Electric Power ›› 2019, Vol. 52 ›› Issue (10): 1-10.DOI: 10.11930/j.issn.1004-9649.201808093

Previous Articles     Next Articles

Malicious Attack Correlation Analysis Method of Source-Grid-Load System under Specific Attack Scenarios

ZHANG Rui1, FEI Jiaxuan1, SHI Congcong1, ZHANG Xiaojian1, HUANG Xiuli1, WANG Qi2   

  1. 1. State Grid Key Laboratory of Information & Network Security, Global Energy Interconnection Research Institute Co., Ltd., Nanjing 210003, China;
    2. School of Electrical Engineering, Southeast University, Nanjing 210096, China
  • Received:2018-08-17 Revised:2019-04-10 Online:2019-10-05 Published:2019-10-12
  • Supported by:
    This work is supported by the Science and Technology Project of SGCC (Research on Malicious Attack Mechanism and Precise Attack Monitoring Techniques for Large-Scale Interactive System with Source-Grid-Load Friendly Coordination, No. SGRIXTKJ[2017] 402).

Abstract: The key for the power grid to deal with cyber security threats is to make full use of cyber and electrical information to improve the self-adaptation ability and automation for identification of malicious attack event. In this paper, a malicious attack correlation analysis method of source-grid-load system under specific attack scenarios is proposed. Firstly, an attribute-based multi-source event fusion model is constructed to perform multi-source data fusion processing on abnormal events of cyber layer and electrical layer. And then, based on the neural network model, the fused events are trained and classified according to the attack scenarios. Thirdly, combined with electrical abnormal events, the genetic algorithm's initialization scheme, the selection operator and cross genetic probability are improved. The correlation rules for different attack scenarios are automatically generated based on the classification results. Fourthly, the number of events to be matched is gradually reduced through timing, business logic and IP classification, and the speed of event matching is improved based on vector calculation. A timing- and business logic-based correlation matching algorithm is proposed to realize the high-speed matching of correlation rules. Finally, the effectiveness and applicability of the proposed method is verified in the source-grid-load simulation experiment system. The proposed method utilizes comprehensively the abnormal events of the cyber layer and electrical layer to further improve the identification accuracy of cyber attacks, and automatically realizes the events classification and correlation rule generation, showing great potential for engineering application.

Key words: source-grid-load system, malicious attack, correlation rules, improved genetic algorithm, matching algorithm

CLC Number: