A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 2 Issue 4
Oct.  2015

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 15.3, Top 1 (SCI Q1)
    CiteScore: 23.5, Top 2% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
Song Deng, Dong Yue, Xiong Fu and Aihua Zhou, "Security Risk Assessment of Cyber Physical Power System Based on Rough Set and Gene Expression Programming," IEEE/CAA J. of Autom. Sinica, vol. 2, no. 4, pp. 431-439, 2015.
Citation: Song Deng, Dong Yue, Xiong Fu and Aihua Zhou, "Security Risk Assessment of Cyber Physical Power System Based on Rough Set and Gene Expression Programming," IEEE/CAA J. of Autom. Sinica, vol. 2, no. 4, pp. 431-439, 2015.

Security Risk Assessment of Cyber Physical Power System Based on Rough Set and Gene Expression Programming

Funds:

This work was support by National Natural Science Foundation of China (61202354, 51507084) and Nanjing University of Post and Telecommunications Science Foundation (NUPTSF) (NT214203).

  • Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid into account. In order to solve this problem, security risk assessment algorithm of cyber physical power system based on rough set and gene expression programming is proposed. Firstly, fast attribution reduction based on binary search algorithm is presented. Secondly, security risk assessment function for cyber physical power system is mined based on gene expression programming. Lastly, security risk levels of cyber physical power system are predicted and analyzed by the above function model. Experimental results show that security risk assessment function model based on the proposed algorithm has high efficiency of function mining, accuracy of security risk level prediction and strong practicality.

     

  • loading
  • [1]
    Zhao Jun-Hua, Wen Fu-Shuan, Xue Yu-Sheng, Li Xue, Dong Zhao-Yang. Cyber physical power systems: architecture, implementation techniques and challenges. Automation of Electric Power Systems, 2010, 34(16): 1-7 (in Chinese)
    [2]
    Ju Ping, Qin Chuan, Huang Hua, Wu Feng, Jin Yu-Qing. Research trends of power system modeling geared to smart grid. Automation of Electric Power Systems, 2012, 36(11): 1-6 (in Chinese)
    [3]
    Yu Yi-Xin, Luan Wen-Peng. Basic philosophy of smart grid. Journal of Tianjin University, 2011, 44(5): 377-384 (in Chinese)
    [4]
    Vellaithurai C, Srivastava A, Zonouz S, Berthier R. CPINDEX: cyberphysical vulnerability assessment for power-grid infrastructures. IEEE Transactions on Smart Grid, 2015, 6(2): 566-575
    [5]
    Hong J H, Liu C C, Govindarasu M. Integrated anomaly detection for cyber security of the substations. IEEE Transactions on Smart Grid, 2014, 5(4): 1643-1653
    [6]
    Sridhar S, Govindarasu M. Model-based attack detection and mitigation for automatic generation control. IEEE Transactions on Smart Grid, 2014, 5(2): 580-591
    [7]
    Zonouz S, Davis C M, Davis K R, Berthier R, Bobba R B, Sanders W H. SOCCA: a security-oriented cyber-physical contingency analysis in power infrastructures. IEEE Transactions on Smart Grid, 2014, 5(1): 3-13
    [8]
    Hu J K, Pota H R, Guo S. Taxonomy of attacks for agent-based smart grids. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(7): 1886-1895
    [9]
    Mei Sheng-Wei, Wang Ying-Ying, Chen Lai-Jun. Overviews and prospects of the cyber security of smart grid from the view of complex network theory. High Voltage Engineering, 2011, 37(3): 672-679 (in Chinese)
    [10]
    Feng Deng-Guo, Zhang Yang, Zhang Yu-Qing. Survey of information security risk assessment. Journal of China Institute of Communications, 2004, 25(7): 10-18 (in Chinese)
    [11]
    Guo Chuang-Xin, Yu Bin, Guo Jia, Wen Bo-Jian, Zhang Jin-Jiang, Zhang Li, Lu Hai-Bo, Li Bo. Security risk assessment of the IEC61850-based substation automation system. Proceedings of the CSEE, 2014, 34(4): 685-694 (in Chinese)
    [12]
    Liu N, Zhang J H, Wu X. Asset analysis of risk assessment for IEC 61850-based power control systems, Part I: methodology. IEEE Transactions on Power Delivery, 2011, 26(2): 869-875
    [13]
    Liu N, Zhang J H, Wu X. Asset analysis of risk assessment for IEC 61850-based power control systems, Part II: application in substation. IEEE Transactions on Power Delivery, 2011, 26(2): 876-881
    [14]
    Bompard E, Gao C W, Napoli R, Russo A, Masera M, Stefanini A. Risk assessment of malicious attacks against power systems. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 2009, 39(5): 1074-1085
    [15]
    Zhang Li, Yao Yi-Zhan, Peng Jian-Fen, Chen Hong-Bo, Du Yu-Ge. Intelligent information security risk assessment based on a decision tree algorithm. Journal of Tsinghua University (Science and Technology), 2011, 51(10): 1236-1239 (in Chinese)
    [16]
    Zhao Dong-Mei, Liu Jin-Xing, Ma Jian-Feng. Risk assessment of information security based on improved wavelet neural network. Computer Science, 2010, 37(2): 90-93 (in Chinese)
    [17]
    Zhao Gang, Wu Tian-Shui. Information security risk assessment based on G-ANP. Journal of Tsinghua University (Science and Technology), 2013, 53(12): 1761-1767 (in Chinese)
    [18]
    Chang L Y, Lee Z J. Applying fuzzy expert system to information security risk assessment-a case study on an attendance system. In: Proceedings of the 2013 International Conference on Fuzzy Theory and Its Applications. Taipei, China: IEEE, 2013. 346-351
    [19]
    Wang Bo. Research on Security Risk and Vulnerability Assessment Methods of Complicated Power System [Ph. D. dissertation], Huazhong University of Science and Technology, China, 2011. (in Chinese)
    [20]
    Yin Lin-Zi, Yang Chun-Hua, Wang Xiao-Li, Gui Wei-Hua. An incremental algorithm for attribute reduction based on labeled discernibility matrix. Acta Automatica Sinica, 2014, 40(3): 397-404 (in Chinese)
    [21]
    Jiang Yun-Liang, Yang Zhang-Xian, Liu Yong. Quick distribution reduction algorithm in inconsistent information system. Acta Automatica Sinica, 2012, 38(3): 382-388 (in Chinese)
    [22]
    Pawlak Z. Rough sets. International Journal of Computer and Information Sciences, 1982, 11(5): 341-356
    [23]
    Zeng Qing-Hong, Lu De-Tang. Curve and surface fitting based on moving least-squares methods. Journal of Engineering Graphics, 2004, 25(1): 84-89 (in Chinese)
    [24]
    Koza J R. Genetic Programming II: Automatic Discovery of Reusable Programs. Cambridge: MIT Press, 1994. 110-199
    [25]
    Ferreira, C. Gene expression programming: a new adaptive algorithm for solving problems. Complex Systems, 2001, 13(2): 87-129
    [26]
    Deng S, Wang R C, Fu X, Yang L C. Gene expression programming for attribution reduction in rough set. International Journal of Computers and Applications, 2010, 32(2): 226-231
    [27]
    Hu Jian-Jun, Tang Chang-Jie, Duan Lei, Zuo Jie, Peng Jing, Yuan Chang-An. The strategy for diversifying initial population of gene expression programming. Chinese Journal of Computers, 2007, 30(2): 305-310 (in Chinese)
    [28]
    Liu Qi-Hong, Tang Chang-Jie, Hu Jian-Jun, Zeng Tao, Liu Ying-Tian, Qiu Jiang-Tao. Gene expression programming based on diversity-guided grading evolution. Journal of Sichuan University (Engineering Science Edition), 2006, 38(6): 108-113 (in Chinese)
    [29]
    Deng Song, Wang Ru-Chuan. Classification of distributed GEP-BP based on grid service. Acta Electronica Sinica, 2009, 37(11): 2600-2603 (in Chinese)
    [30]
    Header A -R, Wang J, Fukushima M. Tabu search for attribute reduction in rough set theory. Soft Computing, 2007, 12(9): 909-918

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1335) PDF downloads(19) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return