Generation Method of Power Network Security Defense Strategy Based on Markov Decision Process

Authors

  • Wang Yang Xinjiang Normal College, Xinjiang, China
  • Liu Dong Xinjiang Ploytechnical College, Xinjiang, China
  • Wang Dong Xinjiang Normal College, Xinjiang, China
  • Xu Chun Xinjiang University of Finance and Economics, Xinjiang, China

DOI:

https://doi.org/10.13052/dgaej2156-3306.3635

Keywords:

Markov decision, power network security, defense strategy, offense and defense game.

Abstract

Aiming at the problem that the current generation method of power network
security defense strategy ignores the dependency relationship between nodes,
resulting in closed-loop attack graph, which makes the defense strategy not
generate attack path, resulting in poor defense effect and long generation
response time of power network security defense strategy, a generation
method of power network security defense strategy based on Markov decision
process is proposed. Based on the generation of network attack and defense
diagram, the paper describes the state change of attack network by using
Markov decision-making process correlation principle, introduces discount
factor, calculates the income value of attack and defense game process,
constructs the evolutionary game model of attack and defense, solves the
objective function according to the dynamic programming theory, obtains the
optimal strategy set and outputs the final results, and generates the power
network security defense strategy. The experimental results show that the proposed method has good defense effect and can effectively shorten the
generation response time of power network security defense strategy.

Downloads

Download data is not yet available.

Author Biographies

Wang Yang, Xinjiang Normal College, Xinjiang, China

Wang Yang, graduated from school of computer science of Xinjiang Normal
University in 2020 with a master’s degree. At present, she works in the voca-
tional and technical college of Xinjiang Normal College. Her main research
directions are: computer science and technology, information technology
teaching theory.

Liu Dong, Xinjiang Ploytechnical College, Xinjiang, China

Liu Dong, graduated from school of telecom engineering of Beijing Jiaotong
University in 2008 with a bachelor’s degree. Currently, he works in the
vocational and technical college of Xinjiang Ploytechnical University. His
main research directions are: computer science and technology, information
technology teaching theory.

Wang Dong, Xinjiang Normal College, Xinjiang, China

Wang Dong, graduated from school of computer science of Xinjiang Normal
University in 1989 with a master’s degree. At present, he works in the voca-
tional and technical college of Xinjiang Normal College. His main research
directions are: computer science and technology.

Xu Chun, Xinjiang University of Finance and Economics, Xinjiang, China

Xu Chun received a Ph.D. from the University of Chinese Academy
of Sciences. Her research interest is natural language processing. Cur-
rently, mainly engaged in the research of big data analysis and predic-
tion at the Xinjiang University of Finance and Economics. Contact her at
xuchun@mails.ucas.edu.cn.

References

Xiong Xinli, Yang Lin, Li Kechao. A Strategy Optimization Model of

Moving Target Defense Based on Markov Decision Process [J]. Journal

of Wuhan University (Natural Science Edition), 2020, 66(02):141–148.

Song Jiahan, Li Jingjiao, Pi Jie, et al. Research on Attack and Defense

Strategy of Substation Network Security Applying Markov Decision

Process[J]. Electric Power Construction, 2019, 40(10):104–110.

Meng Xiaodong. Anti-theft method of sensitive data in link network in

large data background[J]. Journal of Xi’an Polytechnic University, 2019,

(02):212–217.

Zhang Xingming, Gu Zeyu, Wei Shuai, et al. Markov game modeling

of mimic defense and defense strategy determination [J]. Journal on

Communications, 2018, 39(10):143–154.

Yang Junnan, Zhang Hongqi, Zhang Chuanfu. Defense decision-making

method based on incomplete information stochastic game.[J]. Chinese

Journal of Network and Information Security, 2018, 4(08):12–20.

Liu Jingwei, Liu Jin-Ju, Lu Yuliang, et al. Optimal Defense Strategy

Selection Method Based on Network Attack-Defense Game Model [J].

Computer Science, 2018, 45(06):117–123.

Based on Markov Evolutionary Game [J]. Acta Electronica Sinica, 2018,

(06):1503–1509.

Tian Jiwei, Wang Buhong, Li Xia, et al. Optimal Defense Strat-

egy Against Load Redistribution Attack Based on Game Theory [J].

Computer Simulation, 2018, 35(05):123–127+190.

Pan Qiuyu. Network intrusion detection based on hidden markov model

[J]. Information Security and Technology, 2018, 9(04):65–68.

Hu Hao, Liu Yuling, Zhang Hongqi, et al. Route Prediction Method

for Network Intrusion Using Absorbing Markov Chain [J]. Journal of

Computer Research and Development, 2018, 55(04):831–845

Published

2021-07-13

How to Cite

Yang, W. ., Dong, L. ., Dong, W. ., & Chun, X. . (2021). Generation Method of Power Network Security Defense Strategy Based on Markov Decision Process. Distributed Generation &Amp; Alternative Energy Journal, 36(3), 287–300. https://doi.org/10.13052/dgaej2156-3306.3635

Issue

Section

Articles