Feng Sai, Xixuan Wang, Xiangtao Yu, Peipei Yan, Wei Ma
{"title":"电力监控系统中回弹式远程控制木马异常流量识别与检测技术","authors":"Feng Sai, Xixuan Wang, Xiangtao Yu, Peipei Yan, Wei Ma","doi":"10.1109/ITNEC56291.2023.10082482","DOIUrl":null,"url":null,"abstract":"Energy security is related to national security, and power security is the core of energy security. With the process of intelligent transformation of power, the production network gradually moves from being closed to interconnection. Power production and operation are highly dependent on the power monitoring system and dispatching data network. Once an external attack breaks through The safety protection system will directly threaten the safe and stable operation of the power system, so higher requirements are put forward for the detection of abnormal flow in the power system. This paper designs an intrusion detection algorithm based on the normal flow threshold model based on the deep machine learning algorithm, and conducts a comparison test through the flow characteristic value, and finally verifies the accuracy and reliability of the abnormal flow detection algorithm proposed in this paper for modern power networks in different test environments.","PeriodicalId":218770,"journal":{"name":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Recognition and detection technology for abnormal flow of rebound type remote control Trojan in power monitoring system\",\"authors\":\"Feng Sai, Xixuan Wang, Xiangtao Yu, Peipei Yan, Wei Ma\",\"doi\":\"10.1109/ITNEC56291.2023.10082482\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Energy security is related to national security, and power security is the core of energy security. With the process of intelligent transformation of power, the production network gradually moves from being closed to interconnection. Power production and operation are highly dependent on the power monitoring system and dispatching data network. Once an external attack breaks through The safety protection system will directly threaten the safe and stable operation of the power system, so higher requirements are put forward for the detection of abnormal flow in the power system. This paper designs an intrusion detection algorithm based on the normal flow threshold model based on the deep machine learning algorithm, and conducts a comparison test through the flow characteristic value, and finally verifies the accuracy and reliability of the abnormal flow detection algorithm proposed in this paper for modern power networks in different test environments.\",\"PeriodicalId\":218770,\"journal\":{\"name\":\"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)\",\"volume\":\"88 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNEC56291.2023.10082482\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNEC56291.2023.10082482","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Recognition and detection technology for abnormal flow of rebound type remote control Trojan in power monitoring system
Energy security is related to national security, and power security is the core of energy security. With the process of intelligent transformation of power, the production network gradually moves from being closed to interconnection. Power production and operation are highly dependent on the power monitoring system and dispatching data network. Once an external attack breaks through The safety protection system will directly threaten the safe and stable operation of the power system, so higher requirements are put forward for the detection of abnormal flow in the power system. This paper designs an intrusion detection algorithm based on the normal flow threshold model based on the deep machine learning algorithm, and conducts a comparison test through the flow characteristic value, and finally verifies the accuracy and reliability of the abnormal flow detection algorithm proposed in this paper for modern power networks in different test environments.