Journal of East China Normal University(Natural Science) ›› 2023, Vol. 2023 ›› Issue (5): 182-192.doi: 10.3969/j.issn.1000-5641.2023.05.015
• Data Analytics • Previous Articles Next Articles
Zhi XU1(), Jun CHEN1, Zhiyong ZHANG1, Junling WAN2, Peisen YUAN2,*()
Received:
2023-07-08
Accepted:
2023-07-08
Online:
2023-09-25
Published:
2023-09-20
Contact:
Peisen YUAN
E-mail:876722081@qq.com;peiseny@njau.edu.cn
CLC Number:
Zhi XU, Jun CHEN, Zhiyong ZHANG, Junling WAN, Peisen YUAN. Network security assessment based on hidden Markov and artificial immunization in new power systems[J]. Journal of East China Normal University(Natural Science), 2023, 2023(5): 182-192.
Table 2
Matrix of security state I"
安全事件 | 网络安全防范措施 | |||
| | | | |
| | | | |
| | (1/2)P、(1/2)I | (1/2)P、(1/2)I | |
| | (1/4)I、(3/4)A | (1/2)A、(1/2)I | |
| | (1/4)I、(3/4)C | (1/2)C、(1/2)I | |
Table 5
Comparison of the different network security states of the algorithms at different moments"
算法/状态 | 安全状态 | 预攻击状态 | 入侵状态 | 攻陷状态 |
本文算法 | 10 min 前, 170 min, 180 min | 10~60 min, 135 min, 150 min, 190~200 min | 60~85 min, 100~190 min 主要是入侵状态 | 90~100 min |
Xi | 20 min 前, 160 min 后 | 20~70 min | 70~160 min | / |
Arnes | 15 min 前 | 15 min 后 | / | / |
Haslum | 安全状态和预攻击状态两种状态相互交替出现 | / | / | |
遗传算法 | 几种状态下的概率值没有大和明显小的状态概率 | / |
1 | 胡厚鹏, 肖艳红, 吴才远, 等.. 计及多端互联通信的智能电网AMI新型密钥管理方案. 西南师范大学学报(自然科学版), 2023, 48 (3): 9- 16. |
2 | 陈伟雄, 杨晓晨, 春增军, 等.. 电力企业网络安全威胁情报管理体系的研究与实践. 电信科学, 2022, 38 (7): 184- 189. |
3 | 金志刚, 刘凯, 武晓栋.. 智能电网AMI领域IDS研究综述. 信息网络安全, 2023, 23 (1): 1- 8. |
4 | WANG S, CHEN H, ZHAO Q, et al.. Preserving scheme for user’s confidential information in smart grid based on digital watermark and asymmetric encryption. Journal of Central South University, 2022, 29 (2): 726- 740. |
5 | 周劼英, 张晓, 邵立嵩, 等.. 新型电力系统网络安全防护挑战与展望. 电力系统自动化, 2023, 47 (8): 15- 24. |
6 | 欧家祥, 胡厚鹏, 何沛林, 等.. 基于国密算法的电网AMI数据安全防护技术. 西南师范大学学报(自然科学版), 2023, 48 (3): 17- 24. |
7 | 赵小林, 曾冲寒, 薛静锋, 等.. 基于TOPSIS的多维网络安全度量模型研究. 北京理工大学学报, 2021, 41 (3): 311- 321. |
8 | 王增平, 林一峰, 王彤, 等.. 电力系统继电保护与安全控制面临的挑战与应对措施. 电力系统保护与控制, 2023, 51 (6): 10- 20. |
9 | 严康, 陆艺丹, 于宗超, 等.. 配电网用户侧异构电力物联设备安全研究综述及展望. 电力自动化设备, 2023, 43 (3): 146- 158. |
10 | REN J.. Network security situation assessment model based on information quality control. International Journal of Performability Engineering, 2020, 16 (4): 673- 680. |
11 | 蒋文辉, 席禹, 于力, 等.. 基于智能电网服务器的网络安全可视化研究. 自动化与仪表, 2023, 38 (4): 6- 9. |
12 | 肖鹏, 王柯强, 黄振林.. 基于IABC和聚类优化RBF神经网络的电力信息网络安全态势评估. 智慧电力, 2022, 50 (6): 100- 106. |
13 | 王金恒, 单志龙, 谭汉松, 等.. 基于遗传优化PNN神经网络的网络安全态势评估. 计算机科学, 2021, 48 (6): 338- 342. |
14 | LIU Z, YANG C, LIU Y, et al.. A BIPMU-based network security situation assessment method for wireless network. Computer Standards & Interfaces, 2023, 83, 103661. |
15 | 苏鹏涛, 吴贶, 陈孟婕, 等.. 基于隐马尔可夫模型的电力信息系统动态威胁定量分析. 上海理工大学学报, 2022, 44 (4): 388- 396. |
16 | 段青青.. 基于HMM算法的英语形音匹配可视分析. 计算机应用与软件, 2021, 38 (8): 44- 50. |
17 | 张明恒, 刘朝阳, 郭政先, 等.. 基于GM-HMM的驾驶人疲劳状态检测. 大连理工大学学报, 2021, 61 (4): 399- 407. |
18 | KHREICH W, GRANGER E, MIRI A, et al.. Adaptive ROC-based ensembles of HMMs applied to anomaly detection. Pattern Recognition, 2012, 45 (1): 208- 230. |
19 | 徐佳伟, 罗倩.. 基于遗传非参数MDL-BW方法的HMM结构优化. 电子学报, 2022, 50 (11): 2765- 2772. |
20 | ÅRNES A, SALLHAMMAR K, HSALUM K, et al. Real-time risk assessment with network sensors and intrusion detection systems[C]// Computational Intelligence and Security: International Conference. Berlin, Heidelberg: Springer-Verlag, 2005: 388-397. |
21 | LI B, WU F, LIU J, et al.. Real-time scheduling of virtual power system based on the hidden Markov model. Journal of Physics: Conference Series, 2022, 2401 (1): 012023. |
22 | 张铠翔, 姜文刚.. 基于人工免疫的渐消容积粒子滤波目标跟踪算法. 计算机应用与软件, 2022, 39 (12): 266- 271. |
23 | 李涛, 兰小龙, 李贝贝, 等.. 内生安全支撑的新型网络体系结构与关键技术研究构想与成果展望. 工程科学与技术, 2023, 55 (2): 1- 13. |
24 | 琚安康, 郭渊博, 李涛, 叶子维.. 基于网络通信异常识别的多步攻击检测方法. 通信学报, 2019, 40 (7): 57- 66. |
25 | 马云珍. 网络多步攻击场景还原及预测关键技术研究 [D]. 哈尔滨: 哈尔滨工程大学, 2017. |
26 | 席荣荣, 云晓春, 张永铮, 等.. 一种改进的网络安全态势量化评估方法. 计算机学报, 2015, 38 (4): 749- 758. |
27 | 常利伟, 刘秀娟, 钱宇华, 等.. 基于卷积神经网络多源融合的网络安全态势感知模型. 计算机科学, 2023, 50 (5): 382- 389. |
28 | ÅRNES A, VALEUR F, VIGNA G, et al. Using hidden Markov models to evaluate the risks of intrusions: System architecture and model validation [C]// ZAMBONI D, KRUEGEL C. Recent Advances in Intrusion Detection: 9th International Symposium. Berlin, Heidelberg: Springer-Verlag, 2006: 145-164. |
29 | HASLUM K, MOE M E G, KNAPSKOG S J. Real-time intrusion prevention and security analysis of networks using HMMs [C]// 2008 33rd IEEE Conference on Local Computer Networks (LCN). IEEE, 2008: 927-934. |
30 | 李伟明, 雷杰, 董静, 等.. 一种优化的实时网络安全风险量化方法. 计算机学报, 2009, 32 (4): 793- 804. |
[1] | Jie WANG, Wenrui HUANG, Shengyu ZHAO, Xiaoya XIA, Fanyu HAN, Wei WANG, Yanbin ZHANG. OpenRank contribution evaluation method and empirical study in open-source course [J]. Journal of East China Normal University(Natural Science), 2024, 2024(5): 11-19. |
[2] | Jiarui ZHANG, Qiming ZHANG, Fenglin BI, Yanbin ZHANG, Wei WANG, Erjin REN, Haili ZHANG. Locally lightweight course teaching-assistant system based on IPEX-LLM [J]. Journal of East China Normal University(Natural Science), 2024, 2024(5): 162-172. |
[3] | Yanli FENG, Yu ZHOU, Fuxing HUANG, Junling WAN, Peisen YUAN. Study on short-term electricity load forecasting based on SF-Transformer for intelligent education platform [J]. Journal of East China Normal University(Natural Science), 2024, 2024(5): 173-182. |
[4] | Junlin REN, Huan WANG, Xiaodi HUANG, Yanting LI, Shenggen JU. Sequence-aware and multi-type behavioral data driven knowledge concept recommendation for massive open online courses [J]. Journal of East China Normal University(Natural Science), 2024, 2024(5): 45-56. |
[5] | Zhirui CHEN, Xuesong LU. Prompting open-source code large language models for student program repair [J]. Journal of East China Normal University(Natural Science), 2024, 2024(5): 93-103. |
[6] | Linding XIE, Yuan ZHANG, Yihong CAI. Bioinformatics-based construction of immune prognostic gene model for hepatocellular carcinoma and preliminary model validation [J]. Journal of East China Normal University(Natural Science), 2024, 2024(4): 100-110. |
[7] | Sijing RAO, Ying XIN, Junjun PAN. Skinning in character animation based on implicit surface [J]. Journal of East China Normal University(Natural Science), 2024, 2024(2): 143-156. |
[8] | Luping FENG, Liye SHI, Wen WU, Jun ZHENG, Wenxin HU, Wei ZHENG. Collaborative stranger review-based recommendation [J]. Journal of East China Normal University(Natural Science), 2024, 2024(2): 53-64. |
[9] | Yongzhuo ZHANG, Qingfeng ZHUGE, Edwin Hsing-Mean SHA, Yuhong SONG. Parallel block-based stochastic computing with adapted quantization [J]. Journal of East China Normal University(Natural Science), 2024, 2024(2): 76-85. |
[10] | Xin LU, Chang HUANG, Zhiwei JIN. Multi-view and multi-pose lock pin point cloud model reconstruction based on turntable [J]. Journal of East China Normal University(Natural Science), 2024, 2024(2): 86-96. |
[11] | Lingxiao TANG, Chang HUANG. Infrared small-target detection method based on double-layer local energy factor [J]. Journal of East China Normal University(Natural Science), 2024, 2024(2): 97-107. |
[12] | Shirui WANG, Fang SHEN, Renhu LI, Peng LI. Research on water surface glint removal and information reconstruction methods for unmanned aerial vehicle hyperspectral images [J]. Journal of East China Normal University(Natural Science), 2024, 2024(1): 36-49. |
[13] | Kaiyan XIAO, Jie LIAN. Sentence classification algorithm based on multi-kernel support vector machine [J]. Journal of East China Normal University(Natural Science), 2023, 2023(6): 85-94. |
[14] | Ruibo CUI, Feng WANG. Momentum-updated representation with reconstruction constraint for limited-view 3D object recognition [J]. Journal of East China Normal University(Natural Science), 2023, 2023(6): 61-72. |
[15] | Daojia CHEN, Zhiyun CHEN. Hierarchical description-aware personalized recommendation system [J]. Journal of East China Normal University(Natural Science), 2023, 2023(6): 73-84. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||