全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电网技术  2009 

风电场SCADA系统边界安全模型设计

, PP. 24-29

Keywords: SCADA系统,非军事区,分布式防火墙,入侵检测系统,安全策略

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对风电SCADA系统边界安全体系架构问题,将防火墙和入侵检测系统(intrusiondetectionsystem,IDS)功能集于一体,融入入侵容忍技术、诱骗系统和数字取证等网络安全技术,设计出风电SCADA系统边界安全模型。该模型提供了多层屏障,可实现风电SCADA网络和外部网络间的深度防御,增加网络的安全性,对解决电力企业进行远程控制和通信的网络安全问题具有参考和应用价值。

References

[1]  迟永宁,刘燕华,王伟胜,等.风电接入对电力系统的影响[J].电网技术,2007,31(3):77-81.
[2]  包士魁,宁玉琴,贾志刚.网络安全防御体系的构建及功能配置[J].科技咨询导报,2007(12):6.
[3]  Bao Shikui,Ning Yuqin,Jia Zhigang.The construction and functions configuration of the network security defense system[J].Science and Technology Consulting Herald,2007(12):6(in Chinese).
[4]  Denning D E.An intrusion-detection model[J].IEEE Transaction on Software Engineering,1987,13(2):222-232.
[5]  王先培,熊平,李文武.防火墙和入侵检测系统在电力企业信息网络中的应用[J].电力系统自动化,2002,26(5):60-63.
[6]  Wang Xianpei,Xiong Ping,Li Wenwu.Application of firewall and IDS in the information network for power enterprises[J].Automation of Electric Power Systems,2002,26(5):60-63(in Chinese).
[7]  季称利,杨晓元,胡予濮,等.五层安全模型的概念及应用[J].计算机工程,2005,31(15):132-134.
[8]  Ji Chenli,Yang Xiaoyuan,Hu Yupu,et al.Concepts and application of five-layers security model[J].Computer Engineering,2005,31(15):132-134(in Chinese).
[9]  钱伟中,王蔚然,袁宏春.分布式防火墙环境的边界防御系统[J].电子科技大学学报,2005,34(4):513-516.
[10]  Qian Weizhong,Wang Weiran,Yuan Hongchun.Boundary defense system based on DFW[J].Journal of UEST of China,2005,34(4):513-516(in Chinese).
[11]  姚立红,谢立.IPSEC与防火墙协同工作设计与实现[J].小型微型计算机系统,2004,25(12):183-186.
[12]  Yao Lihong,Xie Li.Research and implementation of cooperation of IPSEC and firewall[J].Mini-Micro Systems,2004,25(12):183-186(in Chinese).
[13]  王伟,曹元大,阎慧.分布式防火墙下的分布式通信技术[J].计算机工程,2003,29(22):148-150.
[14]  Wang Wei,Cao Yuanda,Yan Hui.Distributed object technologies in distributed firewall[J].Computer Engineering,2003,29(22):148-150(in Chinese).
[15]  CHI Yongning,LIU Yanhua,WANG Weisheng,et al.Study on impact of wind power integration on power system[J].Power System Technology,2007,31(3):77-81(in Chinese).
[16]  Hassan G.Development of a generic wind farm SCADA system [EB/OL].2001.http://www.garradhassan.com.
[17]  Hassan G.GH wind farm supervisory control and data acquisition system user’s manual[EB/OL].2006.http://www.garradhassan.Com.
[18]  Wolthusen S.Layered multipoint network defense and security policy enforcement[C].The Second Annual IEEE SMC Information Assurance Workshop,West Point,NY,USA,200l.
[19]  戚宇林,刘文颖,杨以涵,等.电力信息的网络化传输是电力系统安全的重要保证[J].电网技术,2004,28(9):58-61.
[20]  Qi Yulin,Liu Wenying,Yang Yihan,et al.Ensuring power system security by networking transmission of electric power information [J].Power System Technology,2004,28(9):58-61(in Chinese).
[21]  周士跃,王劲松,金小达.地区供电网调度实时数据网络安全分析及对策[J].电网技术,2003,27(10):52-55.
[22]  Zhou Shiyue,Wang Jinsong,Jin Xiaoda.Security analysis and countermeasures of real-time dispatching data network for regional power supply network[J].Power System Technology,2003,27(10):52-55(in Chinese).
[23]  吴国威.数字化变电站中信息处理及网络信息安全分析[J].继电器,2007,35(12):18-22.
[24]  Wu Guowei.Information disposal and network security analysis in digital substation[J].Relay,2007,35(12):18-22(in Chinese).
[25]  Willian Stallings.Cryptography and network security:principles and practice[M].Second Edition.Beijing:Publishing House of Electronics Industry,2001:621-634.
[26]  Young W F,Stamp J E,Dillinger J D.Communication vulnerabilities and mitigations in Wind Power SCADA systems[C].American Wind Energy Association Windpower 2003 Conference,Austin,Texas,USA,2003.
[27]  陈军,王海洋,曹鲁慧.基于SOAP的分布式防火墙策略发布研究[J].计算机科学,2005,32(5):82-84.
[28]  Chen Jun,Wang Haiyang,Gao Luhui.Research in policy issue of distributed firewalls based SOAP[J].Computer Science,2005,32(5):82-84(in Chinese).
[29]  郑明磊,李建华,张少俊.基于SOAP的开放性网络安全管理[J].计算机工程,2003,29(2):83-87.
[30]  Zheng Minglei,Li Jianhua,Zhang Shaojun.SOAP-based open network security management[J].Computer Engineering,2003,29(2):83-87(in Chinese).
[31]  张功萱,宋斌,王平立.基于SOAP的网络消息安全策略[J].南京理工大学学报,2007,31(1):66-70.
[32]  Zhang Gongxuan,Song Bin,Wang Pingli.Security policy of network messages based on SOAP[J].Journal of Nanjing University of Science and Technology,2007,31(1):66-70(in Chinese).
[33]  雷亚洲,Gordon L.国外风力发电导则及动态模型简介[J].电网技术,2005,25 (12):27-32.
[34]  Lei Yazhou,Gordon L.An introduction on wind power grid code and dynamic simulation[J].Power System Technology,2005,25(12):27-32(in Chinese).

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133