Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 455-459.

• Information Security • Previous Articles     Next Articles

Attack Detection Method for Electricity Information Collection System Based on Virtual Honeynet

CAO Kang-hua, DONG Wei-wei, WANG Jin-liang, ZHOU Lin, WANG Yong   

  1. (Shanghai University of Electric Power,College of Information and Technology,Shanghai 200000,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: The Advanced Measurement System (AMI) is the basis for smart grid systems to measure,collect,store,analyze and manipulate user-consumed data.The communication and data transfer requirements between consumers (smart meters) and utilities significantly reduce the security of AMI.The electricity information collection system uses a variety of communication methods,communication protocols and new intelligent collection terminals.Therefore,the network attacks faced by the electricity information collection system are extremely frequent.Since the system currently focuses on the uplink rate of the acquisition terminal and the connectivity of the communication channel,there is a lack of corresponding security protection measures.Aiming at the above problems,the deployment scheme of the virtual honeynet on the power information collection system was designed and implemented,which solves the problem of waste of traditional honeynet hardware resources.At the same time,the data control algorithm is designed to detect the data packet,which effectively solves the control problem of attack traffic.Finally,the penetration attack test was carried out,and the experimental results are analyzed by combining the three core functions of the honeynet,which show that the scheme can effectively detect the attack.

Key words: Electricity information collection system, Communication protocol, Network attacks, Security protection, Virtual honeynet

CLC Number: 

  • TP393.08
[5]FAISAL M A,AUNG Z,WILLIAMS J R,et al.Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid:A feasibility study[J].IEEESystems Journal,2015,9(1):31-44.
[6]WANG K,OUYANG Z,KRISHNAN R,et al.A game theory-based energy management system using price elasticity for smart grids[J].IEEE Transactions on Industrial Informatics,2015,11(6):1607-1616.
[7]YE F,QIAN Y,HU R Q.A security protocol for advanced metering infrastructure in smart grid[C]∥2014 IEEE Global Communications Conference.Austin,TX,USA:IEEE,2014:649-654.
[8]LIU N,ZHU C L,ZHANG J,et al.A key management scheme for secure communications of advanced metering infrastructure in smart grid[J].IEEE Transactions on Instrumentationand Measurement,2013,60(10):4746-4756.
[13]CONPOT ICS/SCADA honeypot[EB/OL].
[14]KOLTYS K,GAJEWSKI R.Shape:A honeypot for electric power substation[J].Journal of Telecommunications and Information Technology,2015(4):37-43.
[15]FAN W,FERNÁNDEZ D,DU Z.Versatile virtual honeynetmanagement framework[J].IET Information Security,2017,11(1):38-45.
[16]REN J,XU Y.A compartmental model to explore the interplay between virus epidemics and honeynet potency[J].Applied Mathematical Modelling,2018,59:86-99.
[17]SOKOL P,GAJDOŠ A.Prediction of Attacks Against Honeynet Based on Time Series Modeling[J].Applied Computational Intelligence and Mathematical Methods,2018,662:360-371.
[1] CHENG Qing-feng, LI Yu-ting, LI Xing-hua, JIANG Qi. Research on Application of Cryptography Technology for Edge Computing Environment [J]. Computer Science, 2020, 47(11): 10-18.
[2] DAI Hong-bin. Research on the Independence of the Communication Protocol Software in Automation [J]. Computer Science, 2013, 40(Z11): 68-72.
[3] CAO Li-feng,LI Zhong,CHEN Xing-yuan and FENG Yu. Method of Binding Secure Label to Data Object Based on XML [J]. Computer Science, 2013, 40(8): 124-128.
[4] . Research on Communication Protocol Fault-oriented Reliability Testing of Distributed Software [J]. Computer Science, 2012, 39(7): 132-134.
[5] . Overview of Wireless Sensor and Actor Networks [J]. Computer Science, 2012, 39(10): 21-25.
[6] LI Xiao-yan,MIAO Chang-yun. A Kind of Network Security Protocols and Verification [J]. Computer Science, 2011, 38(Z10): 87-88.
[7] . [J]. Computer Science, 2007, 34(1): 39-41.
[8] XIA Nai, LIN Zhi-Qiang,MAO Bing, XIE Li (National Laboratory for Novel Software Technology, Nanjing University,Nanjing 210093). [J]. Computer Science, 2006, 33(12): 1-5.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .