Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 455-459.

• Information Security • Previous Articles     Next Articles

Attack Detection Method for Electricity Information Collection System Based on Virtual Honeynet

CAO Kang-hua, DONG Wei-wei, WANG Jin-liang, ZHOU Lin, WANG Yong   

  1. (Shanghai University of Electric Power,College of Information and Technology,Shanghai 200000,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: The Advanced Measurement System (AMI) is the basis for smart grid systems to measure,collect,store,analyze and manipulate user-consumed data.The communication and data transfer requirements between consumers (smart meters) and utilities significantly reduce the security of AMI.The electricity information collection system uses a variety of communication methods,communication protocols and new intelligent collection terminals.Therefore,the network attacks faced by the electricity information collection system are extremely frequent.Since the system currently focuses on the uplink rate of the acquisition terminal and the connectivity of the communication channel,there is a lack of corresponding security protection measures.Aiming at the above problems,the deployment scheme of the virtual honeynet on the power information collection system was designed and implemented,which solves the problem of waste of traditional honeynet hardware resources.At the same time,the data control algorithm is designed to detect the data packet,which effectively solves the control problem of attack traffic.Finally,the penetration attack test was carried out,and the experimental results are analyzed by combining the three core functions of the honeynet,which show that the scheme can effectively detect the attack.

Key words: Electricity information collection system, Communication protocol, Network attacks, Security protection, Virtual honeynet

CLC Number: 

  • TP393.08
[1]赵兵,翟峰,李涛永,等.适用于智能电表双向互动系统的安全通信协议[J].电力系统自动化,2016,40(17):93-98.
[2]李敏,王刚,石磊,等.智能电网信息安全风险分析[J].华北电力技术,2017(1):62-65.
[3]李中伟,佟为明,金显吉.智能电网信息安全防御体系与信息安全测试系统构建乌克兰和以色列国家电网遭受网络攻击事件的思考与启示[J].电力系统自动化,2016,40(8):147-151.
[4]任天成.电力信息网络主动式风险预警系统开发研究[D].北京:华北电力大学,2015.
[5]FAISAL M A,AUNG Z,WILLIAMS J R,et al.Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid:A feasibility study[J].IEEESystems Journal,2015,9(1):31-44.
[6]WANG K,OUYANG Z,KRISHNAN R,et al.A game theory-based energy management system using price elasticity for smart grids[J].IEEE Transactions on Industrial Informatics,2015,11(6):1607-1616.
[7]YE F,QIAN Y,HU R Q.A security protocol for advanced metering infrastructure in smart grid[C]∥2014 IEEE Global Communications Conference.Austin,TX,USA:IEEE,2014:649-654.
[8]LIU N,ZHU C L,ZHANG J,et al.A key management scheme for secure communications of advanced metering infrastructure in smart grid[J].IEEE Transactions on Instrumentationand Measurement,2013,60(10):4746-4756.
[9]张恩超.智能电网信息安全防御体系架构与关键技术研究[D].北京:华北电力大学,2016.
[10]周晟,赵君翊,葛元鹏.主被动防御结合的智能电网信息安全防护体系[J].电子科技,2015,28(6):213-215.
[11]陈飞.智能电网信息安全交互模型及关键技术研究[D].北京华北电力大学,2014.
[12]诸葛建伟,唐勇,韩心慧,等.蜜罐技术研究与应用进展[J].软件学报,2013,24(4):825-842.
[13]CONPOT ICS/SCADA honeypot[EB/OL].https://www.conpot.org.
[14]KOLTYS K,GAJEWSKI R.Shape:A honeypot for electric power substation[J].Journal of Telecommunications and Information Technology,2015(4):37-43.
[15]FAN W,FERNÁNDEZ D,DU Z.Versatile virtual honeynetmanagement framework[J].IET Information Security,2017,11(1):38-45.
[16]REN J,XU Y.A compartmental model to explore the interplay between virus epidemics and honeynet potency[J].Applied Mathematical Modelling,2018,59:86-99.
[17]SOKOL P,GAJDOŠ A.Prediction of Attacks Against Honeynet Based on Time Series Modeling[J].Applied Computational Intelligence and Mathematical Methods,2018,662:360-371.
[18]易秀双,马世伟,王卫东.虚拟蜜网核心功能剖析与实例部署[J].计算机科学,2012,39(3):101-103,109.
[19]胡江溢,祝恩国,杜新纲,等.用电信息采集系统应用现状及发展趋势[J].电力系统自动化,2014,38(2):131-135.
[20]祝恩国,刘宣,葛磊蛟.用电信息采集系统非结构化数据管理设计[J].电力系统及其自动化学报,2016,28(10):123-128.
[21]翟峰,冯云,李保丰.电力采集系统安全防护和密码管理体系[J].网络空间安全,2018,9(2):79-84,89.
[1] CHENG Qing-feng, LI Yu-ting, LI Xing-hua, JIANG Qi. Research on Application of Cryptography Technology for Edge Computing Environment [J]. Computer Science, 2020, 47(11): 10-18.
[2] DAI Hong-bin. Research on the Independence of the Communication Protocol Software in Automation [J]. Computer Science, 2013, 40(Z11): 68-72.
[3] CAO Li-feng,LI Zhong,CHEN Xing-yuan and FENG Yu. Method of Binding Secure Label to Data Object Based on XML [J]. Computer Science, 2013, 40(8): 124-128.
[4] . Research on Communication Protocol Fault-oriented Reliability Testing of Distributed Software [J]. Computer Science, 2012, 39(7): 132-134.
[5] . Overview of Wireless Sensor and Actor Networks [J]. Computer Science, 2012, 39(10): 21-25.
[6] LI Xiao-yan,MIAO Chang-yun. A Kind of Network Security Protocols and Verification [J]. Computer Science, 2011, 38(Z10): 87-88.
[7] . [J]. Computer Science, 2007, 34(1): 39-41.
[8] XIA Nai, LIN Zhi-Qiang,MAO Bing, XIE Li (National Laboratory for Novel Software Technology, Nanjing University,Nanjing 210093). [J]. Computer Science, 2006, 33(12): 1-5.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .