A Generation Method of New Power System APT Attack Graph Based on DQN

被引:0
|
作者
Wang, Zijia [1 ]
Li, Yuancheng [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, 2 Beinong Rd, Beijing 102206, Peoples R China
关键词
New power system; the APT attack; the DQN algorithm; network topology; industrial control system; new power system; CYBER;
D O I
10.2174/2352096516666230427100445
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Background The new power system is more vulnerable to Advanced Persistent Threat (APT) than the traditional power system.Objective This study aims to grasp the intent of the APT attack better; a new generation method of power system APT attack graph based on DQN is proposed.Methods First, the network topology of the new power system was extracted by Nessus scanning as the model input. Secondly, the agent in DQN was trained for multiple rounds. Starting from the set initial state, the agent selected the action with the highest Q value to act on the system in each round, and then the system entered the next state. Then the Q network function value was updated according to the obtained system feedback value until the target state appeared.Results After multiple rounds of training agents, multiple APT attack paths were finally obtained, thus an APT attack graph can be generated.Conclusion The experimental results showed that the efficiency of generating an APT attack graph based on the DQN method is obviously superior to the existing methods for the large-scale industrial control system, such as the new power system.
引用
收藏
页码:82 / 90
页数:9
相关论文
共 50 条
  • [21] Depth-first method for attack graph generation
    Information Security Research Center, Harbin Engineering University, Harbin 150001, China
    不详
    Jilin Daxue Xuebao (Gongxueban), 2009, 2 (446-452):
  • [22] A Bayesian-Attack-Graph-Based Security Assessment Method for Power Systems
    Chen, Lu
    Zhang, Tao
    Ma, Yuanyuan
    Li, Yong
    Wang, Chen
    He, Chuan
    Lv, Zhuo
    Li, Nuannuan
    ELECTRONICS, 2024, 13 (13)
  • [23] A Power System Operating Scenario Generation Method Based on Graph Representation Learning and Feature Guidance
    Chen, Zhiwei
    Wu, Yufeng
    Pan, Zhenning
    Yu, Tao
    Liu, Qianjin
    Huang, Wenqi
    Hou, Jiaxuan
    Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2024, 44 (24): : 9521 - 9532
  • [24] An Effective Reconstruction Method of the APT Attack Based on Hidden Markov Model
    Huang, Yonghui
    Sun, Yi
    Lin, Kaixiang
    Xie, Bowen
    Fan, Jiayang
    Ma, Yan
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2022, 31 (06)
  • [25] Attack Intent Analysis Method Based on Attack Path Graph
    Li, Shijin
    Zhu, Minchen
    Qiu, Yanbin
    ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 27 - 31
  • [26] MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning
    Aly, Ahmed
    Iqbal, Shahrear
    Youssef, Amr
    Mansour, Essam
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5257 - 5271
  • [27] Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases
    Sonmez, Ferda Ozdemir
    Hankin, Chris
    Malacaria, Pasquale
    COMPUTERS & SECURITY, 2022, 123
  • [28] An Attack Path Generation Methods Based on Graph Database
    Yuan, Bintao
    Pan, Zulie
    Shi, Fan
    Li, Zhenhan
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1905 - 1910
  • [29] Generation method of planning scenario for new power system based on fractal theory
    Yin J.
    Xie N.
    Wang C.
    Zhao P.
    Fan C.
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2024, 44 (07): : 94 - 100and188
  • [30] Research on APT group classification method based on graph attention networks
    Du, Yazhou
    Ren, Weiwu
    Song, Xintong
    Li, Wenjuan
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (04):