Journal of Terahertz Science and Electronic Information Technology , Volume. 23, Issue 2, 175(2025)

Design of optimization algorithm for vulnerability correlation mining of power Internet of Things terminals

WANG Jian, FU Zhibo, NONG Caiqin, LIU Jiahao, and XU Weijie
Author Affiliations
  • Information and Communication Technology Co, LTD, China Southern Power Grid Digital Grid Group, Guangzhou Guangdong 510670, China
  • show less

    Affected by the complexity of the power Internet of Things (IoT) and the stealth of terminal vulnerabilities, the traditional vulnerability correlation mining methods currently in use exhibit local biases in correlation feature parameters. This leads to insufficient overall mining scale and low global optimization efficiency of the algorithms, which severely impacts the normal operation of power IoT terminals. To address the aforementioned issues, starting from the structural characteristics of IoT, a black-box genetic algorithm is introduced. By completing the global parameter reconstruction and optimization of the overall mining method through four parts: power IoT terminal status perception, terminal vulnerability correlation mining rule generation, introduction of black-box genetic algorithm parameters, and terminal vulnerability correlation mining, the accuracy and scale of mining are enhanced. Simulation tests indicate that the mining curve values of the proposed method are relatively large, and the mean deviation index difference is 0.1. This demonstrates that the black-box genetic algorithm has high feasibility and effectiveness in the mining of security vulnerabilities in power IoT terminals, and the mining stability is sufficient to meet the current terminal vulnerability mining task requirements.

    Tools

    Get Citation

    Copy Citation Text

    WANG Jian, FU Zhibo, NONG Caiqin, LIU Jiahao, XU Weijie. Design of optimization algorithm for vulnerability correlation mining of power Internet of Things terminals[J]. Journal of Terahertz Science and Electronic Information Technology , 2025, 23(2): 175

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Sep. 22, 2023

    Accepted: Mar. 13, 2025

    Published Online: Mar. 13, 2025

    The Author Email:

    DOI:10.11805/tkyda2023276

    Topics