Paper
9 February 2024 Network security enhancement strategies for power distribution station based on attack graphs
Zhuo Lv, Hao Chang, Cen Chen, Nuannuan Li
Author Affiliations +
Proceedings Volume 13073, Third International Conference on High Performance Computing and Communication Engineering (HPCCE 2023); 1307302 (2024) https://doi.org/10.1117/12.3026619
Event: Third International Conference on High Performance Computing and Communication Engineering (HPCCE 2023), 2023, Changsha, China
Abstract
With the application of network and communication technologies, power distribution stations have achieved online monitoring of operational status, intelligent analysis, and decision control, leading to the digitization and intelligent development. While network communication technologies bring efficiency to the operation and management of smart grids, they also introduce various network threats. This paper, in the context of power distribution station, analyzes the process of data flow of transmission and the method of constructing network attack graphs based on communication topology. It conducts quantitative risk assessment for power distribution station under network attacks, analyzes attack graphs to find the optimal attack paths, and formulates network security enhancement strategies based on this analysis. The experimental results show that the proposed scheme can find the key attack nodes more efficiently in the network attack graph of the power distribution station.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Zhuo Lv, Hao Chang, Cen Chen, and Nuannuan Li "Network security enhancement strategies for power distribution station based on attack graphs", Proc. SPIE 13073, Third International Conference on High Performance Computing and Communication Engineering (HPCCE 2023), 1307302 (9 February 2024); https://doi.org/10.1117/12.3026619
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Information security

Risk assessment

Power grids

Data transmission

Computer simulations

Data processing

Back to Top