首页--工业技术论文--自动化技术、计算机技术论文--自动化技术及设备论文--自动化系统论文--自动控制、自动控制系统论文

12kV变电站的数据采集与监视控制系统(SCADA)的研究

Abstract第4页
摘要第5-9页
1 Introduction第9-14页
    1.1 Background第11页
    1.2 Motivation第11-12页
    1.3 Problem Statement第12-13页
    1.4 Objective Of The Research第13页
    1.5 Thesis Organization第13-14页
2 SCADA Systems第14-27页
    2.1 Components Of SCADA System第14-21页
        2.1.1 Hardware Components第15-19页
        2.1.2 Software Components第19-21页
    2.2 SCADA System Protocol第21-24页
        2.2.1 The ModBus Model第22页
        2.2.2 DNP3 Protocol第22页
        2.2.3 Control And Information Protocol第22页
        2.2.4 DeviceNet Standards第22页
        2.2.5 ControlNet Standards第22-23页
        2.2.6 ProfiBus Protocol第23-24页
        2.2.7 CanBus Model第24页
    2.3 Security Measure Of SCADA protocol第24-26页
        2.3.1 Firewalls第24-25页
        2.3.2 Firewalls Implementation Area第25-26页
        2.3.3 Virtual Private Network (VPN)第26页
    2.4 Summary第26-27页
3 SCADA Vulnerabilities And Attacks第27-41页
    3.1 Architecture Of SCADA System第27-30页
        3.1.1 First Generation SCADA System - Monolithic第27-28页
        3.1.2 Second Generation SCADA System - Distributed第28-29页
        3.1.3 Third Generation SCADA System - Networked第29-30页
    3.2 Vulnerabilities And Attacks To SCADA System第30-33页
        3.2.1 Outdated System第31页
        3.2.2 Hardware Integrity第31页
        3.2.3 Ease Of Use第31页
        3.2.4 Business Integration第31-32页
        3.2.5 Contraction Of SCADA Protection Policy第32-33页
        3.2.6 Standard Organizations For SCADA第33页
    3.3 Vulnerability Inspection And Scrutiny第33-34页
    3.4 Terrorization To SCADA Systems第34-36页
        3.4.1 Malware Software第34-35页
        3.4.2 Internal Attacks第35页
        3.4.3 Industrial Sabotage And Espionage第35页
        3.4.4 Outsider Attacks: Hackers第35页
        3.4.5 Terrorists第35-36页
        3.4.6 Nation States第36页
    3.5 Threats Mitigation Techniques第36-39页
        3.5.1 Awareness Through Education第36页
        3.5.2 Security Of SCADA Networks第36-38页
        3.5.3 Accomplishment Of Protection Enhancement第38页
        3.5.4 Secure Protocols第38页
        3.5.5 Security Controls第38-39页
    3.6 SCADA IDS System第39-40页
        3.6.1 Network Based Intrusion Detection System第39页
        3.6.2 Host Based Intrusion Detection System第39-40页
        3.6.3 Signature Based Intrusion Detection System第40页
        3.6.4 Active And Passive Response Intrusion Detection Systems第40页
    3.7 Summary第40-41页
4 Safety Of The 12kV SCADA System In Power Station And Network Reconnaissance第41-52页
    4.1 Safety Of The SCADA Systems第41-47页
        4.1.1 Modern Standards Of Ensure The Safety Of Power Station SCADA第42-43页
        4.1.2 The Main Trend第43页
        4.1.3 Identify Security Threats In SCADA Power Systems第43-45页
        4.1.4 Application Of Genetic Algorithms To Detect Vulnerabilities SCADADistribution Systems第45-47页
    4.2 Network Reconnaissance第47-49页
    4.3 Reconnaissance Tool Development for SCADA第49-51页
        4.3.1 Tool Purpose第49-50页
        4.3.2 Tool Criteria第50-51页
    4.4 Summary第51-52页
5 SCADA System Implementation For 12kV Distributed Network第52-61页
    5.1 Network Size第52-53页
    5.2 System Configuration第53-58页
        5.2.1 Master computer system station第53-55页
        5.2.2 Remote Computer System Station第55-56页
        5.2.3 SCADA Functions And Their Benefits第56-58页
    5.3 SCADA Implementation System Up Gradation第58-59页
    5.4 Online Database Management System第59-60页
    5.5 Summary第60-61页
Conclusion第61-62页
Acknowledgements第62-63页
References第63-67页
Publications第67页

论文共67页,点击 下载论文
上一篇:基于GF-1卫星影像的城市绿地信息提取与景观格局研究--以兰州市为例
下一篇:一种离心风机内部流场三维数值模拟研究