Aiming at the hidden danger of information security in power monitoring automation system,an analysis method of information security vulnerabilities in power monitoring automation system is proposed.This method uses automatic monitoring and intelligent processing technology to analyze the information security vulnerabilities in the system,and adopts the optimization combination of Markov chain optimization algorithm in support vector machine to analyze the existing security problems in the system.Through the analysis of the detection data uploaded by the intelligent module to the terminal,the impact of information security in the system on the system is calculated,and the optimal solution is formulated.The test results show that the accuracy of the data detected by the system technology is more than 90%,indicating the correctness of the method based on information security vulnerability analysis.This research lays a technical foundation for the next step of information security vulnerability analysis technology.
Key words
power monitoring automation /
information security /
vulnerability analysis /
Markov chain
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
References
[1] 苏东,马仲能,李成翔,等.配网开关柜全生命周期成本模型及敏感度分析[J].电力系统保护与控制,2018,46(1):150-155.
[2] 赖英旭,刘静,刘增辉,等.工业控制系统脆弱性分析及漏洞挖掘技术研究综述[J].北京工业大学学报,2020,46(6):571-582.
[3] Liu Y S.Research on Application Technology of Converged Communication Technology in Power Line Monitoring[D].Chengdu:University of Electronic Science and Technology of China,2019,1(2):10-56.
[4] 曲泷玉,贾依真,郝永乐.结合CNN和文本语义的漏洞自动分类方法[J].北京理工大学学报,2019,39(7):5.
[5] 许健,陈平华,熊建斌.融合滑动窗口和哈希函数的代码漏洞检测模型[J].计算机应用研究,2021,38(8):7-26.
[6] 王剑,匡洪宇,李瑞林,等.基于CNN-GAP可解释性模型的软件源码漏洞检测方法[J].电子与信息学报,2022,44(7):8-19.
[7] 叶子维,郭渊博,琚安康.动静态特征结合的漏洞风险评估及缓解方法[J].计算机应用研究,2020,37(4):5-20.
[8] 沈文婷,丁宜鹏,郭卫,等.计算机网络安全与漏洞扫描技术的应用研究[J].科技与创新,2018(1):154-155.
[9] Reshmi T R.Information security breaches due to ransomware attacks - a systematic literature review[J].International Journal of Information Management Data Insights,2021,1(2):10-56.
[10] 熊强,杨欣琦,李治文.网络安全漏洞信息披露中多元参与主体行为策略演化博弈分析[J].运筹与管理,2021,30(7):8-28.
[11] 文敏,王荣存,姜淑娟.基于关系图卷积网络的源代码漏洞检测[J].计算机应用,2022,42(6):8-32.