TY - GEN
T1 - Research on Enhancement Mechanism of Pseudo Defense Algorithm in Power Grid Network Security
AU - Tang, Linlin
AU - Yang, Zhiheng
AU - Lei, Haoyun
AU - Wang, Dunquan
AU - Teng, Lijun
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
PY - 2026
Y1 - 2026
N2 - The mimetic defense algorithm, as a core technology of the endogenous security system in cyberspace, uses dynamic heterogeneous redundancy (DHR) [1] architecture to deal with unknown threats through “uncertainty defense” in large-scale power grid network security, significantly enhancing the system's ability to resist attacks. This article reconstructs the paradigm of power grid security through dynamism, heterogeneity, and redundancy, shifting from passive leak prevention to active immunity. Combined with intelligent scheduling, cross domain fusion, and lightweight deployment, it achieves a security improvement of 65.9% and a throughput reduction of only 15%, effectively balancing contradiction between the security and performance. Load Balancing algorithm has been introduced in dynamic scheduling; A Multimodal Pre-trained Cyber Threat Model was adopted in intelligent evaluation and active defense; The Mimetic Password Fusion Architecture is adopted in cross domain fusion technology. Significant advantages have been achieved in the comparison with the current security architecture and technical solutions of the power grid.
AB - The mimetic defense algorithm, as a core technology of the endogenous security system in cyberspace, uses dynamic heterogeneous redundancy (DHR) [1] architecture to deal with unknown threats through “uncertainty defense” in large-scale power grid network security, significantly enhancing the system's ability to resist attacks. This article reconstructs the paradigm of power grid security through dynamism, heterogeneity, and redundancy, shifting from passive leak prevention to active immunity. Combined with intelligent scheduling, cross domain fusion, and lightweight deployment, it achieves a security improvement of 65.9% and a throughput reduction of only 15%, effectively balancing contradiction between the security and performance. Load Balancing algorithm has been introduced in dynamic scheduling; A Multimodal Pre-trained Cyber Threat Model was adopted in intelligent evaluation and active defense; The Mimetic Password Fusion Architecture is adopted in cross domain fusion technology. Significant advantages have been achieved in the comparison with the current security architecture and technical solutions of the power grid.
KW - Load Balancing Algorithm
KW - Mimetic Password Fusion Architecture
KW - Multimodal Pre-trained Cyber Threat Model
KW - Pseudo Defense Algorithm
UR - https://www.scopus.com/pages/publications/105028872204
U2 - 10.1007/978-3-032-13048-8_27
DO - 10.1007/978-3-032-13048-8_27
M3 - 会议稿件
AN - SCOPUS:105028872204
SN - 9783032130471
T3 - Smart Innovation, Systems and Technologies
SP - 347
EP - 358
BT - Advances in Intelligent Data Analysis and Applications - Proceedings of the 9th Euro-China Conference on Intelligent Data Analysis and Applications
A2 - Snášel, Václav
A2 - Kong, Lingping
A2 - Chu, Chu-Chuan
A2 - Pan, Jeng-Shyang
A2 - Esposito, Anna
PB - Springer Science and Business Media Deutschland GmbH
T2 - 9th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2025
Y2 - 21 July 2025 through 23 July 2025
ER -