An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power Information System

被引:0
|
作者
Guan, Xiaojuan [1 ]
Ma, Yuanyuan [1 ]
Hua, Ye [1 ]
机构
[1] Global Energy Interconnect Res Inst, State Grid Key Lab Informat & Network Secur, Nanjing, Jiangsu, Peoples R China
关键词
parallel computing; attack graph; vulnerability exploit; attacker knowledge; attack proficiency; attacker willingness; attack confidence;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing scale of the network, the power information system has many characteristics, such as large number of nodes, complicated structure, diverse network protocols and abundant data, which make the network intrusion detection system difficult to detect real alarms. The current security technologies cannot meet the actual power system network security operation and protection requirements. Based on the attacker ability, the vulnerability information and the existing security protection configuration, we construct the attack sub-graphs by using the parallel distributed computing method and combine them into the whole network attack graph. The vulnerability exploit degree, attacker knowledge, attack proficiency, attacker willingness and the confidence level of the attack evidence are used to construct the security evaluation index system of the power information network system to calculate the attack probability value of each node of the attack graph. According to the probability of occurrence of each node attack, the pre-order attack path will be formed and then the most likely attack path and attack targets will be got to achieve the identification of attack intent.
引用
收藏
页码:1544 / 1548
页数:5
相关论文
共 50 条
  • [21] The Evaluation Index System of Information Value
    Yu, Hao
    [J]. PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY (EMCS 2017), 2017, 61 : 916 - 919
  • [22] Evaluation Index System of Agricultural Information
    Liu, Shouyi
    Li, Fengyun
    Wei, Dongling
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 2195 - +
  • [23] Intelligent Management System of Electric Power Meter Based on Analysis of the Index
    Du Jie
    Cheng Yingying
    Xiao Ji
    Zhou Feng
    Yang Huaxiao
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL FORUM ON ENERGY, ENVIRONMENT SCIENCE AND MATERIALS, 2015, 40 : 568 - 571
  • [24] The University Culture Soft Power Evaluation Index System and Evaluation Models Based on Fuzzy Comprehensive Evaluation Method
    Zou, Xing
    Zhang, Heng-Yi
    Yin, Zhi-Yong
    Chen, Xiao-Liang
    Chen, Guo-Sheng
    [J]. INTERNATIONAL CONFERENCE ON ECONOMICS AND MANAGEMENT ENGINEERING (ICEME 2014), 2014, : 333 - 338
  • [25] Evaluation index system for carbon information disclosure quality in China's electric power sector based on a mutual information and back propagation neural network model
    Liu, Zhibin
    Wu, Jiayin
    [J]. UTILITIES POLICY, 2024, 89
  • [26] Evaluation Index System of Electric Power SD-OTN Service Riskfactors
    Dong, Wu
    Liu, Xu
    He, Xiangling
    [J]. 2017 16TH INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATIONS & NETWORKS (ICOCN 2017), 2017,
  • [27] Preventive control method of electric power system based on on-line voltage stability monitoring index
    College of Electrical and Information Engineering, Hunan University, Changsha
    Hunan Province
    410082, China
    [J]. Zhongguo Dianji Gongcheng Xuebao, 18 (4598-4606):
  • [28] An Improved Evaluation Index System for the Host Information Security Evaluation System
    Ou, Yuyi
    Xie, Jinbiao
    Ling, Jie
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 49 - 61
  • [29] Evaluation method of performance index for on-line control of high voltage electric power system of generation and transmission
    Cuccia, P.
    Giangualano, M.
    [J]. Energia Elettrica, 1991, 68 (02):
  • [30] AHP BASED INFORMATION SYSTEM SECURITY EVALUATION METHOD
    Xu Yunfeng
    [J]. 2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 349 - 354