Network security risk detection method for smart microgrid monitoring system

被引:0
作者
Wu X. [1 ]
Yang Y. [1 ]
Fan X. [1 ]
Yu Y. [1 ]
Wu Y. [1 ]
机构
[1] State Grid Ningbo Electric Power Supply Company, Ningbo
来源
Advanced Control for Applications: Engineering and Industrial Systems | 2024年 / 6卷 / 02期
关键词
artificial immune algorithm; monitoring system; network security; smart microgrid;
D O I
10.1002/adc2.143
中图分类号
学科分类号
摘要
Although the smart microgrid improves the power quality of the power system, it still has some security risks. So, this paper proposes a network security risk detection method of an intelligent microgrid monitoring system based on the artificial immune algorithm. By analyzing the structure of a smart microgrid monitoring system and introducing Policy Protection Detection Response (P2DR) dynamic network security model and ale static network security analysis method, the network security risk of the microgrid monitoring system is evaluated. The theoretical model is analyzed by the overall framework of the artificial immune algorithm, and its term definition is given. The mutation self is detected by self-dynamic description and immune cell evolution process with the network structure brought into and the risk of the computing network facing different attack subjects is analyzed. This method has a high detection accuracy for more than 10 kinds of network attack modes, the highest detection accuracy is 98%, and the average time is only 0.8 s. Compared with other methods, this method has higher detection accuracy and faster detection speed. It is universal in various network attack modes and can detect the possible network security risks of the intelligent microgrid monitoring system and protect its safe and stable operation. © 2023 John Wiley & Sons Ltd.
引用
收藏
相关论文
共 20 条
  • [1] Ni X.X., Intelligent communication network sensitive information connection reliability monitoring simulation, Comput Simul, 36, 7, pp. 449-453, (2019)
  • [2] Ni Z., Li Q., Liu G., Game-model-based network security risk control, Computer, 51, 4, pp. 28-38, (2018)
  • [3] Gharakheili H.H., Sivanathan A., Hamza A., Et al., Network-level security for the internet of things: opportunities and challenges, Computer, 10, pp. 12-25, (2019)
  • [4] Kherbache M., Amroun K., Espes D., A new wrapper feature selection model for anomaly-based intrusion detection systems, Int J Secur Netw, 17, 2, pp. 107-123, (2022)
  • [5] Salkuti S.R., Risk-based optimal operation of hybrid power system using multiobjective optimization, Int J Green Energy, 17, 11-15, pp. 853-863, (2020)
  • [6] Surender R.S., Park J.Y., Jung C.M., Optimal operation of microgrid using hybrid differential evolution and harmony search algorithm, Front Energy, 10, pp. 355-362, (2016)
  • [7] Battula A.R., Vuddanti S., Salkuti S.R., Review of energy management system approaches in microgrids, Energies, 14, 17, (2021)
  • [8] Panigrahi P.K., Mishra D.P., Das B., Et al., Power quality improvement in a photovoltaic based microgrid integrated network using multilevel inverter, Int J Emerg Electr Power Syst, 23, 2, pp. 197-209, (2021)
  • [9] Salkuti S.R., Optimal operation management of grid-connected microgrids under uncertainty 2019, 16(3): pp. 1163-1170
  • [10] Kergaravat S.V., Gagneten A.M., Hernandez S.R., Development of an electrochemical method for the detection of quinolones: application to cladoceran ecotoxicity studies, Microchem J, 141, pp. 279-286, (2018)