• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

考虑网络攻击漏洞的配电网信息物理系统安全风险评估方法

Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities.

作者信息

Zhou Buxiang, Sun Binjie, Zang Tianlei, Cai Yating, Wu Jiale, Luo Huan

机构信息

College of Electrical Engineering, Sichuan University, Chengdu 610065, China.

Intelligent Electric Power Grid Key Laboratory of Sichuan Province, Sichuan University, Chengdu 610065, China.

出版信息

Entropy (Basel). 2022 Dec 27;25(1):47. doi: 10.3390/e25010047.

DOI:10.3390/e25010047
PMID:36673188
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9858534/
Abstract

With the increasing digitalization and informatization of distribution network systems, distribution networks have gradually developed into distribution network cyber physical systems (CPS) which are deeply integrated with traditional power systems and cyber systems. However, at the same time, the network risk problems that the cyber systems face have also increased. Considering the possible cyber attack vulnerabilities in the distribution network CPS, a dynamic Bayesian network approach is proposed in this paper to quantitatively assess the security risk of the distribution network CPS. First, the Bayesian network model is constructed based on the structure of the distribution network and common vulnerability scoring system (CVSS). Second, a combination of the fuzzy analytic hierarchy process (FAHP) and entropy weight method is used to correct the selectivity of the attacker to strike the target when cyber attack vulnerabilities occur, and then after considering the defense resources of the system, the risk probability of the target nodes is obtained. Finally, the node loads and node risk rates are used to quantitatively assess the risk values that are applied to determine the risk level of the distribution network CPS, so that defense strategies can be given in advance to counter the adverse effects of cyber attack vulnerabilities.

摘要

随着配电网系统数字化和信息化程度的不断提高,配电网已逐渐发展成为与传统电力系统和网络系统深度融合的配电网信息物理系统(CPS)。然而,与此同时,网络系统面临的网络风险问题也有所增加。考虑到配电网CPS中可能存在的网络攻击漏洞,本文提出一种动态贝叶斯网络方法来定量评估配电网CPS的安全风险。首先,基于配电网结构和通用漏洞评分系统(CVSS)构建贝叶斯网络模型。其次,采用模糊层次分析法(FAHP)和熵权法相结合的方式,对网络攻击漏洞发生时攻击者打击目标的选择性进行修正,然后在考虑系统防御资源的情况下,得到目标节点的风险概率。最后,利用节点负荷和节点风险率对风险值进行定量评估,以确定配电网CPS的风险等级,从而提前给出防御策略,应对网络攻击漏洞带来的不利影响。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/36c7b512274f/entropy-25-00047-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/081c1950943b/entropy-25-00047-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/453920d31ae6/entropy-25-00047-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/c9d063d4e264/entropy-25-00047-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/ac086d00de28/entropy-25-00047-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/958377364c5e/entropy-25-00047-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/49573b40b5ac/entropy-25-00047-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/fa0759bbfd1f/entropy-25-00047-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/13b65fb1ff69/entropy-25-00047-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/a3edd334d213/entropy-25-00047-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/89b18faf86ac/entropy-25-00047-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/8f721c760266/entropy-25-00047-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/dec9387452cc/entropy-25-00047-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/95f6a2be3e0f/entropy-25-00047-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/4228e6525bae/entropy-25-00047-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/af4d9757f137/entropy-25-00047-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/24925d4edc82/entropy-25-00047-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/36c7b512274f/entropy-25-00047-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/081c1950943b/entropy-25-00047-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/453920d31ae6/entropy-25-00047-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/c9d063d4e264/entropy-25-00047-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/ac086d00de28/entropy-25-00047-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/958377364c5e/entropy-25-00047-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/49573b40b5ac/entropy-25-00047-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/fa0759bbfd1f/entropy-25-00047-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/13b65fb1ff69/entropy-25-00047-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/a3edd334d213/entropy-25-00047-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/89b18faf86ac/entropy-25-00047-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/8f721c760266/entropy-25-00047-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/dec9387452cc/entropy-25-00047-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/95f6a2be3e0f/entropy-25-00047-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/4228e6525bae/entropy-25-00047-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/af4d9757f137/entropy-25-00047-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/24925d4edc82/entropy-25-00047-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bd77/9858534/36c7b512274f/entropy-25-00047-g017.jpg

相似文献

1
Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities.考虑网络攻击漏洞的配电网信息物理系统安全风险评估方法
Entropy (Basel). 2022 Dec 27;25(1):47. doi: 10.3390/e25010047.
2
CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks.CANon:用于汽车控制器局域网的轻量级实用网络攻击检测
Sensors (Basel). 2022 Mar 29;22(7):2636. doi: 10.3390/s22072636.
3
Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).捍卫防御者:基于对抗学习的防御策略,用于网络物理系统 (CPS) 中的基于学习的安全方法。
Sensors (Basel). 2023 Jun 9;23(12):5459. doi: 10.3390/s23125459.
4
Security Control of Denial-of-Service Attacks in Cyber-Physical Systems Based on Dynamic Feedback.基于动态反馈的信息物理系统中拒绝服务攻击的安全控制
Comput Intell Neurosci. 2022 Jun 13;2022:5472137. doi: 10.1155/2022/5472137. eCollection 2022.
5
Cyber-physical systems security: Limitations, issues and future trends.网络物理系统安全:局限性、问题与未来趋势。
Microprocess Microsyst. 2020 Sep;77:103201. doi: 10.1016/j.micpro.2020.103201. Epub 2020 Jul 8.
6
Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.考虑合理性演化的针对网络攻击的保护资源分配优化的多阶段攻防图博弈分析
Risk Anal. 2022 May;42(5):1086-1105. doi: 10.1111/risa.13837. Epub 2021 Oct 11.
7
An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks.一种用于确保6G自动驾驶汽车网络中安全通信的智能动态信息物理系统威胁检测系统。
Sci Rep. 2024 Sep 5;14(1):20795. doi: 10.1038/s41598-024-70835-3.
8
Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.对抗性风险分析,为保护网络物理系统免受网络攻击分配最优防御资源。
Risk Anal. 2019 Dec;39(12):2766-2785. doi: 10.1111/risa.13382. Epub 2019 Jul 30.
9
Robustness of Cyber-Physical Supply Networks in Cascading Failures.级联故障下信息物理供应链网络的鲁棒性
Entropy (Basel). 2021 Jun 18;23(6):769. doi: 10.3390/e23060769.
10
Cyber-Physical Vulnerability Assessment in Smart Grids Based on Multilayer Complex Networks.基于多层复杂网络的智能电网网络-物理漏洞评估。
Sensors (Basel). 2021 Aug 30;21(17):5826. doi: 10.3390/s21175826.

引用本文的文献

1
Bilateral Matching Method for Business Resources Based on Synergy Effects and Incomplete Data.基于协同效应和不完全数据的商业资源双边匹配方法
Entropy (Basel). 2024 Aug 6;26(8):669. doi: 10.3390/e26080669.

本文引用的文献

1
Capture and Prediction of Rainfall-Induced Landslide Warning Signals Using an Attention-Based Temporal Convolutional Neural Network and Entropy Weight Methods.基于注意力的时间卷积神经网络和熵权法对降雨诱发滑坡预警信号的捕捉与预测
Sensors (Basel). 2022 Aug 19;22(16):6240. doi: 10.3390/s22166240.