中国电力 ›› 2020, Vol. 53 ›› Issue (1): 81-91.DOI: 10.11930/j.issn.1004-9649.201912050

• 信息物理电力系统(CPPS)专栏 • 上一篇    下一篇

智能变电站嵌入式终端的网络攻击类型研究及验证

何金栋1, 王宇2, 赵志超1, 李俊娥2, 谢新志1, 张锐文2, 柳玙卿2, 裘德熙2   

  1. 1. 国网福建省电力有限公司电力科学研究院, 福建 福州 350007;
    2. 空天信息安全与可信计算教育部重点实验室(武汉大学 国家网络安全学院), 湖北 武汉 430072
  • 收稿日期:2019-12-10 发布日期:2020-01-15
  • 通讯作者: 李俊娥(1966-),女,通信作者,博士,教授,博士研究生导师,从事电网信息物理系统、信息安全、通信网络研究,E-mail:jeli@whu.edu.cn
  • 作者简介:何金栋(1982-),男,硕士,高级工程师,从事网络安全技术研究,E-mail:dky.he_jindong@fj.sgcc.com.cn;王宇(1996-),男,硕士研究生,从事电力工控系统安全研究,E-mail:564943524@qq.com
  • 基金资助:
    国家自然科学基金资助项目(协同网络攻击下电网CPS跨空间级联故障演化机理及早期防御研究,51977155);国网福建省电力公司科技项目(智能变电站网络安全测试技术研究,SGFJDK00NYJS1900308)

Type and Verification of Network Attacks on Embedded Terminals of Intelligent Substation

HE Jindong1, WANG Yu2, ZHAO Zhichao1, LI June2, XIE Xinzhi1, ZHANG Ruiwen2, LIU Yuqing2, QIU Dexi2   

  1. 1. State Grid Fujian Electric Power Research Institute, Fuzhou 350007, China;
    2. Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
  • Received:2019-12-10 Published:2020-01-15
  • Supported by:
    This work is supported by National Natural Science Foundation of China (Research on the Evolution Mechanism and Early Defense of GCPS Cascading Failures under Cooperative Cyber Attacks, No.51977155), Science and Technology Program of State Grid Fujian Electric Power Corporation (Research on Network Security Test of Intelligent Substation, No. SGFJDK00NYJS1900308)

摘要: 全面掌握智能变电站嵌入式终端可能遭受的网络攻击方式及其对电力一次系统的影响,是建立有效安全防护措施的基础。目前,有关智能变电站嵌入式终端网络攻击的研究大都针对单一类型的网络攻击,且仅停留在理论分析阶段,未对提出的网络攻击类型进行验证。在分析智能变电站嵌入式终端及其通信环境的脆弱性的基础上,从攻击检测所需要的数据源和检测方法角度总结了终端可能遭受的网络攻击类型;提出了实物与仿真相结合的攻击验证方案;分析了泛洪类和报文类主要攻击的原理,给出了相应攻击工具的构造方法;使用所构造的攻击工具在验证方案设计的实验环境中进行了测试,结果证明这些攻击会对智能变电站嵌入式终端及电力一次设备造成影响,且终端抵御泛洪类攻击能力较差。

关键词: 智能变电站, 嵌入式终端, 网络攻击, 攻击验证

Abstract: A comprehensive understanding of the ways of network attacks on the embedded terminals of intelligent substation and their impacts on the primary power system is the basis for taking effective security protection measures. At present, most researches on the embedded terminal attack of intelligent substation focus on the single type of network attack and stay in the theoretical analysis stage, and no verification is conducted on the presented types of network attack. Based on a vulnerability analysis of the embedded terminals of intelligent substation and their communication environment, the types of network attacks on the terminals are summarized in terms of the data sources and detection methods required for attack detection. Then, an attack verification scheme is proposed with combination of physical testing and simulation. Meanwhile, the principles of flooding and message attacks are analyzed, and the construction methods of the corresponding attack tools are presented. Finally, the constructed attack tools are tested in the experiment environment of the designed verification scheme. The test results show that the presented two attacks can affect the embedded terminals of intelligent substation and the primary equipment, and the embedded terminals are poor in resisting flooding attack.

Key words: intelligent substation, embedded terminal, network attack, attack verification