摘要
可视化技术凭借其优秀的数据展示及信息探索能力,已经成为复杂系统分析中不可或缺的一环。配电网结构复杂多变,其信息安全分析需要处理海量数据,且分析模型无法满足日新月异的攻击手段,迫切需要能有效展示海量数据,帮助操作员理解、分析、优化安全分析模型的可视化技术。目前,配电网信息安全防护工作与可视化技术结合不够紧密,文章在对可视化参考模型、显示交互技术、分析认知框架及应用进行全面论述的基础上,讨论了可视化技术在信息安全防护模块中的应用,着重强调了人通过可视化对安全分析过程进行感知形成新的见解,并结合专家知识,对安全防护模块进行反馈控制优化的过程,为进一步提升信息安全防护能力,确保配电网持续、稳定、可靠运行提供了新的思路。
With the excellent data display and information exploration capabilities, visualization technology has become an integral part of complex systems analysis. The structure of distribution network is complex and changeable, and its information security analysis needs to deal with massive data, and the analysis model can’t meet the ever-changing attack means. Therefore, there is an urgent need for visualization technology that can effectively display massive data and help operators understand, analyze and optimize the security analysis model. At present, the combination of information security protection and visualization in distribution network is not close enough. This paper puts forward the application of visualization in the information security of distribution network based on a comprehensive discussion of the reference model of visualization technology, visual representation and interaction, the analysis of the cognitive framework and its application, emphasizes that that the process of human’s perception on security analysis, the formation of new insights and combined with prior knowledge to control the security protection module feedback through visualization. It provides a new way of thinking to further enhance the information security protection capabilities and ensure continued, stable and reliable operation of distribution.
作者
张婷
黄开兴
胡博文
周纯杰
ZHANG Ting;HUANG Kai-xing;HU Bo-wen;ZHOU Chun-jie(School of Automation, Huazhong University of Science and Technology, Wuhan 430074, Chin)
出处
《电力信息与通信技术》
2018年第6期1-7,共7页
Electric Power Information and Communication Technology
基金
国家自然科学基金重点项目"容忍入侵的工业控制系统信息安全防护的基础理论与关键技术"(61433006)
国家电网公司总部科技项目资助"面向电力工控系统的攻击仿真验证技术研究"(52110417001B)
关键词
可视化分析
人机交互
信息探索
信息安全
visual analysis
interaction
information exploration
information security