Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200158-7.doi: 10.11896/jsjkx.241200158

• Information Security • Previous Articles     Next Articles

Cooperative Defense Method for Network Space Object of Power Monitoring System

LI Xiaogeng1, HAN Xiao1, XIAO Haiyi2   

  1. 1 Yunnan Power Grid Corporation Yunnan Power Dispatch Control Centre,Kunming 650000,China
    2.Chuxiong Electric Power Supply Bureau,Yunnan Power Grid,Chuxiong,Yunnan 675000,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    China Southern Power Grid Co.,Ltd.(0500002023030301XT00152).

Abstract: The power monitoring system is the core facility for ensuring stable power supply.Currently,most of the network security defense measures for power monitoring systems are based on fixed strategies,which often lack specificity for the current system environment and security events.Moreover,implementing such defense strategies can also have a significant impact on the normal operation of system business.To solve the above problem,a cooperative defense method for network space object is proposed.Firstly,in order to block network threats,IP tracing technology is used to redraw the attack path,taking into account the number of hops between nodes and the attacked object in the attack path,as well as the network traffic at nodes.A fitness function is constructed,and the optimal blocking position is determined based on the idea of improved genetic algorithm.Secondly,based on the types of objects,it formulates defense strategies for classifying objects,introduces a defense action correlation calculation model,and determines specific defense actions.Simulation experiments show that the proposed network space objectco-operative defense method has significant advantages in selecting and executing defense actions,as well as defense effectiveness,which can minimize the impact of defense actions on normal system operations.

Key words: Power monitoring system, Network space, Cooperative defense, Genetic algorithm, Correlation analysis

CLC Number: 

  • TM933
[1]ZHOU Q X et al.Detection resource allocation scheme for two-layer cooperative IDSs in smartgrids[J].Journal of Parallel and Distributed Computing,2021,147:236-247.
[2]SARASWATHI S.Enforcing a source-end cooperative multil-evel defense mechanism to counter floodingattack[J].Computer Systems Science and Engineering,2023,44(1):67-79.
[3]LI L X,ZHANG B,WU H M,et al.A novel network proactive defense model:anomaly driven dynamic cooperative defense model[C]//IOP Conference Series:Materials Science and Engineering.2018.
[4]FANRONG W et al.Substation area joint defensive protection strategy based on distributed cooperative all-in-onedevice[J].Journal of Modern Power Systems and Clean Energy,2016,4(3):467-477.
[5]HONG Q Z,ZI W,WEI L,et al.A method of conflict detectionfor cooperative defense strategy in power industrial control system[J].International Conference on Advanced Cloud and Big Data,2020.
[6]CAI X P.Research on information-physical collaborativedefence methods for power system cyber attacks[D].Najjing:Southeast University,2021.
[7]LI W,HE H.Design and implementation of a multi-level backup automatic blocking system for source-network-load interaction[J].Computer Applications and Software,2020,37(9):302-309,333.
[8]XIAO Y X,MU T,QIN Z Y,et al.Exploration of water resources network security collaborative defence system based on software defined security[J].Pearl River,2023,44(2):122-128,133.
[9]TAN S S.Design and implementation of an attack blocking system for virtual-real networks[D].Beijing:Beijing University of Posts and Telecommunications,2015.
[10]WANG Z,WANG Z H,HAN Y,et al.Research on multi-layercollaborativedefence model for power system network security[J].Computer Engineering,2021,47(12):131-140.
[11]SONG L,FAN Y,LIU M,et al.State estimation method of a new energy power system based on SC-DNN and multi-source datafusion[J].Power System Protection and Control,2023,51:177-187.
[12]LIU J Q,W R.An overview of new information transmission methods for powersystems[J].Journal of Northeast Dianli University,2024,44(4):1-8,76.
[13]ZHANG D,ZHANG Y,ZANG X X.Anomalous Intrusion Detection Method for Surveillance Video Based on Self-Organising Mathematical Models[J].Journal of Northeast Dianli University,2022,42(4):63-69.
[14]HAN Y,WANG Y,CAO Y,et al.A novel wrapped feature selection framework for developing power system intrusion detection based on machine learning methods[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems,2023,53(11):7066-7076.
[15]YAN B,JIANG Z,YAO P,et al.Game Theory based optimaldefensive resources allocation with incomplete information in cyber-physical power systems against false data injection attacks[J].Protection and Control of Modern Power Systems,2024,9(2):115-127.
[16]LIU C,ZHU H,ZHOU M,et al.Phase shiftingtransformer-based mitigation strategy for load redistribution attacks in po-wer system optimal power flow[J].IEEE Transactions on Smart Grid,2024,15(5):5127-5138.
[17]CHANG Z,WU J,LIANG H,et al.A review of power system false data attack detection technology based on bigdata[J].Information,2024,15(8):439.
[18]ABDELKADER S,AMISSAH J,KINGA S,et al.Securing mod-ern power systems:implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks[J].Results in Engineering,2024:102647.
[19]ZHANG S,YANG Y,ZHOU Z,et al.DIBAD:A disentangled information bottleneck adversarial defense method using Hilbert-Schmidt independence criterion for spectrum security[J].IEEE Transactions on Information Forensics and Security,2024,19:3879-3891.
[1] WANG Wei, ZHAO Yunlong, PENG Xiaoyu, PAN Xiaodong. TSK Fuzzy System Enhanced by TSVR with Cooperative Parameter Optimization [J]. Computer Science, 2025, 52(7): 75-81.
[2] HUANG Ao, LI Min, ZENG Xiangguang, PAN Yunwei, ZHANG Jiaheng, PENG Bei. Adaptive Hybrid Genetic Algorithm Based on PPO for Solving Traveling Salesman Problem [J]. Computer Science, 2025, 52(6A): 240600096-6.
[3] WANG Sitong, LIN Rongheng. Improved Genetic Algorithm with Tabu Search for Asynchronous Hybrid Flow Shop Scheduling [J]. Computer Science, 2025, 52(4): 271-279.
[4] LANG Aoqi, HUANG Weijie, YU Zhiyong, HUANG Fangwan. Spatiotemporal Active-sampling and Joint Inference of Urban Air Quality Data [J]. Computer Science, 2025, 52(11A): 241000116-9.
[5] JIANG Yakun, LIN Xu. Intrusion Detection Method for Power Monitoring System Based on Multi-source Network Data [J]. Computer Science, 2025, 52(11A): 241200157-7.
[6] YU Ping, YAN Hui, BAO Jie, GENG Xiaozhong. MEC Network Task Offloading and Migration Strategy Based on Optimization Model [J]. Computer Science, 2025, 52(11A): 241200215-6.
[7] XU Haitao, CHENG Haiyan, TONG Mingwen. Study on Genetic Algorithm of Course Scheduling Based on Deep Reinforcement Learning [J]. Computer Science, 2024, 51(6A): 230600062-8.
[8] HUANG Fei, LI Yongfu, GAO Yang, XIA Lei, LIAO Qinglong, DAI Jian, XIANG Hong. Scheduling Optimization Method for Household Electricity Consumption Based on Improved Genetic Algorithm [J]. Computer Science, 2024, 51(6A): 230600096-6.
[9] LI Zhibo, LI Qingbao, LAN Mingjing. Method of Generating Test Data by Genetic Algorithm Based on ART Optimal Selection Strategy [J]. Computer Science, 2024, 51(6): 95-103.
[10] WANG Baocai, WU Guowei. Feature-weighted Counterfactual Explanation Method:A Case Study in Credit Risk Control Scenarios [J]. Computer Science, 2024, 51(12): 259-268.
[11] ZHONG Linhui, YANG Chaoyi, XIA Zihao, HUANG Qixuan, QU Qiaoqiao, LI Fangyun, SUN Wenbin. Style-oriented Software Architecture Evolution Path Generation Method [J]. Computer Science, 2024, 51(11A): 240100130-9.
[12] JIANG Yibo, ZHOU Zebao, LI Qiang, ZHOU Ke. Optimization of Low-carbon Oriented Logistics Center Distribution Based on Genetic Algorithm [J]. Computer Science, 2024, 51(11A): 231200035-6.
[13] HAN Huijian, LIU Kexin, LIN Xue. Air Quality Fuzzy Cognitive Map Forecasting Based on Niche Genetic Algorithm [J]. Computer Science, 2024, 51(11A): 240300120-6.
[14] SI Jianpeng, HONG Zheng, ZHOU Zhenji, CHEN Qian, LI Tao. Keyword Sensitive Fuzzing Method for Embedded Device Firmware [J]. Computer Science, 2024, 51(10): 196-207.
[15] LIU Xuanyu, ZHANG Shuai, HUO Shumin, SHANG Ke. Microservice Moving Target Defense Strategy Based on Adaptive Genetic Algorithm [J]. Computer Science, 2023, 50(9): 82-89.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!