期刊文献+

入侵检测技术在智能配电系统中的应用研究 被引量:4

Application Research of Intrusion Detection Technology in Intelligent Distribution System
下载PDF
导出
摘要 近年来智能配电系统在数据化、网络化、智能化方向发展迅速。随着网络空间安全形势的日益复杂,智能配电系统的网络安全问题正面临巨大的挑战。如何检测针对智能配电系统的入侵行为是一个亟待解决的关键技术问题。以控制与保护开关为终端设备的智能配电系统为研究对象,提出了系统的入侵检测关键算法,引用了Relief、MCFS、mRMR 3种特征选择算法分别进行数据降维,运用K近邻算法作为入侵检测系统的分类器,并对比了检测结果。实验结果表明,提出的入侵检测算法能够有效检测智能配电系统遭受的非法攻击。 In recent years,the intelligent power distribution systems have developed rapidly in the direction of data,networking and intelligence.With the increasing complexity of the cyberspace security situation,the network security of intelligent power distribution systems is facing enormous challenges.How to detect intrusion behavior against intelligent power distribution systems is a key technical issue that needs to be solved urgently.The intelligent power distribution system with control and protection switch as the terminal equipment was taken as the research object.The key algorithm of system intrusion detection was proposed.Three feature selection algorithms of Relief,MCFS and mRMR,were used to reduce the data respectively.The K nearest neighbor(KNN)algorithm was used as classifiers of the intrusion detection system,and the detection results were compared.The experiment results show that the intrusion detection algorithm proposed can effectively detect illegal attacks on intelligent power distribution systems.
作者 黄沙里 郭其一 柳悦 黄世泽 屠旭慰 HUANG Shali;GUO Qiyi;LIU Yue;HUANG Shize;TU Xuwei(College of Electronics and Information Engineering,Tongji University,Shanghai 201804,China;Shanghai Key Laboratory of Structural Durability and System Safety for Rail Transit,Shanghai 201804,China;Zhejiang Zhongkai Technology Co.,Ltd.,Wenzhou 325604,China)
出处 《电器与能效管理技术》 2020年第4期23-29,共7页 Electrical & Energy Management Technology
基金 国家自然科学基金(61703308)。
关键词 智能配电系统 入侵检测 特征选择算法 K近邻算法 intelligent power distribution system intrusion detection feature selection algorithm K nearest neighbor(KNN)algorithm
  • 相关文献

参考文献2

二级参考文献20

  • 1Patel R, Thakkar A, Uanatra A. A survey and comparative analysis of data mining techniques for network intrusion detection systems. International Journal of Soft Computing Engineering, 2012, 2(1): 78-85.
  • 2Dong Y, Qi B, Zhu W, et al. A new intrusion detection model based on data mining and neural network. Przeglad Elektrotechniczny, 2013, 89(1b): 88-90.
  • 3Denning DE. An intrusion detection model. IEEE Trans. on Software Engineering, 2010, 13(2): 222-232.
  • 4Pan W, Shen XT, Liu BH. Cluster analysis unsupervised learning via supervised learning with a non convex penalty. Journal of Machine Learning Research, 2013: 1865-1889.
  • 5Wang B, Shi Y, Huang WW, et al. Misclassification minimization based on multiple criteria linear programming. Proc. of 2014 IEEE Int Conl on Data Mining Workshop, Piscataway, NJ. IEEE. 2014. 88-92.
  • 6Venkatesan R, Uanesan R, Selvakumar AAI. A comprehensive study in data mining frameworks for intrusion detection . International Journal 01 Advanced Computer Research, 2012, 2(7): 29-34.
  • 7柯品惠,郑秋鸿.Hash函数研究综述[J].福建电脑,2008,24(12):1-4. 被引量:9
  • 8严岳松,倪桂强,缪志敏,潘志松,汪肇强.基于SVDD的半监督入侵检测研究[J].微电子学与计算机,2009,26(10):128-130. 被引量:6
  • 9毛明,陈少晖,袁征,贾永兴.关于Hash函数MD5的解析[J].计算机科学,2009,36(11):106-108. 被引量:9
  • 10魏晓玲.MD5加密算法的研究及应用[J].信息技术,2010,34(7):145-147. 被引量:51

共引文献3

同被引文献50

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部