Journal of Shanghai Jiao Tong University ›› 2021, Vol. 55 ›› Issue (S2): 77-81.doi: 10.16183/j.cnki.jsjtu.2021.S2.012

Previous Articles     Next Articles

Network Security Inference Method Based on Dempster-Shafer Theory

WU Nan1, CHENG Zhetao1, DU Liang2, SHEN Yingping3()   

  1. 1. CNNP Nuclear Power Operation Management Co., Ltd., Haiyan 314300, Zhejiang, China
    2. Department of Automation; Key Laboratory of System Control and Information Processing of the Ministry of Education, Shanghai Jiao Tong University, Shanghai 200240, China
    3. Shanghai Yunxin Electronic Information Technology Co., Ltd., Shanghai 200233, China
  • Received:2021-08-20 Online:2021-12-28 Published:2022-01-24
  • Contact: SHEN Yingping E-mail:withnet@126.com

Abstract:

The network environment of the edge layer of the Internet of Things in power systems (IOTIPS) is complex in an open environment, and the security threats are diverse and dynamic. It is difficult for the traditional network security system based on firewall to effectively deal with the emerging security problems of the IOTIPS. This paper uses the data-driven idea to dynamically judge the network behavior of edge devices. Based on the characteristics of the IOTIPS, by using the three dimensions of network log, domain name generated by domain generation algorithm, and network traffic as criteria, a basic probability assignment method based on confusion matrix is proposed. Multi-source information fusion is performed by using the Dempster-Shafer theory, and the network security of IOTIPS is distinguished.

Key words: Internet of Things in power systems (IOTIPS), Dempster-Shafer theory, network security, evidence fusion

CLC Number: