计算机科学 ›› 2025, Vol. 52 ›› Issue (11A): 241200158-7.doi: 10.11896/jsjkx.241200158

• 信息安全 • 上一篇    下一篇

电力监控系统网络空间客体协同防御方法

李晓耕1, 韩校1, 肖海怡2   

  1. 1 云南电网有限责任公司云南电力调度控制中心 昆明 650000
    2 云南电网有限责任公司楚雄供电局 云南 楚雄 675000
  • 出版日期:2025-11-15 发布日期:2025-11-10
  • 通讯作者: 李晓耕(1067688698@qq.com)
  • 基金资助:
    中国南方电网有限责任公司科技项目(0500002023030301XT00152)

Cooperative Defense Method for Network Space Object of Power Monitoring System

LI Xiaogeng1, HAN Xiao1, XIAO Haiyi2   

  1. 1 Yunnan Power Grid Corporation Yunnan Power Dispatch Control Centre,Kunming 650000,China
    2.Chuxiong Electric Power Supply Bureau,Yunnan Power Grid,Chuxiong,Yunnan 675000,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    China Southern Power Grid Co.,Ltd.(0500002023030301XT00152).

摘要: 电力监控系统是确保电力稳定供应的核心基础设施,当前电力监控系统网络空间客体安全防御手段大多基于固定策略,往往缺少对当前系统环境与安全事件的针对性,且执行这种防御策略也会对系统业务的正常运行产生较大影响。为解决此问题,提出了一种网络空间客体协同防御方法。首先,针对网络威胁阻断,使用IP溯源技术对攻击路径进行重绘,考虑节点与受攻击客体在攻击路径中的跳数以及节点处的网络流量,构造适应度函数,基于改进遗传算法思想确定最优阻断位置;其次,根据网络空间客体类型,制定网络空间客体分类防御策略,引入防御动作关联度计算模型,确定具体的防御动作。仿真实验证明,所提出的网络空间客体协同防御方法在防御动作选取与执行、防御效果等方面均有显著优势,可最大程度降低防御动作对系统正常业务的影响。

关键词: 电力监控系统, 网络空间, 协同防御, 遗传算法, 关联分析

Abstract: The power monitoring system is the core facility for ensuring stable power supply.Currently,most of the network security defense measures for power monitoring systems are based on fixed strategies,which often lack specificity for the current system environment and security events.Moreover,implementing such defense strategies can also have a significant impact on the normal operation of system business.To solve the above problem,a cooperative defense method for network space object is proposed.Firstly,in order to block network threats,IP tracing technology is used to redraw the attack path,taking into account the number of hops between nodes and the attacked object in the attack path,as well as the network traffic at nodes.A fitness function is constructed,and the optimal blocking position is determined based on the idea of improved genetic algorithm.Secondly,based on the types of objects,it formulates defense strategies for classifying objects,introduces a defense action correlation calculation model,and determines specific defense actions.Simulation experiments show that the proposed network space objectco-operative defense method has significant advantages in selecting and executing defense actions,as well as defense effectiveness,which can minimize the impact of defense actions on normal system operations.

Key words: Power monitoring system, Network space, Cooperative defense, Genetic algorithm, Correlation analysis

中图分类号: 

  • TM933
[1]ZHOU Q X et al.Detection resource allocation scheme for two-layer cooperative IDSs in smartgrids[J].Journal of Parallel and Distributed Computing,2021,147:236-247.
[2]SARASWATHI S.Enforcing a source-end cooperative multil-evel defense mechanism to counter floodingattack[J].Computer Systems Science and Engineering,2023,44(1):67-79.
[3]LI L X,ZHANG B,WU H M,et al.A novel network proactive defense model:anomaly driven dynamic cooperative defense model[C]//IOP Conference Series:Materials Science and Engineering.2018.
[4]FANRONG W et al.Substation area joint defensive protection strategy based on distributed cooperative all-in-onedevice[J].Journal of Modern Power Systems and Clean Energy,2016,4(3):467-477.
[5]HONG Q Z,ZI W,WEI L,et al.A method of conflict detectionfor cooperative defense strategy in power industrial control system[J].International Conference on Advanced Cloud and Big Data,2020.
[6]CAI X P.Research on information-physical collaborativedefence methods for power system cyber attacks[D].Najjing:Southeast University,2021.
[7]LI W,HE H.Design and implementation of a multi-level backup automatic blocking system for source-network-load interaction[J].Computer Applications and Software,2020,37(9):302-309,333.
[8]XIAO Y X,MU T,QIN Z Y,et al.Exploration of water resources network security collaborative defence system based on software defined security[J].Pearl River,2023,44(2):122-128,133.
[9]TAN S S.Design and implementation of an attack blocking system for virtual-real networks[D].Beijing:Beijing University of Posts and Telecommunications,2015.
[10]WANG Z,WANG Z H,HAN Y,et al.Research on multi-layercollaborativedefence model for power system network security[J].Computer Engineering,2021,47(12):131-140.
[11]SONG L,FAN Y,LIU M,et al.State estimation method of a new energy power system based on SC-DNN and multi-source datafusion[J].Power System Protection and Control,2023,51:177-187.
[12]LIU J Q,W R.An overview of new information transmission methods for powersystems[J].Journal of Northeast Dianli University,2024,44(4):1-8,76.
[13]ZHANG D,ZHANG Y,ZANG X X.Anomalous Intrusion Detection Method for Surveillance Video Based on Self-Organising Mathematical Models[J].Journal of Northeast Dianli University,2022,42(4):63-69.
[14]HAN Y,WANG Y,CAO Y,et al.A novel wrapped feature selection framework for developing power system intrusion detection based on machine learning methods[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems,2023,53(11):7066-7076.
[15]YAN B,JIANG Z,YAO P,et al.Game Theory based optimaldefensive resources allocation with incomplete information in cyber-physical power systems against false data injection attacks[J].Protection and Control of Modern Power Systems,2024,9(2):115-127.
[16]LIU C,ZHU H,ZHOU M,et al.Phase shiftingtransformer-based mitigation strategy for load redistribution attacks in po-wer system optimal power flow[J].IEEE Transactions on Smart Grid,2024,15(5):5127-5138.
[17]CHANG Z,WU J,LIANG H,et al.A review of power system false data attack detection technology based on bigdata[J].Information,2024,15(8):439.
[18]ABDELKADER S,AMISSAH J,KINGA S,et al.Securing mod-ern power systems:implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks[J].Results in Engineering,2024:102647.
[19]ZHANG S,YANG Y,ZHOU Z,et al.DIBAD:A disentangled information bottleneck adversarial defense method using Hilbert-Schmidt independence criterion for spectrum security[J].IEEE Transactions on Information Forensics and Security,2024,19:3879-3891.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!