Operation and maintenance operation instruction security analysis method and system and storage medium

A security analysis, operation and maintenance operation technology, applied in the direction of neural learning methods, computer security devices, instruments, etc., can solve the problems of cumbersome manual labeling and category labeling, and difficult operation and maintenance operation instructions, so as to improve the degree of automation and enhance the security of the system Effect

Active Publication Date: 2020-09-01
STATE GRID CORP OF CHINA +6
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is: it is difficult to manually mark the categories during the security analysis process of the operation and maintenance operation instructions, and the marking is too cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation and maintenance operation instruction security analysis method and system and storage medium
  • Operation and maintenance operation instruction security analysis method and system and storage medium
  • Operation and maintenance operation instruction security analysis method and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] figure 1 Schematic diagram of the overall framework of the security analysis model for user operation and maintenance operations. On the basis of the theoretical basis and the scene of equipment operation and maintenance operations, a security analysis model for user operation and maintenance operation instructions is constructed. An operation and maintenance operation instruction security analysis method of the present invention includes Follow the steps below:

[0036] Step 1, read the historical operation instruction data, and perform character vectorization processing on the character set of the historical operation instruction data;

[0037] 1) Read the historical data from the specified database, respectively SSH (Secure Shell abbreviation, formulated by the Network Working Group of IETF, SSH is a security protocol based on the application layer and transport layer.) Remote Operation instruction set (133142 groups of instruction data) and Local local operation in...

Embodiment 2

[0057] In step three, the dimensionality reduction method is t-distribution domain embedding algorithm (t-SNE). Compared with the principal component analysis (PCA) method, the two dimensionality reduction methods have their own advantages and disadvantages. However, for the current For the actual data in the scene, the two methods can compare the output data respectively.

[0058] Other technical characteristics are identical with embodiment 1.

Embodiment 3

[0060] In Step 4, the clustering method can also choose K-medoid algorithm, CURE, Chameleon and BIRCH algorithms, etc.

[0061] Other technical characteristics are identical with embodiment 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an operation and maintenance operation instruction security analysis method and system and a storage medium, and the method comprises the following steps: 1) reading historicaloperation instruction data, and carrying out character vectorization of a character set of the historical operation instruction data; 2) taking the vectorized operation instruction data as input, establishing a neural network model, and forming a mesh relation graph of the operation instruction data; 3) performing data dimension reduction processing on the operation instruction character data inthe mesh relation graph; 4) performing data clustering processing after the data dimension reduction processing is finished; and 5) performing definition and arrangement of black and white grey listson the operation and maintenance instruction data set clustered in the step 4) according to an actual service scene to form output data, and writing all black and white grey list output data into a specified database. According to the method, the problems of difficulty in manually labeling categories, excessively complicated labeling and the like in the operation and maintenance operation instruction security analysis process are solved, and the automation degree of operation and maintenance operation instruction security analysis is improved.

Description

technical field [0001] The invention relates to a safety analysis method for operation and maintenance operation instructions, which belongs to the technical field of safety analysis of operation instructions during the operation and maintenance operation of electric power systems. Background technique [0002] In recent years, with the "smart manufacturing" proposed by the new national strategic transformation of Made in China 2025, the intelligence and intelligent processing of data information has become the current mainstream research direction. In the actual operation process of the power system of the State Grid Corporation of China, and under the background that its marketing strategy is more systematic, scientific and operable. Enterprise operations have strengthened the research on big data in terms of e-commerce and actual operation information collection. The big data research on user behaviors of major online platforms and e-commerce is particularly significant. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F40/126G06F40/295G06K9/62G06N3/08G06F21/62
CPCG06F40/295G06F40/126G06N3/088G06F21/6218G06F18/23Y04S10/50
Inventor 梁野管荑高明慧王文婷张志军蒋正威高英健金学奇王昊刘勇王春艳刘新林琳马雷肖艳炜
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products