Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 428-432.

• Information Security • Previous Articles     Next Articles

Research on Security Risk Assessment Method of State Grid Edge Computing Information System

ZHAN Xiong1,2, GUO Hao1,2, HE Xiao-yun1,2, LIU Zhou-bin3, SUN Xue-jie4, CHEN Hong-song4   

  1. (Global Energy Interconnection Research Institute Co.,Ltd,Beijing 102209,China)1;
    (State Grid Key Laboratory of Information & Network Security,Beijing 102209,China)2;
    (State Grid Zhejiang Electric Power Research Institute co.,ltd,Hangzhou 310014,China)3;
    (School of Computer and Communication Engineering,University of Science and Technology Beijing,Beijing 100083,China)4
  • Online:2019-11-10 Published:2019-11-20

Abstract: Based on the risk assessment theory,this paper proposed a risk analytic method based on fuzzy analytic hiera-rchy process for State Grid Corporation of China Edge Computing Information System.The security assessment items of five aspects of equipment layer,data layer,network layer,application layer and management layer are given.On the basis of this,for the aspect of network security,the importance degree of the evaluation item is compared by analytichie-rarchy process.And then combined with fuzzy comprehensive evaluation matrix,the overall security evaluation value of network security is calculated,and risk assessment on network security is conducted,andthe security assessment results are compared in different scenarios.Finally,the Microsoft threat modeling tool is used to construct the State Grid Corporation of China Edge Computing Information System threat model,which is used to analyze and reinforce the risk.

Key words: Edge calculation, Information security, Risk assessment, Smart grid

CLC Number: 

  • TP309
[1]吕华章,陈丹,范斌,等.边缘计算标准化进展与案例分析[J].计算机研究与发展,2018,55(3):487-511.
[2]GB/T 22239:信息安全技术 网络安全等级保护基本要求 第1部分:通用要求[S].中国国家标准化管理委员会.北京:中国标准出版社.
[3]GB/T 22239:信息安全技术 网络安全等级保护基本要求 第4部分:物联网安全扩展要求[S].中国国家标准化管理委员会.北京:中国标准出版社.
[4]GB/T 28448:信息安全技术 网络安全等级保护评测要求 第1部分:安全通用要求[S].中国国家标准化管理委员会,北京:中国标准出版社.
[5]GB/T 28448:信息安全技术 网络安全等级保护评测要求 第4部分:物联网安全扩展要求[S].中国国家标准化管理委员会.北京:中国标准出版社.
[6]GB/T 28449:信息安全技术网络安全等级保护测评过程指南[S].中国国家标准化管理委员会.北京:中国标准出版社.
[7]杨小彬,李和明,尹忠东,等.基于层次分析法的配电网能效指标体系[J].电力系统自动化,2013,37(21):146-150.
[8]LANGER L,SKOPIK F,SMITH P,et al.From old to new:assessing cybersecurity risks for an evolving smart grid[J].Computers & Security,2016,62:165-176.
[9]苑嘉航,李存斌.基于灰关联和D-S证据理论电网企业信息安全风险评估[J].陕西电力,2014,42(2):11-15.
[10]徐洋,谢晓尧.信息安全等级保护测评量化模型[M].武汉:武汉大学出版社,2017.
[11]WILLIAMS I,YUAN X.Evaluating the effectiveness of Microsoft threat modeling tool[C]∥Information Security Curriculum Development Conference.ACM,2015:76-83.
[12]张佳乐,赵彦超,陈兵,等.边缘计算数据安全与隐私保护研究综述[J].通信学报,2018,39(3):1-21.
[13]陈红松,王钢,宋建林.基于云计算入侵检测数据集的内网用户异常行为分类算法研究[J].信息网络安全,2018,18(3):1-7.
[1] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[2] XIAO Ding, ZHANG Yu-fan, JI Hou-ye. Electricity Theft Detection Based on Multi-head Attention Mechanism [J]. Computer Science, 2022, 49(1): 140-145.
[3] YONG Qi, JIANG Wei-na, LUO Yu-ze. Trial Risk Assessment System Based on Fuzzy Number Similarity [J]. Computer Science, 2021, 48(5): 209-216.
[4] WANG Xiao-xiao, WANG Ting-wen, MA Yu-ling, FAN Jia-yi, CUI Chao-ran. Credit Risk Assessment Method of P2P Online Loan Borrowers Based on Deep Forest [J]. Computer Science, 2021, 48(11A): 429-434.
[5] XIAO Yong, JIN Xin, FENG Jun-hao. Cross-layer Matching Mechanism of Link Communication Rate for Heterogeneous Communication in Power System [J]. Computer Science, 2021, 48(11A): 495-499.
[6] LIU Shan-shan, ZHU Hai-long, HAN Xiao-xia, MU Quan-qi, HE Wei. Enterprise Risk Assessment Model Based on Principal Component Regression and HierarchicalBelief Rule Base [J]. Computer Science, 2021, 48(11A): 570-575.
[7] GU Shuang-jia, LIU Wan-ping, HUANG Dong. Application of Express Information Encryption Based on AES and QR [J]. Computer Science, 2021, 48(11A): 588-591.
[8] XIAO Yong, JIN Xin, WANG Li-bo and LUO Hong-xuan. Research on Intelligent Multi-mode Gonverged Gateway Device Based on AMI [J]. Computer Science, 2020, 47(6A): 289-293.
[9] WANG Yi-rou,ZHANG Da-min,XU Hang,SONG Ting-ting,FAN Ying. Spectrum Allocation Strategy for Neighborhood Network Based Cognitive Smart Grid [J]. Computer Science, 2020, 47(3): 267-272.
[10] LI Bin, ZHOU Qing-lei, SI Xue-ming, CHEN Xiao-jie. Optimized Implementation of Office Password Recovery Based on FPGA Cluster [J]. Computer Science, 2020, 47(11): 32-41.
[11] YAN Gong-da, DONG Peng, WEN Hao-lin. Simulation Modeling of Complex Engineering Project Schedule Risk AssessmentBased on Multi Agent [J]. Computer Science, 2019, 46(6A): 523-526.
[12] SUN Lian-shan, OUYANG Xiao-tong, XU Yan-yan, WANG Yi-xing. Novel Sanitization Approach for Indirect Dependencies in Provenance Graph [J]. Computer Science, 2019, 46(3): 164-169.
[13] YE Zi-wei, GUO Yuan-bo, LI Tao, JU An-kang. Extended Attack Graph Generation Method Based on Knowledge Graph [J]. Computer Science, 2019, 46(12): 165-173.
[14] WANG Hui, ZHOU Ming-ming. Medical Information Security Storage Model Based on Blockchain Technology [J]. Computer Science, 2019, 46(12): 174-179.
[15] YANG De-jie, ZHANG Ning, YUAN Ji, BAI Lu. Individual Credit Risk Assessment Based on Stacked Denoising Autoencoder Networks [J]. Computer Science, 2019, 46(10): 7-13.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!