Application of network security penetration technology in power internet of things security vulnerability detection

被引:4
|
作者
Chen, Ze [1 ]
Zuo, Xiaojun [1 ]
Dong, Na [1 ]
Hou, Botao [1 ]
机构
[1] State Grid Hebei Elect Power Res Inst, Shijiazhuang 050021, Hebei, Peoples R China
关键词
FRAMEWORK;
D O I
10.1002/ett.3859
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The emergence of network penetration attacks makes network security problems more and more prominent. To better detect network penetration attacks, this article first proposes an attack detection method based on ant colony classification rules mining algorithm based on swarm intelligence theory. Classification rules perform pattern matching to detect attack behavior. Second, the quantitative problem in the evaluation mechanism of power internet security vulnerability is analyzed. The addition and deletion of power internet of things (IoT) security assessment elements introduces a probabilistic computing model, improves the vulnerability assessment mechanism of power object networks, and solves the problem of power object network security and quantitative computing. Finally, after performing a series of preprocessing on the dataset, using the above method to find the classification rule or classification center, respectively, perform pattern matching or similarity calculation, and finally obtain the attack detection result. A series of evaluation functions are established in the experiment, and the experimental results are compared with other related algorithms. The results show that the method can effectively detect network penetration attacks and IoT security vulnerabilities, and the effectiveness of attack detection methods is greatly improved.
引用
收藏
页数:13
相关论文
共 50 条
  • [11] Study on network security and the application of internet firewall technology
    Zhang Yan
    Han Xie
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6380 - 6382
  • [12] Evaluation of Internet of Things computer network security and remote control technology
    Lu, Haifeng
    Wu, Haiwei
    Jing, Ru
    OPEN COMPUTER SCIENCE, 2024, 14 (01):
  • [13] Network Security Risk Investigation System Based on Internet of Things Technology
    He, Qian
    2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, : 397 - 400
  • [14] Security authentication technology based on dynamic Bayesian network in Internet of Things
    Qing Zhang
    Dilong Xu
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 573 - 580
  • [15] An Analysis of Internet of Things Computer Network Security and Remote Control Technology
    Zhao, Hong
    Wang, Lingxia
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [16] Analysis of Internet of Things Computer Network Security and Remote Control Technology
    Wang, Mei
    Zhang, Baohua
    2020 2ND INTERNATIONAL CONFERENCE ON CIVIL ENGINEERING, ENVIRONMENT RESOURCES AND ENERGY MATERIALS, 2021, 634
  • [17] Security authentication technology based on dynamic Bayesian network in Internet of Things
    Zhang, Qing
    Xu, Dilong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (02) : 573 - 580
  • [18] Bioimmunological Method Based Security Technology of Ubiquitous Power Internet of Things
    Qu Z.
    Dong Y.
    Liu S.
    Shen Z.
    Yu J.
    Li Y.
    Dong, Yunchang (dongyunchang@sgepri.sgcc.com.cn), 1600, Automation of Electric Power Systems Press (44): : 1 - 12
  • [19] Research on Technology Application and Security Threat of Internet of Things for Smart Grid
    Liu, Donglan
    Liu, Xin
    Yu, Hao
    Wang, Wenting
    Zhao, Xiaohong
    Zhao, Yang
    Zhang, Hao
    Ma, Lei
    Li, Dong
    Li, Qiying
    2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 496 - 499
  • [20] Research on Data Security Technology in Internet of Things
    Zhao Yanling
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1752 - 1755