Generation Method of Power Network Security Defense Strategy Based on Markov Decision Process

  • Wang Yang Xinjiang Normal College, Xinjiang, China
  • Liu Dong Xinjiang Ploytechnical College, Xinjiang, China
  • Wang Dong Xinjiang Normal College, Xinjiang, China
  • Xu Chun injiang University of Finance and Economics, Xinjiang, China
Keywords: arkov decision, power network security, defense strategy, offense and defense game.

Abstract

Aiming at the problem that the current generation method of power network security defense strategy ignores the dependency relationship between nodes, resulting in closed-loop attack graph, which makes the defense strategy not generate attack path, resulting in poor defense effect and long generation response time of power network security defense strategy, a generation method of power network security defense strategy based on Markov decision process is proposed. Based on the generation of network attack and defense diagram, the paper describes the state change of attack network by using Markov decision-making process correlation principle, introduces discount factor, calculates the income value of attack and defense game process, constructs the evolutionary game model of attack and defense, solves the objective function according to the dynamic programming theory, obtains the optimal strategy set and outputs the final results, and generates the power network security defense strategy. The experimental results show that the proposed method has good defense effect and can effectively shorten the generation response time of power network security defense strategy.

Downloads

Download data is not yet available.

Author Biographies

Wang Yang, Xinjiang Normal College, Xinjiang, China

Wang Yang, graduated from school of computer science of Xinjiang Normal University in 2020 with a master’s degree. At present, she works in the vocational and technical college of Xinjiang Normal College. Her main research directions are: computer science and technology, information technology teaching theory.

Liu Dong, Xinjiang Ploytechnical College, Xinjiang, China

Liu Dong, graduated from school of telecom engineering of Beijing Jiaotong University in 2008 with a bachelor’s degree. Currently, he works in the vocational and technical college of Xinjiang Ploytechnical University. His main research directions are: computer science and technology, information technology teaching theory.

Wang Dong, Xinjiang Normal College, Xinjiang, China

Wang Dong, graduated from school of computer science of Xinjiang Normal University in 1989 with a master’s degree. At present, he works in the vocational and technical college of Xinjiang Normal College. His main research directions are: computer science and technology.

Xu Chun, injiang University of Finance and Economics, Xinjiang, China

Xu Chun received a Ph.D. from the University of Chinese Academy of Sciences. Her research interest is natural language processing. Currently, mainly engaged in the research of big data analysis and prediction at the Xinjiang University of Finance and Economics. Contact her at xuchun@mails.ucas.edu.cn.

References

Xiong Xinli, Yang Lin, Li Kechao. A Strategy Optimization Model of Moving Target Defense Based on Markov Decision Process [J]. Journal of Wuhan University (Natural Science Edition), 2020, 66(02):141–148.

Song Jiahan, Li Jingjiao, Pi Jie, et al. Research on Attack and Defense Strategy of Substation Network Security Applying Markov Decision Process[J]. Electric Power Construction, 2019, 40(10):104–110.

Meng Xiaodong. Anti-theft method of sensitive data in link network in large data background[J]. Journal of Xi’an Polytechnic University, 2019, 32(02):212–217.

Zhang Xingming, Gu Zeyu, Wei Shuai, et al. Markov game modeling of mimic defense and defense strategy determination [J]. Journal on Communications, 2018, 39(10):143–154.

Yang Junnan, Zhang Hongqi, Zhang Chuanfu. Defense decision-making method based on incomplete information stochastic game.[J]. Chinese Journal of Network and Information Security, 2018, 4(08):12–20.

Liu Jingwei, Liu Jin-Ju, Lu Yuliang, et al. Optimal Defense Strategy Selection Method Based on Network Attack-Defense Game Model [J]. Computer Science, 2018, 45(06):117–123.

Based on Markov Evolutionary Game [J]. Acta Electronica Sinica, 2018, 46(06):1503–1509.

Tian Jiwei, Wang Buhong, Li Xia, et al. Optimal Defense Strategy Against Load Redistribution Attack Based on Game Theory [J]. Computer Simulation, 2018, 35(05):123–127+190.

Pan Qiuyu. Network intrusion detection based on hidden markov model [J]. Information Security and Technology, 2018, 9(04):65–68.

Hu Hao, Liu Yuling, Zhang Hongqi, et al. Route Prediction Method for Network Intrusion Using Absorbing Markov Chain [J]. Journal of Computer Research and Development, 2018, 55(04):831–845.

Published
2021-07-19
Section
Renewable Power and Energy Systems