期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
变电站过程层与SMV安全传输的网络攻击检测与取证设计 被引量:20
1
作者 侯连全 章坚民 +3 位作者 金乃正 李勇 朱玛 张亮 《电力系统自动化》 EI CSCD 北大核心 2016年第17期87-92,155,共7页
提出了现有条件下变电站过程层与采样测量值(SMV)安全传输的网络攻击检测与取证策略;设计了SMV数字签名验证、媒体访问控制(MAC)地址异常、SMV不良数据、数据包逻辑检测、数据流量阀值异常、一次故障相似、网络攻击相似、上送SMV伪造、... 提出了现有条件下变电站过程层与采样测量值(SMV)安全传输的网络攻击检测与取证策略;设计了SMV数字签名验证、媒体访问控制(MAC)地址异常、SMV不良数据、数据包逻辑检测、数据流量阀值异常、一次故障相似、网络攻击相似、上送SMV伪造、上送SMV篡改等9种异常指示器,用于过程层及SMV变电站内及调控中心间传输的网络攻击在线检测、取证和监视。鉴于目前间隔装置尚无SMV报文认证及网络攻击检测功能,探索了代理认证加密网关以及代理检测的可行性。 展开更多
关键词 采样测量值 网络攻击检测 网络攻击取证 代理认证加密网关 代理检测
下载PDF
基于集员滤波的自动发电控制系统虚假数据注入攻击检测 被引量:10
2
作者 吴英俊 汝英涛 +3 位作者 刘锦涛 施展宇 顾松 倪明 《电力系统自动化》 EI CSCD 北大核心 2022年第1期33-41,共9页
随着先进通信与信息技术的广泛应用,虚假数据注入攻击已成为威胁自动发电控制系统安全的重要因素之一。网络攻击的检测是防御的首要任务,文中提出了一种基于集员滤波的自动发电控制系统虚假数据注入攻击检测方法。首先,针对自动发电控... 随着先进通信与信息技术的广泛应用,虚假数据注入攻击已成为威胁自动发电控制系统安全的重要因素之一。网络攻击的检测是防御的首要任务,文中提出了一种基于集员滤波的自动发电控制系统虚假数据注入攻击检测方法。首先,针对自动发电控制系统中虚假数据注入攻击的影响进行了分析,并建立了互联电网自动发电控制系统模型以及虚假数据注入攻击的模型。其次,基于实时自动发电控制系统的控制指令以及测量数据,对自动发电控制系统椭球集进行预测更新和测量更新,通过判断预测更新椭球集与测量更新椭球集之间是否存在交集,检测系统的数据传输中可能存在的虚假数据注入攻击。最后,在IEEE标准双区域互联电网中验证了所提方法的有效性。 展开更多
关键词 虚假数据注入攻击 自动发电控制 集员滤波 网络攻击检测
下载PDF
A Two-stage Kalman Filter for Cyber-attack Detection in Automatic Generation Control System 被引量:6
3
作者 Ayyarao S.L.V.Tummala Ravi Kiran Inapakurthi 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2022年第1期50-59,共10页
Communication plays a vital role in incorporating smartness into the interconnected power system.However,historical records prove that the data transfer has always been vulnerable to cyber-attacks.Unless these cyber-a... Communication plays a vital role in incorporating smartness into the interconnected power system.However,historical records prove that the data transfer has always been vulnerable to cyber-attacks.Unless these cyber-attacks are identified and cordoned off,they may lead to black-out and result in national security issues.This paper proposes an optimal two-stage Kalman filter(OTS-KF)for simultaneous state and cyber-attack estimation in automatic generation control(AGC)system.Biases/cyber-attacks are modeled as unknown inputs in the AGC dynamics.Five types of cyber-attacks,i.e.,false data injection(FDI),data replay attack,denial of service(DoS),scaling,and ramp attacks,are injected into the measurements and estimated using OTS-KF.As the load variations of each area are seldom available,OTS-KF is reformulated to estimate the states and outliers along with the load variations of the system.The proposed technique is validated on the benchmark two-area,three-area,and five-area power system models.The simulation results under various test conditions demonstrate the efficacy of the proposed filter. 展开更多
关键词 cyber-security automatic generation control(AGC) load frequency control false data injection cyber-attack detection
原文传递
Active resilient defense control against false data injection attacks in smart grids
4
作者 Xiaoyuan Luo Lingjie Hou +3 位作者 Xinyu Wang Ruiyang Gao Shuzheng Wang Xinping Guan 《Control Theory and Technology》 EI CSCD 2023年第4期515-529,共15页
The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defe... The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defense control scheme based on interval observer detection is proposed in this paper to protect smart grids.The proposed active defense highlights the integration of detection and defense against FDIAs in smart girds.First,a dynamic physical grid model under FDIAs is modeled,in which model uncertainty and parameter uncertainty are taken into account.Then,an interval observer-based detection method against FDIAs is proposed,where a detection criteria using interval residual is put forward.Corresponding to the detection results,the resilient defense controller is triggered to defense the FDIAs if the system states are affected by FDIAs.Linear matrix inequality(LMI)approach is applied to design the resilient controller with H_(∞)performance.The system with the resilient defense controller can be robust to FDIAs and the gain of the resilient controller has a certain gain margin.Our active resilient defense approach can be built in real time and show accurate and quick respond to the injected FDIAs.The effectiveness of the proposed defense scheme is verified by the simulation results on an IEEE 30-bus grid system. 展开更多
关键词 Active resilient defense attack detection cyber attacks cyber-attack detection cyber grid elements cyber threat False data injection attack Smart grids security Interval observer
原文传递
Cyber-attack Detection Strategy Based on Distribution System State Estimation 被引量:3
5
作者 Huan Long Zhi Wu +3 位作者 Chen Fang Wei Gu Xinchi Wei Huiyu Zhan 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2020年第4期669-678,共10页
Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system.This paper proposes a cyber-attack detection strategy based on distribution system s... Cyber-attacks that tamper with measurement information threaten the security of state estimation for the current distribution system.This paper proposes a cyber-attack detection strategy based on distribution system state estimation(DSSE).The uncertainty of the distribution network is represented by the interval of each state variable.A three-phase interval DSSE model is proposed to construct the interval of each state variable.An improved iterative algorithm(IIA)is developed to solve the interval DSSE model and to obtain the lower and upper bounds of the interval.A cyber-attack is detected when the value of the state variable estimated by the traditional DSSE is out of the corresponding interval determined by the interval DSSE.To validate the proposed cyber-attack detection strategy,the basic principle of the cyber-attack is studied,and its general model is formulated.The proposed cyber-attack model and detection strategy are conducted on the IEEE 33-bus and 123-bus systems.Comparative experiments of the proposed IIA,Monte Carlo simulation algorithm,and interval Gauss elimination algorithm prove the validation of the proposed method. 展开更多
关键词 cyber-attack detection distribution network interval state estimation distribution system state estimation cyber-attack model
原文传递
Data Mining Based Cyber-Attack Detection
6
作者 TIANFIELD Huaglory 《系统仿真技术》 2017年第2期90-104,共15页
Detecting cyber-attacks undoubtedly has become a big data problem. This paper presents a tutorial on data mining based cyber-attack detection. First,a data driven defence framework is presented in terms of cyber secur... Detecting cyber-attacks undoubtedly has become a big data problem. This paper presents a tutorial on data mining based cyber-attack detection. First,a data driven defence framework is presented in terms of cyber security situational awareness. Then, the process of data mining based cyber-attack detection is discussed. Next,a multi-loop learning architecture is presented for data mining based cyber-attack detection. Finally,common data mining techniques for cyber-attack detection are discussed. 展开更多
关键词 big data analytics cyber-attack detection cyber security cyber situational awareness data mining pattern mining machine learning
下载PDF
An Algebraic Detection Approach for Control Systems under Multiple Stochastic Cyber-attacks 被引量:2
7
作者 Yumei Li Holger Voos +1 位作者 Mohamed Darouach Changchun Hua 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第3期258-266,共9页
In order to compromise a target control system successfully, hackers possibly attempt to launch multiple cyberattacks aiming at multiple communication channels of the control system. However, the problem of detecting ... In order to compromise a target control system successfully, hackers possibly attempt to launch multiple cyberattacks aiming at multiple communication channels of the control system. However, the problem of detecting multiple cyber-attacks has been hardly investigated so far. Therefore, this paper deals with the detection of multiple stochastic cyber-attacks aiming at multiple communication channels of a control system. Our goal is to design a detector for the control system under multiple cyberattacks. Based on frequency-domain transformation technique and auxiliary detection tools, an algebraic detection approach is proposed. By applying the presented approach, residual information caused by different attacks is obtained respectively and anomalies in the control system are detected. Sufficient and necessary conditions guaranteeing the detectability of the multiple stochastic cyber-attacks are obtained. The presented detection approach is simple and straightforward. Finally, two simulation examples are provided, and the simulation results show that the detection approach is effective and feasible. © 2014 Chinese Association of Automation. 展开更多
关键词 ALGEBRA Communication channels (information theory) Control systems CRIME Frequency domain analysis Personal computing Stochastic systems
下载PDF
Blockchain‑oriented approach for detecting cyber‑attack transactions
8
作者 Zhiqi Feng Yongli Li Xiaochen Ma 《Financial Innovation》 2023年第1期2190-2227,共38页
With the high-speed development of decentralized applications,account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value.Financial secu... With the high-speed development of decentralized applications,account-based blockchain platforms have become a hotbed of various financial scams and hacks due to their anonymity and high financial value.Financial security has become a top priority with the sustainable development of blockchain-based platforms because of an increasing number of cyber attacks,which have resulted in a huge loss of crypto assets in recent years.Therefore,it is imperative to study the real-time detection of cyber attacks to facilitate effective supervision and regulation.To this end,this paper proposes the weighted and extended isolation forest algorithms and designs a novel framework for the real-time detection of cyber-attack transactions by thoroughly studying and summarizing real-world examples.Furthermore,this study develops a new detection approach for locating the compromised address of a cyber attack to resolve the data scarcity of hack addresses and reduce time consumption.Moreover,three experiments are carried out not only to apply on different types of cyber attacks but also to compare the proposed approach with the widely used existing methods.The results demonstrate the high efficiency and generality of the proposed approach.Finally,the lower time consumption and robustness of our method were validated through additional experiments.In conclusion,the proposed blockchain-oriented approach in this study can handle real-time detection of cyber attacks and has significant scope for applications. 展开更多
关键词 Blockchain cyber-attack detection Extended isolation forest Decentralized application Financial security Fintech
下载PDF
Cyber-Attack Detection for Autonomous Driving Using Vehicle Dynamic State Estimation 被引量:1
9
作者 Dong Zhang Chen Lv +1 位作者 Tianci Yang Peng Hang 《Automotive Innovation》 EI CSCD 2021年第3期262-273,共12页
As intelligent vehicles become increasingly computerized and networked,they gain more autonomous capabilities.However,they are also becoming more exposed to cyber-threats which are likely to be a more prominent concer... As intelligent vehicles become increasingly computerized and networked,they gain more autonomous capabilities.However,they are also becoming more exposed to cyber-threats which are likely to be a more prominent concern.This paper proposes a cyber-attack detection method for autonomous vehicles based on secure estimation of vehicle states,with an example application under attacks in the vehicle localization system.To investigate the effects of vehicle model and estimator on the attack detection performance,different nonlinear vehicle dynamic models and estimation approaches are employed.The deviation between the measurement from the onboard sensors and the state estimation is monitored in real time.With the designed vehicle state estimator and preset threshold,the cyber-attack detection algorithm is further developed for autonomous vehicles,whose performance is tested in simulations where the vehicle localization system is assumed to be compromised during a double lane change maneuver.The test results demonstrate the feasibility and effectiveness of the proposed cyber-attack algorithm.In addition,the results illustrate the impacts of vehicle nonlinear characteristics on the cyber-attack detection performance.Beyond this,the effects of different vehicle models on the attack detection performance,as well as the selection of suitable filtering approaches for the attack detection,are also discussed. 展开更多
关键词 Autonomous vehicle State estimation Vehicle dynamics cyber-attack detection
原文传递
基于改进隐马尔可夫模型的网络攻击检测方法 被引量:22
10
作者 杨晓峰 孙明明 +1 位作者 胡雪蕾 杨静宇 《通信学报》 EI CSCD 北大核心 2010年第3期95-101,共7页
提出了一种基于改进隐马尔可夫模型的网络攻击检测方法。正常的网络行为符合一定的语法规则,异常的行为会偏离正常的语法规则。通过对正常行为样本的学习得到的基于隐马尔可夫模型的语法可以根据网络行为和语法的符合程度有效地检测正... 提出了一种基于改进隐马尔可夫模型的网络攻击检测方法。正常的网络行为符合一定的语法规则,异常的行为会偏离正常的语法规则。通过对正常行为样本的学习得到的基于隐马尔可夫模型的语法可以根据网络行为和语法的符合程度有效地检测正常行为和攻击行为。在基于现实数据的实验测试中,得到了比较好的检测性能。 展开更多
关键词 网络安全 网络攻击 入侵检测 隐马尔可夫模型 语法推断
下载PDF
基于机器学习的网络攻击检测与防御方法研究 被引量:1
11
作者 李永娜 张锐 《信息与电脑》 2024年第1期177-179,共3页
传统的网络攻击检测与防御方法存在求解精度低、收敛速度慢、易陷入局部最优解等问题。为提升网络安全技术水平、应对日益突出的非法网络数据攻击现象,文章将提出基于机器学习的网络攻击检测与防御方法,测试模型的性能,结果表明新方法... 传统的网络攻击检测与防御方法存在求解精度低、收敛速度慢、易陷入局部最优解等问题。为提升网络安全技术水平、应对日益突出的非法网络数据攻击现象,文章将提出基于机器学习的网络攻击检测与防御方法,测试模型的性能,结果表明新方法的网络攻击检测与防御效果均显著优于传统方法,具有更好的安全防御效果。 展开更多
关键词 机器学习 支持向量机 网络安全 网络攻击检测 网络攻击防御
下载PDF
Distribution system state estimation: an overview of recent developments 被引量:5
12
作者 Gang WANG Georgios B.GIANNAKIS +1 位作者 Jie CHEN Jian SUN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第1期4-17,共14页
In the envisioned smart grid, high penetration of uncertain renewables, unpredictable participation of(industrial) customers, and purposeful manipulation of smart meter readings, all highlight the need for accurate,fa... In the envisioned smart grid, high penetration of uncertain renewables, unpredictable participation of(industrial) customers, and purposeful manipulation of smart meter readings, all highlight the need for accurate,fast, and robust power system state estimation(PSSE). Nonetheless, most real-time data available in the current and upcoming transmission/distribution systems are nonlinear in power system states(i.e., nodal voltage phasors).Scalable approaches to dealing with PSSE tasks undergo a paradigm shift toward addressing the unique modeling and computational challenges associated with those nonlinear measurements. In this study, we provide a contemporary overview of PSSE and describe the current state of the art in the nonlinear weighted least-squares and least-absolutevalue PSSE. To benchmark the performance of unbiased estimators, the Cramér-Rao lower bound is developed.Accounting for cyber attacks, new corruption models are introduced, and robust PSSE approaches are outlined as well. Finally, distribution system state estimation is discussed along with its current challenges. Simulation tests corroborate the effectiveness of the developed algorithms as well as the practical merits of the theory. 展开更多
关键词 State estimation Cramér-Rao BOUND Feasible point PURSUIT SEMIDEFINITE relaxation PROXIMAL linear algorithm Composite optimization cyber attack BAD data detection
原文传递
核电厂智能设备的网络安全防护设计 被引量:6
13
作者 王萍 《自动化仪表》 CAS 2021年第S01期314-318,共5页
在核电厂数字化控制系统不断采用新技术新平台的背景下,智能设备基于其自身技术优势,取代传统设备进行核电厂(NPP)操作和检测的需求越来越强烈。然而,核智能设备带来的网络安全风险等因素制约了其在核电厂的规模化使用。对NPP智能设备... 在核电厂数字化控制系统不断采用新技术新平台的背景下,智能设备基于其自身技术优势,取代传统设备进行核电厂(NPP)操作和检测的需求越来越强烈。然而,核智能设备带来的网络安全风险等因素制约了其在核电厂的规模化使用。对NPP智能设备的网络风险及防御的深入研究,对NPP的安全稳定运行有着重大的意义。通过对NPP智能设备设计原理及网络接口进行研究,并依据风险评估方法,诊断并报告NPP智能设备在管理和技术方面存在的漏洞及现状。同时,对智能设备的各个网络风险点及网络攻击过程进行了调查和分析,从而提出了智能设备应对网络攻击的完备防护策略。提出了一种适用于核电厂智能设备的纵深防御的网络安全防御体系,能够构建多层次的防御框架,设计多维度的攻防应对措施以及检测手段。经过攻防预演验证和采用大数据进行取证,所设计的智能设备的网络安全防御体系能有效应对各种新型网络攻击,同时对NPP的信息安全防御研究有借鉴和指导意义。 展开更多
关键词 核电厂 智能设备 风险评估 网络攻击 防护策略 纵深防御 多维度检测 网络安全设计
下载PDF
网络空间安全与人工智能研究综述 被引量:6
14
作者 隋然 《信息工程大学学报》 2021年第5期584-589,共6页
网络空间安全与人工智能间存在广泛的研究结合点。一方面,人工智能技术成为网络空间安全技术难题的重要解决手段,越来越多的研究基于人工智能去构建恶意代码分类、入侵检测以及网络态势感知的智能模型。另一方面,人工智能技术本身具有... 网络空间安全与人工智能间存在广泛的研究结合点。一方面,人工智能技术成为网络空间安全技术难题的重要解决手段,越来越多的研究基于人工智能去构建恶意代码分类、入侵检测以及网络态势感知的智能模型。另一方面,人工智能技术本身具有一定脆弱性,带来诸如对抗样本攻击等新的漏洞。人工智能模型需要先进的网络安全防御技术来抵御对抗性机器学习攻击,保护机器学习中的隐私数据,构建安全的联合学习模型。综述了网络空间安全与人工智能研究的契合点。首先,总结了在使用人工智能对抗网络攻击方面的现有研究成果,包括采用传统的机器学习方法和现有的深度学习解决方案。然后,分析了人工智能模型自身可能遭受的攻击,并对相应的防御方法进行了分类。 展开更多
关键词 网络空间安全 人工智能 网络攻防 入侵检测
下载PDF
基于马尔科夫模型的分布式电网CPS网络攻击动态检测 被引量:4
15
作者 常杰 刘硕 郭禹伶 《河北电力技术》 2022年第1期20-22,共3页
传统信息物理系统(cyber physical systems, CPS)网络攻击检测方法存在隐性攻击因子漏检的情况。为此引进马尔科夫模型,设计一种针对分布式电网CPS网络攻击的动态检测方法。考虑到分布式电力资源属于隐性资源,因此要在马尔科夫模型的应... 传统信息物理系统(cyber physical systems, CPS)网络攻击检测方法存在隐性攻击因子漏检的情况。为此引进马尔科夫模型,设计一种针对分布式电网CPS网络攻击的动态检测方法。考虑到分布式电力资源属于隐性资源,因此要在马尔科夫模型的应用下,对隐性参数进行提取,并利用模型的统计功能,对攻击因子进行总结与归纳。同时,绘制CPS网络攻击因子概念模型图,以此为参照,描述CPS网络攻击下分布式电网运行,并结合攻击的可检测性,定位不同CPS网络攻击因子的入口。此外,通过对比实验证明,设计的检测方法可以准确地检测不同类型CPS网络攻击因子,平均检测准确率可高达96.0%。 展开更多
关键词 分布式电网 马尔科夫模型 CPS网络攻击 动态检测方法
下载PDF
一种新的网络攻击检测方法 被引量:3
16
作者 赵攀 江宇波 邱玲 《四川理工学院学报(自然科学版)》 CAS 2014年第4期21-23,33,共4页
为了有效判断网络数据包是否存在被攻击的可能性,在以往的研究基础上提出了一种新的检测算法DMPSO。该算法根据数据包属性的离散度定义了状态检测指标,并利用粒子群优化方法给出了标准差分布的计算流程,以此判断数据包的异常状况。最后... 为了有效判断网络数据包是否存在被攻击的可能性,在以往的研究基础上提出了一种新的检测算法DMPSO。该算法根据数据包属性的离散度定义了状态检测指标,并利用粒子群优化方法给出了标准差分布的计算流程,以此判断数据包的异常状况。最后,进行仿真实验,对比了与其它算法之间的性能状况,结果表明DMPSO具有较好的适应性。 展开更多
关键词 网络攻击 检测 变异算子 数据包 标准差 粒子群优化
下载PDF
网络空间安全实训设计
17
作者 李丽红 王君宇 +1 位作者 李敏 尤海鑫 《电脑知识与技术》 2021年第5期50-52,共3页
为保障网络空间安全,需要加强网络空间安全人才队伍建设,实训是把学生培养成为高素质复合型人才的重要手段。通过分析我国网络空间安全人才队伍建设现状,构建实训课程体系和实训平台,设计实训大纲和实训竞赛平台,形成了校企合作、教学... 为保障网络空间安全,需要加强网络空间安全人才队伍建设,实训是把学生培养成为高素质复合型人才的重要手段。通过分析我国网络空间安全人才队伍建设现状,构建实训课程体系和实训平台,设计实训大纲和实训竞赛平台,形成了校企合作、教学与竞赛相结合的实训体系。实践证明,此网络空间安全实训设计能有效提高学生的网络空间安全技术能力,具有一定的推广价值,为高校培养应用型、复合型人才提供了新思路。 展开更多
关键词 网络空间安全 实训大纲 实训竞赛平台 网络攻防 入侵检测
下载PDF
面向网络多源数据的模型嵌入方法
18
作者 李超鹏 邓浩江 王劲林 《网络新媒体技术》 2021年第2期18-22,共5页
随着网络规模的不断扩大,网络内部子网数量不断增加,各个子网之间网络行为差异越来越大。这导致了网络数据的多源问题。传统的网络安全检测模型难以有效覆盖全部子网的网络行为。针对数据多源问题,提出了模型嵌入方法。模型嵌入方法是... 随着网络规模的不断扩大,网络内部子网数量不断增加,各个子网之间网络行为差异越来越大。这导致了网络数据的多源问题。传统的网络安全检测模型难以有效覆盖全部子网的网络行为。针对数据多源问题,提出了模型嵌入方法。模型嵌入方法是通过针对各个子网独立构建局部模型得到局部特征,再通过全局模型对网络攻击进行检测。实验结果表明,模型嵌入方法相比于传统的数据编码方法,有着更好的攻击检测性能。 展开更多
关键词 多源数据 模型嵌入 攻击检测
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部