期刊文献+

word2vec基础上的配电网恶意控制指令检测

Detection of Malicious Control Instruction in Distribution Network Based on word2vec
下载PDF
导出
摘要 提出了一种根据上下文数据关系建立的word2vec算法。针对大量访问数据来建立白名单模型,通过对配电网上下文测量信息和控制信息的挖掘和数据驱动实现恶意控制指令的快速检测,获得白名单模型中的不符合项作为异常。利用孤立森林算法建立上下文关系的孤立树,从而实现对各测试样本的分类和训练,采用CBOW神经网络模型将中心词汇后验概率作为输出层,获得不同样本集下的监测精确度和准确率。最后在建立的配电网仿真平台上对word2vec进行了数据挖掘和计算,验证了算法具有高准确率和低误警率。 In the paper,a word2vec algorithm based on context data relation is proposed.The whitelist model is established for a large number of accessing data.By mining and data driving the context measurement information and control information of distribution network,the malicious control instructions can be quickly detected,and the nonconformance items in the whitelist model can be obtained as exceptions.The isolated tree of context relation is established by using the isolated forest algorithm to realize the classification and training of each test sample.The CBOW neural network model is used to classify the central vocabulary.A posteriori probability is used as an output layer to obtain the monitoring accuracy under different sample sets.Finally,the data mining and calculation of word2vcc are carried out on the simulation platform of distribution network,which proves that the algorithm has high accuracy and low false alarm rate.
作者 李静 戴越 Li Jing;Dai Yue(Kunming Changshui International Airport,Kunming 650200,China;China Mobile Communications Group Yunnan Co.,Ltd)
出处 《单片机与嵌入式系统应用》 2019年第10期22-24,36,共4页 Microcontrollers & Embedded Systems
关键词 word2vec 配电网 恶意控制指令 CBOW神经网络模型 word2vec distribution network malicious control instruction CBOW neural network model
  • 相关文献

参考文献12

二级参考文献170

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2朱良根,张玉清,雷振甲.DoS攻击及其防范[J].计算机应用研究,2004,21(7):82-84. 被引量:20
  • 3陈向宜,陈允平,李春艳,邓长虹.构建大电网安全防御体系——欧洲大停电事故的分析及思考[J].电力系统自动化,2007,31(1):4-8. 被引量:56
  • 4Draft NISTIR 7628. Smart grid cyber security strategyand requirements [ S]. 2009.
  • 5IEC 61850-7 -420. Communication network and system forpower utility automation : part 7 -420 basic communicationstructure-distributed energy resources logical nodes [ S ].2009.
  • 6Xudong Wang, Ping Yi. Security framework for wirelesscommunications in smart distribution grid [ J ]. IEEE SmartGrid,2011 (2) :809-818.
  • 7Cleveland F M. Cyber security issues for advanced me-tering infrastructure ( AMI) [ C ] //Proceedings of 2008 IEEEPower and Energy Society General Meeting : Conversion andDelivery of Electrical Energy in the 21st Century,July 20-24,2008,Pittsburgh,PA,USA ;2613-2617.
  • 8Vinod Namboodiri, Visvakumar Aravinthan, SuryaNarayan Mohapatra, et al. Toward a secure wireless-basedhome area network for metering in smart grids [ J ]. IEEE Sys-tems Journal ,2014,8(2) :509-520.
  • 9Zhang Zhigang, Liu Hao, Niu Shuangxia, et al. Informa-tion security requirements and challenges in smart grid[ C]//2011 6th IEEE Joint International Information Technology andArtificial Intelligence Conference ( ITAIC ) , August 20-22 ,Chongqing,China :90-92.
  • 10Ye Yan, Yi Qian, Hamid Sharif, et al. A survey on cybersecurity for smart grid communication [ J ] . CommunicationsSurveys & Tutorials,2012,14(4) ;998-1010.

共引文献397

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部