Outline

Ingegneria Sismica

Ingegneria Sismica

Research on Network Characterization Security Response Based on SDN Rule Definition of Power IOT Service Traffic

Author(s): Binyuan Yan1
1Information Center of Guizhou Power Grid Co., LTD., Guiyang, Guizhou, 550002, China
Yan, Binyuan. “Research on Network Characterization Security Response Based on SDN Rule Definition of Power IOT Service Traffic.” Ingegneria Sismica Volume 43 Issue 2: 1-26, doi:10.65102/is2026699.

Abstract

In order to accurately assess the SDN network security status of power IOT business traffic, this paper proposes an SDN-oriented network security sensing method. The method extracts network security posture indicators based on the attack characteristics suffered by data, control and application planes. On this basis, a network security posture assessment method based on CS-BPNN is proposed, which uses the cuckoo search algorithm to find the optimal weights and thresholds of the model, and then applies the BP algorithm to adjust the error. On the basis of network security posture assessment, in order to solve the nonlinear problem in security posture prediction, the parameters of the LSTM prediction model are calculated using the gray wolf optimization algorithm to control the direction of the optimization search. The results show that the overall error of the proposed CS-BPNN assessment model is small and closest to 0. The prediction accuracy of the GWO-LSTM model in different tasks reaches more than 95%, which confirms the accuracy and stability of the method proposed in this paper. It provides methodological support for network feature security response and strategy design in the environment of electric power IoT.

Keywords
cuckoo search algorithm; gray wolf optimization algorithm; posture assessment; posture prediction; SDN; power IoT service traffic

Related Articles

Xihan Gong1, Haonan Cui2
1School of Marxism, Northeastern University, Shenyang, 110169, Liaoning, China
2School of Information Engineering, Shenyang Institute of Science and Technology, Shenyang, 110167, Liaoning, China
Lu Zhong1
1Yantai Nanshan University, Yantai, Shandong, China, 265713
Huanyong Zhang1, Ruzhu Jiang1
1School of business, Jiangnan University, Wuxi214122, Shaanxi, China
Yuqi Zhang1, Weixuan Liang2, Jiwei Lv3
1Department of Environmental Science and Engineering, North China Electric Power University, Baoding 071000, Hebei, China
2Department of Automation, North China Electric Power University, Baoding 071000, Hebei, China
3Department of Computer Science, North China Electric Power University, Baoding, 071000, Hebei, China
Lei Lei1, Chenxi Wang2, Hongmei Cai1, Dong Zhang3, Yusheng Zhang2, Qingyun Chen1
1State Grid (Xi’an) Environmental Protection Technology Center Co., Ltd., Xi’an 710100, Shaanxi, China
2Electric Power Research Institute of State Grid Shaanxi Electric Power Co., Ltd., Xi’an 710100, Shaanxi, China
3State Grid Shaanxi Electric Power Co., Ltd., Xi’an 710048, Shaanxi, China