Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220400293-7.doi: 10.11896/jsjkx.220400293

• Information Security • Previous Articles     Next Articles

Network Reliability Analysis of Power Monitoring System Based on Improved Fuzzy ComprehensiveEvaluation Method

BING Ying’ao1, WANG Wenting2, SUN Shengze1, LIU Xin2, NIE Qigui2, LIU Jing2   

  1. 1 School of Computer Science,Northeast Electric Power University,Jilin 132012,China;
    2 State Grid Shandong Electric Power Research Institute,Jinan 250013,China
  • Online:2023-06-10 Published:2023-06-12
  • About author:BING Ying’ao,born in 1999,postgra-duate.His main research interests include power system security and network security. WANG Wenting,born in 1988,postgraduate.Her main research interests include power system security,network security and ICT(information and communications technology).
  • Supported by:
    State Grid Shandong Electric Power Company Technology Project(520626220029).

Abstract: Network attacks emerge one after another,and the importance of risk management and control in the power industry is increasing day by day.However,complex and new network attack methods,missing system loopholes in production equipment,and the complexity of the integration of physical and information networks will undoubtedly bring forward the risk management and control of power monitoring systems.Aiming at how to comprehensively,accurately and reasonably judge the network reliability of the power monitoring system under the comprehensive influence of multiple factors,a sound reliability evaluation system is established,and a reliability evaluation model of the power monitoring system based on fuzzy evaluation is proposed.This paper starts with the loopholes existing in the equipment nodes of the power monitoring system,and comprehensively analyzes the risks in the system and the environmental risks outside the system,so that the power monitoring system can be safely graded during the operation process to make security decisions.This method adopts network security classification.The standard is combined with the industrial system vulnerability database to establish an evaluation index system,and the reliability evaluation index is determined from the three aspects of network communication reliability,business reliability,and system reliability.The reliability analysis of the power monitoring and monitoring system is carried out,targeted maintenance is carried out according to the evaluation results,and more accurate quantitative indicators are used to achieve fine-grained risk assessment in the evaluation process.Finally,a set of semi-virtual system environment synthesis is built for power.The risk level and reliability of the power monitoring system are analyzed and evaluated to verify the validity of the reliability evaluation method.

Key words: Power monitoring system, Gray wolf optimization algorithm, Fuzzy comprehensive evaluation, Analytic hierarchy process, Network reliability evaluation model

CLC Number: 

  • TP393
[1]ZHAN X,GUO H,HE X Y,et al.Research on security risk assessment method of state grid edge computing information system[J].Computer Science,2019,46(S2):428-432.
[2]WANG H,ZHANG J,ZHAO Y,et al.A new Bayesian model for network risk assessment[J].Small and Microcomputer Systems,2020,41(9):1898-1904.
[3]DING M S,SUN W J,CAI X P,et al.Risk assessment and prevention of extreme events in power system[J].China Electric Power,2020,53(1):32-39,65.
[4]WANG W H,GUO P,ZHU J,et al.Risk assessment and fault location method of relay protection system based on fault tree and Bayesian network[J].Journal of Electric Power Science and Technology,2021,36(4):81-90.
[5]YIN J J,ZHAO D M.Power system backup risk assessmentmethod based on full probability risk measurement[J].Electric Power Automation Equipment,2020,40(1):156-162.
[6]BU Y,GAO C H,LI W F,et al.Risk assessment of power system under the framework of big data[J].Power Grid and Clean Energy,2021,37(1):77-83.
[7]WEI Y,CUI J B,LIU X T,et al.Reliability analysis method of power system wide area protection communication system based on improved dynamic fault Tree[J].Power System Protection and Control,2021,49(23):171-177.
[8]ZHU R C,LI X,LIN X N.Security risk analysis method of video private network based on Bayesian network[J].Information Network Security,2021,21(12):91-101.
[9]ZHOU W,ZHANG H,LI B H.Network risk assessment me-thod based on attack and defense state graph model[J].Journal of Southeast University(Natural Science Edition),2016,46(4):688-694.
[10]FU J J,WU Z H,SHI Z.Reliability optimization algorithm for power communication network based on improved clustering algorithm[J].Computing Technology and Automation,2020,39(4):92-95.
[11]LI W T,JIAO Y L,YANG Z L,et al.Risk assessment of centralized control wind farm based on probabilistic neural network[J].Electrical Measurement and Instrumentation,2019,56(17):76-81,152.
[12]LI S B,LI J,TANG G,et al.Network security status prediction and risk assessment method of industrial control system based on HMM[J].Information Network Security,2020,20(9):57-61.
[13]YANG H Y,YUAN H H,ZHANG L.A network host noderisk assessment method based on host importance[J/OL].Journal of Beijing University of Posts and Telecommunications,2022:1-5.
[14]HE Y G,LIU J.Security Risk Assessment of Power Internet of Things Based on Combination Empowerment-Cloud Model[J].Power SystemTechnology,2020,44(11):4302-4309.
[15]ZHAO X L,ZHAO B,ZHAO J J,et al.Research on network security measurement method based on attack identification[J].Information Network Security,2021,21(11):17-27.
[16]WANG Y,LIU Y,SONG W H.Research on the evaluationmethod of emergency response capability of petrochemical enterprises based on fuzzy comprehensive evaluation method[J].Journal of Nankai University(Natural Science Edition),2021,54(6):75-80.
[17]LI H,YANG J F.Design of reliability assessment software for substation automation system based on fault tree analysis me-thod[J].Automation and Instrumentation,2016(2):138-141.
[1] ZHAO Xuefeng, HOU Xiao, SUN Zhe, LI Mengxuan. Multidimensional Evaluation Method for Domestic Building Information Modeling Software Based on Entropy-Weight-AHP and Cloud Model [J]. Computer Science, 2023, 50(6A): 220400216-9.
[2] CHU An-qi, DING Zhi-jun. Application of Gray Wolf Optimization Algorithm on Synchronous Processing of Sample Equalization and Feature Selection in Credit Evaluation [J]. Computer Science, 2022, 49(4): 134-139.
[3] LIU Zi-qi, GUO Bing-hui, CHENG Zhen, YANG Xiao-bo and YIN Zi-qiao. Science and Technology Strategy Evaluation Based on Entropy Fuzzy AHP [J]. Computer Science, 2020, 47(6A): 1-5.
[4] ZHENG Geng-feng. Emergency Plan Evaluation of Special Equipment Accident Based on Intuitionistic Fuzzy Analytic Hierarchy Process [J]. Computer Science, 2020, 47(6A): 616-621.
[5] WU Yu-kun,XIAO Jie,Wei William LEE,LOU Ji-lin. Support Vector Machine Model Based on Grey Wolf Optimization Fused Asymptotic [J]. Computer Science, 2020, 47(2): 37-43.
[6] YUE Wen-jiao, LI Peng, WEN Jun-hao, XING Bin. Study on Impact Assessment Model of Enterprise Data Application [J]. Computer Science, 2020, 47(11A): 520-523.
[7] ZHONG Ma-chi, ZHANG Jun-lang, LAN Yang-bo, HE Yue-hua. Study on Online Education Focus Degree Based on Face Detection and Fuzzy Comprehensive Evaluation [J]. Computer Science, 2020, 47(11A): 196-203.
[8] FENG Shen-feng, GAO Jian-hua. Test Case Prioritization Method Based on AHP for Regression Testing [J]. Computer Science, 2019, 46(8): 233-238.
[9] HENG Hong-jun, WANG Rui. Long-term Operational Situation Assessment System for Terminal Buildings [J]. Computer Science, 2019, 46(5): 310-314.
[10] ZHENG Zhi-yun, JIA Chun-yuan, WANG Zhen-fei and LI Dun. Computing Research of User Similarity Based on Micro-blog [J]. Computer Science, 2017, 44(2): 262-266.
[11] WAN Xue-lian and ZHANG Jing-he. Research on Comprehensive Assessment Method of Information System Security Based on System Attack and Defense [J]. Computer Science, 2016, 43(Z6): 322-327.
[12] LUO Feng-e, ZHANG Cheng-wei and LIU An. Flight Delays Early Warning Management and Analysis Based on Data Mining [J]. Computer Science, 2016, 43(Z6): 542-546.
[13] XU Wen-hua, CHEN Hai-yan, ZHANG Yu-ping and WANG Jian-dong. Fuzzy Comprehensive Evaluation Method Based on Measure of Medium Truth Degree [J]. Computer Science, 2016, 43(2): 204-209.
[14] SHAN Mei-jing. Analytic Hierarchy Process-based Assessment Method on Mobile Payment Security [J]. Computer Science, 2015, 42(Z11): 368-371.
[15] CHEN Xi-hong, JIN Yue-hui and YANG Tan. Study on Quality Assessment Model for Mobile Videos over 3G Network [J]. Computer Science, 2015, 42(9): 86-93.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!