Intrusion detection system and intrusion detection method for energy Internet

An intrusion detection system and energy Internet technology, applied in the energy Internet field, can solve problems such as difficult to detect attack types, slow convergence speed, and inability to process high-dimensional data, so as to achieve effective network threat detection, maximize information gain, and reduce The effect of computational complexity

Active Publication Date: 2020-11-06
SICHUAN UNIV
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development and advancement of intrusion detection systems for decades, traditional network intrusion detection methods use known types of attack samples to train intrusion detection models in an offline manner. Although they have a high detection rate for known attack types, but Unable to identify new types of attacks on the network, such an intrusion detection system has the disadvantages of slow system establishment and high cost of model update. Facing the ever-expanding network and endless attacks, it lacks adaptability and scalability, making it difficult to Detect emerging types of attacks on the network, for example:
[0006] The analysis of intrusion detection system based on prior knowledge mainly focuses on the analysis of intrusion behavior and system status. A big problem is that it cannot detect potential attack operations that exploit system vulnerabilities or conform to protocol specifications;
[0007] Statistical-based intrusion detection usually adopts analytical and statistically relevant methods to analyze intrusion detection, although they do not require any prior knowledge about the attack, but they need time to find the accurate statistical distribution;
[0008] Intrusion detection systems based on traditional machine learning cannot handle high-dimensional data. When the amount of data is large, there are problems such as slow convergence and high complexity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection system and intrusion detection method for energy Internet
  • Intrusion detection system and intrusion detection method for energy Internet
  • Intrusion detection system and intrusion detection method for energy Internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0082] 1. Performance evaluation

[0083] The REAL model was implemented using the Keras API on an Intel Xeon E5-2618L v3 CPU NVIDIA GeForce RTX2080TI GPU (64GB RAM) workstation. Not only the experiment of REAL detection model was carried out, but also the performance of some widely used detection models were compared, such as Support Vector Machine (SVM), Linear Regression (LR), MLP, LSTM and Convolutional Neural Network (CNN), etc. The hyperparameters used in our REAL model were determined after a preliminary set of experiments, as shown in Table 1.

[0084] Table 1 Model training hyperparameters

[0085]

[0086]

[0087] In the analysis of numerical results, four metrics are considered to evaluate the performance of IDS, namely accuracy, precision, recall and F1 value. Here the macro average is used to comprehensively evaluate the global performance of IDS. Each set of experiments was repeated ten times, and macro-averaged results are shown here.

[0088] The nat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intrusion detection system and an intrusion detection method for an energy Internet. A feature selection module is used for forming a reduced data set by removing features which have no contribution or low contribution to an intrusion detection model from an original data set; a data preprocessing module is used for carrying out further data preprocessing on the reduceddata set and processing the reduced data set into a data set which can be received and processed by a deep learning model; and an intrusion detection module is used for training, optimizing and testing the deep learning model by using the data set obtained by the data preprocessing module, and then detecting intrusion flow by using the deep learning model. According to the intrusion detection system for the energy Internet, through testing on a real data set of the energy Internet, the numerical result shows that the intrusion detection system disclosed by the invention is very effective in detection of various network threats in the energy Internet, and is superior to most of existing intrusion detection system schemes.

Description

technical field [0001] The present invention relates to the technical field of energy Internet, in particular to an energy Internet-oriented intrusion detection system and a method thereof. Background technique [0002] The Energy Internet is an emerging field of the Internet of Things, such as figure 1 As shown, it is defined as a networked system composed of various smart energy infrastructures, including control centers, distributed renewable energy systems, decentralized energy storage, and energy consumption (such as industrial, commercial, residential, etc.). The goal of the Energy Internet is to coordinate existing distributed energy systems, thereby optimizing the energy efficiency of generation, transmission, and consumption of all these energy systems. [0003] Energy Internet has many development prospects and is facing more and more network security challenges. Because the Energy Internet integrates a series of heterogeneous and vulnerable communication network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/04G06N3/08G06K9/62G06N20/20
CPCH04L63/1416G06N3/08G06N20/20G06N3/044G06N3/045G06F18/2113
Inventor 李贝贝印一聪武玉豪宋佳芮欧阳远凯马小霞
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products