期刊文献+

基于Apriori算法的稳控装置通信系统网络攻击检测方法 被引量:4

Cyber Attack Detection Method of Stability Control Device Communication System Based on Apriori Algorithm
下载PDF
导出
摘要 随着信息通信技术的不断发展,网络攻击对稳控装置通信系统的影响逐渐增大,恶意网络攻击可以伪造成正常网络故障,加大检测和识别的难度,严重威胁稳控装置运行安全,从而造成稳控装置误动或者拒动。为更加有效分析识别稳控装置系统状态,文章提出基于Apriori算法的稳控装置通信系统网络攻击检测方法。首先分析稳控装置通信系统传输模型,通过实时仿真平台对稳控装置物理侧和通信侧进行监测,获取原始数据,然后通过额定电压/电流值制定数据离散化规则,根据规则对原始数据进行离散量化处理,再对数据编码生成事件序列,接着利用Apriori算法对时间序列进行分析,生成一条最长、最频繁的序列,通过已有频繁序列特征对新的攻击类别和故障点进行识别,实现对稳控装置通信系统网络攻击的检测。 With the continuous development of information and communication technology,the impact of cyber attack on the communication system of stability control device is gradually increasing.Malicious cyber attacks can be forged into normal network faults,making it difficult to detect and identify such attacks,seriously threatening the operation safety of stability control device,resulting in misoperation or refusal of stability control device.In order to analyze and identify the system state of stability control device more effectively,this paper proposes a cyber attack detection method of stability control device communication system based on Apriori algorithm.Firstly,the transmission model of the communication system of the stability control device is analyzed,and the physical side and communication side of the stability control device are monitored through the real-time simulation platform to obtain the original data.Then,the data discretization rules are formulated through the rated voltage / current value,the original data are discretized according to the rules,and then the data is encoded to generate an event sequence.Then,the time series is analyzed by Apriori algorithm to generate a longest and most frequent sequence,the new attack category and fault point are identified through the characteristics of the existing frequent sequence,so as to detect the cyber attack of the communication system of the stability control device.
作者 吕东晓 李勇 邵伟 王潇煜 谢丹丹 LV Dongxiao;LI Yong;SHAO Wei;WANG Xiaoyu;XIE Dandan(Central China Branch,State Grid Corporation of China,Wuhan 430077,China;Grid NARI Technology Development Co.,Ltd.,Nanjing 211106,China)
出处 《电力信息与通信技术》 2022年第9期1-8,共8页 Electric Power Information and Communication Technology
基金 国家自然科学基金重点项目(61933005) 国家电网公司华中分部科技项目“安全稳定控制系统二次设备建模与应用技术研究”。
关键词 稳控装置 网络攻击识别 事件序列 APRIORI算法 stability control device cyber attacks identification sequence of events Apriori algorithm
  • 相关文献

参考文献11

二级参考文献132

  • 1王欢,章翔凌.基于“白名单”技术思路构建应用安全容器[J].保密科学技术,2012(10):18-22. 被引量:2
  • 2杨武,方滨兴,云晓春,张宏莉.入侵检测系统中高效模式匹配算法的研究[J].计算机工程,2004,30(13):92-94. 被引量:23
  • 3诸葛建伟,徐辉,潘爱民.基于面向对象方法的攻击知识模型[J].计算机研究与发展,2004,41(7):1110-1116. 被引量:7
  • 4胡军华,周炎涛,郭如冰.一种基于网络的入侵检测模型及其实现[J].湖南大学学报(自然科学版),2006,33(6):119-122. 被引量:4
  • 5Jaeseung Go, Kawangjo Kim. Wireless Authentication Protocol Preserving User Anonymity[J]. SCIS 2001, Japan, January 23-26, 2001.
  • 6M.G.Rahman, H.Imai. Security in wireless communication[C]. Wireless Personal Communications, Vol.22, No.2,August, 2002: 213-228.
  • 7M.J.Beller, L.F.Chang, Y.Yacobi. Security for personal communication services: public-key vs. private key approaches[C]. Proceedings of Third International Symposium on Personal, Indoor and Mobile Radio Communication(PIMRC' 92),IEEE Press, NewYork,1992,pp.26-31.
  • 8Northcutt S, Novak J. Network Intrusion Detection: An Analyst' s Handbook. 2nd Edition[C] Indianapolis (IN): New Riders Publishing, 2000.
  • 9侯方明.无线网络中入侵检测系统的研究与设计[M].山东:山东大学,2005.
  • 10Snort-wireless User's Guide. www.snort-wireless.org, 2012-01--05.

共引文献208

同被引文献62

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部