计算机科学 ›› 2023, Vol. 50 ›› Issue (6A): 220400293-7.doi: 10.11896/jsjkx.220400293
邴英澳1, 王文婷2, 孙圣泽1, 刘鑫2, 聂其贵2, 刘京2
BING Ying’ao1, WANG Wenting2, SUN Shengze1, LIU Xin2, NIE Qigui2, LIU Jing2
摘要: 网络攻击层出不穷,电力行业风险管控的重要性日益凸显。然而,复杂新式的网络攻击手段、生产设备存在遗漏的系统漏洞、物理-信息网络融合的复杂性,无疑对电力监控系统的风险管控提出了新的挑战。针对如何全面准确合理地判断多因素综合影响下的电力监控系统网络的可靠性,建立一个健全的可靠性评估体系,提出了一种基于模糊评价的电力监控系统可靠性评估模型。文中从电力监控系统设备节点存在的漏洞入手,综合分析系统内的风险与系统所处的环境风险,使电力监控系统在运行过程中进行安全定级从而进行安全决策。该方法首先采用网络安全定级标准,结合工业系统漏洞库建立评估指标体系,从网络通信可靠性、业务可靠性、系统可靠性3个方面确定可靠性评估指标;然后采用改进灰狼优化算法优化调整层次分析权重,结合模糊综合评价方法对电力监控系统进行可靠性分析,根据评估结果进行针对性加强维护,在评估过程中使用更精确的量化指标,以达到细粒度级的风险评估;最后,针对电力搭建了一套半虚拟系统环境,综合分析评价电力监控系统的风险等级和可靠性验证该可靠性评估方法的有效性。
中图分类号:
[1]ZHAN X,GUO H,HE X Y,et al.Research on security risk assessment method of state grid edge computing information system[J].Computer Science,2019,46(S2):428-432. [2]WANG H,ZHANG J,ZHAO Y,et al.A new Bayesian model for network risk assessment[J].Small and Microcomputer Systems,2020,41(9):1898-1904. [3]DING M S,SUN W J,CAI X P,et al.Risk assessment and prevention of extreme events in power system[J].China Electric Power,2020,53(1):32-39,65. [4]WANG W H,GUO P,ZHU J,et al.Risk assessment and fault location method of relay protection system based on fault tree and Bayesian network[J].Journal of Electric Power Science and Technology,2021,36(4):81-90. [5]YIN J J,ZHAO D M.Power system backup risk assessmentmethod based on full probability risk measurement[J].Electric Power Automation Equipment,2020,40(1):156-162. [6]BU Y,GAO C H,LI W F,et al.Risk assessment of power system under the framework of big data[J].Power Grid and Clean Energy,2021,37(1):77-83. [7]WEI Y,CUI J B,LIU X T,et al.Reliability analysis method of power system wide area protection communication system based on improved dynamic fault Tree[J].Power System Protection and Control,2021,49(23):171-177. [8]ZHU R C,LI X,LIN X N.Security risk analysis method of video private network based on Bayesian network[J].Information Network Security,2021,21(12):91-101. [9]ZHOU W,ZHANG H,LI B H.Network risk assessment me-thod based on attack and defense state graph model[J].Journal of Southeast University(Natural Science Edition),2016,46(4):688-694. [10]FU J J,WU Z H,SHI Z.Reliability optimization algorithm for power communication network based on improved clustering algorithm[J].Computing Technology and Automation,2020,39(4):92-95. [11]LI W T,JIAO Y L,YANG Z L,et al.Risk assessment of centralized control wind farm based on probabilistic neural network[J].Electrical Measurement and Instrumentation,2019,56(17):76-81,152. [12]LI S B,LI J,TANG G,et al.Network security status prediction and risk assessment method of industrial control system based on HMM[J].Information Network Security,2020,20(9):57-61. [13]YANG H Y,YUAN H H,ZHANG L.A network host noderisk assessment method based on host importance[J/OL].Journal of Beijing University of Posts and Telecommunications,2022:1-5. [14]HE Y G,LIU J.Security Risk Assessment of Power Internet of Things Based on Combination Empowerment-Cloud Model[J].Power SystemTechnology,2020,44(11):4302-4309. [15]ZHAO X L,ZHAO B,ZHAO J J,et al.Research on network security measurement method based on attack identification[J].Information Network Security,2021,21(11):17-27. [16]WANG Y,LIU Y,SONG W H.Research on the evaluationmethod of emergency response capability of petrochemical enterprises based on fuzzy comprehensive evaluation method[J].Journal of Nankai University(Natural Science Edition),2021,54(6):75-80. [17]LI H,YANG J F.Design of reliability assessment software for substation automation system based on fault tree analysis me-thod[J].Automation and Instrumentation,2016(2):138-141. |
|