用户登录
期刊信息
  • 主管单位:
  • 上海市教育委员会
  • 主办单位:
  • 上海理工大学
  • 主  编:
  • 庄松林
  • 地  址:
  • 上海市军工路516号
  • 邮政编码:
  • 200093
  • 联系电话:
  • 021-55277251
  • 电子邮件:
  • xbzrb@usst.edu.cn
  • 国际标准刊号:
  • 1007-6735
  • 国内统一刊号:
  • 31-1739/T
  • 邮发代号:
  • 4-401
  • 单  价:
  • 15.00
  • 定  价:
  • 90.00
苏鹏涛,吴贶,陈孟婕,张雪芹.基于隐马尔可夫模型的电力信息系统动态威胁定量分析[J].上海理工大学学报,2022,44(4):388-396416.
基于隐马尔可夫模型的电力信息系统动态威胁定量分析
Dynamic threat quantitative analysis of power information system based on hidden Markov model
投稿时间:2021-10-09  
DOI:10.13255/j.cnki.jusst.20211009003
中文关键词:  电力信息系统  威胁定量分析  隐马尔可夫  入侵报警  贝叶斯网络
英文关键词:power information system  quantitative threat analysis  hidden Markov  intrusion alarm  Bayesian network
基金项目:
作者单位E-mail
苏鹏涛 上海欣能信息科技发展有限公司上海 200025  
吴贶 上海挚达科技发展有限公司上海 200433  
陈孟婕 华东理工大学 信息科学与工程学院上海 200237  
张雪芹 华东理工大学 信息科学与工程学院上海 200237 zxq@ecust.edu.cn 
摘要点击次数: 51
全文下载次数: 50
中文摘要:
      针对典型电力信息系统的网络威胁定量评估问题,提出了基于网络入侵检测系统(network intrusion detection syetem,NIDS)报警信息和隐马尔可夫模型的网络威胁动态分析方法HMM-NIDS。该方法充分利用NIDS报警信息,从优先级、严重度、资产值和可信度4个方面分析NIDS报警信息,给出了报警威胁定量描述和分类方法,优化了隐马尔可夫模型中的观测矩阵;基于贝叶斯网络分析攻击成功的可信度,避免NIDS误警信息干扰;基于改进的隐马尔可夫模型,融合得到系统的动态风险量化值。基于Darpa2000实验场景模拟DDoS攻击,通过对比实验,验证了所提方法的有效性和优越性。
英文摘要:
      Aiming at the problem of network threat quantitative evaluation of typical power information system, a network threat dynamic analysis method hmm-ids based on network intrusion detection syetem (NIDS) alarm information and hidden Markov model was proposed in this paper. NIDS alarm information was fully used to analyzes alarm threats from four aspects: priority, severity, asset value and reliability. A quantitative description and classification method of alarm threats were given and the observation matrix in hidden Markov model was optimized. The reliability of successful attack based on Bayesian network was analyzed, which avoided the interference of NIDS false alarm information. Based on the improved hidden Markov model, the dynamic risk quantification value of the system was obtained by fusion. DDoS attacks were simulated based on DARPA2000 experimental scenario. Through comparative experiments, the effectiveness and superiority of the proposed method were verified.
HTML   查看全文  查看/发表评论  下载PDF阅读器