+

CN110472839A - Thermal power plant's control system Information Security Evaluation system based on SA-PSO-AHP - Google Patents

Thermal power plant's control system Information Security Evaluation system based on SA-PSO-AHP Download PDF

Info

Publication number
CN110472839A
CN110472839A CN201910676756.0A CN201910676756A CN110472839A CN 110472839 A CN110472839 A CN 110472839A CN 201910676756 A CN201910676756 A CN 201910676756A CN 110472839 A CN110472839 A CN 110472839A
Authority
CN
China
Prior art keywords
control system
matrix
particle
power plant
threat
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910676756.0A
Other languages
Chinese (zh)
Inventor
彭道刚
段旭晨
赵慧荣
姚峻
祝建飞
夏飞
钱玉良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai University of Electric Power
Original Assignee
Shanghai University of Electric Power
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai University of Electric Power filed Critical Shanghai University of Electric Power
Priority to CN201910676756.0A priority Critical patent/CN110472839A/en
Publication of CN110472839A publication Critical patent/CN110472839A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/004Artificial life, i.e. computing arrangements simulating life
    • G06N3/006Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Educational Administration (AREA)
  • Health & Medical Sciences (AREA)
  • Game Theory and Decision Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computational Linguistics (AREA)
  • Water Supply & Treatment (AREA)
  • Primary Health Care (AREA)
  • Artificial Intelligence (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Public Health (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Feedback Control In General (AREA)

Abstract

本发明涉及一种基于SA‑PSO‑AHP的火电厂控制系统信息安全评估系统,包括数据输入模块,用于获取对待评估控制系统的打分数据;矩阵搭建模块,该模块中预存有利用层次分析法搭建的控制系统的威胁评估分层递进模型,该模型结合数据输入模块输入的打分数据构建评估矩阵;矩阵修正模块,用于对评估矩阵进行一致性评判,对不满足一致性标准的评估矩阵利用模拟退火优化粒子群算法进行一致性修正;数据输出模块,用于利用层次分的算法获取此电厂控制系统威胁排序,结合威胁频率得到综合威胁评分。与现有技术相比,本发明能够充分反映评判要素及过程的模糊性,减少个人主观因素带来的影响,较好地得出客观充分的评价结果。

The present invention relates to a thermal power plant control system information security assessment system based on SA-PSO-AHP, comprising a data input module for obtaining scoring data of the control system to be evaluated; The threat assessment layered progressive model of the built control system, the model combines the scoring data input by the data input module to construct the assessment matrix; the matrix correction module is used to judge the consistency of the assessment matrix, and the assessment matrix The simulated annealing optimization particle swarm algorithm is used for consistency correction; the data output module is used to obtain the threat ranking of the power plant control system by using the hierarchical algorithm, and obtain the comprehensive threat score combined with the threat frequency. Compared with the prior art, the present invention can fully reflect the ambiguity of the evaluation elements and process, reduce the influence of personal subjective factors, and better obtain objective and sufficient evaluation results.

Description

基于SA-PSO-AHP的火电厂控制系统信息安全评估系统SA-PSO-AHP-based information security assessment system for thermal power plant control system

技术领域technical field

本发明涉及信息安全技术领域,尤其是涉及一种基于SA-PSO-AHP的火电厂控制系统信息安全评估系统。The invention relates to the technical field of information security, in particular to an SA-PSO-AHP-based thermal power plant control system information security evaluation system.

背景技术Background technique

火电厂作为能源领域重心,其工业控制系统的信息安全变得尤为重要。随着企业不断推进的信息化建设步伐,信息化程度逐步提升,控制系统与企业管理等系统的联系越来越紧密,系统的开放性不断提升,系统引入各类通用信息产品与技术,如以太网技术和商用操作系统在控制系统的应用范围不断扩大,表现为电力系统对信息技术的依赖日益加强。另一方便,电厂控制系统与电力调度系统的互联互通造成电厂信息安全风险不断扩大,甚至会严重危害电厂的安全运行。由此带来的电力企业信息系统安全问题日益增多,因此进行电厂控制系统信息安全的评估是非常重要的。Thermal power plants are the center of gravity in the energy field, and the information security of their industrial control systems has become particularly important. With the continuous advancement of information construction by enterprises, the degree of informatization has gradually increased, the connection between control systems and enterprise management systems has become closer and closer, the openness of the system has been continuously improved, and various general information products and technologies have been introduced into the system, such as Ethernet The scope of application of network technology and commercial operating systems in control systems continues to expand, which is manifested in the increasing dependence of power systems on information technology. On the other hand, the interconnection between the power plant control system and the power dispatching system has caused the power plant information security risk to continue to expand, and even seriously endanger the safe operation of the power plant. As a result, the information system security problems of electric power enterprises are increasing day by day, so it is very important to evaluate the information security of the power plant control system.

电厂常用控制系统主要为分散控制系统(DCS)、可编程控制系统(PLC)及现场总线系统(FCS)。而火电厂控制系统普遍采用了专用的软硬件、操作系统和通信协议,又存在于封闭的网络之中,因此往往疏于防范,存在着诸多安全隐患。因此电厂应建立多技术层面的防护体系,做到物理、网络、终端、数据的多角度、全方位保护。通过实施安全威胁的评估,可以发现电厂控制系统存在的安全威胁,提出电厂控制系统安全整改建议并实施安全整改,确保电厂控制系统的生命周期安全性。Commonly used control systems in power plants are mainly distributed control system (DCS), programmable control system (PLC) and field bus system (FCS). However, the control system of thermal power plants generally adopts special software and hardware, operating system and communication protocol, and exists in a closed network, so it is often neglected and there are many security risks. Therefore, power plants should establish a multi-technical protection system to achieve multi-angle and all-round protection of physical, network, terminal, and data. Through the assessment of security threats, the security threats existing in the power plant control system can be found, and suggestions for safety rectification of the power plant control system can be proposed and implemented to ensure the life cycle security of the power plant control system.

现有的评估方法和系统一般采用如马尔可夫决策理论、模糊数学理论等仅利用影响受决策问题相关的可量化指标进行分析,因此对假设条件、实施建议等定性因素难以评判进行综合评估,存在主观性强和不确定性的问题,无法客观精确地获取安全评估。Existing evaluation methods and systems generally use Markov decision theory, fuzzy mathematics theory, etc. to analyze only quantifiable indicators related to decision-making issues, so it is difficult to judge and comprehensively evaluate qualitative factors such as assumptions and implementation suggestions. There are problems of strong subjectivity and uncertainty, and it is impossible to obtain objective and accurate security assessments.

发明内容Contents of the invention

本发明的目的就是为了克服上述现有技术存在的缺陷而提供一种基于SA-PSO-AHP的火电厂控制系统信息安全评估方法。The purpose of the present invention is to provide a SA-PSO-AHP-based thermal power plant control system information security assessment method in order to overcome the above-mentioned defects in the prior art.

本发明的目的可以通过以下技术方案来实现:The purpose of the present invention can be achieved through the following technical solutions:

一种基于SA-PSO-AHP的火电厂控制系统信息安全评估系统,包括:A thermal power plant control system information security assessment system based on SA-PSO-AHP, including:

数据输入模块,用于获取对待评估控制系统的打分数据;The data input module is used to obtain the scoring data of the control system to be evaluated;

矩阵搭建模块,该模块中预存有利用层次分析法搭建的控制系统的威胁评估分层递进模型,该模型结合数据输入模块输入的打分数据构建评估矩阵;A matrix building module, which pre-stores a layered and progressive model of threat assessment of the control system built using the AHP, which combines the scoring data input by the data input module to construct an assessment matrix;

矩阵修正模块,用于对评估矩阵进行一致性评判,对不满足一致性标准的评估矩阵利用模拟退火优化粒子群算法进行一致性修正;The matrix correction module is used to judge the consistency of the evaluation matrix, and use the simulated annealing optimization particle swarm optimization algorithm to perform consistency correction on the evaluation matrix that does not meet the consistency standard;

数据输出模块,用于利用层次分的算法获取此电厂控制系统威胁排序,结合威胁频率得到综合威胁评分。The data output module is used to obtain the threat ranking of the power plant control system by using the hierarchical classification algorithm, and obtain the comprehensive threat score in combination with the threat frequency.

进一步地,所述的矩阵修正模块中具体执行以下步骤:Further, the following steps are specifically performed in the matrix correction module:

S1、对粒子进行初始化设定,设置粒子数n、起始位置和速度,设置退火系数α和起始温度T;S1. Initialize the particles, set the particle number n, initial position and speed, set the annealing coefficient α and initial temperature T;

S2、由粒子目前的位置与速度得到此粒子新的位置;S2. Obtain the new position of the particle from the current position and velocity of the particle;

S3、判断迭代次数是否小于规定迭代次数,若是,则执行步骤S4;若否,则将修正后的判断矩阵数据传输至数据输出模块;S3. Determine whether the number of iterations is less than the specified number of iterations, if so, execute step S4; if not, transmit the corrected judgment matrix data to the data output module;

S4、计算粒子适应值,若粒子的适应值优于原来个体极值pbest,则更新当前的粒子适应值为pbest,则更新当前的粒子适应值为pbest,全局极值gbest依据粒子个体极值pbest寻找,更新粒子的位置和速度;若否,则执行步骤S2;S4. Calculate the particle fitness value. If the particle fitness value is better than the original individual extreme value pbest, then update the current particle fitness value pbest, then update the current particle fitness value pbest, and the global extreme value gbest is based on the particle individual extreme value pbest Find and update the position and velocity of the particle; if not, execute step S2;

S5、计算当前粒子和更新后粒子两个位置的适应值变化量ΔE;如果ΔE≤0或满足exp(-ΔE/T)>rand(0,1),则接受更新值执行降温,将T值更新为αT;否则拒绝接收更新值,执行步骤S2。S5. Calculate the variation ΔE of the fitness value of the two positions of the current particle and the updated particle; if ΔE≤0 or satisfy exp(-ΔE/T)>rand(0,1), then accept the updated value to perform cooling, and change the T value Update to αT; otherwise, refuse to accept the updated value and go to step S2.

进一步地,所述的步骤S2中,速度更新的表达式为:Further, in the step S2, the expression of speed update is:

vk+1=c0vk+c1(pbestk-xk)+c2(gbestk-xk)v k+1 =c 0 v k +c 1 (pbest k -x k )+c 2 (gbest k -x k )

其中,vk是粒子的速度向量;vk+1是更新的粒子的速度向量;xk是当前粒子的位置;pbestk为粒子自身找到最优解的位置;gbestk是整个种群目前找到的最优解的位置;c0,c1,c2表示群体认知系数,c0一般取介于(0,1)之间的随机数,c1、c2取介于(0,2)之间的随机数。Among them, v k is the velocity vector of the particle; v k+1 is the velocity vector of the updated particle; x k is the position of the current particle; pbest k is the position where the particle itself finds the optimal solution; gbest k is the current finding of the entire population The position of the optimal solution; c 0 , c 1 , and c 2 represent the group cognition coefficient, c 0 generally takes a random number between (0,1), and c 1 and c 2 take a random number between (0,2) random number between.

进一步地,所述的步骤S2中,位置更新的表达式为:Further, in the step S2, the expression of location update is:

xk+1=xk+vk+1 x k+1 =x k +v k+1

其中,xk是当前粒子的位置;xk+1是更新的粒子位置;vk+1是更新的粒子的速度向量。Among them, x k is the current particle position; x k+1 is the updated particle position; v k+1 is the updated particle velocity vector.

进一步地,所述的威胁评估层级结构包括目标结果层、评判准则层和威胁要素层,其中,评判准则层包括:Further, the threat assessment hierarchical structure includes a target result layer, a judging criterion layer and a threat element layer, wherein the judging criterion layer includes:

威胁对系统的保密性的影响,包括设备或软件被控制或破坏、远程维护端口被非授权地使用、口令的暴力攻击、软件后门或后门软件、恶意软件和未经授权将设备连接到网络;The impact of threats on the confidentiality of the system, including control or destruction of equipment or software, unauthorized use of remote maintenance ports, password brute force attacks, software backdoors or backdoor software, malware, and unauthorized connection of equipment to the network;

威胁对系统的可用性的影响,包括口令的暴力攻击、不恰当地配置和操作、拒绝服务攻击、远程溢出攻击和远程文件访问;The impact of threats on system availability, including password brute force attacks, improper configuration and operation, denial of service attacks, remote overflow attacks, and remote file access;

威胁对系统的完整性的影响,包括设备或软件被控制或破坏、远程维护端口被非授权地使用、恶意软件、拒绝服务攻击、远程溢出攻击和流量过载。The impact of threats on the integrity of the system, including the control or destruction of equipment or software, unauthorized use of remote maintenance ports, malware, denial of service attacks, remote overflow attacks and traffic overload.

进一步地,所述的矩阵修正模块中,当CR<0.1或λmax=n,CI=0时,则判断矩阵一致性达到要求,其中,CR为一致性检验系数;CI为一致性指标,当CI=0时,有完全的一致性;CI接近于0,有满意的一致性;CI越大,不一致越严重;λmax为判断矩阵最大特征值,n为判断矩阵阶数。Further, in the matrix correction module, when CR<0.1 or λ max =n, CI=0, the judgment matrix consistency meets the requirements, wherein CR is the consistency test coefficient; CI is the consistency index, when When CI=0, there is complete consistency; when CI is close to 0, there is satisfactory consistency; the larger the CI, the more serious the inconsistency; λ max is the maximum eigenvalue of the judgment matrix, and n is the order of the judgment matrix.

进一步地,所述模拟退火优化粒子群算法的加速度因子为1.49445,进化次数为200,种群规模为20,权重系数区间为[0.4,0.9],速度区间为[-1,1],位置区间为[1/9,9],起始温度为1000,退火系数为0.9。Further, the acceleration factor of the simulated annealing optimized particle swarm optimization algorithm is 1.49445, the number of evolutions is 200, the population size is 20, the weight coefficient range is [0.4,0.9], the speed range is [-1,1], and the position range is [1/9,9], the starting temperature is 1000, and the annealing coefficient is 0.9.

进一步地,综合威胁评分Ta的计算表达式为:Further, the calculation expression of the comprehensive threat score Ta is:

其中,ωPi为第i个威胁的全局权重,TPi为第i个威胁的发生频率。Among them, ω Pi is the global weight of the i-th threat, T Pi is the occurrence frequency of the i-th threat.

与现有技术相比,本发明具有以下优点:Compared with the prior art, the present invention has the following advantages:

本发明基于SA-PSO-AHP(Simulate Anneal-Particle Swarm Optimization-Analytic Hierarchy Process,基于模拟退火改进粒子群算法的层次分析法)对电厂控制系统进行信息安全威胁评估。The present invention is based on SA-PSO-AHP (Simulate Anneal-Particle Swarm Optimization-Analytic Hierarchy Process, based on the Analytic Hierarchy Process of Simulated Annealing Improved Particle Swarm Algorithm) to evaluate the information security threat of the power plant control system.

首先通过层次分析法将定性因素量化后参与评估的综合决策条件,能够充分反映评判要素及过程的模糊性,减少个人主观因素带来的影响,能够较好地得出客观充分的评价结果;然后通过粒子群算法修正矩阵一致性克服了如果评估矩阵不具备满意的一致性指标,由此评估矩阵计算出的权重用作判断证据则不够可靠的问题;最后通过模拟退火算法优化粒子群算法可对粒子群算法中新位置做约束,以一定概率接受新的解,能够在较少的迭代次数下可以获得更好的一致性结果,克服了粒子群算法新的位置较差从而引起收敛速度缓慢的问题。Firstly, the comprehensive decision-making conditions for participating in the evaluation after quantifying the qualitative factors through the analytic hierarchy process can fully reflect the ambiguity of the evaluation elements and process, reduce the influence of personal subjective factors, and obtain objective and sufficient evaluation results; and then Correcting matrix consistency by particle swarm optimization algorithm overcomes the problem that if the evaluation matrix does not have a satisfactory consistency index, the weight calculated from this evaluation matrix is not reliable enough to be used as judgment evidence; finally, optimizing particle swarm algorithm by simulated annealing algorithm can In the particle swarm algorithm, the new position is constrained, and the new solution is accepted with a certain probability, which can obtain better consistency results with fewer iterations, and overcomes the slow convergence caused by the poor new position of the particle swarm algorithm. question.

因此,本发明既能够充分反映评判要素及过程的模糊性,减少个人主观因素带来的影响,获取更为精确,更为客观充分的评价结果,又能够提高火电厂在风险测评过程中的效率,通过分析出在控制系统中的主要威胁便于电厂的及时维护与改进。Therefore, the present invention can not only fully reflect the ambiguity of the evaluation elements and process, reduce the influence of personal subjective factors, obtain more accurate, more objective and sufficient evaluation results, but also improve the efficiency of thermal power plants in the risk evaluation process , by analyzing the main threats in the control system, it is convenient for the timely maintenance and improvement of the power plant.

附图说明Description of drawings

图1为本实施例的结构示意图;Fig. 1 is the structural representation of present embodiment;

图2为本实施例的流程示意图;Fig. 2 is the schematic flow chart of this embodiment;

图3为实施例中对应机组DCS系统网络拓扑结构图;Fig. 3 is the network topology structure diagram of corresponding unit DCS system in the embodiment;

图4为实施例中层次分级结构及判断矩阵图。Fig. 4 is a hierarchical structure and judgment matrix diagram in the embodiment.

具体实施方式Detailed ways

下面结合附图和具体实施例对本发明进行详细说明。本实施例以本发明技术方案为前提进行实施,给出了详细的实施方式和具体的操作过程,但本发明的保护范围不限于下述的实施例。The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

如图1所示,本实施例提供了一种基于SA-PSO-AHP的火电厂控制系统信息安全评估系统,包括:As shown in Figure 1, this embodiment provides a thermal power plant control system information security assessment system based on SA-PSO-AHP, including:

数据输入模块,用于获取对待评估控制系统的打分数据;The data input module is used to obtain the scoring data of the control system to be evaluated;

矩阵搭建模块,该模块中预存有利用层次分析法搭建的控制系统的威胁评估分层递进模型,该模型结合数据输入模块输入的打分数据构建评估矩阵;A matrix building module, which pre-stores a layered and progressive model of threat assessment of the control system built using the AHP, which combines the scoring data input by the data input module to construct an assessment matrix;

矩阵修正模块,用于对评估矩阵进行一致性评判,对不满足一致性标准的评估矩阵利用模拟退火优化粒子群算法进行一致性修正;The matrix correction module is used to judge the consistency of the evaluation matrix, and use the simulated annealing optimization particle swarm optimization algorithm to perform consistency correction on the evaluation matrix that does not meet the consistency standard;

数据输出模块,用于利用层次分的算法获取此电厂控制系统威胁排序,结合威胁频率得到综合威胁评分。The data output module is used to obtain the threat ranking of the power plant control system by using the hierarchical classification algorithm, and obtain the comprehensive threat score in combination with the threat frequency.

本系统的工作原理为:The working principle of this system is:

使用本系统前首先根据工业控制系统信息安全相关标准分析影响信息安全的威胁,并建立相应的层级结构预存在矩阵搭建模块中;组织专家组对所评估因素进行评判,将打分数据输入至数据输入模块,并由矩阵搭建模块得到各因素的评估矩阵;然后通过矩阵修正模块对评估矩阵进行一致性校验,如矩阵不满足一致性要求则对其进行一致性修正;最后在数据输出模块通过层次分析法得到系统的威胁。Before using this system, first analyze the threats affecting information security according to the relevant standards of industrial control system information security, and establish the corresponding hierarchical structure and pre-store it in the matrix building module; organize an expert group to judge the evaluated factors, and input the scoring data into the data input Module, and the evaluation matrix of each factor is obtained by the matrix construction module; then the consistency check of the evaluation matrix is carried out through the matrix correction module, and if the matrix does not meet the consistency requirements, the consistency correction is carried out; finally, the data output module passes the level Analytics to get systemic threats.

如图2所示,本实施例的具体运行流程如下:As shown in Figure 2, the specific operation process of this embodiment is as follows:

步骤S1、分析待评估DCS系统网络架构,识别并获取控制系统存在的威胁并且在数据输入模块输入对待评估控制系统的打分数据。Step S1 , analyzing the network architecture of the DCS system to be evaluated, identifying and acquiring threats to the control system, and inputting scoring data of the control system to be evaluated in the data input module.

步骤S2、矩阵搭建模块获取打分数据,然后通过预设的威胁评估分层递进模型后生成评估矩阵。Step S2, the matrix construction module obtains the scoring data, and then generates an assessment matrix through the preset threat assessment layered progressive model.

步骤S3、在矩阵修正模块中对评估矩阵进行一致性评判,采用当CR<0.1或λmax=n,CI=0时,认为矩阵一致性达到要求。Step S3 , in the matrix correction module, evaluate the consistency of the evaluation matrix. When CR<0.1 or λ max =n, CI=0, it is considered that the consistency of the matrix meets the requirement.

其中:一致性指标CI计算公式为:Among them: the formula for calculating the consistency index CI is:

当CI=0时,有完全的一致性;CI接近于0,有满意的一致性;CI越大,不一致越严重;When CI=0, there is complete consistency; when CI is close to 0, there is satisfactory consistency; the larger the CI, the more serious the inconsistency;

一致性检验系数CR计算公式为:The formula for calculating the consistency test coefficient CR is:

λmax为判断矩阵最大特征值,n为判断矩阵阶数。λ max is the maximum eigenvalue of the judgment matrix, and n is the order of the judgment matrix.

对不满足一致性标准的评估矩阵进行一致性修正,利用模拟退火优化粒子群算法使评估矩阵拥有满意的一致性指标。模拟退火算法是基于物理中固体物质的退火过程与一般组合优化问题间的相似性,伴随着每次降温使温度逐渐下降,对于粒子群算法不断产生新的粒子状态,以一定概率接受或舍弃新的状态,最终粒子渐趋有序,从而达到平衡态。具体展开如下:Consistency correction is performed on the evaluation matrix that does not meet the consistency standard, and the particle swarm optimization algorithm is optimized by simulated annealing to make the evaluation matrix have a satisfactory consistency index. The simulated annealing algorithm is based on the similarity between the annealing process of solid matter in physics and the general combinatorial optimization problem. With each cooling, the temperature gradually decreases. For the particle swarm algorithm, new particle states are continuously generated, and new particle states are accepted or discarded with a certain probability. state, and finally the particles gradually become orderly, thus reaching an equilibrium state. The specific expansion is as follows:

步骤S31、用模拟退火改进粒子群算法(SA-PSO)来寻找一致性检验系数CR最优数值并优化矩阵参数,首先对粒子进行初始化设定,设置粒子数n、起始位置和速度,设置退火系数α和起始温度T。Step S31, use simulated annealing improved particle swarm optimization algorithm (SA-PSO) to find the optimal value of the consistency check coefficient CR and optimize the matrix parameters. First, initialize the particles, set the number of particles n, the initial position and speed, and set Annealing coefficient α and starting temperature T.

步骤S32、由粒子目前的位置与速度得到此粒子新的位置。Step S32, obtain the new position of the particle from the current position and velocity of the particle.

速度更新的表达式为:The expression for speed update is:

vk+1=c0vk+c1(pbestk-xk)+c2(gbestk-xk)v k+1 =c 0 v k +c 1 (pbest k -x k )+c 2 (gbest k -x k )

其中:vk是粒子的速度向量;xk是当前粒子的位置;pbestk为粒子自身找到最优解的位置;gbestk是整个种群目前找到的最优解的位置;c0,c1,c2表示群体认知系数,c0一般取介于(0,1)之间的随机数,c1、c2取介于(0,2)之间的随机数。Among them: v k is the velocity vector of the particle; x k is the position of the current particle; pbest k is the position where the particle itself finds the optimal solution; gbest k is the position of the optimal solution found by the entire population; c 0 , c 1 , c 2 represents the group cognition coefficient, c 0 generally takes a random number between (0,1), and c 1 and c 2 take a random number between (0,2).

速度更新将其限制在Vmax内,对粒子速度作限制,使新的速度减少变坏的可能性,从而在一定程度上缓解收敛速度变慢的问题。The speed update limits it to V max , and limits the particle speed, so that the new speed reduces the possibility of deterioration, thereby alleviating the problem of slowing down the convergence speed to a certain extent.

位置更新的表达式为:The expression for location update is:

xk+1=xk+vk+1 x k+1 =x k +v k+1

其中:xk+1是更新的粒子位置;vk+1是更新的粒子的速度向量。Among them: x k+1 is the updated particle position; v k+1 is the updated particle velocity vector.

步骤S33、判断迭代次数是否小于规定迭代次数,若是,则执行步骤S34;若否,则执行步骤S4。Step S33 , judging whether the number of iterations is less than the specified number of iterations, if yes, execute step S34 ; if not, execute step S4 .

步骤S34、计算粒子适应值,若粒子的适应值优于原来个体极值pbest,则更新当前的粒子适应值为pbest,全局极值gbest依据粒子个体极值pbest寻找,更新粒子的位置和速度;若否,则执行步骤S32;Step S34, calculate the particle fitness value, if the particle fitness value is better than the original individual extremum pbest, then update the current particle fitness value pbest, the global extremum gbest is searched according to the particle individual extremum pbest, and update the position and velocity of the particle; If not, execute step S32;

步骤S35、计算当前粒子和更新后粒子两个位置的适应值变化量ΔE;如果ΔE≤0或满足exp(-ΔE/T)>rand(0,1),则接受更新值,执行降温,将T值更新为αT;否则拒绝接收更新值,xk+1仍为xk,执行步骤S32。Step S35, calculate the variation ΔE of the fitness value of the current particle and the particle after the update; if ΔE≤0 or satisfy exp(-ΔE/T)>rand(0,1), accept the updated value, perform cooling, and The T value is updated to αT; otherwise, the updated value is rejected, x k+1 is still x k , and step S32 is executed.

步骤S4、利用层次分析的计算方法计算出此电厂控制系统威胁排序,结合威胁频率计算出综合威胁评分,综合威胁评分Ta的计算表达式为:Step S4, using the AHP calculation method to calculate the threat ranking of the power plant control system, and calculating the comprehensive threat score in combination with the threat frequency, the calculation expression of the comprehensive threat score Ta is:

其中,ωPi为第i个威胁的全局权重,TPi为第i个威胁的发生频率。Among them, ω Pi is the global weight of the i-th threat, T Pi is the occurrence frequency of the i-th threat.

为验证方法有效性,在本实施例采用本评估系统中对某机组DCS系统进行威胁评估,构建层级分析结构并对其中不满足一致性标准的矩阵进行一致性修正。In order to verify the effectiveness of the method, in this embodiment, the assessment system is used to assess the threat of a DCS system of a unit, construct a hierarchical analysis structure, and perform consistency correction on the matrix that does not meet the consistency standard.

如图3所示,为实例所评估系统的网络架构,此控制系统由6台操作员站以及工程师站、历史站、link站以及SIS工作站(接口机)通过A/B网的方式接入交换机。交换机连接有BMS炉膛安全监控系统、CCS协调控制、SCS顺序控制系统、DAS火电厂计算机监视系统、ECS火电厂电气控制系统对生产过程中的控制点位和工艺系统进行控制,完成收集生产数据、传送操作指令等任务。As shown in Figure 3, it is the network architecture of the system evaluated in the example. This control system consists of 6 operator stations, engineer stations, history stations, link stations, and SIS workstations (interface machines) connected to the switch through the A/B network . The switch is connected with BMS furnace safety monitoring system, CCS coordinated control, SCS sequence control system, DAS thermal power plant computer monitoring system, and ECS thermal power plant electrical control system to control the control points and process systems in the production process, and complete the collection of production data, Sending tasks such as operation instructions.

如图4所示,为层次分析模型及对应的判断矩阵,通过威胁识别得到每个底层威胁(P1~P11)对系统的保密性(Confidentiality)、完整性(Integrity)及可用性(Availability)的影响,矩阵C表示威胁P1~P5对系统保密性的影响,矩阵I表示威胁P3、P7~P10对系统完整性的影响,矩阵A表示威胁P1、P2、P5、P8、P9、P11对系统可用性的影响,矩阵S表示系统保密性、完整性、可用性对于系统整体威胁评分的影响。As shown in Figure 4, it is the hierarchical analysis model and the corresponding judgment matrix. Through threat identification, the impact of each underlying threat (P1~P11) on the system's confidentiality (Confidentiality), integrity (Integrity) and availability (Availability) is obtained. , matrix C represents the impact of threats P1-P5 on system confidentiality, matrix I represents the impact of threats P3, P7-P10 on system integrity, matrix A represents the impact of threats P1, P2, P5, P8, P9, and P11 on system availability Impact, matrix S represents the impact of system confidentiality, integrity, and availability on the overall threat score of the system.

表1至表3为对不满足一致性标准的评估矩阵的修正结果,并将本发明提出的方法(SAPSO)与传统粒子群算法(PSO)进行比较,表4为通过层次分析的方法分别得到底层威胁的全局权重。Table 1 to Table 3 are the correction results to the evaluation matrix that does not meet the consistency standard, and compare the method (SAPSO) proposed by the present invention with the traditional particle swarm optimization algorithm (PSO), and Table 4 is obtained respectively by the method of hierarchical analysis The global weight of the underlying threat.

所述粒子群算法的加速度因子为1.49445,进化次数为200,种群规模为20,权重系数区间为[0.4,0.9],速度区间为[-1,1],位置区间为[1/9,9],模拟退火优化参数增添起始温度为1000,退火系数为0.9。The acceleration factor of the particle swarm optimization algorithm is 1.49445, the number of evolutions is 200, the population size is 20, the weight coefficient range is [0.4,0.9], the speed range is [-1,1], and the position range is [1/9,9] ], the optimized parameters of simulated annealing were added with an initial temperature of 1000 and an annealing coefficient of 0.9.

表1完整性评估矩阵一致性修正结果比较Table 1 Comparison of consistency correction results of integrity assessment matrix

I12I12 I13I13 I14I14 I15I15 I23I23 I24I24 I25I25 I34I34 I35I35 I45I45 初始initial 11 22 33 33 33 1/21/2 44 22 55 44 PSOPSO 1.77451.7745 1.8411.841 2.9992.999 6.3136.313 0.9850.985 1.5751.575 3.99113.9911 1.7191.719 4.6384.638 2.77852.7785 SAPSOSAPSO 1.77141.7714 1.8791.879 3.0003.000 6.8556.855 1.0531.053 1.6931.693 3.9793.979 1.6181.618 3.9093.909 2.41122.4112

表2可用性评估矩阵一致性修正结果比较Table 2 Comparison of consistency correction results of usability evaluation matrix

A12A12 A13A13 A14A14 A15A15 A16A16 A23A23 A24A24 A25A25 A26A26 A34A34 A35A35 A36A36 A45A45 A46A46 A56A56 初始initial 22 33 1/31/3 1/21/2 1/31/3 22 1/31/3 1/21/2 1/21/2 11 1/31/3 11 33 22 11 PSOPSO 1.5391.539 1.6841.684 1.0221.022 2.0132.013 1.4621.462 1.1181.118 0.6660.666 1.3291.329 0.9590.959 0.6040.604 1.1971.197 0.8660.866 2.0102.010 1.4311.431 0.7250.725 SAPSOSAPSO 2.8542.854 2.9442.944 1.0411.041 1.8211.821 2.3722.372 0.9080.908 0.3340.334 0.7270.727 0.7780.778 0.3510.351 0.6840.684 0.8440.844 2.3362.336 2.7062.706 1.2491.249

表3评估矩阵一致性修正参数比较Table 3 Evaluation matrix consistency correction parameter comparison

表4威胁的全局权重Table 4 Global weight of threats

P1P1 P2P2 P3P3 P4P4 P5P5 P6P6 P7P7 P8P8 P9P9 P10P10 P11P11 PSOPSO 0.15060.1506 0.12020.1202 0.12370.1237 0.02250.0225 0.10340.1034 0.01250.0125 0.05790.0579 0.19620.1962 0.10460.1046 0.01420.0142 0.09430.0943 SAPSOSAPSO 0.1730.173 0.08730.0873 0.12590.1259 0.02250.0225 0.08020.0802 0.01250.0125 0.05960.0596 0.19450.1945 0.16110.1611 0.01490.0149 0.06850.0685

表5威胁发生频率Table 5 Threat occurrence frequency

P1P1 P2P2 P3P3 P4P4 P5P5 P6P6 P7P7 P8P8 P9P9 P10P10 P11P11 频率TFrequency T 11 11 22 11 22 11 33 11 11 44 11

计算结果体现出本实施例采用的模拟退火优化粒子群算法能够在较少的迭代次数下可以获得更好的一致性结果,能够避免粒子群算法新的位置较差从而引起收敛速度缓慢的问题。两种方法得到的在11种系统存在的威胁中,威胁权重最高的分别为P8拒绝服务攻击和P1设备或软件被控制或破坏,根据表5计算出的威胁评分值分别为2.7712和2.74,评估结果分为较高、高、中、低和较低,相应的范围为10~8,8~6,6~4,4~2,2~0均表现为此DCS网络的威胁等级为低,整体可能承受威胁侵害的损失较低。The calculation results show that the simulated annealing optimization particle swarm optimization algorithm adopted in this embodiment can obtain better consistent results with fewer iterations, and can avoid the problem of slow convergence caused by the poor new position of the particle swarm optimization algorithm. Among the 11 types of system threats obtained by the two methods, the highest threat weights are P8 denial of service attack and P1 equipment or software being controlled or destroyed. The threat scores calculated according to Table 5 are 2.7712 and 2.74, respectively. The results are divided into high, high, medium, low and low, and the corresponding ranges are 10-8, 8-6, 6-4, 4-2, 2-0, all of which indicate that the threat level of the DCS network is low, The overall loss that may be borne by threats is relatively low.

综合考虑对此DCS系统的信息安全威胁量化评估结果、现有控制措施及可能产生的风险后果,改进系统安全措施使其增强安全防护水平。可以得出,本系统影响较大的威胁为拒绝服务攻击以及设备或软件被控制或破坏,若因拒绝服务供给引起过多连接,则要及时更改安全策略,做好应对防范举措,联合多方合作解决威胁。系统应及时更新漏洞库,增加漏洞检查设备或软件,并增加网络安全工具如工业防火墙、入侵检测产品(IDS)、单向隔离装置等,在与调度数据网等外部网络互联过程中注重加密认证装置的接入保证数据的加密传输;关闭主机系统多余服务,配置口令复杂度策略,及时升级勒索病毒补丁或配置相应安全应对策略。本发明提出的威胁评估应用不仅可以提高火电厂在风险测评过程中的效率,而且能够分析出在系统中的主要威胁便于电厂的及时维护与改进。Comprehensively consider the information security threat quantitative assessment results of the DCS system, the existing control measures and possible risk consequences, and improve the system security measures to enhance the level of security protection. It can be concluded that the threats that have a greater impact on the system are denial of service attacks and equipment or software being controlled or destroyed. If too many connections are caused by denial of service supply, it is necessary to change the security policy in time, take preventive measures, and cooperate with multiple parties. Address threats. The system should update the vulnerability database in a timely manner, add vulnerability inspection equipment or software, and add network security tools such as industrial firewalls, intrusion detection products (IDS), one-way isolation devices, etc., and pay attention to encryption and authentication in the process of interconnecting with dispatching data networks and other external networks The access of the device ensures the encrypted transmission of data; shut down the redundant services of the host system, configure the password complexity policy, upgrade the ransomware patch in time or configure the corresponding security response strategy. The application of threat assessment proposed by the invention can not only improve the efficiency of the thermal power plant in the process of risk assessment, but also analyze the main threats in the system to facilitate timely maintenance and improvement of the power plant.

以上详细描述了本发明的较佳具体实施例。应当理解,本领域的普通技术人员无需创造性劳动就可以根据本发明的构思作出诸多修改和变化。因此,凡本技术领域中技术人员依本发明的构思在现有技术的基础上通过逻辑分析、推理或者有限的实验可以得到的技术方案,皆应在由权利要求书所确定的保护范围内。The preferred specific embodiments of the present invention have been described in detail above. It should be understood that those skilled in the art can make many modifications and changes according to the concept of the present invention without creative efforts. Therefore, all technical solutions that can be obtained by those skilled in the art based on the concept of the present invention through logical analysis, reasoning or limited experiments on the basis of the prior art shall be within the scope of protection defined by the claims.

Claims (6)

1. a kind of thermal power plant's control system Information Security Evaluation system based on SA-PSO-AHP characterized by comprising
Data input module, for obtaining the marking data to control system to be assessed;
Matrix builds module, and the threat assessment layering that the control system built using analytic hierarchy process (AHP) is prestored in the module is progressive The marking data of model, models coupling data input module input construct evaluating matrix;
Matrix correction module, for carrying out consistency judge to evaluating matrix, to the evaluating matrix benefit for being unsatisfactory for consistency criterion Consistent correction is carried out with simulated annealing optimization particle swarm algorithm;
Data outputting module, for obtaining this control system of power plant threat sequercing using the algorithm of level point, in conjunction with threat frequency Obtain synthetic threat scoring.
2. thermal power plant's control system Information Security Evaluation system according to claim 1 based on SA-PSO-AHP, special Sign is, specifically executes following steps in the matrix correction module:
S1, initializing set, setting population n, initial position and speed, setting annealing coefficient α and starting temperature are carried out to particle Spend T;
S2, the new position of this particle is obtained by the current Position And Velocity of particle;
S3, judge whether the number of iterations is less than regulation the number of iterations, if so, thening follow the steps S4;If it is not, then sentencing revised Disconnected matrix data is transmitted to data outputting module;
S4, particle adaptive value is calculated, if it is suitable to update current particle better than original individual extreme value pbest for the adaptive value of particle It should be worth for pbest, then updating current particle adaptive value is pbest, and global extremum gbest is according to particle individual extreme value pbest It finds, the position and speed of more new particle;If it is not, thening follow the steps S2;
S5, the adaptive value variation delta E for calculating two positions of particle after current particle and update;If Δ E≤0 meets exp (- Δ E/T) > rand (0,1), then receive updated value and execute cooling, T value is updated to α T;Otherwise updated value is rejected, is held Row step S2.
3. thermal power plant's control system Information Security Evaluation system according to claim 1 based on SA-PSO-AHP, special Sign is that the threat assessment hierarchical structure includes objective result layer, judges rule layer and threaten element layer, wherein is judged Rule layer includes:
The influence to the confidentiality of system is threatened, including equipment or software are controlled or destroyed, remote maintenance port is unauthorized Ground use, the brute force attack of password, software back door or Backdoor Software, Malware and network is connected devices to without permission;
The influence to the availability of system is threatened, brute force attack including password, irrelevantly configuration and operation, Denial of Service attack It hits, long-range flooding and remote document access;
The influence to the integrality of system is threatened, including equipment or software are controlled or destroyed, remote maintenance port is unauthorized Ground use, Malware, Denial of Service attack, long-range flooding and overload.
4. thermal power plant's control system Information Security Evaluation system according to claim 1 based on SA-PSO-AHP, special Sign is, in the matrix correction module, as CR < 0.1 or λmaxWhen=n, CI=0, then judgment matrix approach, which reaches, wants It asks, wherein CR is consistency check coefficient;CI is coincident indicator, as CI=0, there is complete consistency;CI close to 0, There is satisfied consistency;CI is bigger, inconsistent more serious;λmaxFor judgment matrix maximum eigenvalue, n is judgment matrix order.
5. thermal power plant's control system Information Security Evaluation system according to claim 1 based on SA-PSO-AHP, special Sign is that the acceleration factor of the simulated annealing optimization particle swarm algorithm is 1.49445, and evolution number is 200, population scale It is 20, weight coefficient section is [0.4,0.9], and speed interval is [- 1,1], and position section is [1/9,9], and initial temperature is 1000, annealing coefficient 0.9.
6. thermal power plant's control system Information Security Evaluation system according to claim 1 based on SA-PSO-AHP, special Sign is, synthetic threat scores the calculation expression of Ta are as follows:
Wherein, ωPiThe global weight threatened for i-th, TPiThe occurrence frequency threatened for i-th.
CN201910676756.0A 2019-07-25 2019-07-25 Thermal power plant's control system Information Security Evaluation system based on SA-PSO-AHP Pending CN110472839A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910676756.0A CN110472839A (en) 2019-07-25 2019-07-25 Thermal power plant's control system Information Security Evaluation system based on SA-PSO-AHP

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910676756.0A CN110472839A (en) 2019-07-25 2019-07-25 Thermal power plant's control system Information Security Evaluation system based on SA-PSO-AHP

Publications (1)

Publication Number Publication Date
CN110472839A true CN110472839A (en) 2019-11-19

Family

ID=68509293

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910676756.0A Pending CN110472839A (en) 2019-07-25 2019-07-25 Thermal power plant's control system Information Security Evaluation system based on SA-PSO-AHP

Country Status (1)

Country Link
CN (1) CN110472839A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112070404A (en) * 2020-09-10 2020-12-11 广东韶钢松山股份有限公司 Evaluation method and device for cost performance of injected coal, electronic equipment and storage medium
CN113486337A (en) * 2021-06-18 2021-10-08 北京电子科技学院 Network security situation element identification system and method based on particle swarm optimization
CN113535573A (en) * 2021-07-26 2021-10-22 北京计算机技术及应用研究所 GOMS model improvement-based software availability quantitative evaluation method
CN116345495A (en) * 2023-04-03 2023-06-27 华能山东发电有限公司烟台发电厂 Power plant unit frequency modulation optimization method based on data analysis and modeling
CN117350615A (en) * 2023-09-18 2024-01-05 嘉兴环洋电商物流服务有限公司 International logistics track tracking system and method
CN117952592A (en) * 2024-01-30 2024-04-30 长峡数字能源科技(湖北)有限公司 Intelligent management method for charging pile

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101950338A (en) * 2010-09-14 2011-01-19 中国科学院研究生院 Bug repair method based on hierarchical bug threat assessment
CN103268450A (en) * 2013-06-06 2013-08-28 成都浩博依科技有限公司 Mobile intelligent terminal system safety evaluation system model and method based on test
CN103400027A (en) * 2013-07-09 2013-11-20 贵州大学 Risk assessment algorithm for information system
CN109188907A (en) * 2018-09-14 2019-01-11 哈尔滨理工大学 A kind of genetic Annealing Particle Swarm Mixed Algorithm and its Control System of Stable Platform applied to Control System of Stable Platform
CN109245944A (en) * 2018-10-22 2019-01-18 西南石油大学 Network safety evaluation method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101950338A (en) * 2010-09-14 2011-01-19 中国科学院研究生院 Bug repair method based on hierarchical bug threat assessment
CN103268450A (en) * 2013-06-06 2013-08-28 成都浩博依科技有限公司 Mobile intelligent terminal system safety evaluation system model and method based on test
CN103400027A (en) * 2013-07-09 2013-11-20 贵州大学 Risk assessment algorithm for information system
CN109188907A (en) * 2018-09-14 2019-01-11 哈尔滨理工大学 A kind of genetic Annealing Particle Swarm Mixed Algorithm and its Control System of Stable Platform applied to Control System of Stable Platform
CN109245944A (en) * 2018-10-22 2019-01-18 西南石油大学 Network safety evaluation method and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112070404A (en) * 2020-09-10 2020-12-11 广东韶钢松山股份有限公司 Evaluation method and device for cost performance of injected coal, electronic equipment and storage medium
CN113486337A (en) * 2021-06-18 2021-10-08 北京电子科技学院 Network security situation element identification system and method based on particle swarm optimization
CN113535573A (en) * 2021-07-26 2021-10-22 北京计算机技术及应用研究所 GOMS model improvement-based software availability quantitative evaluation method
CN116345495A (en) * 2023-04-03 2023-06-27 华能山东发电有限公司烟台发电厂 Power plant unit frequency modulation optimization method based on data analysis and modeling
CN116345495B (en) * 2023-04-03 2023-10-10 华能山东发电有限公司烟台发电厂 Power plant unit frequency modulation optimization method based on data analysis and modeling
CN117350615A (en) * 2023-09-18 2024-01-05 嘉兴环洋电商物流服务有限公司 International logistics track tracking system and method
CN117350615B (en) * 2023-09-18 2024-04-19 嘉兴环洋电商物流服务有限公司 International logistics track tracking system and method
CN117952592A (en) * 2024-01-30 2024-04-30 长峡数字能源科技(湖北)有限公司 Intelligent management method for charging pile

Similar Documents

Publication Publication Date Title
CN110472839A (en) Thermal power plant&#39;s control system Information Security Evaluation system based on SA-PSO-AHP
CN112235283B (en) A network attack assessment method for power industrial control system based on vulnerability description attack graph
CN115801460B (en) Security risk assessment method for power distribution cyber-physical system considering network attack vulnerability
CN116911700B (en) Engineering safety and quality supervision method and system based on BIM and IOT
CN107491694B (en) A Method for Quantitatively Assessing Information Security Vulnerabilities of SCADA Systems
CN107819771A (en) A kind of Information Security Risk Assessment Methods and system based on assets dependence
CN108833416A (en) A SCADA system information security risk assessment method and system
CN111400890B (en) Attack-defense structure-based power grid upgrading method for resisting malicious data attack
CN110458463B (en) Electric power Internet of things security assessment method based on interval intuitive fuzzy decision
CN118509214B (en) An information security monitoring method and system based on industrial Internet
CN111614615A (en) A Quantitative Evaluation Method for Network Security of Substation Power Monitoring System
CN118095823A (en) A factor-correlated security risk assessment method for power Internet of Things
CN114493246A (en) Power information network node risk assessment method based on DW-Degree centrality
CN112184510B (en) Interactive teaching platform based on high in clouds
CN117763555A (en) Power distribution network data safety protection and evaluation method based on block chain
CN117332425A (en) Security risk prediction method, device, equipment and storage medium
CN119047728A (en) Electric power information physical system collaborative attack prediction method considering multiple coupling relations
CN117633787A (en) A security analysis method and system based on user behavior data
Bothos et al. Cybersecurity vulnerability and risk of industrial control systems
Zhang et al. Evaluation of Network Security State of Industrial Control System Based on BP Neural Network
Tang et al. Study on fuzzy AHP group decision-making method based on set-valued statistics
Wei et al. Integrated energy systems security assessment based on belief rule base model
Huo et al. A security situation assessment method based on support vector regression for power monitoring system
Liu et al. Vulnerability assessment for communication network of substation automation systems to cyber attack
CN114205117B (en) A security and stability control business risk assessment method considering network attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191119

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载