用户名: 密码: 验证码:
基于SA-PSO-AHP的火电厂控制系统信息安全威胁评估
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Assessment on the Threat to the Information Security of Power Plant Control System Based on SA-PSO-AHP Method
  • 作者:段旭晨 ; 彭道刚 ; 姚峻 ; 赵慧荣 ; 夏飞
  • 英文作者:DUAN Xuchen;PENG Daogang;YAO Jun;ZHAO Huirong;XIA Fei;School of Automation Engineering, Shanghai University of Electric Power;Shanghai Minghua Power Science & Technology Co., Ltd.;
  • 关键词:火电厂控制系统 ; 层次分析 ; 模拟退火 ; 粒子群 ; 一致性修正 ; 威胁评估
  • 英文关键词:control system of thermal power plant;;analytic hierarchy process;;simulated annealing;;particle swarm optimization;;consistency correction;;threat assessment
  • 中文刊名:ZGDL
  • 英文刊名:Electric Power
  • 机构:上海电力大学自动化工程学院;上海明华电力科技有限公司;
  • 出版日期:2019-05-09 16:21
  • 出版单位:中国电力
  • 年:2019
  • 期:v.52;No.606
  • 基金:上海市“科技创新行动计划”高新技术领域项目(18511105700,18511105800);; 上海市科学技术委员会工程技术研究中心项目(14DZ2251100)~~
  • 语种:中文;
  • 页:ZGDL201905004
  • 页数:7
  • CN:05
  • ISSN:11-3265/TM
  • 分类号:35-41
摘要
火电厂控制系统信息安全问题形势严峻,针对某电厂的信息安全测评,利用层次分析法建立分层递进分析模型,通过模拟退火算法改进粒子群的方法解决判断矩阵一致性问题,可以有效解决信息安全威胁评估中存在的主观性强和不确定性的弊端,对火电厂控制系统的应用表明,该方法既能够充分反映评判要素及过程的模糊性,也可以减少个人主观因素带来的影响,能够较好地得出评价结果。
        Due to the severe situation of information security in power plant control system, based on the information security evaluation of a power plant, a hierarchical progressive analysis model is established by using analytic hierarchy process(AHP)model. And then the consistency problem of judgment matrix is solved through the enhancement of particle swarm optimization(PSO) method in combination with simulated annealing(SA) algorithm, which can effectively overcome the drawbacks such as strong subjectivity and uncertainties in the current information security threat assessment. The practice in the thermal plant shows that this method can not only fully demonstrate the application of the fuzziness of the evaluation elements and processes, but also reduce the impact of individual subjective factors such that satisfactory evaluation results can be achieved.
引文
[1]冯涛,鲁晔,方君丽.工业以太网协议脆弱性与安全防护技术综述[J].通信学报,2017, 38(增刊2):185-196.FENG Tao, LU Ye, FANG Junli. Research on vulnerability andsecurity technology of industrial ethernet protocol[J]. Journal on Communications, 2017, 38(S2):185-196.
    [2] CHEN T M. Stuxnet,the real start of cyber warfare?[J]. IEEE Network,2010, 24(6):2-3.
    [3]邹春明,郑志千,刘智勇,等.电力二次安全防护技术在工业控制系统中的应用[J].电网技术,2013, 37(11):3227-3232.ZOU Chunming, ZHENG Zhiqian, LIU Zhiyong, et al. Application of cyber security in industrial control systems based on security protection technology for electrical secondary system[J]. Power System Technology, 2013, 37(11):3227-3232.
    [4]周慎学,范渊,夏克晁,等.台二电厂工控系统信息安全防护体系的建设[J].中国电力,2017, 50(8):53-57.ZHOU Shenxue, FAN Yuan, XIA Kechao, et al. Construction of information security system for industrial control system in Taizhou2nd power plant[J]. Electric Power, 2017, 50(8):53-57.
    [5]王睿喆,张建华,刘文霞.基于电力系统风险评估的灾害预警量化算法[J].南方电网技术,2015, 9(5):53-58.WANG Ruizhe, ZHANG Jianhua, LIU Wenxia. A quantitative algorithm of disaster warning based on risk assessment of power system[J]. Southern Power System Technology, 2015, 9(5):53-58.
    [6]王锦,潘恒.基于相似云的网络安全风险评估[J].中原工学院学报,2018,29(1):67-71.WANG Jin, PAN Heng. Network risk assessment based on the similar cloud[J]. Journal of Zhongyuan University of Technology,2018, 29(1):67-71.
    [7]王滔,管霖.基于概率风险评估的直流输电系统短时检修安排[J].中国电力,2015, 48(5):27-30.WANG Tao, GUAN Lin. Short-time maintenance schedule of transmission systems based on probabilistic risk assessment[J].Electric Power,2015, 48(5):27-30.
    [8]石文辉,别朝红,王锡凡.大型电力系统可靠性评估中的马尔可夫链蒙特卡洛方法[J].中国电机工程学报,2008, 28(4):9-15.SHI Wenhui, BIE Zhaohong, WANG Xifan. Applications of Markov chain Monte Carlo in large-scale system reliability evaluation[J].Proceedings of the CSEE, 2008, 28(4):9-15.
    [9]陈晞,谢茂清,高琪瑞.基于模糊推理的电厂设备通用型故障诊断系统研究[J].中国电力,2003, 36(5):72-75.CHEN Xi, XIE Maoqing, GAO Qirui. Research of general power plant equipment fault diagnosis system based on fuzzy inference[J].Electric Power,2003, 36(5):72-75.
    [10]李国庆,翟晓娟.基于层次分析法的孤立微电网多目标优化运行[J].电力系统保护与控制,2018, 46(10):17-23.LI Guoqing, ZHAI Xiaojuan. Multi-obiective optimal operation of isolated micro-grid based on analytic hierarchy process[J]. Power System Protection and Control,2018, 46(10):17-23.
    [11]韩霞,郭易鑫,王晖南,等.基于AHP的电力运行信息安全管理风险评估的研究[J].国外电子测量技术,2018, 37(5):32-37.HAN Xian GUO Yixin WANG Huinan, et al. Study on the risk assessment of power operation information security management based on AHP[J]. Foreign Electronic Measurement Technology,2018, 37(5):32-37.
    [12]王羽佳,李华强,刘沛清,等.基于改进DEAHP模型的支路综合脆弱性评估方法[J].电网技术,2016, 40(4):1249-1256.WANG Yujia, LI Huaqiang, LIU Peiqing, et al. A Branch comprehensive vulnerability assessment method based on improved DEAHP modle[J]. Power System Technology,2016,40(4):1249-1256.
    [13]沐连顺,张鹏,杨赛霓,等.国外电力企业风险管理典型案例及其启示[J].中国电力,2012, 45(5):91-96.MU Lianshun, ZHANG Peng, YANG Saini, et al. Typical cases of foreign electricity enterprise risk management[J]. Electric Power,2012, 45(5):91-96.
    [14]龚钢军,高爽,陆俊,等.地市级区域能源互联网安全可信防护体系研究[J].中国电机工程学报,2018, 38(10):2861-2873.GONG Gangjun, GAO Shuang, LU Jun, et al. Study on secure trusted protection architecture for prefecture-level regional energy internet[J]. Proceedings of the CSEE, 2018, 38(10):2861-2873.
    [15]黄家辉,冯冬芹,王虹鉴.基于攻击图的工控系统脆弱性量化方法[J].自动化学报,2016, 42(5):792-798.HUANG Jiahui, FENG Dongqin, WNAG Hongjian. A method for quantifying vulnerability of industrial control system based on attack graph[J]. Acta Automatica Sinica,2016, 42(5):792-798.
    [16]李佳玮,郝悍勇,李宁辉.工业控制系统信息安全防护[J].中国电力,2015, 48(10):139-143.LI Jiawei HAO Hanyong, LI Ninghui. Research on information security protection of industrial control system[J]. Electric Power,2015,48(10):139-143.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700