摘要
为提升电力网络数据安全入侵模型仿真方法的防御措施响应效率并减少资源消耗,文中进行大数据环境下电力网络数据安全入侵模型仿真研究。首先,依据风险最小原理,使用引入拉格朗日乘子的支持向量机对电力网络安全态势级别进行估计,得到确定的估计结果;然后,在安全入侵系统的支持下建立电力网络数据安全入侵模型,仿真关于攻击节点与网络节点的变化过程,计算电力网络内攻击与防御的成本。至此,大数据环境下电力网络数据安全入侵模型仿真方法设计完成。实验结果表明:文中设计的安全入侵模型仿真方法防御措施响应时间较短,最低为0.07 s;资源消耗少,资源消耗水平为15.26%,且防御性能较强,能够为提升电力网络数据安全提供一定的帮助。
In order to improve the response efficiency of defense measures of intrusion model simulation method for power network data security and reduce resource consumption,a simulation research of intrusion model for the power network data security in the big data environment is performed.According to the principle of risk minimization,the support vector machine(SVM)with Lagrange multiplier is used to estimate the security situation level of power network,so as to obtain the determined estimation results.The intrusion model for power network data security is established under the support of security intrusion system,the change process of attack node and network node is simulated,and the cost of attack and defense in power network is calculated,so that the design of intrusion model simulation method for power network data security in the big data environment is completed.The experimental results show that the designed intrusion model simulation method for power network data security has shorter response time(the shortest response time is 0.07 s),low resource consumption(the resource consumption level is 15.26%),and strong defense performance,which can provide some help to improve the data security of power network.
作者
林楠
吴林峰
方洪波
LIN Nan;WU Linfeng;FANG Hongbo(Zhejiang University,Hangzhou 310058,China;Zhejiang Zheneng Yueqing Power Generation Co.,Ltd.,Wenzhou 325000,China;Northeast Electric Power University,Jilin 132012,China;Zhejiang Zheneng Technology Research Institute Co.,Ltd.,Hangzhou 311121,China;Zhejiang Anke Network Technology Co.,Ltd.,Hangzhou 310012,China)
出处
《现代电子技术》
2022年第4期118-122,共5页
Modern Electronics Technique
基金
国家自然科学基金资助项目(51007080)
中国博士后科学基金资助项目(20090461352)
河北社科基金项目(HB20YS004)。
关键词
电力网络
数据安全
大数据环境
网络入侵模型
安全态势
防御措施
仿真分析
power network
data security
big data environment
network intrusion model
security posture
defensive measure
simulation analysis