杨挺, 许哲铭, 赵英杰, 翟峰. 数字化新型电力系统攻击与防御方法研究综述[J]. 电力系统自动化, 2024, 48(6): 112-126.
引用本文: 杨挺, 许哲铭, 赵英杰, 翟峰. 数字化新型电力系统攻击与防御方法研究综述[J]. 电力系统自动化, 2024, 48(6): 112-126.
YANG Ting, XU Zheming, ZHAO Yingjie, ZHAI Feng. Review on Research of Attack and Defense Methods for Digitalized New Power System[J]. Automation of Electric Power Systems, 2024, 48(6): 112-126.
Citation: YANG Ting, XU Zheming, ZHAO Yingjie, ZHAI Feng. Review on Research of Attack and Defense Methods for Digitalized New Power System[J]. Automation of Electric Power Systems, 2024, 48(6): 112-126.

数字化新型电力系统攻击与防御方法研究综述

Review on Research of Attack and Defense Methods for Digitalized New Power System

  • 摘要: 随着先进数字技术、通信技术和互联网技术的发展,传统电力系统转变为数字化、自动化和高效管理的新型电力系统。然而,信息域与物理域的深度融合使新型电力系统中的网络、层次和组件变得更加复杂,大量的智能电子设备频繁访问与信息交互,更容易出现如窃取篡改数据、堵塞通信信道和破坏关键设备等恶意攻击,对新型电力系统的安全性、稳定性和经济性构成巨大威胁,引发了学术界的极大关注。首先,文中剖析了新型电力系统的结构和面临的潜在威胁,从控制层、网络层、物理层3个层面对新型电力系统攻击模式进行了深入分析。然后,详细归纳总结了新型电力系统攻击前、攻击中、攻击后的3层安全防御方法。最后,明确阐述了新型电力系统安全性研究的未来技术发展前景,为构建可靠、安全、健壮的新型电力系统提供技术支撑。

     

    Abstract: With the development of advanced digital, communication, and Internet technologies, the traditional power system has been transformed into a new power system with digitalization, automation, and efficient management. However, the deep integration of cyber and physical domains makes the network, hierarchy, and components in the new power system more complex, and the frequent access and information interaction of a large number of intelligent electronic devices makes malicious attacks easier, such as data theft and tampering, blocking of communication channels, and damaging key equipment, which poses a great threat to the security, stability and economy of the new power system. This has triggered great concern in the academic community. First, this paper analyzes the structure of the new power system and the potential threats faced by the new power system, and conducts an in-depth analysis of the attack modes to the new power system from the three levels of the control layer, network layer, and physical layer. Then, it summarizes in detail the three-layer security defense methods before, during, and after the attack on the new power system. Finally, the future technological development prospect of the new power system security research is clearly elaborated to provide technical support for the construction of the reliable, secure, and robust new power system.

     

/

返回文章
返回