A Generation Method of New Power System APT Attack Graph Based on DQN

被引:0
|
作者
Wang, Zijia [1 ]
Li, Yuancheng [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, 2 Beinong Rd, Beijing 102206, Peoples R China
关键词
New power system; the APT attack; the DQN algorithm; network topology; industrial control system; new power system; CYBER;
D O I
10.2174/2352096516666230427100445
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Background The new power system is more vulnerable to Advanced Persistent Threat (APT) than the traditional power system.Objective This study aims to grasp the intent of the APT attack better; a new generation method of power system APT attack graph based on DQN is proposed.Methods First, the network topology of the new power system was extracted by Nessus scanning as the model input. Secondly, the agent in DQN was trained for multiple rounds. Starting from the set initial state, the agent selected the action with the highest Q value to act on the system in each round, and then the system entered the next state. Then the Q network function value was updated according to the obtained system feedback value until the target state appeared.Results After multiple rounds of training agents, multiple APT attack paths were finally obtained, thus an APT attack graph can be generated.Conclusion The experimental results showed that the efficiency of generating an APT attack graph based on the DQN method is obviously superior to the existing methods for the large-scale industrial control system, such as the new power system.
引用
收藏
页码:82 / 90
页数:9
相关论文
共 50 条
  • [31] APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning
    Li, Jiacheng
    Li, Tong
    Zhang, Runzi
    Wu, Di
    Yue, Hao
    Yang, Zhen
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 10 - 19
  • [32] Method for Behavior-Prediction of APT Attack Based on Dynamic Bayesian Game
    Yang Haopu
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2016), 2016, : 177 - 182
  • [33] A Multi-stage APT Attack Detection Method Based on Sample Enhancement
    Xie, Lixia
    Li, Xueou
    Yang, Hongyu
    Zhang, Liang
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 209 - 216
  • [34] A New Control Method for Microturbine-generation based Series Hybrid Power System
    Wei, Jialin
    Wang, Youlong
    Wen, Xuhui
    Li, Hongyang
    Zhang, Ying
    Li, Ke
    2019 22ND INTERNATIONAL CONFERENCE ON ELECTRICAL MACHINES AND SYSTEMS (ICEMS 2019), 2019, : 1246 - 1250
  • [35] Simulation and Evaluation Method of a Survival Equipment System Based on DQN
    Zhang, Qichen
    Ni, Bin
    Qian, Li
    Pan, Zhigang
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024, 2024, : 507 - 512
  • [36] A Graph Theory Based New Approach for Power System Restoration
    Quiros-Tortos, Jairo
    Terzija, Vladimir
    2013 IEEE GRENOBLE POWERTECH (POWERTECH), 2013,
  • [37] AI planning-based approach of attack graph generation
    Chen, Feng
    Su, Jin-Shu
    Han, Wen-Bao
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2008, 9 (05): : 460 - 465
  • [38] An atomic-domains-based approach for attack graph generation
    Chen, Fangfang
    Wang, Chunlu
    Tian, Zhihong
    Jin, Shuyuan
    Zhang, Tianle
    World Academy of Science, Engineering and Technology, 2009, 32 : 775 - 781
  • [39] Intelligent Legal Document Generation System and Method Based on Knowledge Graph
    Wei, Haifeng
    PROCEEDINGS OF 2024 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND DIGITAL APPLICATIONS, MIDA2024, 2024, : 350 - 354
  • [40] Attack Hypotheses Generation Based on Threat Intelligence Knowledge Graph
    Kaiser, Florian Klaus
    Dardik, Uriel
    Elitzur, Aviad
    Zilberman, Polina
    Daniel, Nir
    Wiens, Marcus
    Schultmann, Frank
    Elovici, Yuval
    Puzis, Rami
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4793 - 4809