• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

结合本体知识和强化学习的电力物联网系统智能渗透测试方法

Intelligent penetration testing method for power internet of things systems combining ontology knowledge and reinforcement learning.

作者信息

Sun Shoudao, Lu Yi, Wu Di, Zhang Guangyan

机构信息

State Grid Liaoning Electric Power Co., Ltd., Shenyang Power Supply Company, Shenyang, China.

出版信息

PLoS One. 2025 May 28;20(5):e0323357. doi: 10.1371/journal.pone.0323357. eCollection 2025.

DOI:10.1371/journal.pone.0323357
PMID:40435162
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12118863/
Abstract

With the application of new-generation information technologies such as big data, artificial intelligence, and the energy Internet in Power Internet of Things (IoT) systems, a large number of IoT terminals, acquisition terminals, and transmission devices have achieved integrated interconnection and comprehensive information interaction. However, this transformation also brings new challenges: the security risk of intrusions into power IoT systems has significantly increased, making the assurance of power system information security a research hotspot. Penetration testing, as an essential means of information security protection, is critical for identifying and fixing security vulnerabilities. Given the complexity of power IoT systems and the limitations of traditional manual testing methods, this paper proposes an automated penetration testing method that combines prior knowledge with deep reinforcement learning. It aims to intelligently explore optimal attack paths under conditions where the system state is unknown. By constructing an ontology knowledge model to fully utilize prior knowledge and introducing an attention mechanism to address the issue of varying state spaces, the efficiency of penetration testing can be improved. Experimental results show that the proposed method effectively optimizes path decision-making for penetration testing, providing support for the security protection of power IoT systems.

摘要

随着大数据、人工智能和能源互联网等新一代信息技术在电力物联网(IoT)系统中的应用,大量物联网终端、采集终端和传输设备实现了集成互联和全面信息交互。然而,这种转变也带来了新的挑战:电力物联网系统遭受入侵的安全风险显著增加,使得电力系统信息安全保障成为研究热点。渗透测试作为信息安全保护的重要手段,对于识别和修复安全漏洞至关重要。鉴于电力物联网系统的复杂性以及传统手动测试方法的局限性,本文提出一种将先验知识与深度强化学习相结合的自动化渗透测试方法。其目的是在系统状态未知的情况下智能探索最优攻击路径。通过构建本体知识模型充分利用先验知识,并引入注意力机制解决状态空间变化问题,可提高渗透测试效率。实验结果表明,所提方法有效优化了渗透测试的路径决策,为电力物联网系统的安全保护提供了支持。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/1e6dc2b9f288/pone.0323357.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/3b8f584545cf/pone.0323357.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/1cc5327c2023/pone.0323357.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/211d02e0f64a/pone.0323357.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/fb5de7da858b/pone.0323357.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/36b0384814e4/pone.0323357.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/df5e9b1ffaff/pone.0323357.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/4444d989a53c/pone.0323357.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/1e6dc2b9f288/pone.0323357.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/3b8f584545cf/pone.0323357.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/1cc5327c2023/pone.0323357.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/211d02e0f64a/pone.0323357.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/fb5de7da858b/pone.0323357.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/36b0384814e4/pone.0323357.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/df5e9b1ffaff/pone.0323357.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/4444d989a53c/pone.0323357.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d3cd/12118863/1e6dc2b9f288/pone.0323357.g008.jpg

相似文献

1
Intelligent penetration testing method for power internet of things systems combining ontology knowledge and reinforcement learning.结合本体知识和强化学习的电力物联网系统智能渗透测试方法
PLoS One. 2025 May 28;20(5):e0323357. doi: 10.1371/journal.pone.0323357. eCollection 2025.
2
Enterprise Information Security Management Using Internet of Things Combined with Artificial Intelligence Technology.利用物联网与人工智能技术的企业信息安全管理。
Comput Intell Neurosci. 2022 Jun 14;2022:7138515. doi: 10.1155/2022/7138515. eCollection 2022.
3
A Research on the Realization Algorithm of Internet of Things Function for Smart Education.物联网功能在智慧教育中的实现算法研究
Comput Intell Neurosci. 2022 Apr 29;2022:1330190. doi: 10.1155/2022/1330190. eCollection 2022.
4
Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization.利用粒子群优化技术预防物联网的网络安全问题。
Sensors (Basel). 2022 Aug 16;22(16):6117. doi: 10.3390/s22166117.
5
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.雾计算环境下物联网应用中大数据的安全性:一项调查。
Sensors (Basel). 2019 Apr 14;19(8):1788. doi: 10.3390/s19081788.
6
Internet of things security evaluation mechanism based on meta attribute fluctuation.基于元属性波动的物联网安全评估机制。
PLoS One. 2023 Jul 14;18(7):e0282630. doi: 10.1371/journal.pone.0282630. eCollection 2023.
7
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
8
Internet of Nano-Things (IoNT): A Comprehensive Review from Architecture to Security and Privacy Challenges.物联网(IoNT):从架构到安全和隐私挑战的全面综述。
Sensors (Basel). 2023 Mar 3;23(5):2807. doi: 10.3390/s23052807.
9
Digital transformation in healthcare management: from Artificial Intelligence to blockchain.医疗管理中的数字转型:从人工智能到区块链。
Wiad Lek. 2025;78(3):578-583. doi: 10.36740/WLek/202445.
10
Biometrics-based Internet of Things and Big data design framework.基于生物识别技术的物联网和大数据设计框架。
Math Biosci Eng. 2021 May 24;18(4):4461-4476. doi: 10.3934/mbe.2021226.

本文引用的文献

1
Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs.预算有限的网络安全:评估开源 SIEM 解决方案在中小企业中的安全性和性能。
PLoS One. 2024 Mar 28;19(3):e0301183. doi: 10.1371/journal.pone.0301183. eCollection 2024.
2
Design and use of a wireless temperature measurement network system integrating artificial intelligence and blockchain in electrical power engineering.设计并使用一个将人工智能和区块链整合到电力工程中的无线温度测量网络系统。
PLoS One. 2024 Jan 2;19(1):e0296398. doi: 10.1371/journal.pone.0296398. eCollection 2024.