CN109359469A - A kind of Information Security Risk Assessment Methods of industrial control system - Google Patents

A kind of Information Security Risk Assessment Methods of industrial control system Download PDF

Info

Publication number
CN109359469A
CN109359469A CN201811203136.7A CN201811203136A CN109359469A CN 109359469 A CN109359469 A CN 109359469A CN 201811203136 A CN201811203136 A CN 201811203136A CN 109359469 A CN109359469 A CN 109359469A
Authority
CN
China
Prior art keywords
risk assessment
training
neural network
control system
industrial control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811203136.7A
Other languages
Chinese (zh)
Inventor
彭道刚
董浩
赵慧荣
姚峻
夏飞
孙宇贞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai University of Electric Power
Shanghai Minghua Electric Power Technology and Engineering Co Ltd
University of Shanghai for Science and Technology
Original Assignee
Shanghai University of Electric Power
Shanghai Minghua Electric Power Technology and Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai University of Electric Power, Shanghai Minghua Electric Power Technology and Engineering Co Ltd filed Critical Shanghai University of Electric Power
Priority to CN201811203136.7A priority Critical patent/CN109359469A/en
Publication of CN109359469A publication Critical patent/CN109359469A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/086Learning methods using evolutionary algorithms, e.g. genetic algorithms or genetic programming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Computational Linguistics (AREA)
  • Mathematical Physics (AREA)
  • Physiology (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to a kind of Information Security Risk Assessment Methods of industrial control system, comprising the following steps: S1, the multiple groups assessment score for obtaining risk assessment value and its corresponding multiple risk assessment elements, as initial sample data set;S2, initial sample data is handled using KPCA, principal component is chosen according to contribution rate of accumulative total, the sample data set after obtaining dimensionality reduction;S3, using the sample data set after dimensionality reduction as training sample, the BP neural network of training genetic algorithm optimization obtains prediction model;S4, by the assessment score input prediction model of multiple risk assessment elements, obtain the predicted value of risk assessment value.Compared with prior art, invention not only improves the problem of parameter selection, the Evaluation accuracy of risk evaluation model is also effectively improved in neural network, which is the combination of conventional modeling and intelligent method, is had great importance to industrial control system.

Description

A kind of Information Security Risk Assessment Methods of industrial control system
Technical field
The present invention relates to field of information security technology, comment more particularly, to a kind of Information Security Risk of industrial control system Estimate method.
Background technique
Industrial control system (Industrial Control System, abbreviation ICS) is widely used in petrochemical industry, hands over In the national critical infrastructures such as logical transport, water process.As the development and " two change " fusion of information technology are goed deep into, tradition Industrial control system and IT system, or even connect with Internet more and more closer, the security threat for causing ICS to face is continuous Increase.
Since in recent years, the overall size of industrial control system gradually expands, and security level associated therewith also obtains General Promotion.However should not ignore, industrial control system under the new situation remains difficult to eliminate Information Risk from source, therefore in visitor Where the value for embodying risk assessment in sight.Information security risk evaluation applies to industrial control system at this stage, facilitates Risk is judged and identified in the shorter period rapidly, then adequate measures is selected to be subject to prevention and control.It can be seen that information is pacified Full assessment should be realized with the normal operation of industrial control system and is intimately associated, and can just be dedicated to preventing under the premise of the two combines comprehensively It controls risk and eliminates wherein potential loophole.
For the whole system of Industry Control, risk assessment itself has the feature of architecture, thus constitutes and be System engineering.From the point of view of essential characteristic, the core of risk assessment be to estimate industrial control system due to by various outside threats or Resource lacks and bring evapotranspiration, is dedicated to assessing tender spots and threat degree in whole system under the premise of this.It opens Open up comprehensive risk assessment, objective is to verify wherein potential every risk and crisis, thus adaptation to local conditions provide it is feasible Property stronger security strategy, ensure safe operation.So under this kind of background, how to find and corresponding accurately comment The method of estimating becomes urgent problem to be solved in present practice circle and academia.
Error backpropagation algorithm (Back Propagation, abbreviation BP) include signal propagated forward and error it is anti- To propagate two processes, i.e., calculating error output when by from be input to output direction carry out, and adjust weight and threshold value then from The direction for being output to input carries out.When forward-propagating, input signal acts on output node by hidden layer, by non-linear change Generation output signal is changed, if reality output is not consistent with desired output, is transferred to the back-propagation process of error.Error-duration model is By output error by hidden layer to the layer-by-layer anti-pass of input layer, and error distribution is given to all units of each layer, to obtain from each layer Error signal as adjustment each unit weight foundation.By adjusting the linking intensity and hidden layer of input node and hidden node The linking intensity and threshold value of node and output node, make error along gradient direction decline, by repetition learning training, determine with The corresponding network parameter of minimal error (weight and threshold value), training stop stopping.Trained neural network can at this time To the input information of similar sample, the smallest information by non-linear conversion of output error is voluntarily handled.BP neural network is Most widely used prediction model, but there are two obvious disadvantages for the model: first is that easily falling into local minimum;Second is that convergence speed Degree is slow.A kind of method for overcoming disadvantages mentioned above is optimized using Genetic Algorithms (Genetic Algorithm, genetic algorithm) BP neural network prediction model.The randomness defect in BP neural network connection weight and threshold value selection is made up with GA, not only The extensive mapping ability of BP neural network can be played, and makes BP neural network that there is faster convergence and stronger study Ability.
Summary of the invention
It is an object of the present invention to overcome the above-mentioned drawbacks of the prior art and provide a kind of industrial control systems Information Security Risk Assessment Methods.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of Information Security Risk Assessment Methods of industrial control system, comprising the following steps:
S1, the multiple groups assessment score for obtaining risk assessment value and its corresponding multiple risk assessment elements, as initial sample Data set;
S2, initial sample data set is handled using KPCA, principal component is chosen according to contribution rate of accumulative total, after obtaining dimensionality reduction Sample data set;
S3, using the sample data set after dimensionality reduction as training sample, the BP neural network of training genetic algorithm optimization obtains Risk evaluation model;
S4, the assessment score of multiple risk assessment elements is inputted in risk evaluation model, obtains the pre- of risk assessment value Measured value.
Preferably, the contribution rate of accumulative total is not less than 90%.
Preferably, the step S3 is specifically included:
S31, population scale is set as P, generate the initial population W=(W of P individual at random1,W2,...,WP)T, give one Data select range, generate individual W in population using linear interpolation functioniA real vector w1,w2,...,wSAs something lost One chromosome of propagation algorithm, using real number coding method;
S32, the evaluation function for determining individual: giving a BP neural network evolution parameter, will contaminate obtained in step S31 Colour solid carries out assignment to BP neural network weight and threshold value, and input training sample carries out neural metwork training, reaches the essence of setting Network training output valve is obtained after degree, using training error quadratic sum as population W in individual WiFitness;
S33, using roulette method selection operator, i.e., the selection strategy based on fitness ratio is to the dye in every generation population Colour solid is selected, select probability are as follows:
Wherein: fiFor fitness value inverse;
S34, crossover operation, k-th of gene w are carried out using real number interior extrapolation methodkWith first of gene wkIn j crossover operations It is respectively as follows:
wkj=wkj(1-b)+wljB,
wlj=wlj(1-b)+wkjb
Wherein, random number of the b between [0,1];
S35: mutation operation: j-th of gene for choosing i-th of individual carries out mutation operation, it may be assumed that
F (g)=r2(1-g/Gmax)
Wherein: wmaxAnd wminRespectively gene wijThe bound of value, random number of the r between [0,1], r2It is random for one Number, g are current iteration number, GmaxFor maximum evolutionary generation;
S36, the optimum individual for obtaining genetic algorithm are decomposed into the connection weight and threshold value of BP neural network, in this, as The initial weight and threshold value of risk evaluation model.
Preferably, momentum term coefficient is 0.75 during the BP neural network of the trained genetic algorithm optimization, maximum Frequency of training is 15000 times, target error 0.0002.
Preferably, the risk assessment element includes enterprise management level element, process control station element and field control layer Element.
Preferably, the enterprise management level element includes: unauthorized access, malicious code, distributed denial of service, virus Wooden horse and forgery attack;The process control station element includes: that Denial of Service attack, dos attack, extensive aggression, response are cheated With direction misdirecting attack;The field control layer element includes: physical attacks, information stealth, data tampering, Denial of Service attack It hits, unauthorized access and Replay Attack.
Compared with prior art, the present invention is based on KPCA-GA-BP to industrial control system information security risk evaluation, removes It is predicted using ordinary BP nerve network, also it is optimized using genetic algorithm, searches out optimal initial weight and threshold Value, the problem of keeping conventional model accuracy and generalization ability more preferable, not only improve parameter selection in neural network, also effectively mentions The Evaluation accuracy of high risk assessment models, which is the combination of conventional modeling and intelligent method, to Industry Control System has great importance.
Detailed description of the invention
Fig. 1 is the method for the present invention flow chart;
Fig. 2 is industrial control system risk elements structure chart in the present invention;
Fig. 3 be embodiment in tri- kinds of BP neural network, KPCA-BP neural network and KPCA-GA-BP of the present invention models most Whole training result curve graph;
Fig. 4 be embodiment in tri- kinds of BP neural network, KPCA-BP neural network and KPCA-GA-BP of the present invention models most Training relative error curve graph eventually;
Fig. 5 be embodiment in tri- kinds of BP neural network, KPCA-BP neural network and KPCA-GA-BP of the present invention models most Training the number of iterations figure eventually.
Specific embodiment
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.The present embodiment is with technical solution of the present invention Premised on implemented, the detailed implementation method and specific operation process are given, but protection scope of the present invention is not limited to Following embodiments.
Embodiment
The application proposes a kind of Information Security Risk Assessment Methods of industrial control system, according to industrial control system information Safety-related standard analysis influences the factor of information security, and establishes corresponding structural model, determine each specific factor and by Expert estimation assigns a value;KPCA processing is carried out to risk elements, and extracts principal component and obtains the sample data after dimensionality reduction; Then risk evaluation model is obtained to GA-BP network training by sample data.
As shown in Figure 1, this method specifically includes the following steps:
S1, the multiple groups assessment score for obtaining risk assessment value and its corresponding multiple risk assessment elements, as initial sample Data set;
According to " GB/T 35673-2017. industrial communication network network and system security technology safety requirements and safety etc. Grade " and " GB/T 36466-2018 information security technology industrial control system risk assessment implementation guide " and industrial control system Three Tiered Network Architecture, 16 risk assessment elements are listed, as shown in Fig. 2, including that enterprise management level element, process control station are wanted Element and field control layer element;Enterprise management level element includes: unauthorized access, malicious code, distributed denial of service, virus Wooden horse and forgery attack;Process control station element includes: Denial of Service attack, dos attack, extensive aggression, response is cheated and side To misdirecting attack;Field control layer element includes: physical attacks, information stealth, data tampering, Denial of Service attack, illegal visit It asks and Replay Attack;
In the present embodiment, the object of risk assessment is this 16 elements, and the value-at-risk of each element is by expert according to industry " GA/T 1390.5-2017 information security technology network safety grade protects the 5th part of basic demand: industrial control system to standard Security extension requirement " in the classification of risks standard that proposes specifically assessed, and characterized with integer of 1 to 10.
S2, initial sample data is handled using core principle component analysis (KPCA), principal component is chosen according to contribution rate of accumulative total, Sample data set after obtaining dimensionality reduction in the present embodiment, extracts the contribution rate of accumulative total of principal component not less than 90%.
S3, the BP neural network for optimizing the sample data set after dimensionality reduction as training sample, training genetic algorithm (GA), The pattern of fusion regression model based on BP neural network, i.e. GA-BP risk evaluation model are constructed, the survey of risk evaluation model is improved Accuracy, specifically includes the following steps:
S31, population scale is set as P, generate the initial population W=(W of P individual at random1,W2,...,WP)T, give one Data select range, generate individual W in population using linear interpolation functioniA real vector w1,w2,...,wSAs GA A chromosome, high-precision weight and threshold value in order to obtain, using real number coding method;
S32, the evaluation function for determining individual: giving a BP neural network evolution parameter, will contaminate obtained in step S31 Colour solid carries out assignment to BP neural network weight and threshold value, and input training sample carries out neural metwork training, reaches the essence of setting Network training output valve is obtained after degree, using training error quadratic sum as population W in individual WiFitness;
S33, using roulette method selection operator, i.e., the selection strategy based on fitness ratio is to the dye in every generation population Colour solid is selected, select probability are as follows:
Wherein: fiFor fitness value inverse;
S34, real coding is used due to individual, crossover operation method uses real number interior extrapolation method, k-th of gene wkWith l A gene wkIt is respectively as follows: in j crossover operations
Wherein, random number of the b between [0,1];
S35: mutation operation: j-th of gene for choosing i-th of individual carries out mutation operation, it may be assumed that
F (g)=r2(1-g/Gmax)
Wherein: wmaxAnd wminRespectively gene wijThe bound of value, random number of the r between [0,1], r2It is random for one Number, g are current iteration number, GmaxFor maximum evolutionary generation;
S36, the optimum individual for obtaining genetic algorithm are decomposed into the connection weight and threshold value of BP neural network, in this, as The initial weight and threshold value of risk evaluation model obtain the corresponding regression function of risk evaluation model.
S4, the assessment score of multiple risk assessment elements is inputted in risk evaluation model, obtains the pre- of risk assessment value Measured value.
It obtains 15 groups in the present embodiment for the validity for verifying modeling method and outputs and inputs data as nerve net The learning sample of network.As shown in table 1, there are 16 risk assessment elements point (F1~F16) and the assessed value of 15 application systems, grade It is not to be divided according to assessed value size, the object of risk assessment is this 16 elements.
1 15 systematic sample data of table
Table 2 is the specific data that KPCA analyzes result, as can be seen from Table 2, when proceeding to the 6th Principle component extraction, Accumulative principal component contribution proportion total value has been above 90%, can represent 90% information of original 16 elements, so with The data set that this 6 principal components generate replaces initial data as training sample, and this 6 principal components are irrelevant 6 A principal component.
2 KPCA of table analyzes result
In order to verify the validity based on KPCA-GA-BP Information Security Risk Assessment Methods of the application proposition, this implementation Example carries out this method with based on BP neural network, the Information Security Risk Evaluation Model obtained based on KPCA-BP neural network Comparative analysis.In the present embodiment, BP neural network, which uses, has training method of the momentum gradient descent method as network, and sets Traingdm function is training function.Performance function is MSE function.Momentum term coefficient=0.75, maximum frequency of training are 15000 It is secondary, target error 0.0002.Sample data of the 12 groups of data of front as correlation training in table 1, is used for BP network, 4 groups of data of number 12 to 15 carry out risk data with trained BP network is had already passed through as verifying collection data below Prediction, the operation being finally normalized obtain output valve.Prediction result can also be compared with truthful data.In order to avoid with Machine, 3 kinds of models are separately operable 20 times, and prediction result is as shown in Fig. 3,4 and table 3.
The prediction result of the different risk evaluation models of table 3
Can be obtained by table 3, the range of the relative error rate for the model that this method obtains is 0.56%~1.03%, and other two The relative error rate range of kind model is 1.11%~7.2 4%.So the neural network model obtained based on this method is to wind The accuracy rate that danger is predicted is promoted, and can carry out risk assessment to industrial control system more accurately.
The operation time of the different risk evaluation models of table 4
Network parameter BP model KPCA-BP model KPCA-GA-BP model
The number of iterations 11397 4103 2384
Training time 67 41 28
By Fig. 5 and table 4, it can be seen that if there is identical error learning objective, it is iterated based on this method modeling Number and the duration of training are few more many than other two methods, so this method establishes the process of model in convergence rate On be also improved.

Claims (3)

1. a kind of Information Security Risk Assessment Methods of industrial control system, which comprises the following steps:
S1, the multiple groups assessment score for obtaining risk assessment value and its corresponding multiple risk assessment elements, as initial sample data Collection;
S2, initial sample data set is handled using KPCA, principal component is chosen according to contribution rate of accumulative total, the sample after obtaining dimensionality reduction Data set;
S3, using the sample data set after dimensionality reduction as training sample, the BP neural network of training genetic algorithm optimization obtains risk Assessment models;
S4, the assessment score of multiple risk assessment elements is inputted in risk evaluation model, obtains the predicted value of risk assessment value.
2. a kind of Information Security Risk Assessment Methods of industrial control system according to claim 1, which is characterized in that institute Step S3 is stated to specifically include:
S31, population scale is set as P, generate the initial population W=(W of P individual at random1,W2,...,WP)T, give a data Selected range generates individual W in population using linear interpolation functioniA real vector w1,w2,...,wSIt is calculated as heredity One chromosome of method, using real number coding method;
S32, the evaluation function for determining individual: a BP neural network evolution parameter is given, by chromosome obtained in step S31 Assignment carried out to BP neural network weight and threshold value, input training sample carries out neural metwork training, after the precision for reaching setting Obtain network training output valve, using training error quadratic sum as population W in individual WiFitness;
S33, using roulette method selection operator, i.e., the selection strategy based on fitness ratio is to the chromosome in every generation population It is selected, select probability are as follows:
Wherein: fiFor fitness value inverse;
S34, crossover operation, k-th of gene w are carried out using real number interior extrapolation methodkWith first of gene wkDistinguish in j crossover operations Are as follows:
wkj=wkj(1-b)+wljB,
wlj=wlj(1-b)+wkjb
Wherein, random number of the b between [0,1];
S35: mutation operation: j-th of gene for choosing i-th of individual carries out mutation operation, it may be assumed that
F (g)=r2(1-g/Gmax)
Wherein: wmaxAnd wminRespectively gene wijThe bound of value, random number of the r between [0,1], r2For a random number, g For current iteration number, GmaxFor maximum evolutionary generation;
S36, the optimum individual for obtaining genetic algorithm are decomposed into the connection weight and threshold value of BP neural network, in this, as risk The initial weight and threshold value of assessment models.
3. a kind of Information Security Risk Assessment Methods of industrial control system according to claim 1, which is characterized in that institute Stating risk assessment element includes enterprise management level element, process control station element and field control layer element;The business administration Layer element includes: unauthorized access, malicious code, distributed denial of service, viral wooden horse and forgery attack;The process control Layer element includes: that Denial of Service attack, dos attack, extensive aggression, response are cheated and direction misdirecting attack;The field control Layer element includes: physical attacks, information stealth, data tampering, Denial of Service attack, unauthorized access and Replay Attack.
CN201811203136.7A 2018-10-16 2018-10-16 A kind of Information Security Risk Assessment Methods of industrial control system Pending CN109359469A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811203136.7A CN109359469A (en) 2018-10-16 2018-10-16 A kind of Information Security Risk Assessment Methods of industrial control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811203136.7A CN109359469A (en) 2018-10-16 2018-10-16 A kind of Information Security Risk Assessment Methods of industrial control system

Publications (1)

Publication Number Publication Date
CN109359469A true CN109359469A (en) 2019-02-19

Family

ID=65349182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811203136.7A Pending CN109359469A (en) 2018-10-16 2018-10-16 A kind of Information Security Risk Assessment Methods of industrial control system

Country Status (1)

Country Link
CN (1) CN109359469A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059887A (en) * 2019-04-25 2019-07-26 湖南大学 BP neural network Risk Identification Method and system based on self-adapted genetic algorithm
CN110489972A (en) * 2019-06-26 2019-11-22 中电万维信息技术有限责任公司 The safety evaluation method and relevant device of electronic government affairs system
CN110703712A (en) * 2019-10-25 2020-01-17 国家工业信息安全发展研究中心 Industrial control system information security attack risk assessment method and system
CN110889587A (en) * 2019-10-18 2020-03-17 国家电网有限公司 Power distribution network line risk assessment method
CN112291239A (en) * 2020-10-29 2021-01-29 东北大学 Network physical model facing SCADA system and intrusion detection method thereof
CN112330082A (en) * 2020-08-13 2021-02-05 青岛科技大学 Intelligent quantitative risk assessment method based on dynamic mechanism model
CN113159615A (en) * 2021-05-10 2021-07-23 麦荣章 Intelligent information security risk measuring system and method for industrial control system
CN113705098A (en) * 2021-08-30 2021-11-26 国网江苏省电力有限公司营销服务中心 Air duct heater modeling method based on PCA and GA-BP network
CN114723960A (en) * 2022-04-02 2022-07-08 湖南三湘银行股份有限公司 Additional verification method and system for enhancing bank account security
CN116090839A (en) * 2023-04-07 2023-05-09 水利部交通运输部国家能源局南京水利科学研究院 Multiple risk analysis and evaluation method and system for water resource coupling system
CN116896452A (en) * 2023-06-05 2023-10-17 云念软件(广东)有限公司 Computer network information security management method based on data processing

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971162A (en) * 2014-04-04 2014-08-06 华南理工大学 Method for improving BP (back propagation) neutral network and based on genetic algorithm
CN105718876A (en) * 2016-01-18 2016-06-29 上海交通大学 Evaluation method of health states of ball screw
CN106130986A (en) * 2016-06-30 2016-11-16 湘潭大学 A kind of wind energy turbine set active safety defence method based on automated decision-making
CN106815652A (en) * 2016-12-16 2017-06-09 国家电网公司 A kind of distribution network reliability Forecasting Methodology based on big data correlation analysis
CN107316099A (en) * 2017-05-22 2017-11-03 沈阳理工大学 Ammunition Storage Reliability Forecasting Methodology based on particle group optimizing BP neural network
CN108400895A (en) * 2018-03-19 2018-08-14 西北大学 One kind being based on the improved BP neural network safety situation evaluation algorithm of genetic algorithm
CN108460461A (en) * 2018-02-06 2018-08-28 吉林大学 Mars earth shear parameters prediction technique based on GA-BP neural networks

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971162A (en) * 2014-04-04 2014-08-06 华南理工大学 Method for improving BP (back propagation) neutral network and based on genetic algorithm
CN105718876A (en) * 2016-01-18 2016-06-29 上海交通大学 Evaluation method of health states of ball screw
CN106130986A (en) * 2016-06-30 2016-11-16 湘潭大学 A kind of wind energy turbine set active safety defence method based on automated decision-making
CN106815652A (en) * 2016-12-16 2017-06-09 国家电网公司 A kind of distribution network reliability Forecasting Methodology based on big data correlation analysis
CN107316099A (en) * 2017-05-22 2017-11-03 沈阳理工大学 Ammunition Storage Reliability Forecasting Methodology based on particle group optimizing BP neural network
CN108460461A (en) * 2018-02-06 2018-08-28 吉林大学 Mars earth shear parameters prediction technique based on GA-BP neural networks
CN108400895A (en) * 2018-03-19 2018-08-14 西北大学 One kind being based on the improved BP neural network safety situation evaluation algorithm of genetic algorithm

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JOSÉ MANUELBERNAL DE LÁZARO 等: "Optimizing kernel methods to reduce dimensionality in fault diagnosis of industrial systems", 《COMPUTERS & INDUSTRIAL ENGINEERING》 *
刘浩然 等: "一种基于改进遗传算法的神经网络优化算法研究", 《仪器仪表学报》 *
李静 等: "制造业上市公司信息风险评估研究", 《武汉理工大学学报(信息与管理工程版)》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059887A (en) * 2019-04-25 2019-07-26 湖南大学 BP neural network Risk Identification Method and system based on self-adapted genetic algorithm
CN110489972A (en) * 2019-06-26 2019-11-22 中电万维信息技术有限责任公司 The safety evaluation method and relevant device of electronic government affairs system
CN110889587A (en) * 2019-10-18 2020-03-17 国家电网有限公司 Power distribution network line risk assessment method
CN110703712A (en) * 2019-10-25 2020-01-17 国家工业信息安全发展研究中心 Industrial control system information security attack risk assessment method and system
CN110703712B (en) * 2019-10-25 2020-09-15 国家工业信息安全发展研究中心 Industrial control system information security attack risk assessment method and system
CN112330082A (en) * 2020-08-13 2021-02-05 青岛科技大学 Intelligent quantitative risk assessment method based on dynamic mechanism model
CN112330082B (en) * 2020-08-13 2023-08-15 青岛科技大学 Intelligent quantitative risk assessment method based on dynamic mechanism model
CN112291239A (en) * 2020-10-29 2021-01-29 东北大学 Network physical model facing SCADA system and intrusion detection method thereof
CN113159615A (en) * 2021-05-10 2021-07-23 麦荣章 Intelligent information security risk measuring system and method for industrial control system
CN113705098A (en) * 2021-08-30 2021-11-26 国网江苏省电力有限公司营销服务中心 Air duct heater modeling method based on PCA and GA-BP network
CN114723960A (en) * 2022-04-02 2022-07-08 湖南三湘银行股份有限公司 Additional verification method and system for enhancing bank account security
CN116090839A (en) * 2023-04-07 2023-05-09 水利部交通运输部国家能源局南京水利科学研究院 Multiple risk analysis and evaluation method and system for water resource coupling system
CN116896452A (en) * 2023-06-05 2023-10-17 云念软件(广东)有限公司 Computer network information security management method based on data processing
CN116896452B (en) * 2023-06-05 2024-01-26 云念软件(广东)有限公司 Computer network information security management method and system based on data processing

Similar Documents

Publication Publication Date Title
CN109359469A (en) A kind of Information Security Risk Assessment Methods of industrial control system
CN105897714B (en) Botnet detection method based on DNS traffic characteristics
CN104270281B (en) A kind of Web Service QoS combination forecasting methods
CN108694484A (en) A kind of photovoltaic power generation power prediction method
CN107273974B (en) Method and system for constructing safety emergency disposal evaluation system
CN107786369A (en) Based on the perception of IRT step analyses and LSTM powerline network security postures and Forecasting Methodology
Shirk et al. Simulating pattern‐process relationships to validate landscape genetic models
CN109218304B (en) Network risk blocking method based on attack graph and co-evolution
CN113361865B (en) Vulnerability assessment method for deep learning inertia prediction model in power system
CN104869126A (en) Network intrusion anomaly detection method
Donyaii et al. Water reservoir multiobjective optimal operation using Grey Wolf optimizer
CN112215446A (en) Neural network-based unit dynamic fire risk assessment method
CN108337223A (en) A kind of appraisal procedure of network attack
CN111222583B (en) Image steganalysis method based on countermeasure training and critical path extraction
Goncharov et al. Mathematical modeling of the security management process of an information system in conditions of unauthorized external influences
CN112039864A (en) Method for analyzing cross-layer security risk of electric power CPS
CN117272306A (en) Federal learning half-target poisoning attack method and system based on alternate minimization
Turner et al. Adaptive decision rules for the acquisition of nature reserves
CN112651110B (en) Malignant data injection attack defense method based on multi-stage dynamic game
Sbarufatti Optimization of an artificial neural network for fatigue damage identification using analysis of variance
CN108683534A (en) A kind of network weak node searching method that Community-oriented is found
Hart et al. Accuracy and power analysis of social networks built from count data
Reddy et al. An optimal neural network model for software effort estimation
Vidyarthi et al. Does ANN really acquire the physics of the system? A study using conceptual components from an established water balance model
CN110990835B (en) Neural network Trojan horse detection method based on sample judgment error

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190219

RJ01 Rejection of invention patent application after publication