上海交通大学学报 ›› 2021, Vol. 55 ›› Issue (S2): 77-81.doi: 10.16183/j.cnki.jsjtu.2021.S2.012

• • 上一篇    下一篇

基于Dempster-Shafer证据理论的网络安全推断方法

吴楠1, 程哲韬1, 杜亮2, 沈颖平3()   

  1. 1.中核核电运行管理有限公司,浙江 海盐 314300
    2.上海交通大学 自动化系; 系统控制与信息处理教育部重点实验室,上海 200240
    3.上海云欣电子信息技术有限公司,上海 200233
  • 收稿日期:2021-08-20 出版日期:2021-12-28 发布日期:2022-01-24
  • 通讯作者: 沈颖平 E-mail:withnet@126.com
  • 作者简介:吴 楠(1985-),男,浙江省嘉兴市人,工程师,主要研究方向为网络安全管理.

Network Security Inference Method Based on Dempster-Shafer Theory

WU Nan1, CHENG Zhetao1, DU Liang2, SHEN Yingping3()   

  1. 1. CNNP Nuclear Power Operation Management Co., Ltd., Haiyan 314300, Zhejiang, China
    2. Department of Automation; Key Laboratory of System Control and Information Processing of the Ministry of Education, Shanghai Jiao Tong University, Shanghai 200240, China
    3. Shanghai Yunxin Electronic Information Technology Co., Ltd., Shanghai 200233, China
  • Received:2021-08-20 Online:2021-12-28 Published:2022-01-24
  • Contact: SHEN Yingping E-mail:withnet@126.com

摘要:

电力物联网边缘层的网络环境复杂,处于开放环境中,安全威胁多样且动态变化.传统的基于防火墙的网络安全体系难以有效应对电力物联网层出不穷的安全问题.本文使用了数据驱动的思想对边缘设备的网络行为进行动态地判断.基于电力物联网的特点,采用网络日志、域名生成算法以及网络流量三个维度作为判据,给出了基于混淆矩阵的基本概率指派方法.通过Dempster-Shafer证据理论进行多源信息融合,对电力物联网的网络安全进行判别.

关键词: 电力物联网, Dempster-Shafer证据理论, 网络安全, 证据融合

Abstract:

The network environment of the edge layer of the Internet of Things in power systems (IOTIPS) is complex in an open environment, and the security threats are diverse and dynamic. It is difficult for the traditional network security system based on firewall to effectively deal with the emerging security problems of the IOTIPS. This paper uses the data-driven idea to dynamically judge the network behavior of edge devices. Based on the characteristics of the IOTIPS, by using the three dimensions of network log, domain name generated by domain generation algorithm, and network traffic as criteria, a basic probability assignment method based on confusion matrix is proposed. Multi-source information fusion is performed by using the Dempster-Shafer theory, and the network security of IOTIPS is distinguished.

Key words: Internet of Things in power systems (IOTIPS), Dempster-Shafer theory, network security, evidence fusion

中图分类号: