排序方式: 共有17条查询结果,搜索用时 0 毫秒
11.
新型电力系统实现了新能源电源与多元负荷的广域互联以及信息流与能量流的动态交互,但亦面临愈加严峻的安全威胁.攻击者可发动网络攻击,在多个电力节点引发一系列时空协同的电力故障,形成跨越信息域与电力域的连锁故障,破坏新型电力系统稳定运行.在此背景下,对跨域连锁故障的演化机理与主动防御机制展开研究.首先,根据新型电力系统的架构... 相似文献
12.
随着先进通信与信息技术的广泛应用,虚假数据注入攻击已成为威胁自动发电控制系统安全的重要因素之一。网络攻击的检测是防御的首要任务,文中提出了一种基于集员滤波的自动发电控制系统虚假数据注入攻击检测方法。首先,针对自动发电控制系统中虚假数据注入攻击的影响进行了分析,并建立了互联电网自动发电控制系统模型以及虚假数据注入攻击的模型。其次,基于实时自动发电控制系统的控制指令以及测量数据,对自动发电控制系统椭球集进行预测更新和测量更新,通过判断预测更新椭球集与测量更新椭球集之间是否存在交集,检测系统的数据传输中可能存在的虚假数据注入攻击。最后,在IEEE标准双区域互联电网中验证了所提方法的有效性。 相似文献
13.
Adlyn Adam Teoh Norjihan Binti Abdul Ghani Muneer Ahmad Nz Jhanjhi Mohammed A. Alzain Mehedi Masud 《计算机系统科学与工程》2022,40(2):505-515
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation. The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date, the 2018 SingHealth data breach. The single in-depth case study observed information security awareness, policy, experience, attitude, subjective norms, perceived behavioral control, threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident handling. The data analysis did not support threat severity relationship with conscious care behaviour. The findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management. 相似文献
14.
The construction industry has long faced the challenge of introducing collaborative systems among multiple stakeholders. This challenge creates a high level of rigidity in terms of processing shared information related to different processes, robust holistic regulations, payment actualizations, and resource utilization across different nodes. The need for a digital platform to cross-connect all stakeholders is necessary. A blockchain-based platform is a prime candidate to improve the industry in general and the construction supply chain (CSC) in particular. In this paper, a literature review is presented to establish the main challenges that CSC faces in terms of its effects on productivity and efficiency. In addition, the effect of applying blockchain platforms on a case study is presented and analyzed from performance and security level. The analysis aims to emphasize that blockchain, as presented in this paper, is a viable solution to the challenges in the CSC regardless of the risks associated with the security and robustness of the flow of information and data protection. Moreover, a threat analysis of applying a blockchain model on the CSC industry is introduced. This model indicates potential attacks and possible countermeasures to prevent the attacks. Future work is needed to expand, quantify, and optimize the threat model and conduct simulations considering proposed countermeasures for the different blockchain attacks outlined in this study. 相似文献
15.
变电站过程层与SMV安全传输的网络攻击检测与取证设计 总被引:1,自引:0,他引:1
提出了现有条件下变电站过程层与采样测量值(SMV)安全传输的网络攻击检测与取证策略;设计了SMV数字签名验证、媒体访问控制(MAC)地址异常、SMV不良数据、数据包逻辑检测、数据流量阀值异常、一次故障相似、网络攻击相似、上送SMV伪造、上送SMV篡改等9种异常指示器,用于过程层及SMV变电站内及调控中心间传输的网络攻击在线检测、取证和监视。鉴于目前间隔装置尚无SMV报文认证及网络攻击检测功能,探索了代理认证加密网关以及代理检测的可行性。 相似文献
16.
17.