CN117155799A - Transformer substation communication network fragile structure assessment method based on complex network theory - Google Patents
Transformer substation communication network fragile structure assessment method based on complex network theory Download PDFInfo
- Publication number
- CN117155799A CN117155799A CN202311087167.1A CN202311087167A CN117155799A CN 117155799 A CN117155799 A CN 117155799A CN 202311087167 A CN202311087167 A CN 202311087167A CN 117155799 A CN117155799 A CN 117155799A
- Authority
- CN
- China
- Prior art keywords
- node
- link
- vulnerability
- communication network
- calculating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 66
- 238000000034 method Methods 0.000 title claims abstract description 43
- 239000011159 matrix material Substances 0.000 claims description 21
- 230000008569 process Effects 0.000 claims description 18
- 230000002194 synthesizing effect Effects 0.000 claims description 4
- 230000003993 interaction Effects 0.000 claims description 3
- 238000010606 normalization Methods 0.000 claims description 2
- 238000012545 processing Methods 0.000 claims description 2
- 238000011156 evaluation Methods 0.000 abstract description 6
- 238000011002 quantification Methods 0.000 abstract description 2
- 238000005065 mining Methods 0.000 description 6
- 208000036119 Frailty Diseases 0.000 description 4
- 206010003549 asthenia Diseases 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 239000004744 fabric Substances 0.000 description 2
- 238000012038 vulnerability analysis Methods 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 1
- 238000003012 network analysis Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Abstract
The application discloses a method for evaluating a fragile structure of a transformer station communication network based on a complex network theory, which comprises the following steps: constructing a substation communication network model, and generating link weights based on an attack path of the substation communication network model; combining a complex network theory with the link weight, and calculating to obtain a plurality of node vulnerability values; based on the node vulnerability values, integrating local information and global information of links, and calculating to obtain a plurality of link vulnerability values; and respectively evaluating the fragile structure of the substation communication network based on the node fragile degree value and the link fragile degree value. The application can solve the problems of high updating speed, difficult quantification and subjectivity in expert evaluation of network attack in the prior art.
Description
Technical Field
The application belongs to the technical field of communication network fragile structure mining, and particularly relates to a substation communication network fragile structure assessment method based on a complex network theory.
Background
Assessment of fragile entities in complex networks is a fundamental problem in network analysis. Because the evaluation of each algorithm is different in selected emphasis, local factors and global factors are taken into consideration as the division, and the influence of different attack strategies on vulnerability is different. It is therefore very important to determine vulnerable entities in the network.
In the analysis of vulnerability of the power communication network, a characteristic index evaluation method is put forward to construct a power communication network model, and the network vulnerability is measured by the service importance loss caused by links; (2) Yin Jun, liju, huang Hongguang. In the analysis of vulnerability of a power communication network based on the utilization of links, a method for studying vulnerability of a power communication network based on the utilization of links is proposed.
In the aspect of vulnerability analysis of a transformer substation communication network, (3) Zhang. In vulnerability assessment of a transformer substation automation system in a network environment, a method for vulnerability assessment of the transformer substation automation system in the network environment is provided, and a vulnerability degree function of state transition is defined by taking a vulnerability degree factor and equivalent attack cost as parameters through formalized definition construction of a system to represent vulnerability state diagram of an attack process.
In the prior art, vulnerability analysis is carried out on an estimated network from two aspects of complex network theory and formalized definition of a system in an attack process, but when the network vulnerability structure is analyzed, network security protection measures adopted by different links in a transformer substation communication network are not considered, so that differences between the attacked difficulty of the network security protection measures are not found, and meanwhile, the network attack updating speed is high and is difficult to quantify, and the subjective performance exists in expert estimation.
Disclosure of Invention
The application provides a method for evaluating a fragile structure of a transformer station communication network based on a complex network theory, which aims to solve the technical problems in the prior art.
In order to achieve the above purpose, the present application provides a method for evaluating a fragile structure of a substation communication network based on a complex network theory, comprising:
constructing a substation communication network model, and generating link weights based on an attack path of the substation communication network model;
combining a complex network theory with the link weight, and calculating to obtain a plurality of node vulnerability values;
based on the node vulnerability values, integrating local information and global information of links, and calculating to obtain a plurality of link vulnerability values;
and respectively evaluating the fragile structure of the substation communication network based on the node fragile degree value and the link fragile degree value.
Preferably, the process of generating the link weights includes:
based on the attack path, quantifying a plurality of links of the substation communication network model through a CVSS scoring system, and calculating to obtain link weights based on vulnerability availability indexes in the CVSS scoring system.
Preferably, the vulnerability availability index includes: attack path, attack complexity, required privileges and user interactions.
Preferably, the process of calculating the node vulnerability values includes:
based on the complex network theory, obtaining a node network relation, wherein the node network relation comprises: node degree and node betweenness;
calculating to obtain node constraint coefficients based on the node degrees and the link weights;
and generating a structural hole influence matrix based on the node betweenness and the node constraint coefficient, and calculating a plurality of node vulnerability values based on the structural hole influence matrix.
Preferably, the process of calculating the node constraint coefficients includes:
calculating to obtain link strength based on the node degree and the link weight;
accumulating the link intensities to obtain node intensities;
and obtaining a relative importance function based on the link strength and the node strength, and calculating a node constraint coefficient based on the relative importance function.
Preferably, the process of generating the structure hole influence matrix comprises:
based on the node betweenness, establishing a node influence coefficient matrix;
and generating a structural hole influence matrix based on the node constraint coefficients and the node influence coefficient matrix.
Preferably, the process of calculating a number of link vulnerability values includes:
based on the node vulnerability value, synthesizing local information of the link, and calculating to obtain a link local vulnerability value;
synthesizing global information of the links, and calculating to obtain the roadside betweenness of the links;
and calculating a plurality of link vulnerability values based on the link local vulnerability and the link edge betweenness.
Preferably, the process of calculating the link local vulnerability value includes:
and carrying out normalization processing on the node vulnerability value to obtain a node relative vulnerability value, acquiring local information of nodes at two ends of the link, and calculating to obtain the link local vulnerability value based on the node relative vulnerability value and the local information.
Preferably, the process of evaluating the fragile structure of the substation communication network based on the node vulnerability value comprises:
and arranging the node vulnerability values in a descending order, wherein if the node vulnerability value is larger, the node corresponding to the node vulnerability value is more fragile in a substation communication network.
Preferably, the process of evaluating the fragile structure of the substation communication network based on the link vulnerability value comprises:
and arranging the link vulnerability values in a descending order, wherein if the link vulnerability value is larger, the link corresponding to the link vulnerability value is more vulnerable in the substation communication network.
Compared with the prior art, the application has the following advantages and technical effects:
according to the method, the communication network attack path of the transformer substation is analyzed, the attack difficulty of the network attack of the transformer substation is quantized, and the link weight is generated for the analysis of the topology structure of the communication network; the fragile structure assessment method provided by the application is mainly characterized in that complex network theory and link weight are combined, the local information and the global information of the comprehensive links are used for carrying out fragile assessment on the communication network nodes and the links, and the fragile nodes and the fragile links are obtained according to the assessment results, so that the problems that in the prior art, the network attack update speed is high, quantification is difficult, and subjective assessment exists in expert assessment are solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
fig. 1 is a flowchart of a method for evaluating a fragile structure of a substation communication network according to an embodiment of the present application;
fig. 2 is a schematic diagram of a substation communication network structure according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a fragile node mining flow according to an embodiment of the present application;
fig. 4 is a flowchart of a vulnerable link evaluation method according to an embodiment of the present application.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
Example 1
As shown in fig. 1, in this embodiment, a method for evaluating a fragile structure of a substation communication network based on a complex network theory is provided, including:
constructing a substation communication network model, and generating link weights based on an attack path of the substation communication network model;
combining a complex network theory with the link weight, and calculating to obtain a plurality of node vulnerability values;
based on the node vulnerability values, integrating local information and global information of links, and calculating to obtain a plurality of link vulnerability values;
and respectively evaluating the fragile structure of the substation communication network based on the node fragile degree value and the link fragile degree value.
In this embodiment, a substation communication network structure diagram is obtained by simplifying a real substation communication network structure, and is abstracted into a substation communication network topology model, and the result is shown in fig. 2, where p merging units and q intelligent terminals are in total.
The set of nodes in the communication network is v= { V i Node v i And v j The link is composed of e i,j The link set is e= { E i,j }。
The network attack can break the firewall in a remote access mode, can propagate along the information interaction path of fig. 2 after entering the station-controlled layer bus, and can quantify each link by adopting a CVSS3.0 universal vulnerability scoring system. CVSS3.0 is issued by the national vulnerability database in the United states and keeps the vulnerability data updated in time, comprehensively measures the harmfulness of the vulnerability and gives a specific score to the vulnerability. The exploit cost of vulnerabilities is calculated here by the CVSS scoring system to characterize the link weights.
The score of the availability index of the vulnerability is determined by the difficulty level of the vulnerability and the complexity level of the technical means adopted by the vulnerability. The exploit index is specifically shown in table 1:
TABLE 1
Weights for edges between nodes, i.e. at the previous node v i For the following node v in case of successful attack j Probability of launching an attack, which probability is mainly the same as the following node v j The cost of exploit is relevant. If the following node v j The higher the exploit cost, the lower the probability of being attacked successful. The calculation formula is as follows:
W (i,j) =Cost=AV·AC·PR·UI (1)
wherein W is (i,j) For link e i,j Is used for the link weight of the (c).
Complex network theory-based mining of fragile nodes of substation communication network
To mine the fragile entity of the communication network, the fragile node needs to be mined first, and the mining flow of the fragile node is shown in fig. 3.
The first step: obtaining node internet relations from complex network theory
In order to perform subsequent node evaluation, firstly, the internet relation of the nodes is obtained, and the topology structure evaluation is performed on the selected nodes from two angles of node degrees and node betweenness by a complex network theory. The specific indexes are as follows:
(1) Node degree: node degree is deg (v i ) Representing the node v within the network i A number of directly associated links; with node v i The number of links as the link start point is the node output degree deg + (v i ) In terms of node v i The number of links as the end point is the node output degree deg - (v i ) There is
(2) Node betweenness B: representing node v by node betweenness B i At the global influence level of the network, there are
In the formula (3), delta jk For node v j To v k The number of paths, delta, under the principle of shortest route jk (i) Delta is jk Via v i Is a path number of the (c).
And a second step of: link strength and node strength calculation based on improved structure holes
If two independent nodes in the network topology have neither direct connections nor indirect redundancy relationships, then the barrier between them is called a fabric hole. Node v i The more "fabric holes" that are occupied, the greater its vulnerability in the overall network topology. However, in the actual network topology, the nodes have bias towards the neighboring nodes, that is, more important neighboring nodes are put into more contribution, and the network security protection levels among different nodes are different, that is, the link security degrees are different, so that the nodes are not treated equally. Therefore, not only the node v needs to be considered in the application of the structural hole in the substation communication network i And the number of adjacent nodes, and also needs to consider the node v i With adjacent node v i The strength of the connected communication link.
In order to evaluate node vulnerability of a substation communication network, the link strength and the node strength need to be calculated:
(1) Consider node v i To maintain adjacent node v j The degree of contribution paid by the relation of the link is ascribed to the link strength w (i, j), and the expression is as follows:
w(i,j)=[deg(v i )+deg(v j )]*W (i,j) (4)
(2) In the obtained link e i,j Based on the intensity w (i, j), the intensity of each link is accumulated and processed to be attributed to the node v i The strength w (i) of (a) is:
w(i)=∑ j∈Z(i) w(i,j) (5)
wherein Z (i) is the AND node v i And the connected nodes form a collection.
And a third step of: calculating constraint coefficients
Node v is measured by a relative importance function p (i, j) i To maintain adjacent node v j The contribution to be paid out is expressed as:
p(i,j)=w(i,j)/w(i) (6)
by node v i To maintain adjacent node v j The constraint coefficient value C (i) of each node is calculated by the contribution p (i, j) of the edge relation of the (a), and the constraint coefficient value C (i) of each node is calculated by the following steps:
C(i)=Σ[p(i,j)+p(i,q)*p(q,j)],i≠q≠j,q,j∈Z(i) (7)
wherein p (i, q) and p (q, j) respectively represent node v i And v j To maintain a common adjacent node v q The contribution made by the relationship of (c).
Fourth step: generating a node influence coefficient matrix and a structural hole influence matrix
The impact of a node depends on two factors: the location information of a node and the neighboring information of the node may also be referred to as global influence of the node and local influence of the node. To integrate the effects of the two, a node influence coefficient matrix and a structure hole influence matrix are sequentially constructed:
(1) Combining node betweenness to establish a node influence coefficient matrix H A The method comprises the following steps:
wherein H is A (i,j)=e i,j ·B j Representing node v j For node v i The influence coefficients of the nodes on the matrix diagonal are all 1, which means that the influence coefficient of the nodes on the matrix diagonal is 100%, so that the influence degree of any node on other nodes in the network can be obtained.
(3) Determining the influence degree between nodes by adopting node constraint coefficients, and generating a structural hole influence matrix H by combining the constraint coefficients and the influence coefficient matrix C The method comprises the following steps:
wherein H is C (i,j)e i,j B j [C(j)] -1 Representing node v j For node v i Is a fragile value of (c). Node v i The influence on its neighboring nodes is inversely related to the value of its constraint coefficient, but with its node betweenness B i And shows positive correlation.
Fifth step: computing node vulnerability values
To accomplish the vulnerability node metric based on the improved structure hole, the vulnerability value Fi of the required node vi is:
sixth step: acquiring a set of frangible nodes
And the vulnerability values of all nodes in the substation communication network are calculated by the links and are arranged in descending order. When F i The larger the value of (v), the node v i The more fragile it is in the substation communication network. Nodes that take the first 20% of the frailty value row constitute a frailty node set.
Second, vulnerable link mining algorithm
After the node vulnerability value is obtained, the link vulnerability value can be calculated on the basis, and the flow of the link vulnerability value is shown in fig. 4.
The first step: and completing the construction of a substation communication network model and acquiring the node vulnerability value by the previous links.
And a second step of: computing node relative vulnerability values
In order to make the node vulnerability values in the same magnitude for subsequent calculation, the node vulnerability values need to be normalized to obtain node relative vulnerability values τ i The method comprises the following steps:
wherein,is the maximum value obtained by squaring all node vulnerability values.
And a third step of: computing link local vulnerability
The local information and the global information of the nodes are mainly considered in the network topology level, and the same thought is also applied to vulnerable link mining. For this purpose, the local information of the nodes at both ends of the link is considered first, and the influence degree of the vulnerability of the nodes at both ends on the link is analyzed to obtain the local vulnerability value PF (e) i,j ) The expression is:
PF(e i,j )=deg(v i )*τ i +deg(v j )*τ j (12)
fourth step: computing edge betweenness of links
To embody the global information attribute of the link, consider introducing the link e i,j Edge medium number EB (e) i,j ) The position and the effect of the link in information communication are measured, and the expression is as follows:
wherein delta kl For node v k To v l The number of paths, delta, under the principle of shortest route kl (e i,j ) Delta is kl Via link e i,j Is a path number of the (c).
Fifth step: computing link vulnerability values
Combining link local vulnerability with link edge betweenness to calculate link vulnerability F (e i,j ) The expression of the local information and the global information of the time-integrated link is as follows:
F(e i,j )=α*PF(e i,j )+(1-α)*EB(e i,j ) (14)
wherein, α is a decision coefficient, and the value range thereof is [0,1], where α=0.5.
Sixth step: acquiring a vulnerable Link set
Simultaneously obtain fragile node set, headThe calculation of the vulnerability values of all links in the substation communication network is finished by the links, and the vulnerability values are arranged in descending order. When F (e) i,j ) The larger the value of (c), the link e i,j The more fragile it is in the substation communication network. Links that take the first 20% of the frailty value rows constitute the frailty link set.
The present application is not limited to the above-mentioned embodiments, and any changes or substitutions that can be easily understood by those skilled in the art within the technical scope of the present application are intended to be included in the scope of the present application. Therefore, the protection scope of the present application should be subject to the protection scope of the claims.
Claims (10)
1. A method for evaluating a fragile structure of a transformer station communication network based on a complex network theory is characterized by comprising the following steps:
constructing a substation communication network model, and generating link weights based on an attack path of the substation communication network model;
combining a complex network theory with the link weight, and calculating to obtain a plurality of node vulnerability values;
based on the node vulnerability values, integrating local information and global information of links, and calculating to obtain a plurality of link vulnerability values;
and respectively evaluating the fragile structure of the substation communication network based on the node fragile degree value and the link fragile degree value.
2. The method for evaluating the fragile structure of the communication network of the transformer substation based on the complex network theory according to claim 1, wherein the process of generating the link weight comprises the following steps:
based on the attack path, quantifying a plurality of links of the substation communication network model through a CVSS scoring system, and calculating to obtain link weights based on vulnerability availability indexes in the CVSS scoring system.
3. The method for evaluating a fragile structure of a substation communication network based on the complex network theory according to claim 2, wherein the vulnerability availability index comprises: attack path, attack complexity, required privileges and user interactions.
4. The method for evaluating the fragile structure of the transformer station communication network based on the complex network theory according to claim 1, wherein the process of calculating the plurality of node fragile degree values comprises the following steps:
based on the complex network theory, obtaining a node network relation, wherein the node network relation comprises: node degree and node betweenness;
calculating to obtain node constraint coefficients based on the node degrees and the link weights;
and generating a structural hole influence matrix based on the node betweenness and the node constraint coefficient, and calculating a plurality of node vulnerability values based on the structural hole influence matrix.
5. The method for evaluating the fragile structure of the transformer station communication network based on the complex network theory according to claim 4, wherein the process of calculating the node constraint coefficients comprises the following steps:
calculating to obtain link strength based on the node degree and the link weight;
accumulating the link intensities to obtain node intensities;
and obtaining a relative importance function based on the link strength and the node strength, and calculating a node constraint coefficient based on the relative importance function.
6. The method for evaluating a fragile structure of a transformer station communication network based on a complex network theory according to claim 4, wherein the process of generating the structure hole influence matrix comprises:
based on the node betweenness, establishing a node influence coefficient matrix;
and generating a structural hole influence matrix based on the node constraint coefficients and the node influence coefficient matrix.
7. The method for evaluating the fragile structure of the transformer station communication network based on the complex network theory according to claim 1, wherein the process of calculating the link vulnerability values comprises the following steps:
based on the node vulnerability value, synthesizing local information of the link, and calculating to obtain a link local vulnerability value;
synthesizing global information of the links, and calculating to obtain the roadside betweenness of the links;
and calculating a plurality of link vulnerability values based on the link local vulnerability and the link edge betweenness.
8. The method for evaluating the fragile structure of the transformer station communication network based on the complex network theory according to claim 7, wherein the process of calculating the link local vulnerability value comprises the following steps:
and carrying out normalization processing on the node vulnerability value to obtain a node relative vulnerability value, acquiring local information of nodes at two ends of the link, and calculating to obtain the link local vulnerability value based on the node relative vulnerability value and the local information.
9. The method for evaluating the fragile structure of the communication network of the transformer substation based on the complex network theory according to claim 1, wherein the process of evaluating the fragile structure of the communication network of the transformer substation based on the node fragile degree value comprises the following steps:
and arranging the node vulnerability values in a descending order, wherein if the node vulnerability value is larger, the node corresponding to the node vulnerability value is more fragile in a substation communication network.
10. The method for evaluating the fragile structure of the communication network of the transformer substation based on the complex network theory according to claim 1, wherein the process of evaluating the fragile structure of the communication network of the transformer substation based on the link weakness value comprises the following steps:
and arranging the link vulnerability values in a descending order, wherein if the link vulnerability value is larger, the link corresponding to the link vulnerability value is more vulnerable in the substation communication network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311087167.1A CN117155799A (en) | 2023-08-28 | 2023-08-28 | Transformer substation communication network fragile structure assessment method based on complex network theory |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311087167.1A CN117155799A (en) | 2023-08-28 | 2023-08-28 | Transformer substation communication network fragile structure assessment method based on complex network theory |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117155799A true CN117155799A (en) | 2023-12-01 |
Family
ID=88883576
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311087167.1A Pending CN117155799A (en) | 2023-08-28 | 2023-08-28 | Transformer substation communication network fragile structure assessment method based on complex network theory |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117155799A (en) |
-
2023
- 2023-08-28 CN CN202311087167.1A patent/CN117155799A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109767352B (en) | Safety situation assessment method for electric power information physical fusion system | |
Hu et al. | Security risk situation quantification method based on threat prediction for multimedia communication network | |
CN108683654B (en) | Network vulnerability assessment method based on zero-day attack graph | |
CN115361150B (en) | Security risk assessment method for power distribution network risk cascade under network attack | |
Sun et al. | Quantifying the robustness of network controllability | |
Marzo et al. | A study of the robustness of optical networks under massive failures | |
CN114615066A (en) | Target path determination method and device | |
CN115460608A (en) | Method and device for executing network security policy and electronic equipment | |
Bian et al. | Network security situational assessment model based on improved AHP_FCE | |
Li et al. | Dynamic trustworthiness overlapping community discovery in mobile internet of things | |
CN117155799A (en) | Transformer substation communication network fragile structure assessment method based on complex network theory | |
Winanto et al. | Designing consensus algorithm for collaborative signature-based intrusion detection system | |
Abraham et al. | A novel architecture for predictive cybersecurity using non-homogenous markov models | |
Peng et al. | Sensing network security prevention measures of BIM smart operation and maintenance system | |
CN111464327A (en) | Spatial information network survivability evaluation method based on graph convolution network | |
CN111917589B (en) | Power communication network resource backup method and related device | |
CN113709097B (en) | Network risk sensing method and defense method | |
K V et al. | Accurate and reliable detection of DDoS attacks based on ARIMA-SWGARCH model | |
CN114006744A (en) | LSTM-based power monitoring system network security situation prediction method and system | |
Bhattacharjee et al. | Vulnerability characterization and privacy quantification for cyber-physical systems | |
CN112491801B (en) | Incidence matrix-based object-oriented network attack modeling method and device | |
Wang et al. | Optimal Repair Strategy Against Advanced Persistent Threats Under Time-Varying Networks | |
CN109039722B (en) | Link prediction method based on common neighbor node resource allocation and naive Bayes | |
CN111447168B (en) | Multidimensional network security prediction method | |
CN112070315A (en) | Terrorist attack network analysis and event prediction method based on centrality measurement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |