Electric Power ›› 2020, Vol. 53 ›› Issue (1): 81-91.DOI: 10.11930/j.issn.1004-9649.201912050

Previous Articles     Next Articles

Type and Verification of Network Attacks on Embedded Terminals of Intelligent Substation

HE Jindong1, WANG Yu2, ZHAO Zhichao1, LI June2, XIE Xinzhi1, ZHANG Ruiwen2, LIU Yuqing2, QIU Dexi2   

  1. 1. State Grid Fujian Electric Power Research Institute, Fuzhou 350007, China;
    2. Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
  • Received:2019-12-10 Published:2020-01-15
  • Supported by:
    This work is supported by National Natural Science Foundation of China (Research on the Evolution Mechanism and Early Defense of GCPS Cascading Failures under Cooperative Cyber Attacks, No.51977155), Science and Technology Program of State Grid Fujian Electric Power Corporation (Research on Network Security Test of Intelligent Substation, No. SGFJDK00NYJS1900308)

Abstract: A comprehensive understanding of the ways of network attacks on the embedded terminals of intelligent substation and their impacts on the primary power system is the basis for taking effective security protection measures. At present, most researches on the embedded terminal attack of intelligent substation focus on the single type of network attack and stay in the theoretical analysis stage, and no verification is conducted on the presented types of network attack. Based on a vulnerability analysis of the embedded terminals of intelligent substation and their communication environment, the types of network attacks on the terminals are summarized in terms of the data sources and detection methods required for attack detection. Then, an attack verification scheme is proposed with combination of physical testing and simulation. Meanwhile, the principles of flooding and message attacks are analyzed, and the construction methods of the corresponding attack tools are presented. Finally, the constructed attack tools are tested in the experiment environment of the designed verification scheme. The test results show that the presented two attacks can affect the embedded terminals of intelligent substation and the primary equipment, and the embedded terminals are poor in resisting flooding attack.

Key words: intelligent substation, embedded terminal, network attack, attack verification