Active Defense Technology of Power Monitoring System With Adaptive Features

Internet of Things has found a lot of applications in power systems. However, with the increased the sensing, networking, and control capabilities, the security issues have become even more urgent at the same time. In this paper, a TMAC model based on trusted mandatory access control is proposed by studying the security situation of a power monitoring system. The model has self-learning characteristic and can realize the automatic escalation of the global security strategy based on intelligent agent, so as to build the safe immune ability and active defense system for the power monitoring. This paper introduces the key technology of the TMAC security model, formalizes some of the work, and finally tests its credibility and effectiveness for the typical application scenario of the power monitoring system. Through the study of this technology, the power monitoring system is further equipped with an immune ability against virus Trojan and hacker attacks, especially for application scenarios, such as substation, power plant, and master station.

[1]  Dan Grossman,et al.  Safe manual memory management in Cyclone , 2006, Sci. Comput. Program..

[2]  Michael Norrish,et al.  seL4: formal verification of an OS kernel , 2009, SOSP '09.

[3]  Michael K. Reiter,et al.  Mitigating Storage Side Channels Using Statistical Privacy Mechanisms , 2015, CCS.

[4]  Sanjit A. Seshia,et al.  Moat: Verifying Confidentiality of Enclave Programs , 2015, CCS.

[5]  Gianpiero Cabodi,et al.  Formal Verification of Embedded Systems for Remote Attestation , 2015 .

[6]  Victor C. M. Leung,et al.  A Time-Ordered Aggregation Model-Based Centrality Metric for Mobile Social Networks , 2018, IEEE Access.

[7]  Zhong Shao,et al.  CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels , 2016, OSDI.

[8]  Abhinav Srivastava,et al.  Efficient Monitoring of Untrusted Kernel-Mode Execution , 2011, NDSS.

[9]  William A. Arbaugh,et al.  An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data , 2006, USENIX Security Symposium.

[10]  William A. Arbaugh,et al.  Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.

[11]  Eugene H. Spafford,et al.  The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.

[12]  Donghai Tian,et al.  Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions , 2011, NDSS.

[13]  Michael G. Hinchey,et al.  Developing Experimental Models for NASA Missions with ASSL , 2009, FMA.

[14]  Jing Sun,et al.  Testing and Defending Methods Against DOS Attack in State Estimation , 2017 .

[15]  Fan Long,et al.  Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity , 2015, CCS.

[16]  Anthony Hall Using Formal Methods to Develop an ATC Information System , 1996, IEEE Softw..

[17]  Elaine Shi,et al.  BIND: a fine-grained attestation service for secure distributed systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[18]  Jean-Pierre Courtiat,et al.  An Experiment in using RT-LOTOS for the Formal Specification and Verification of a Distributed Scheduling Algorithm in a Nuclear Power Plant Monitoring System , 1997, FORTE.

[19]  Jianfeng Ma,et al.  A delegation based cross trusted domain direct anonymous attestation scheme , 2015, Comput. Networks.