN109194505ACN 109194505 ACN109194505 ACN 109194505ACN 201810927871 ACN201810927871 ACN 201810927871ACN 109194505 ACN109194505 ACN 109194505A
Authority
CN
China
Prior art keywords
network
communication
information
security
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810927871.6A
Other languages
Chinese (zh)
Inventor
张波
张涛
马媛媛
管小娟
石聪聪
邵志鹏
黄秀丽
陈璐
费稼轩
戴造建
周诚
华晔
李妮格
郭骞
李千目
张明扬
周晟
傅慧斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Science and Technology
Global Energy Interconnection Research Institute Co Ltd
Information and Telecommunication Branch of State Grid Fujian Electric Power Co Ltd
State Grid Corp of China SGCC
Original Assignee
Nanjing University of Science and Technology
Global Energy Interconnection Research Institute Co Ltd
Information and Telecommunication Branch of State Grid Fujian Electric Power Co Ltd
State Grid Corp of China SGCC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Science and Technology, Global Energy Interconnection Research Institute Co Ltd, Information and Telecommunication Branch of State Grid Fujian Electric Power Co Ltd, State Grid Corp of China SGCCfiledCriticalNanjing University of Science and Technology
Priority to CN201810927871.6ApriorityCriticalpatent/CN109194505A/en
Publication of CN109194505ApublicationCriticalpatent/CN109194505A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

Translated fromChinese

一种电力网络安全防御告警系统,包括安全监管模块,监测电力网络中网络主机的安全状态信息;区域监管模块,采集可用通信节点网管配置信息,检测相应网络的实时通信状态;协同防御模块,对电网终端边缘接入提供安全防御;安全分析模块,对各网络进行网络安全分析;实时告警模块,进行实时告警和显示。本发明的电力网络安全防御告警系统,可以对电力网络实现全方位的个体监控、整区监控、协同防御、安全分析、实时告警,立体全面地保护整个电力网络的安全。

An electric power network security defense alarm system includes a safety supervision module, which monitors the security status information of network hosts in the electric power network; a regional supervision module, which collects network management configuration information of available communication nodes and detects the real-time communication status of the corresponding network; The power grid terminal edge access provides security defense; the security analysis module performs network security analysis on each network; the real-time alarm module provides real-time alarm and display. The power network security defense alarm system of the present invention can realize all-round individual monitoring, whole-area monitoring, collaborative defense, security analysis, and real-time alarm for the power network, and comprehensively protect the security of the entire power network.

Description

A kind of power network security defence warning system
Technical field
The invention belongs to power network security fields, and in particular to a kind of power network security defence warning system.
Background technique
Currently, international network security situation is increasingly serious, and cyberspace has become country after four territories of land, sea, air, outer spaceThe 5th territory later, network attack grouping of the world economy, the trend of Basic national topographic map are increasingly apparent.Due to the complicated multiplicity of NETWORK STRUCTURE PRESERVING POWER SYSTEM,Widely distributed, importance is high and integrated wide area interconnection, once paralysis influences huge, easily becomes the first choice of hostile force attackTarget.In recent years, with largely being introduced using cloud computing, Internet of Things, big data as " internet+" technology of representative, and it is a large amount ofThe access of intelligent terminal further increases electric network information security protection difficulty.First is that the access of a large amount of intelligent terminals,Using a large amount of communications such as WIFI, 3G/4G, electric power networks basic environment also changes therewith, network boundary increasingly mouldPaste, traditional security boundary protective range can not ensure electric intelligent terminal security.Second is that the acquisition side of electric power relevant informationNew variation also has occurred in method, storage form, transmission channel and processing mode, and application virtualization, data assets, terminal are mobileChange will all introduce new information network security risk, and the information security exposure of power grid is increasing sharply.It is held simultaneously with advancedContinuous property network attack (APT) is the novel attack means also continuous evolution of representative, gives information network security of power system protected workingBring severe challenge.
Power Information Network is rapidly developed in recent years, based on high-speed power communication network, forms each electricity of coveringNet the integrated State Grid's dispatching data network and information network of enterprise.It is micro- that power telecom network has evolved into optical fiber, numberThe trunk communication network of a variety of transmission means such as wave, wireless, satellite, substantially covers each ring such as power generation, transmission of electricity, distributionSection.In electric power wide area Internet network, anywhere user can touch network.In this manner, due to networkDevelopment trend be increasingly intended to ubiquitous network structure system, this requires we have to find out a kind of new the whole network integration,The security system of protection is cooperateed with, to solve the existing and new safety problem of this network.From this respect, it can be seen that electric powerSafety problem under wide area Internet network is worth us to go to study and inquire into.
Summary of the invention
To solve power network security missile defense, the present invention provides a kind of power network securities to defend warning system,The system, comprising:
Security control module, for monitoring the safety state information of network host in electric power networks, and the peace that will be monitoredZone supervisors module corresponding to the network host is sent on full state information is real-time;
Zone supervisors module, for the acquisition available communication node by the center switch of network where each network hostNetwork management configuration information detects the real-time communication conditions of corresponding network, and combines the safety state information sent in security control module,It is formed in network security real time information and is sent to safety analysis module;
Composite defense module, for the available communication node network management configuration information of receiving area administration module acquisition, to electricityNetwork termination edge access provides Prevention-Security;
Safety analysis module, the network security real time information sent on the administration module of receiving area carry out each networkNetwork Safety Analysis;
Real-time Alarm module carries out Real-time Alarm and display for that will analyze obtained security risk, and by Real-time AlarmIt is sent on information and network security analysis result information to the central server of affiliated area, and by Real-time Alarm information and networkThe report of safety analysis result is stored as historical data.
The beneficial effect comprise that the invention proposes a kind of power network securities to defend warning system, it can be rightElectric power networks realize comprehensive individual monitoring, main plot monitoring, composite defense, safety analysis, Real-time Alarm, and solid is comprehensively protectedProtect the safety of entire electric power networks.Especially, it can be achieved that communicating pair or in many ways by primary data exchange, set canRandom negotiation is concentrated to determine communication topology associated diagram and correlation time with network node, the opening up according to agreement in communication processFlutter associated diagram and establish dynamic communication link, listener is difficult to grasp communication topology interior joint network management configuration rule, thus be difficult toTrack communicates overall process.During network link auto-associating, legal entity maintains normal communication using correct node network management configuration,Unauthorized entity is due to that can not know that legal entity node network management configuration will be difficult to carry out effective attack.Meanwhile main station side and clientEnd can under specific circumstances, security update topological correlation figure, to guarantee what network link auto-associating was shown to greatest extentRandomness increases the time and space complexity that attack is implemented, to reach information security attack Initiative Defense target.
Detailed description of the invention
System framework figure Fig. 1 of the invention
The method schematic diagram that Fig. 2 present system uses.
Specific embodiment
For a better understanding of the present invention, with reference to the description of the embodiment of the accompanying drawings, system of the invention is carried outFurther instruction.
In order to fully understand the present invention, numerous details are referred in the following detailed description.But art technologyPersonnel are it should be understood that the present invention may not need these details and realize.In embodiment, it is not described in detail well known sideMethod, process, component, in order to avoid unnecessarily make embodiment cumbersome.
Referring to figure 1 and figure 2, the present invention provides a kind of power network securities to defend warning system, comprising:
Security control module, for monitoring the safety state information of network host in electric power networks, and the peace that will be monitoredZone supervisors module corresponding to the network host is sent on full state information is real-time;
Zone supervisors module, for the acquisition available communication node by the center switch of network where each network hostNetwork management configuration information detects the real-time communication conditions of corresponding network, and combines the safety state information sent in security control module,It is formed in network security real time information and is sent to safety analysis module;
Composite defense module, for the available communication node network management configuration information of receiving area administration module acquisition, to electricityNetwork termination edge access provides Prevention-Security;
Safety analysis module, the network security real time information sent on the administration module of receiving area carry out each networkNetwork Safety Analysis;
Real-time Alarm module carries out Real-time Alarm and display for that will analyze obtained security risk, and by Real-time AlarmIt is sent on information and network security analysis result information to the central server of affiliated area, and by Real-time Alarm information and networkThe report of safety analysis result is stored as historical data.
Preferably, security control module is with coded communication mode, by the safety state information monitored it is real-time on send to thisThe corresponding zone supervisors module of network host.
Preferably, the system also includes policy development modules, the net for being obtained according to central server based on analysisThe security postures information of network, connected applications need and security regulations, formulate corresponding power network security defence policies.
Preferably, wherein the composite defense module includes specifically including:
Resource pool module: for by network communication node structure all in received available communication node network management configuration informationAt network communication node resource pool, alternative resource pond is provided for the choice of dynamical and auto-associating of later period network link;
Link module: it for constructing network link auto-associating space, randomly selects available network communication node and constitutesAvailable link space;
Negotiation module: executing network communication link auto-associating for network communication both sides and negotiate process, negotiates to choose and work asPreceding communication link, and timing unoccupied place carries out the adjustment of communication link dynamic negotiation.
Preferably, the zone supervisors module, for the acquisition by the center switch of network where each network hostAvailable communication node network management configuration information, wherein the available communication node network management configuration information include network address information,Port information, protocol information.
Preferably, the network address is the address IPv4 or the address IPv6.
Preferably, the resource pool module: for by net all in received available communication node network management configuration informationNetwork communication node constitutes network communication node resource pool, provides alternative money for the choice of dynamical and auto-associating of later period network linkSource pond,
Wherein, all available address information form address pool I={ ip1, ip2, L, ipm};Port is the various agreements of application layerProcess carries out the address that interlayer interacts with transportation entities, and usable range is 0 to 65535, removes first 1024 known ports, remainsRemaining 64512 available ports, all available port information form port pool P={ port1, port2, L, portn};Agreement includesNetwork communication protocol, data encryption protocol, data compression algorithm etc., all allowed protocol information form protocol pool Ψ={ pro1,pro2, L, pros}。
Node network management configuration e is made of address, port, agreement triple, individual node network management configuration ei=(ipi,porti, proi), node network management configuration state space is as follows:
E=I × P × Ψ={ (ipi, portj, prok) | 1≤i≤m, 1≤j≤n, 1≤k≤s }
Preferably, for constructing network link auto-associating space, it is logical the link module: to randomly select available networkBelieve that node constitutes available link space, specifically include: is random from available communication node resource pond by way of pseudo random numberA plurality of alternative communication link is chosen, and pseudorandom selection and configuration are carried out to information such as communication port, agreements;
Network link auto-associating space EH is by node network management configuration state space E, pseudo-random sequence collection Φ, automated topologyIt is associated with the five-tuple group that node of graph network management configuration state set Ω, Correlation Criteria C, network link auto-associating transfer relationship δ are constitutedAt i.e. EH=(E, Φ, Ω, C, δ).
Φ1, Φ2, Φ3For pseudo-random functionThe pseudo-random sequence of generation, define respectively address, port, agreement three classes node network management configuration association sequence, communicating pair pressesImplement association and communication according to the node network management configuration of sequence mapping.Pseudo-random sequence guarantees the random of network link auto-associatingProperty, the ability of attacker's match network topologies is reduced, attacker is made to be difficult to hold the related law of destination host, increases and attacksThe person of hitting detects difficulty.
It is the network management configuration state set for constituting all nodes of topological correlation figureIt closes, whereinFor the node network management configuration used in moment t system.
C is the condition for triggering network link auto-associating, such as receives a certain confirmation message, the time for reaching agreement, sendsA certain number of data packets etc., C=(c1, c2, L, cp) the different trigger condition of characterization.
Indicate Correlation Criteria ciUnder, node network management configuration that communicating pair uses is from Ω (ti) stateMove to Ω (ti+1) state process, meet
Preferably, the negotiation module: executing network communication link auto-associating for network communication both sides and negotiate process,Negotiate to choose current communications link, and timing unoccupied place carries out the adjustment of communication link dynamic negotiation, specifically includes: communicating pair executesNetwork link auto-associating negotiates process, and one or more communication link is chosen from alternative communication link as practical communication chainRoad, and the execution network link auto-associating negotiation of timing gap adjusts process again, realizes that the network based on homomorphism communication link is attackedHit composite defense.
Network link auto-associating can be communication one side's single-point association, be also possible to the association of communicating pair equity, evenIt is the collaboration association between multiple communication objects.Therefore the present invention provides correlating method for equity association.Method allows moreIndependent transmission node layer on a network link auto-associating channel, main station side and client require to state certainly to communication objectOneself topological correlation figure, topological correlation figure two-way exchange, then according to set topological correlation figure communication with high safety, wherein main websiteIt holds related procedure to be acted on behalf of by power grid main website topological correlation to execute.
The negotiation module: network communication link auto-associating is executed for network communication both sides and negotiates process, negotiates choosingCurrent communications link is taken, and timing unoccupied place carries out the adjustment of communication link dynamic negotiation, the negotiation module specifically includes:
Request message sending module: for preparing to lead to main station side when the client of a support network link auto-associatingWhen letter, conventional requests message is sent to main station side firstUse client private key KrcTo client identityIDc, network link auto-associating support label mark and request message send when time stamp T1Signature;
First signature verification module: message is received for main station side recordTime T2, use clientHold public key KucSignature verification is carried out, the legitimacy of client identity is verified (if main station side does not support network link certainlyDynamic association, ignores the message);
Auto-associating communication module: after authenticating successfully for client identity, main station side is immediately switched to network link certainlyDynamic association communication pattern, and response message is sent to clientUse main station side private key KrsTo main station sideIdentity IDs, main station side network link automated topology associated diagram HPsT is stabbed with response message sending time3It signs;
Second signature verification module: message is received for client recordTime T4, use main station sidePublic key KusSignature verification is carried out, the legitimacy of main station side identity is verified;
Response message sending module: after main station side authentication success, client sends response message to main station sideUse client private key KrcTo client network link automated topology associated diagram HPcWhen being sent with response messageBetween stab T4It signs;
Time drift computing module: for main station side according to time stamp T1, T2, T3, T4The time drift θ of calculating both sides=(T2-T1+T3-T4)/2, and send it to client
Synchronous correction module: correction is synchronized to local zone time according to time drift θ for client, and switches to netNetwork link auto-associating communication pattern;
Secure communication module: for client and main station side according to given network link automated topology associated diagram HPsAnd HPcIt securely communicates;
Period update module: for working as topological correlation figure T life cyclehWhen arrival, updates network link automated topology and closeConnection figure.
Compared with prior art, the present invention its remarkable advantage are as follows: the invention proposes a kind of defence of power network security to accuseAlert system can realize comprehensive individual monitoring to electric power networks, main plot monitoring, composite defense, safety analysis, accuse in real timeAlert, solid comprehensively protects the safety of entire electric power networks.Especially, it can be achieved that communicating pair or passing through primary data in many waysExchange is concentrated random negotiation to determine communication topology associated diagram and correlation time, was being communicated in set available network nodesTopological correlation figure in journey according to agreement establishes dynamic communication link, and listener is difficult to grasp communication topology interior joint network management configurationRule, to be difficult to track communication overall process.During network link auto-associating, legal entity is matched using correct node network managementMaintenance normal communication is set, unauthorized entity is due to that can not know that legal entity node network management configuration will be difficult to carry out effective attack.TogetherWhen, main station side and client can under specific circumstances, security update topological correlation figure, to guarantee network link certainly to greatest extentIt is dynamic to be associated with the randomness shown, the time and space complexity that attack is implemented is increased, to reach information security attack activelyDefensive Target.
Here the preferred embodiment of the present invention is only illustrated, but its meaning is not intended to limit the scope of the invention, applicability and is matchedIt sets.On the contrary, detailed explanation of the embodiments can be implemented by those skilled in the art.It will be understood that without departing from appended powerIn the case of the spirit and scope of the invention that sharp claim determines, changes and modifications may be made to details.

Claims (13)

12. a kind of power network security according to claim 2 defends warning system, which is characterized in that the negotiation mouldBlock: executing network communication link auto-associating for network communication both sides and negotiate process, negotiates to choose current communications link, and fixedWhen unoccupied place carry out the adjustment of communication link dynamic negotiation, specifically include: network communication both sides execute network communication link auto-associatingNegotiate process, one or more communication link is chosen from alternative communication link as practical communication link, and timing unoccupied place is heldThe negotiation of row network link auto-associating adjusts process again, realizes the network attack composite defense based on homomorphism communication link;Wherein,Network communication link auto-associating is between the association of one side's single-point of communication, the association of communicating pair equity or multiple communication objectsCollaboration association.
CN201810927871.6A2018-08-152018-08-15A kind of power network security defence warning systemPendingCN109194505A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201810927871.6ACN109194505A (en)2018-08-152018-08-15A kind of power network security defence warning system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201810927871.6ACN109194505A (en)2018-08-152018-08-15A kind of power network security defence warning system

Publications (1)

Publication NumberPublication Date
CN109194505Atrue CN109194505A (en)2019-01-11

Family

ID=64935934

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201810927871.6APendingCN109194505A (en)2018-08-152018-08-15A kind of power network security defence warning system

Country Status (1)

CountryLink
CN (1)CN109194505A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110830462A (en)*2019-10-302020-02-21南京理工大学Security analysis method for mimicry defense architecture
CN111581636A (en)*2020-03-262020-08-25大连交通大学 A network security monitoring device
CN112987604A (en)*2019-12-182021-06-18中国东方电气集团有限公司Network safety monitoring and real-time warning system and method for power generation equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020024424A1 (en)*2000-04-102002-02-28Burns T. D.Civil defense alert system and method using power line communication
CN102280929A (en)*2010-06-132011-12-14中国电子科技集团公司第三十研究所System for information safety protection of electric power supervisory control and data acquisition (SCADA) system
CN104378367A (en)*2014-11-062015-02-25国网山东蓬莱市供电公司Improved network security incident correlation analysis system
CN106411562A (en)*2016-06-172017-02-15全球能源互联网研究院Electric power information network safety linkage defense method and system
CN106982229A (en)*2017-05-102017-07-25南京南瑞继保电气有限公司The network security supervisory systems and collaboration monitoring and managing method of a kind of layered distribution type collaboration

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020024424A1 (en)*2000-04-102002-02-28Burns T. D.Civil defense alert system and method using power line communication
CN102280929A (en)*2010-06-132011-12-14中国电子科技集团公司第三十研究所System for information safety protection of electric power supervisory control and data acquisition (SCADA) system
CN104378367A (en)*2014-11-062015-02-25国网山东蓬莱市供电公司Improved network security incident correlation analysis system
CN106411562A (en)*2016-06-172017-02-15全球能源互联网研究院Electric power information network safety linkage defense method and system
CN106982229A (en)*2017-05-102017-07-25南京南瑞继保电气有限公司The network security supervisory systems and collaboration monitoring and managing method of a kind of layered distribution type collaboration

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BO ZHANG: ""The Proactive Defense of Energy Internet Terminals Edge-Access Using the Network Topology Autoassociation"", 《IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS》*

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110830462A (en)*2019-10-302020-02-21南京理工大学Security analysis method for mimicry defense architecture
CN112987604A (en)*2019-12-182021-06-18中国东方电气集团有限公司Network safety monitoring and real-time warning system and method for power generation equipment
CN112987604B (en)*2019-12-182022-07-22东方电气股份有限公司Network safety monitoring and real-time warning system and method for power generation equipment
CN111581636A (en)*2020-03-262020-08-25大连交通大学 A network security monitoring device

Similar Documents

PublicationPublication DateTitle
Yazdinejad et al.Enabling drones in the internet of things with decentralized blockchain-based security
Pu et al.Lightweight authentication protocol for unmanned aerial vehicles using physical unclonable function and chaotic system
Khan et al.An efficient and secure certificate-based access control and key agreement scheme for flying ad-hoc networks
Mahmoud et al.Security for internet of things: A state of the art on existing protocols and open research issues
Jan et al.PAWN: a payload‐based mutual authentication scheme for wireless sensor networks
Wang et al.Blockchain-Aided secure access control for UAV computing networks
Jan et al.A key agreement scheme for IoD deployment civilian drone
Chen et al.A divide-and-conquer strategy for thwarting distributed denial-of-service attacks
RengarajanSecure verification technique for defending IP spoofing attacks
CN109194505A (en)A kind of power network security defence warning system
Rajan et al.Trust based anonymous intrusion detection for cloud assisted WSN-IOT
CN105871929A (en)Wireless sensor network anonymity communication method
Paharia et al.Fog computing as a defensive approach against distributed denial of service (DDoS): A proposed architecture
WronaDistributed security: ad hoc networks & beyond
CN109218292A (en)A kind of electric power networks security boundary composite defense method and system
Tan et al.A secure and efficient blockchain-based key management scheme for LoRaWAN
Wang et al.A secured protocol for iot devices in tactical networks
Zhou et al.Computer network communication security encryption system based on ant colony optimization algorithm
Sengupta et al.Accelerating tactile internet with quic: A security and privacy perspective
Peng et al.Security technology analysis of IoT
Petroulakis et al.A privacy-level model of user-centric cyber-physical systems
Chen et al.Neuronet: An adaptive infrastructure for network security
Zhang et al.Privacy-preserving traceable encrypted traffic inspection in blockchain-based industrial IoT
CN110601878B (en)Method for constructing stealth network
El Zouka et al.Secure Authentication and Session Key Management Scheme for Distributed Sensor Networks

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination

[8]ページ先頭

©2009-2025 Movatter.jp