针对电力监控自动化系统中信息安全隐患问题,提出一种电力监控自动化系统中信息安全漏洞分析方法。该方法采用自动化监控与智能化处理技术来分析系统中信息安全漏洞情况,采用基于马尔科夫链在支持向量机优化算法的优化组合分析系统中存在的安全问题,通过智能模块分析终端上传的检测数据推算出系统内信息安全对系统的影响,从而制定出最优解决方案。实验结果表明,通过该方法检测出的数据精准度高达90%以上,表明该研究基于信息安全漏洞分析方法的正确性,为完善信息安全漏洞分析技术奠定了基础。
Abstract
Aiming at the hidden danger of information security in power monitoring automation system,an analysis method of information security vulnerabilities in power monitoring automation system is proposed.This method uses automatic monitoring and intelligent processing technology to analyze the information security vulnerabilities in the system,and adopts the optimization combination of Markov chain optimization algorithm in support vector machine to analyze the existing security problems in the system.Through the analysis of the detection data uploaded by the intelligent module to the terminal,the impact of information security in the system on the system is calculated,and the optimal solution is formulated.The test results show that the accuracy of the data detected by the system technology is more than 90%,indicating the correctness of the method based on information security vulnerability analysis.This research lays a technical foundation for the next step of information security vulnerability analysis technology.
关键词
电力监控自动化 /
信息安全 /
漏洞分析 /
马尔科夫链
Key words
power monitoring automation /
information security /
vulnerability analysis /
Markov chain
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
参考文献
[1] 苏东,马仲能,李成翔,等.配网开关柜全生命周期成本模型及敏感度分析[J].电力系统保护与控制,2018,46(1):150-155.
[2] 赖英旭,刘静,刘增辉,等.工业控制系统脆弱性分析及漏洞挖掘技术研究综述[J].北京工业大学学报,2020,46(6):571-582.
[3] Liu Y S.Research on Application Technology of Converged Communication Technology in Power Line Monitoring[D].Chengdu:University of Electronic Science and Technology of China,2019,1(2):10-56.
[4] 曲泷玉,贾依真,郝永乐.结合CNN和文本语义的漏洞自动分类方法[J].北京理工大学学报,2019,39(7):5.
[5] 许健,陈平华,熊建斌.融合滑动窗口和哈希函数的代码漏洞检测模型[J].计算机应用研究,2021,38(8):7-26.
[6] 王剑,匡洪宇,李瑞林,等.基于CNN-GAP可解释性模型的软件源码漏洞检测方法[J].电子与信息学报,2022,44(7):8-19.
[7] 叶子维,郭渊博,琚安康.动静态特征结合的漏洞风险评估及缓解方法[J].计算机应用研究,2020,37(4):5-20.
[8] 沈文婷,丁宜鹏,郭卫,等.计算机网络安全与漏洞扫描技术的应用研究[J].科技与创新,2018(1):154-155.
[9] Reshmi T R.Information security breaches due to ransomware attacks - a systematic literature review[J].International Journal of Information Management Data Insights,2021,1(2):10-56.
[10] 熊强,杨欣琦,李治文.网络安全漏洞信息披露中多元参与主体行为策略演化博弈分析[J].运筹与管理,2021,30(7):8-28.
[11] 文敏,王荣存,姜淑娟.基于关系图卷积网络的源代码漏洞检测[J].计算机应用,2022,42(6):8-32.
基金
*国网山西省电力公司科技项目—信息网络平行仿真平台研究(SX2202345)。