检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:苏东禹 姜宇 谢景海 卢诗华 孙密 郭嘉 SU Dong-yu;JIANG Yu;XIE Jing-hai;LU Shi-hua;SUN Mi;GUO Jia(State Grid Jibei Economic Research Institute,Beijing 100038,China;Beijing Jingyan Electric Power Engineering Design Co.,Ltd.,Beijing 100038,China)
机构地区:[1]冀北电力有限公司经济技术研究院,北京100038 [2]北京京研电力工程设计有限公司,北京100038
出 处:《信息技术》2023年第3期128-132,138,共6页Information Technology
摘 要:在筛选未遍历分支结构时,电力通信系统操作步骤十分复杂,易发生错漏现象,导致系统安全漏洞无法被完全检测,因此设计新的电力通信系统安全漏洞自动挖掘方法。计算最新路径搜索长度,消除原有已知序列,更新位移操作下数据结构;基于混合执行计算系统归一化指标向量,通过计算扩展距离筛选判断未遍历目标分支;设计待执行机制与候选执行机制的安全漏洞自适应挖掘算法,完成电力通信系统安全漏洞的自动挖掘。实验结果证明,安全漏洞自动挖掘路径平均覆盖系数约为92.17%,能够准确、高效地检测系统安全漏洞。When screening the non-traversal branch structure,the operation steps of power communication system are quite complex and prone to cause errors and omissions,resulting in the system security vulnerabilities that can not be completely detected.Therefore,a new automatic mining method of security vulnerabilities of power communication system is designed.The latest path search length is calculated,the original known sequence is eliminated,and the data structure under displacement operation is updated.Based on the normalized index vector of hybrid execution computing system,the non-traversal target branch is judged by calculating the extended distance.After that,the self-adaptive mining algorithm of security vulnerabilities of pending execution mechanism and candidate execution mechanism is designed to complete the automatic mining of security vulnerabilities in power communication system.The experiment results show that the average coverage coefficient of security vulnerability automatic mining path is about 92.17%,which can detect system security vulnerabilities accurately and efficiently.
关 键 词:混合执行算法 电力通信系统 安全漏洞检测 自动挖掘算法
分 类 号:TP391[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.141.12.150