Current location - Education and Training Encyclopedia - Graduation thesis - Research on Secondary Security Protection Strategy of Power System
Research on Secondary Security Protection Strategy of Power System
Research on Secondary Security Protection Strategy of Power System

Abstract: With the continuous progress of science and technology, the interaction between the outside world and the power system has been strengthened. Because the secondary safety protection measures of power system can effectively ensure the stable operation of power system, the secondary safety protection strategy of power system has gradually attracted people's attention. This paper studies the secondary security protection strategy of power system.

Keywords: electric power system; Secondary security; Protection strategy

Electric power enterprises are an extremely important part of our national economy. With the improvement of the automation level of power system, there are still factors that lead to power system failure in the safety protection of power secondary system. Therefore, it is necessary to adopt the safety protection strategy of power secondary system to eliminate the influence of fault-causing factors on power system.

1 current situation of secondary security protection in power system

The implementation of secondary safety protection project in China power system has improved the safety level of power system. However, there are still some problems in the current secondary security protection system of power system.

1. 1 armor class inside the power system is low.

One of the main problems of the secondary security protection system of power system is the low internal defense level of power system. This comparison is aimed at the external defense level of power system. In the process of power system operation, the security function of most network security devices is to limit external network information. Therefore, when the power system is attacked internally, there is no effective security protection strategy to solve it. At present, the internal defense level of power system has affected the stable operation of power system, and it must be effectively improved.

1.2 There are fewer protection strategies.

At present, the secondary security protection of China's power system is mainly achieved through firewalls. Firewall technology is used to check the data in power system in order to control the data information effectively. However, this secondary security protection method of power system can not guarantee the operation safety of power system 100%. Therefore, it is necessary to increase the types of effective protection strategies to ensure the safe operation of power system.

1.3 electric power personnel cannot independently complete the related operations of the power system.

At present, the configuration, debugging and maintenance of China's power system are mainly completed by power system manufacturers. When there are a series of problems in the power system, the power personnel can't solve them at the first time, so they can only wait for the professional and technical personnel of the manufacturer. The phenomenon that electric power personnel can't independently complete the related operations of power system has a negative impact on the safe operation of power system.

2 the importance of secondary security protection of power system to power system

With the development of computer technology, the level of intelligence and automation of power system has been significantly improved. For the problems of power system failure and power secondary system attack, the secondary security protection system of power system can be established and continuously improved to ensure the safe operation of power system. The secondary security protection of power system is an important guarantee of power system information, and it is also of great significance for the integration and optimization of different resources in the system.

3 Power system secondary security protection strategy

In order to ensure the effective secondary security protection of power system, aiming at a series of faults and secondary attacks in power system, the secondary security protection system of power system is improved. Adopting effective secondary security protection strategy of power system to ensure the safe operation of power system will play a positive role in promoting social and economic development.

3. 1 Overall strategy for secondary security protection of power system

The overall strategy of power system security protection can be summarized as specific network, vertical authentication, horizontal isolation and security partition. It is necessary to equip the power system with appropriate isolation, detection and protection equipment, and formulate a series of effective management measures to ensure the safe and stable operation of the power system.

3.2 Establish a secure network system

In the process of power system operation, the establishment of security network system can ensure the safe and stable operation of power system. The requirements for establishing a secure network system include: introducing intrusion detection technology into firewall technology to improve the related performance of firewall technology; When the intrusion detection system detects the intrusion in the power system, it can stop the intrusion in time.

3.3 Power system software security protection strategy

The main application systems in power system, such as electric energy management system and substation automation system, should adopt corresponding safety reinforcement strategies. The security protection strategy of power system host mainly includes access control ability, security patch and so on. As far as the power system database is concerned, its security protection strategy mainly includes strengthening database log management and auditing related procedures in the database. The security protection strategies of operating system and database are all carried out in the security area, so the security area is one of the main protection objects of the secondary security protection strategy of power system.

3.4 Power system digital certificate application strategy

The application purpose of digital certificate is to clearly identify the identities of all parties in network communication. Digital certificate provides an effective authentication method for power system. The digital certificate used in the secondary security protection system of power system is based on the distribution of public key technology. This digital certificate is mainly used in the production control field of power system, and is responsible for providing corresponding authentication services for key users and key applications. Equipment certificate is one of the commonly used digital certificates in the secondary security protection system of power system. The application of device certificate can realize the signing and encryption of remote communication entities and data in the process of entity communication. The application of digital certificate in the secondary security protection system of power system can not only improve the convenience of power system operation, but also ensure the transmission safety of power system data information.

3.5 Power system firewall security protection strategy

In the secondary security protection system of power system, firewall occupies an extremely important position. Firewalls are composed of hardware and software, and are usually arranged at the boundary of internal and external networks. Packet filtering firewall is one of the commonly used firewalls in the secondary security protection system of power system. Packet filtering firewall can systematically check the specific information of data according to the destination address, port number and source address of data packet. If the inspection results show that the packet conforms to the filtering rules of the packet filtering firewall, the packet is allowed to pass and be transmitted to the corresponding destination. If the inspection results show that the packet does not meet the filtering rules of the packet filtering firewall, the packet will be discarded. The application of packet filtering firewall in power system can be divided into the following two types: one is dynamic packet filtering firewall, which can dynamically set the filtering rules of firewall, track any connection in power system, and appropriately adjust the filtering rules in firewall according to the requirements of allowing data to pass through power system; The second is the static packet filtering firewall, which can check the data packets in the power system according to certain filtering rules and judge whether the data packets meet the filtering rules of the static packet filtering firewall.

4 conclusion

The secondary security protection of power system can promote the safe and stable operation of power system, and also lay a solid foundation for the intelligent development of power system. Therefore, it is necessary to implement effective secondary security protection strategies for power system, such as establishing a secure network system, software security protection strategy, digital certificate application strategy and firewall security protection strategy.

refer to

Zou Chunming, Zheng,,, et al. Application of Secondary Safety Protection Technology in Industrial Control System [J]. Power Grid Technology, 2013,37 (11): 3227-3232.

[2] Pan Lu. Design and Implementation of Network Information Security Protection for Power Secondary System [D]. Guangzhou: South China University of Technology, 20 14.

[3] Huang Zhu. Research on Security Protection Strategy of Power Secondary System [J]. Heilongjiang Science and Technology Information, 20 14 (36): 27.

;