CN117155799A - Transformer substation communication network fragile structure assessment method based on complex network theory - Google Patents

Transformer substation communication network fragile structure assessment method based on complex network theory Download PDF

Info

Publication number
CN117155799A
CN117155799A CN202311087167.1A CN202311087167A CN117155799A CN 117155799 A CN117155799 A CN 117155799A CN 202311087167 A CN202311087167 A CN 202311087167A CN 117155799 A CN117155799 A CN 117155799A
Authority
CN
China
Prior art keywords
node
link
vulnerability
communication network
calculating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311087167.1A
Other languages
Chinese (zh)
Inventor
龚钢军
谢恒基
刘祎明
於硕
袁庆林
文亚凤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
North China Electric Power University
Original Assignee
North China Electric Power University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by North China Electric Power University filed Critical North China Electric Power University
Priority to CN202311087167.1A priority Critical patent/CN117155799A/en
Publication of CN117155799A publication Critical patent/CN117155799A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The application discloses a method for evaluating a fragile structure of a transformer station communication network based on a complex network theory, which comprises the following steps: constructing a substation communication network model, and generating link weights based on an attack path of the substation communication network model; combining a complex network theory with the link weight, and calculating to obtain a plurality of node vulnerability values; based on the node vulnerability values, integrating local information and global information of links, and calculating to obtain a plurality of link vulnerability values; and respectively evaluating the fragile structure of the substation communication network based on the node fragile degree value and the link fragile degree value. The application can solve the problems of high updating speed, difficult quantification and subjectivity in expert evaluation of network attack in the prior art.

Description

Transformer substation communication network fragile structure assessment method based on complex network theory
Technical Field
The application belongs to the technical field of communication network fragile structure mining, and particularly relates to a substation communication network fragile structure assessment method based on a complex network theory.
Background
Assessment of fragile entities in complex networks is a fundamental problem in network analysis. Because the evaluation of each algorithm is different in selected emphasis, local factors and global factors are taken into consideration as the division, and the influence of different attack strategies on vulnerability is different. It is therefore very important to determine vulnerable entities in the network.
In the analysis of vulnerability of the power communication network, a characteristic index evaluation method is put forward to construct a power communication network model, and the network vulnerability is measured by the service importance loss caused by links; (2) Yin Jun, liju, huang Hongguang. In the analysis of vulnerability of a power communication network based on the utilization of links, a method for studying vulnerability of a power communication network based on the utilization of links is proposed.
In the aspect of vulnerability analysis of a transformer substation communication network, (3) Zhang. In vulnerability assessment of a transformer substation automation system in a network environment, a method for vulnerability assessment of the transformer substation automation system in the network environment is provided, and a vulnerability degree function of state transition is defined by taking a vulnerability degree factor and equivalent attack cost as parameters through formalized definition construction of a system to represent vulnerability state diagram of an attack process.
In the prior art, vulnerability analysis is carried out on an estimated network from two aspects of complex network theory and formalized definition of a system in an attack process, but when the network vulnerability structure is analyzed, network security protection measures adopted by different links in a transformer substation communication network are not considered, so that differences between the attacked difficulty of the network security protection measures are not found, and meanwhile, the network attack updating speed is high and is difficult to quantify, and the subjective performance exists in expert estimation.
Disclosure of Invention
The application provides a method for evaluating a fragile structure of a transformer station communication network based on a complex network theory, which aims to solve the technical problems in the prior art.
In order to achieve the above purpose, the present application provides a method for evaluating a fragile structure of a substation communication network based on a complex network theory, comprising:
constructing a substation communication network model, and generating link weights based on an attack path of the substation communication network model;
combining a complex network theory with the link weight, and calculating to obtain a plurality of node vulnerability values;
based on the node vulnerability values, integrating local information and global information of links, and calculating to obtain a plurality of link vulnerability values;
and respectively evaluating the fragile structure of the substation communication network based on the node fragile degree value and the link fragile degree value.
Preferably, the process of generating the link weights includes:
based on the attack path, quantifying a plurality of links of the substation communication network model through a CVSS scoring system, and calculating to obtain link weights based on vulnerability availability indexes in the CVSS scoring system.
Preferably, the vulnerability availability index includes: attack path, attack complexity, required privileges and user interactions.
Preferably, the process of calculating the node vulnerability values includes:
based on the complex network theory, obtaining a node network relation, wherein the node network relation comprises: node degree and node betweenness;
calculating to obtain node constraint coefficients based on the node degrees and the link weights;
and generating a structural hole influence matrix based on the node betweenness and the node constraint coefficient, and calculating a plurality of node vulnerability values based on the structural hole influence matrix.
Preferably, the process of calculating the node constraint coefficients includes:
calculating to obtain link strength based on the node degree and the link weight;
accumulating the link intensities to obtain node intensities;
and obtaining a relative importance function based on the link strength and the node strength, and calculating a node constraint coefficient based on the relative importance function.
Preferably, the process of generating the structure hole influence matrix comprises:
based on the node betweenness, establishing a node influence coefficient matrix;
and generating a structural hole influence matrix based on the node constraint coefficients and the node influence coefficient matrix.
Preferably, the process of calculating a number of link vulnerability values includes:
based on the node vulnerability value, synthesizing local information of the link, and calculating to obtain a link local vulnerability value;
synthesizing global information of the links, and calculating to obtain the roadside betweenness of the links;
and calculating a plurality of link vulnerability values based on the link local vulnerability and the link edge betweenness.
Preferably, the process of calculating the link local vulnerability value includes:
and carrying out normalization processing on the node vulnerability value to obtain a node relative vulnerability value, acquiring local information of nodes at two ends of the link, and calculating to obtain the link local vulnerability value based on the node relative vulnerability value and the local information.
Preferably, the process of evaluating the fragile structure of the substation communication network based on the node vulnerability value comprises:
and arranging the node vulnerability values in a descending order, wherein if the node vulnerability value is larger, the node corresponding to the node vulnerability value is more fragile in a substation communication network.
Preferably, the process of evaluating the fragile structure of the substation communication network based on the link vulnerability value comprises:
and arranging the link vulnerability values in a descending order, wherein if the link vulnerability value is larger, the link corresponding to the link vulnerability value is more vulnerable in the substation communication network.
Compared with the prior art, the application has the following advantages and technical effects:
according to the method, the communication network attack path of the transformer substation is analyzed, the attack difficulty of the network attack of the transformer substation is quantized, and the link weight is generated for the analysis of the topology structure of the communication network; the fragile structure assessment method provided by the application is mainly characterized in that complex network theory and link weight are combined, the local information and the global information of the comprehensive links are used for carrying out fragile assessment on the communication network nodes and the links, and the fragile nodes and the fragile links are obtained according to the assessment results, so that the problems that in the prior art, the network attack update speed is high, quantification is difficult, and subjective assessment exists in expert assessment are solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
fig. 1 is a flowchart of a method for evaluating a fragile structure of a substation communication network according to an embodiment of the present application;
fig. 2 is a schematic diagram of a substation communication network structure according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a fragile node mining flow according to an embodiment of the present application;
fig. 4 is a flowchart of a vulnerable link evaluation method according to an embodiment of the present application.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
Example 1
As shown in fig. 1, in this embodiment, a method for evaluating a fragile structure of a substation communication network based on a complex network theory is provided, including:
constructing a substation communication network model, and generating link weights based on an attack path of the substation communication network model;
combining a complex network theory with the link weight, and calculating to obtain a plurality of node vulnerability values;
based on the node vulnerability values, integrating local information and global information of links, and calculating to obtain a plurality of link vulnerability values;
and respectively evaluating the fragile structure of the substation communication network based on the node fragile degree value and the link fragile degree value.
In this embodiment, a substation communication network structure diagram is obtained by simplifying a real substation communication network structure, and is abstracted into a substation communication network topology model, and the result is shown in fig. 2, where p merging units and q intelligent terminals are in total.
The set of nodes in the communication network is v= { V i Node v i And v j The link is composed of e i,j The link set is e= { E i,j }。
The network attack can break the firewall in a remote access mode, can propagate along the information interaction path of fig. 2 after entering the station-controlled layer bus, and can quantify each link by adopting a CVSS3.0 universal vulnerability scoring system. CVSS3.0 is issued by the national vulnerability database in the United states and keeps the vulnerability data updated in time, comprehensively measures the harmfulness of the vulnerability and gives a specific score to the vulnerability. The exploit cost of vulnerabilities is calculated here by the CVSS scoring system to characterize the link weights.
The score of the availability index of the vulnerability is determined by the difficulty level of the vulnerability and the complexity level of the technical means adopted by the vulnerability. The exploit index is specifically shown in table 1:
TABLE 1
Weights for edges between nodes, i.e. at the previous node v i For the following node v in case of successful attack j Probability of launching an attack, which probability is mainly the same as the following node v j The cost of exploit is relevant. If the following node v j The higher the exploit cost, the lower the probability of being attacked successful. The calculation formula is as follows:
W (i,j) =Cost=AV·AC·PR·UI (1)
wherein W is (i,j) For link e i,j Is used for the link weight of the (c).
Complex network theory-based mining of fragile nodes of substation communication network
To mine the fragile entity of the communication network, the fragile node needs to be mined first, and the mining flow of the fragile node is shown in fig. 3.
The first step: obtaining node internet relations from complex network theory
In order to perform subsequent node evaluation, firstly, the internet relation of the nodes is obtained, and the topology structure evaluation is performed on the selected nodes from two angles of node degrees and node betweenness by a complex network theory. The specific indexes are as follows:
(1) Node degree: node degree is deg (v i ) Representing the node v within the network i A number of directly associated links; with node v i The number of links as the link start point is the node output degree deg + (v i ) In terms of node v i The number of links as the end point is the node output degree deg - (v i ) There is
(2) Node betweenness B: representing node v by node betweenness B i At the global influence level of the network, there are
In the formula (3), delta jk For node v j To v k The number of paths, delta, under the principle of shortest route jk (i) Delta is jk Via v i Is a path number of the (c).
And a second step of: link strength and node strength calculation based on improved structure holes
If two independent nodes in the network topology have neither direct connections nor indirect redundancy relationships, then the barrier between them is called a fabric hole. Node v i The more "fabric holes" that are occupied, the greater its vulnerability in the overall network topology. However, in the actual network topology, the nodes have bias towards the neighboring nodes, that is, more important neighboring nodes are put into more contribution, and the network security protection levels among different nodes are different, that is, the link security degrees are different, so that the nodes are not treated equally. Therefore, not only the node v needs to be considered in the application of the structural hole in the substation communication network i And the number of adjacent nodes, and also needs to consider the node v i With adjacent node v i The strength of the connected communication link.
In order to evaluate node vulnerability of a substation communication network, the link strength and the node strength need to be calculated:
(1) Consider node v i To maintain adjacent node v j The degree of contribution paid by the relation of the link is ascribed to the link strength w (i, j), and the expression is as follows:
w(i,j)=[deg(v i )+deg(v j )]*W (i,j) (4)
(2) In the obtained link e i,j Based on the intensity w (i, j), the intensity of each link is accumulated and processed to be attributed to the node v i The strength w (i) of (a) is:
w(i)=∑ j∈Z(i) w(i,j) (5)
wherein Z (i) is the AND node v i And the connected nodes form a collection.
And a third step of: calculating constraint coefficients
Node v is measured by a relative importance function p (i, j) i To maintain adjacent node v j The contribution to be paid out is expressed as:
p(i,j)=w(i,j)/w(i) (6)
by node v i To maintain adjacent node v j The constraint coefficient value C (i) of each node is calculated by the contribution p (i, j) of the edge relation of the (a), and the constraint coefficient value C (i) of each node is calculated by the following steps:
C(i)=Σ[p(i,j)+p(i,q)*p(q,j)],i≠q≠j,q,j∈Z(i) (7)
wherein p (i, q) and p (q, j) respectively represent node v i And v j To maintain a common adjacent node v q The contribution made by the relationship of (c).
Fourth step: generating a node influence coefficient matrix and a structural hole influence matrix
The impact of a node depends on two factors: the location information of a node and the neighboring information of the node may also be referred to as global influence of the node and local influence of the node. To integrate the effects of the two, a node influence coefficient matrix and a structure hole influence matrix are sequentially constructed:
(1) Combining node betweenness to establish a node influence coefficient matrix H A The method comprises the following steps:
wherein H is A (i,j)=e i,j ·B j Representing node v j For node v i The influence coefficients of the nodes on the matrix diagonal are all 1, which means that the influence coefficient of the nodes on the matrix diagonal is 100%, so that the influence degree of any node on other nodes in the network can be obtained.
(3) Determining the influence degree between nodes by adopting node constraint coefficients, and generating a structural hole influence matrix H by combining the constraint coefficients and the influence coefficient matrix C The method comprises the following steps:
wherein H is C (i,j)e i,j B j [C(j)] -1 Representing node v j For node v i Is a fragile value of (c). Node v i The influence on its neighboring nodes is inversely related to the value of its constraint coefficient, but with its node betweenness B i And shows positive correlation.
Fifth step: computing node vulnerability values
To accomplish the vulnerability node metric based on the improved structure hole, the vulnerability value Fi of the required node vi is:
sixth step: acquiring a set of frangible nodes
And the vulnerability values of all nodes in the substation communication network are calculated by the links and are arranged in descending order. When F i The larger the value of (v), the node v i The more fragile it is in the substation communication network. Nodes that take the first 20% of the frailty value row constitute a frailty node set.
Second, vulnerable link mining algorithm
After the node vulnerability value is obtained, the link vulnerability value can be calculated on the basis, and the flow of the link vulnerability value is shown in fig. 4.
The first step: and completing the construction of a substation communication network model and acquiring the node vulnerability value by the previous links.
And a second step of: computing node relative vulnerability values
In order to make the node vulnerability values in the same magnitude for subsequent calculation, the node vulnerability values need to be normalized to obtain node relative vulnerability values τ i The method comprises the following steps:
wherein,is the maximum value obtained by squaring all node vulnerability values.
And a third step of: computing link local vulnerability
The local information and the global information of the nodes are mainly considered in the network topology level, and the same thought is also applied to vulnerable link mining. For this purpose, the local information of the nodes at both ends of the link is considered first, and the influence degree of the vulnerability of the nodes at both ends on the link is analyzed to obtain the local vulnerability value PF (e) i,j ) The expression is:
PF(e i,j )=deg(v i )*τ i +deg(v j )*τ j (12)
fourth step: computing edge betweenness of links
To embody the global information attribute of the link, consider introducing the link e i,j Edge medium number EB (e) i,j ) The position and the effect of the link in information communication are measured, and the expression is as follows:
wherein delta kl For node v k To v l The number of paths, delta, under the principle of shortest route kl (e i,j ) Delta is kl Via link e i,j Is a path number of the (c).
Fifth step: computing link vulnerability values
Combining link local vulnerability with link edge betweenness to calculate link vulnerability F (e i,j ) The expression of the local information and the global information of the time-integrated link is as follows:
F(e i,j )=α*PF(e i,j )+(1-α)*EB(e i,j ) (14)
wherein, α is a decision coefficient, and the value range thereof is [0,1], where α=0.5.
Sixth step: acquiring a vulnerable Link set
Simultaneously obtain fragile node set, headThe calculation of the vulnerability values of all links in the substation communication network is finished by the links, and the vulnerability values are arranged in descending order. When F (e) i,j ) The larger the value of (c), the link e i,j The more fragile it is in the substation communication network. Links that take the first 20% of the frailty value rows constitute the frailty link set.
The present application is not limited to the above-mentioned embodiments, and any changes or substitutions that can be easily understood by those skilled in the art within the technical scope of the present application are intended to be included in the scope of the present application. Therefore, the protection scope of the present application should be subject to the protection scope of the claims.

Claims (10)

1. A method for evaluating a fragile structure of a transformer station communication network based on a complex network theory is characterized by comprising the following steps:
constructing a substation communication network model, and generating link weights based on an attack path of the substation communication network model;
combining a complex network theory with the link weight, and calculating to obtain a plurality of node vulnerability values;
based on the node vulnerability values, integrating local information and global information of links, and calculating to obtain a plurality of link vulnerability values;
and respectively evaluating the fragile structure of the substation communication network based on the node fragile degree value and the link fragile degree value.
2. The method for evaluating the fragile structure of the communication network of the transformer substation based on the complex network theory according to claim 1, wherein the process of generating the link weight comprises the following steps:
based on the attack path, quantifying a plurality of links of the substation communication network model through a CVSS scoring system, and calculating to obtain link weights based on vulnerability availability indexes in the CVSS scoring system.
3. The method for evaluating a fragile structure of a substation communication network based on the complex network theory according to claim 2, wherein the vulnerability availability index comprises: attack path, attack complexity, required privileges and user interactions.
4. The method for evaluating the fragile structure of the transformer station communication network based on the complex network theory according to claim 1, wherein the process of calculating the plurality of node fragile degree values comprises the following steps:
based on the complex network theory, obtaining a node network relation, wherein the node network relation comprises: node degree and node betweenness;
calculating to obtain node constraint coefficients based on the node degrees and the link weights;
and generating a structural hole influence matrix based on the node betweenness and the node constraint coefficient, and calculating a plurality of node vulnerability values based on the structural hole influence matrix.
5. The method for evaluating the fragile structure of the transformer station communication network based on the complex network theory according to claim 4, wherein the process of calculating the node constraint coefficients comprises the following steps:
calculating to obtain link strength based on the node degree and the link weight;
accumulating the link intensities to obtain node intensities;
and obtaining a relative importance function based on the link strength and the node strength, and calculating a node constraint coefficient based on the relative importance function.
6. The method for evaluating a fragile structure of a transformer station communication network based on a complex network theory according to claim 4, wherein the process of generating the structure hole influence matrix comprises:
based on the node betweenness, establishing a node influence coefficient matrix;
and generating a structural hole influence matrix based on the node constraint coefficients and the node influence coefficient matrix.
7. The method for evaluating the fragile structure of the transformer station communication network based on the complex network theory according to claim 1, wherein the process of calculating the link vulnerability values comprises the following steps:
based on the node vulnerability value, synthesizing local information of the link, and calculating to obtain a link local vulnerability value;
synthesizing global information of the links, and calculating to obtain the roadside betweenness of the links;
and calculating a plurality of link vulnerability values based on the link local vulnerability and the link edge betweenness.
8. The method for evaluating the fragile structure of the transformer station communication network based on the complex network theory according to claim 7, wherein the process of calculating the link local vulnerability value comprises the following steps:
and carrying out normalization processing on the node vulnerability value to obtain a node relative vulnerability value, acquiring local information of nodes at two ends of the link, and calculating to obtain the link local vulnerability value based on the node relative vulnerability value and the local information.
9. The method for evaluating the fragile structure of the communication network of the transformer substation based on the complex network theory according to claim 1, wherein the process of evaluating the fragile structure of the communication network of the transformer substation based on the node fragile degree value comprises the following steps:
and arranging the node vulnerability values in a descending order, wherein if the node vulnerability value is larger, the node corresponding to the node vulnerability value is more fragile in a substation communication network.
10. The method for evaluating the fragile structure of the communication network of the transformer substation based on the complex network theory according to claim 1, wherein the process of evaluating the fragile structure of the communication network of the transformer substation based on the link weakness value comprises the following steps:
and arranging the link vulnerability values in a descending order, wherein if the link vulnerability value is larger, the link corresponding to the link vulnerability value is more vulnerable in the substation communication network.
CN202311087167.1A 2023-08-28 2023-08-28 Transformer substation communication network fragile structure assessment method based on complex network theory Pending CN117155799A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311087167.1A CN117155799A (en) 2023-08-28 2023-08-28 Transformer substation communication network fragile structure assessment method based on complex network theory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311087167.1A CN117155799A (en) 2023-08-28 2023-08-28 Transformer substation communication network fragile structure assessment method based on complex network theory

Publications (1)

Publication Number Publication Date
CN117155799A true CN117155799A (en) 2023-12-01

Family

ID=88883576

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311087167.1A Pending CN117155799A (en) 2023-08-28 2023-08-28 Transformer substation communication network fragile structure assessment method based on complex network theory

Country Status (1)

Country Link
CN (1) CN117155799A (en)

Similar Documents

Publication Publication Date Title
CN109767352B (en) Safety situation assessment method for electric power information physical fusion system
Hu et al. Security risk situation quantification method based on threat prediction for multimedia communication network
CN108683654B (en) Network vulnerability assessment method based on zero-day attack graph
CN115361150B (en) Security risk assessment method for power distribution network risk cascade under network attack
Sun et al. Quantifying the robustness of network controllability
Marzo et al. A study of the robustness of optical networks under massive failures
CN114615066A (en) Target path determination method and device
CN115460608A (en) Method and device for executing network security policy and electronic equipment
Bian et al. Network security situational assessment model based on improved AHP_FCE
Li et al. Dynamic trustworthiness overlapping community discovery in mobile internet of things
CN117155799A (en) Transformer substation communication network fragile structure assessment method based on complex network theory
Winanto et al. Designing consensus algorithm for collaborative signature-based intrusion detection system
Abraham et al. A novel architecture for predictive cybersecurity using non-homogenous markov models
Peng et al. Sensing network security prevention measures of BIM smart operation and maintenance system
CN111464327A (en) Spatial information network survivability evaluation method based on graph convolution network
CN111917589B (en) Power communication network resource backup method and related device
CN113709097B (en) Network risk sensing method and defense method
K V et al. Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model
CN114006744A (en) LSTM-based power monitoring system network security situation prediction method and system
Bhattacharjee et al. Vulnerability characterization and privacy quantification for cyber-physical systems
CN112491801B (en) Incidence matrix-based object-oriented network attack modeling method and device
Wang et al. Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks
CN109039722B (en) Link prediction method based on common neighbor node resource allocation and naive Bayes
CN111447168B (en) Multidimensional network security prediction method
CN112070315A (en) Terrorist attack network analysis and event prediction method based on centrality measurement

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination