Network attacks identification method of relay protection devices communication system based on Fp-Growth algorithm

Honghui Gao, Zebing Shi, Fangying Wu, Jiang Yu, Quan Xu, Hongzi He, Zhihua Huang
{"title":"Network attacks identification method of relay protection devices communication system based on Fp-Growth algorithm","authors":"Honghui Gao, Zebing Shi, Fangying Wu, Jiang Yu, Quan Xu, Hongzi He, Zhihua Huang","doi":"10.1109/iSPEC54162.2022.10033041","DOIUrl":null,"url":null,"abstract":"In order to ensure the stable operation of relay protection device and identify untrusted data code attacks, this paper proposes a network attacks identification method for relay protection devices communication system based on frequent pattern-growth(FP-Growth) algorithm. Firstly, the transmission model of the communication system of the relay protection device is analyzed. The physical side and the communication side of the relay protection device are monitored through the real-time simulation platform to obtain the original data. Then, the original data are discretely quantized and encoded to generate the abnormal event sequence. Then, FP-Growth algorithm is used to analyze the association of the event sequence to obtain the longest and most frequent sequences. The new attacks categories and fault points are compared by the existing frequent sequence characteristics to determine the type of network attacks or the location of fault points, so as to realize the identification of malicious code attacks, and provide a theoretical basis for the application of trusted technology.","PeriodicalId":129707,"journal":{"name":"2022 IEEE Sustainable Power and Energy Conference (iSPEC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Sustainable Power and Energy Conference (iSPEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iSPEC54162.2022.10033041","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In order to ensure the stable operation of relay protection device and identify untrusted data code attacks, this paper proposes a network attacks identification method for relay protection devices communication system based on frequent pattern-growth(FP-Growth) algorithm. Firstly, the transmission model of the communication system of the relay protection device is analyzed. The physical side and the communication side of the relay protection device are monitored through the real-time simulation platform to obtain the original data. Then, the original data are discretely quantized and encoded to generate the abnormal event sequence. Then, FP-Growth algorithm is used to analyze the association of the event sequence to obtain the longest and most frequent sequences. The new attacks categories and fault points are compared by the existing frequent sequence characteristics to determine the type of network attacks or the location of fault points, so as to realize the identification of malicious code attacks, and provide a theoretical basis for the application of trusted technology.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于Fp-Growth算法的继电保护设备通信系统网络攻击识别方法
为了保证继电保护设备的稳定运行和识别不可信数据码攻击,本文提出了一种基于频繁模式增长(FP-Growth)算法的继电保护设备通信系统网络攻击识别方法。首先,分析了继电保护装置通信系统的传输模型。通过实时仿真平台对继电保护装置的物理侧和通信侧进行监控,获取原始数据。然后,对原始数据进行离散量化编码,生成异常事件序列。然后,利用FP-Growth算法对事件序列进行关联分析,得到最长和最频繁的序列。将新的攻击类别和故障点与现有的频繁序列特征进行比较,确定网络攻击的类型或故障点的位置,从而实现对恶意代码攻击的识别,为可信技术的应用提供理论依据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Optimization strategy for multi-area DC dispatching control considering frequency constraints Design and Application Research of Synchronous Temporary Block Function between Valve Groups on Modular Multilevel Converter Ultra High Voltage Direct Current System A Multi-Stack Vanadium Redox Flow Battery Model Considering Electrolyte Transfer Delay Analysis of Kuramoto models for AC microgrids based on droop control Nodal Pricing Comparison between DCOPF and ACOPF: Case Studies for the Power Systems in Iceland and Germany
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1