Vulnerability Detection System for Power Information Based on Network Traffic Identification Technology

Author:

Luo Fucai,Xie Jingyi,Guo Jingdong,Liu Wenliang,He Jindong,Zhang Hang

Abstract

Abstract A power information vulnerability detection system has the problem of a low network survival rate. Therefore, a power information vulnerability detection system based on network traffic identification technology is designed. In the hardware part, the memory is configured as a synchronous interface and 4 DRAMs, and the level input and output power of the chip are kept in a state compatible with LVTTL levels; in the software part, the power information network indicators are obtained, the importance of network elements is reflected through a mesoscope, the failure characteristics of components are extracted using network traffic identification technology, a critical area is delineated, and the port protocols and association libraries of the passages are matched to optimize the system vulnerability detection function. Through analysis of the simulation results, it can be obtained that the network survival rate of the power information vulnerability detection system in this paper is 17.657% and 17.931% higher than that obtained by the other two power information vulnerability detection systems, respectively, indicating that the designed power information vulnerability detection system is more effective when fully integrated with network traffic identification techniques.

Publisher

IOP Publishing

Subject

General Physics and Astronomy

Reference6 articles.

1. Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics;Mahbub;Journal of Network and Computer Applications,2020

2. Research on Intelligent Detection of Security Vulnerabilities in Power Information Platform Based on Message Queuing;Xu;Microcomputer Applications,2021

3. Assessing Information Security Vulnerabilities and Threats to Implementing Security Mechanism and Security Policy Audit;Mohammed;Journal of Computer Science,2020

4. Scenario-based defense mechanism against vulnerabilities in Lagrange-based DMPC;Maestre;Control Engineering Practice,2021

5. Identification and characterizing of the prevailing paths on an urban network for MFD-based applications;Batista;Transportation Research Part C Emerging Technologies,2021

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Application of Carbon Emission Flow of Power Information Management System Based on Big Data Intelligent Analysis;2023 IEEE 3rd International Conference on Data Science and Computer Application (ICDSCA);2023-10-27

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3