计算机科学 ›› 2022, Vol. 49 ›› Issue (6A): 588-593.doi: 10.11896/jsjkx.210200151

• 信息安全 • 上一篇    下一篇

基于进化神经网络的电力信息网安全态势量化方法

吕鹏鹏, 王少影, 周文芳, 连阳阳, 高丽芳   

  1. 国网河北省电力有限公司信息通信分公司 石家庄 050000
  • 出版日期:2022-06-10 发布日期:2022-06-08
  • 通讯作者: 吕鹏鹏(lvpengpengpower@163.com)
  • 基金资助:
    国网河北省电力有限公司科技项目(kj2019-042)

Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network

LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang   

  1. Information & Telecommunications Branch,State Grid Hebei Electric Power Co.,Ltd.,Shijiazhuang 050000,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:LYU Peng-peng,born in 1988,engineer.His main research interests include operation and maintenance of electric power information system and network security.
  • Supported by:
    Science and Technology Project of State Grid Hebei Electric Power Co.,Ltd. (kj2019-042).

摘要: 电力信息网面临着日益严峻的网络攻击风险威胁,传统网络安全态势量化方法仅从网络性能角度进行分析,忽略了各种电力应用业务的重要性对安全态势的影响,导致量化结果难以全方位反映电力信息网络风险状态。文中提出一种基于进化神经网络的电力信息网安全态势量化方法,首先,通过分析电力通信网络应用业务特点,设计面向电力通信网的安全态势体系架构(PIN-NSSQ);其次,从网络可靠性、威胁性、脆弱性3个维度出发,结合电力业务重要性,建立耦合互联的空间要素指标体系,并实现关键要素指标的数学化表征;然后,将遗传进化算法优化的BP神经网络融入要素指标计算过程中,构建基于进化神经网络的电力信息网安全态势量化模型,有效实现对电力信息网络安全态势全面感知过程的高效计算及结果精确量化;最后,根据某电力部门网络拓扑搭建仿真实验环境,验证了所提方法的有效性和鲁棒性。

关键词: 电力信息网, 进化神经网络, 数学化表征, 态势感知, 网络安全

Abstract: Electric power information networks are facing increasingly severe threats of cyber attacks.Traditional quantification methods of network security situation only analyze from the perspective of network performance,ignoring the impact of the importance of various power application services on the security situation,making it difficult for the quantitative results to fully reflect the power information Cyber risk status.This paper proposes a power information network security situation quantification method based on evolutionary neural networks.First,by analyzing the characteristics of power communication network applications,a power communication network-oriented security situation architecture(PIN-NSSQ)is designed.Secondly,Starting from the three dimensions ofnetwork reliability,threat and vulnerability,combined with the importance of power business,a coupled and interconnected spatial element index system is established,to realize the mathematical representation of key element indicators.Then,integrating the BP neural network optimized by genetic evolution algorithm into the calculation process of element indicators,a power information network security situation quantification model based on evolutionary neural network is constructed to effectively realize the efficient calculation and precise quantification of the process of comprehensive perception of the power information network security situation.Finally,a simulation experiment environment is built according to a certain power department network topology to verify The effectiveness and robustness of the method proposed in the article.

Key words: Evolutionary neural network, Mathematical representation, Network security, Power information network, Situational awareness

中图分类号: 

  • TM732
[1] ZHANG P.A new generation power information networksecuri-ty architecture approach[J].Electronic Technology & Software Engineering,2019(20):194-195.
[2] GAO K,LIU J,XU R.A hybrid security situation prediction model for information network based on support vector machine and particle swarm optimization[J].Power System Technology,2011,35(4):176-182.
[3] BAI X,NURBOL,WANG Y D.Map Analysis for Research Status and Development Trend on Network Security Situational Awareness[J].Computer Science,2020,47(S1):340-343,348.
[4] LI X,DUAN Y C.Network Security Situation AssessmentMethod Based on Improved Hidden Markov Model[J].ComputerScience,2020,47(7):287-291.
[5] WANG X P,XIONG P,LI W W.Application of Firewall and IDS in the Information Network for Power Enterprises[J].Automation of Electric Power Systems,2002(5):60-63.
[6] LI Z M,CONG L,ZHENG Y,et al.Information Security As-sessment of Power Systems Based on SSE-CMM[J].Automation of Electric Power Systems,2003(23):37-40.
[7] HUANG X,CHEN D C,SUN J,et al.A Review of Information Security Research in Power System Under Cyber Attack[J].Electrical Measurement & Instrumentation,2017,54(23):68-74.
[8] FENG X.One Kind of New Security Model of Power Information Systems and its Assessment Methods[J].Journal of North China Electric Power University,2010,37(5):47-51.
[9] ZHANG X,CHEN X H,LIU X.Construction of InformationSecurity Baseline Standardization System for Power Systems[J].Electric Power Information and Communication Techno-logy,2013,11(11):110-114.
[10] ZHANG S C.Research on the Architecture and Key Technology of Information Security Defense System in Smart Grid[D].Beijing:North China Electric Power University,2016.
[11] ZHANG A Q.The application of firewall in power enterprise information network[J].Information & Communications,2018(12):173-174.
[12] XU R,WANG Y.A study on electric power information network-oriented security situation awareness[J].Power System Technology,2012,37(1):53-57.
[13] XIE L J,WANG Y C,YU J B.Network Security Situation Awareness Based on Neural Networks[J].Journal of Tsinghua University(Science & Technology),2013,53(12):1750-1760.
[14] LUO S.Research on Network Security Situation Assessment and Prediction Based on Neural Network[D].Xi'an:Northwest University,2018.
[15] LI S X.Research on Network Security Situation Awareness Based on Improved LSTM Neural Network[D].Shijiazhuang:Hebei Normal University,2020.
[1] 柳杰灵, 凌晓波, 张蕾, 王博, 王之梁, 李子木, 张辉, 杨家海, 吴程楠.
基于战术关联的网络安全风险评估框架
Network Security Risk Assessment Framework Based on Tactical Correlation
计算机科学, 2022, 49(9): 306-311. https://doi.org/10.11896/jsjkx.210600171
[2] 王磊, 李晓宇.
基于随机洋葱路由的LBS移动隐私保护方案
LBS Mobile Privacy Protection Scheme Based on Random Onion Routing
计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077
[3] 赵冬梅, 吴亚星, 张红斌.
基于IPSO-BiLSTM的网络安全态势预测
Network Security Situation Prediction Based on IPSO-BiLSTM
计算机科学, 2022, 49(7): 357-362. https://doi.org/10.11896/jsjkx.210900103
[4] 杜鸿毅, 杨华, 刘艳红, 杨鸿鹏.
基于网络媒体的非线性动力学信息传播模型
Nonlinear Dynamics Information Dissemination Model Based on Network Media
计算机科学, 2022, 49(6A): 280-284. https://doi.org/10.11896/jsjkx.210500043
[5] 陶礼靖, 邱菡, 朱俊虎, 李航天.
面向网络安全训练评估的受训者行为描述模型
Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment
计算机科学, 2022, 49(6A): 480-484. https://doi.org/10.11896/jsjkx.210800048
[6] 邓凯, 杨频, 李益洲, 杨星, 曾凡瑞, 张振毓.
一种可快速迁移的领域知识图谱构建方法
Fast and Transmissible Domain Knowledge Graph Construction Method
计算机科学, 2022, 49(6A): 100-108. https://doi.org/10.11896/jsjkx.210900018
[7] 张师鹏, 李永忠.
基于降噪自编码器和三支决策的入侵检测方法
Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions
计算机科学, 2021, 48(9): 345-351. https://doi.org/10.11896/jsjkx.200500059
[8] 周仕承, 刘京菊, 钟晓峰, 卢灿举.
基于深度强化学习的智能化渗透测试路径发现
Intelligent Penetration Testing Path Discovery Based on Deep Reinforcement Learning
计算机科学, 2021, 48(7): 40-46. https://doi.org/10.11896/jsjkx.210400057
[9] 李贝贝, 宋佳芮, 杜卿芸, 何俊江.
DRL-IDS:基于深度强化学习的工业物联网入侵检测系统
DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things
计算机科学, 2021, 48(7): 47-54. https://doi.org/10.11896/jsjkx.210400021
[10] 陈海彪, 黄声勇, 蔡洁锐.
一个基于智能电网的跨层路由的信任评估协议
Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid
计算机科学, 2021, 48(6A): 491-497. https://doi.org/10.11896/jsjkx.201000169
[11] 唐亮, 李飞.
基于决策树的车联网安全态势预测模型研究
Research on Forecasting Model of Internet of Vehicles Security Situation Based on Decision Tree
计算机科学, 2021, 48(6A): 514-517. https://doi.org/10.11896/jsjkx.200700158
[12] 王金恒, 单志龙, 谭汉松, 王煜林.
基于遗传优化PNN神经网络的网络安全态势评估
Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network
计算机科学, 2021, 48(6): 338-342. https://doi.org/10.11896/jsjkx.201200239
[13] 张凯, 刘京菊.
基于吸收Markov链的网络入侵路径分析方法
Attack Path Analysis Method Based on Absorbing Markov Chain
计算机科学, 2021, 48(5): 294-300. https://doi.org/10.11896/jsjkx.200700108
[14] 陈明豪, 祝跃飞, 芦斌, 翟懿, 李玎.
基于Attention-CNN的加密流量应用类型识别
Classification of Application Type of Encrypted Traffic Based on Attention-CNN
计算机科学, 2021, 48(4): 325-332. https://doi.org/10.11896/jsjkx.200900155
[15] 刘全明, 李尹楠, 郭婷, 李岩纬.
基于Borderline-SMOTE和双Attention的入侵检测方法
Intrusion Detection Method Based on Borderline-SMOTE and Double Attention
计算机科学, 2021, 48(3): 327-332. https://doi.org/10.11896/jsjkx.200600025
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!