scholarly journals Research on Generating and Visualizing Display Method of Power Optical Network Attack Path

1970 ◽  
Vol 1 (1) ◽  
Author(s):  
Li Wei Wei

When an intruder attacks an object in an electric power network, it is necessary to successfully invade the target node along an attack path. However, as the number of target power optical network nodes increases gradually, the attack path will be exponential growth, resulting in path redundancy, affecting the overall performance of the generated path. To this end, a new power optical network attack path generation and visual display method, introduced the atomic attack, attack map and attack path definition. Based on the analysis of the cost and benefit of the attack path, the intrusion feasibility model is proposed, and the intruder’s choice of the attack path becomes the problem of the feasibility of the invasion. When the POS set contains all the directional edges of the power optical network attack map, generate the attack path of the power optical network by traversing the POS collection element. The process of generating the attack path of the electric power network is displayed. The experimental results show that there is no redundant phenomenon in the proposed method, and the generated attack path is effective and the reliability is high.

2014 ◽  
Vol 596 ◽  
pp. 653-658 ◽  
Author(s):  
Ning Zhe Xing ◽  
Jia Qi Guo ◽  
Ran Yu

Reliable power network can provide reliable operation of electric power for dispatching communication security, due to many key network nodes external connectivity in the electric power communication network has only one path, so once the link damage because of emergencies, these networks because of the failure of nodes (or communication link) and power operation scheduling of exception can occur easily, thus to cause great damage to the safe operation of the whole power network. In order to improve the robustness of system in this case, this paper designed a new optimization algorithm based on the equivalent network to simplify the real network and the network analysis.


2017 ◽  
Vol 1 (1) ◽  
pp. 32-37
Author(s):  
Li Wei Wei ◽  
Ma Yuan Yuan ◽  
Zhou Cheng ◽  
Li Qian Mu

2005 ◽  
Author(s):  
Shinichi Nakasuka ◽  
Takashi Eishima ◽  
Hironori Sahara ◽  
Yuya Nakamura ◽  
Yoshiki Sugawara ◽  
...  

2021 ◽  
Author(s):  
V. M. Alevizaki ◽  
A. I. Manolopoulos ◽  
M. Anastasopoulos ◽  
A. Tzanakaki

Author(s):  
Wang Yang ◽  
Liu Dong ◽  
Wang Dong ◽  
Xu Chun

Aiming at the problem that the current generation method of power network security defense strategy ignores the dependency relationship between nodes, resulting in closed-loop attack graph, which makes the defense strategy not generate attack path, resulting in poor defense effect and long generation response time of power network security defense strategy, a generation method of power network security defense strategy based on Markov decision process is proposed. Based on the generation of network attack and defense diagram, the paper describes the state change of attack network by using Markov decision-making process correlation principle, introduces discount factor, calculates the income value of attack and defense game process, constructs the evolutionary game model of attack and defense, solves the objective function according to the dynamic programming theory, obtains the optimal strategy set and outputs the final results, and generates the power network security defense strategy. The experimental results show that the proposed method has good defense effect and can effectively shorten the generation response time of power network security defense strategy.


Author(s):  
Uche Chinweoke Ogbuefi ◽  
Boniface Onyemaechi Anyaka ◽  
Muncho Josephine Mbunwe

1998 ◽  
pp. 239-273
Author(s):  
Olle I. Elgerd ◽  
Patrick D. van der Puije
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document