计算机科学 ›› 2023, Vol. 50 ›› Issue (6A): 220400293-7.doi: 10.11896/jsjkx.220400293

• 信息安全 • 上一篇    下一篇

基于改进模糊综合评价法的电力监控系统网络可靠性分析

邴英澳1, 王文婷2, 孙圣泽1, 刘鑫2, 聂其贵2, 刘京2   

  1. 1 东北电力大学计算机学院 吉林 132012;
    2 国网山东省电力公司电力科学研究院 济南 250013
  • 出版日期:2023-06-10 发布日期:2023-06-12
  • 通讯作者: 王文婷(13853115319@163.com)
  • 作者简介:(18865382590@163.com)
  • 基金资助:
    国网山东省电力公司科技项目(520626220029)

Network Reliability Analysis of Power Monitoring System Based on Improved Fuzzy ComprehensiveEvaluation Method

BING Ying’ao1, WANG Wenting2, SUN Shengze1, LIU Xin2, NIE Qigui2, LIU Jing2   

  1. 1 School of Computer Science,Northeast Electric Power University,Jilin 132012,China;
    2 State Grid Shandong Electric Power Research Institute,Jinan 250013,China
  • Online:2023-06-10 Published:2023-06-12
  • About author:BING Ying’ao,born in 1999,postgra-duate.His main research interests include power system security and network security. WANG Wenting,born in 1988,postgraduate.Her main research interests include power system security,network security and ICT(information and communications technology).
  • Supported by:
    State Grid Shandong Electric Power Company Technology Project(520626220029).

摘要: 网络攻击层出不穷,电力行业风险管控的重要性日益凸显。然而,复杂新式的网络攻击手段、生产设备存在遗漏的系统漏洞、物理-信息网络融合的复杂性,无疑对电力监控系统的风险管控提出了新的挑战。针对如何全面准确合理地判断多因素综合影响下的电力监控系统网络的可靠性,建立一个健全的可靠性评估体系,提出了一种基于模糊评价的电力监控系统可靠性评估模型。文中从电力监控系统设备节点存在的漏洞入手,综合分析系统内的风险与系统所处的环境风险,使电力监控系统在运行过程中进行安全定级从而进行安全决策。该方法首先采用网络安全定级标准,结合工业系统漏洞库建立评估指标体系,从网络通信可靠性、业务可靠性、系统可靠性3个方面确定可靠性评估指标;然后采用改进灰狼优化算法优化调整层次分析权重,结合模糊综合评价方法对电力监控系统进行可靠性分析,根据评估结果进行针对性加强维护,在评估过程中使用更精确的量化指标,以达到细粒度级的风险评估;最后,针对电力搭建了一套半虚拟系统环境,综合分析评价电力监控系统的风险等级和可靠性验证该可靠性评估方法的有效性。

关键词: 电力监控系统, 灰狼优化算法, 模糊综合评价, 层次分析法, 网络可靠性评价模型

Abstract: Network attacks emerge one after another,and the importance of risk management and control in the power industry is increasing day by day.However,complex and new network attack methods,missing system loopholes in production equipment,and the complexity of the integration of physical and information networks will undoubtedly bring forward the risk management and control of power monitoring systems.Aiming at how to comprehensively,accurately and reasonably judge the network reliability of the power monitoring system under the comprehensive influence of multiple factors,a sound reliability evaluation system is established,and a reliability evaluation model of the power monitoring system based on fuzzy evaluation is proposed.This paper starts with the loopholes existing in the equipment nodes of the power monitoring system,and comprehensively analyzes the risks in the system and the environmental risks outside the system,so that the power monitoring system can be safely graded during the operation process to make security decisions.This method adopts network security classification.The standard is combined with the industrial system vulnerability database to establish an evaluation index system,and the reliability evaluation index is determined from the three aspects of network communication reliability,business reliability,and system reliability.The reliability analysis of the power monitoring and monitoring system is carried out,targeted maintenance is carried out according to the evaluation results,and more accurate quantitative indicators are used to achieve fine-grained risk assessment in the evaluation process.Finally,a set of semi-virtual system environment synthesis is built for power.The risk level and reliability of the power monitoring system are analyzed and evaluated to verify the validity of the reliability evaluation method.

Key words: Power monitoring system, Gray wolf optimization algorithm, Fuzzy comprehensive evaluation, Analytic hierarchy process, Network reliability evaluation model

中图分类号: 

  • TP393
[1]ZHAN X,GUO H,HE X Y,et al.Research on security risk assessment method of state grid edge computing information system[J].Computer Science,2019,46(S2):428-432.
[2]WANG H,ZHANG J,ZHAO Y,et al.A new Bayesian model for network risk assessment[J].Small and Microcomputer Systems,2020,41(9):1898-1904.
[3]DING M S,SUN W J,CAI X P,et al.Risk assessment and prevention of extreme events in power system[J].China Electric Power,2020,53(1):32-39,65.
[4]WANG W H,GUO P,ZHU J,et al.Risk assessment and fault location method of relay protection system based on fault tree and Bayesian network[J].Journal of Electric Power Science and Technology,2021,36(4):81-90.
[5]YIN J J,ZHAO D M.Power system backup risk assessmentmethod based on full probability risk measurement[J].Electric Power Automation Equipment,2020,40(1):156-162.
[6]BU Y,GAO C H,LI W F,et al.Risk assessment of power system under the framework of big data[J].Power Grid and Clean Energy,2021,37(1):77-83.
[7]WEI Y,CUI J B,LIU X T,et al.Reliability analysis method of power system wide area protection communication system based on improved dynamic fault Tree[J].Power System Protection and Control,2021,49(23):171-177.
[8]ZHU R C,LI X,LIN X N.Security risk analysis method of video private network based on Bayesian network[J].Information Network Security,2021,21(12):91-101.
[9]ZHOU W,ZHANG H,LI B H.Network risk assessment me-thod based on attack and defense state graph model[J].Journal of Southeast University(Natural Science Edition),2016,46(4):688-694.
[10]FU J J,WU Z H,SHI Z.Reliability optimization algorithm for power communication network based on improved clustering algorithm[J].Computing Technology and Automation,2020,39(4):92-95.
[11]LI W T,JIAO Y L,YANG Z L,et al.Risk assessment of centralized control wind farm based on probabilistic neural network[J].Electrical Measurement and Instrumentation,2019,56(17):76-81,152.
[12]LI S B,LI J,TANG G,et al.Network security status prediction and risk assessment method of industrial control system based on HMM[J].Information Network Security,2020,20(9):57-61.
[13]YANG H Y,YUAN H H,ZHANG L.A network host noderisk assessment method based on host importance[J/OL].Journal of Beijing University of Posts and Telecommunications,2022:1-5.
[14]HE Y G,LIU J.Security Risk Assessment of Power Internet of Things Based on Combination Empowerment-Cloud Model[J].Power SystemTechnology,2020,44(11):4302-4309.
[15]ZHAO X L,ZHAO B,ZHAO J J,et al.Research on network security measurement method based on attack identification[J].Information Network Security,2021,21(11):17-27.
[16]WANG Y,LIU Y,SONG W H.Research on the evaluationmethod of emergency response capability of petrochemical enterprises based on fuzzy comprehensive evaluation method[J].Journal of Nankai University(Natural Science Edition),2021,54(6):75-80.
[17]LI H,YANG J F.Design of reliability assessment software for substation automation system based on fault tree analysis me-thod[J].Automation and Instrumentation,2016(2):138-141.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!