Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Alarm information compression method based on frequent item set mining

A frequent item set mining and alarm information technology, applied in the direction of instruments, data processing applications, resources, etc., can solve the problems of difficult lossless compression, unfavorable alarm traceability, low compression rate, etc.

Active Publication Date: 2021-03-26
CHINA SOUTHERN POWER GRID COMPANY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this algorithm has a low compression rate and low real-time performance when compressing alarm data, and it is difficult to achieve lossless compression, which is not conducive to the development of alarm traceability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm information compression method based on frequent item set mining
  • Alarm information compression method based on frequent item set mining
  • Alarm information compression method based on frequent item set mining

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0066] The alarm information compression method provided by this application can be applied to such as figure 1 shown in the application environment. Among them, the server 104 compresses the information generated by the security device that does not conform to the security policy during the communication process, that is, the alarm information, and compares the real-time alarm information with the compression rule set mined based on the historical alarm information of a predetermined time period, and obtains the The compression result of the real-time alarm information ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an alarm information compression method and device, computer equipment and a storage medium. The method comprises the following steps: collecting real-time alarm information;and comparing the real-time alarm information with a compression rule set mined based on historical alarm information of a predetermined time period to obtain a compression result of the real-time alarm information. Through the method, the alarm information can be compressed in real time on the premise of ensuring the compression efficiency.

Description

technical field [0001] This application relates to the field of industrial control system network security, in particular to a massive alarm compression method, device, computer equipment and storage medium. Background technique [0002] With the digitalization process of China Southern Power Grid and the deepening of network security operation monitoring, the deployment and application of security equipment is becoming more and more extensive. Due to business configuration errors, zombie services and other reasons, more and more alarm information is generated, which seriously interferes with network security operation monitoring. [0003] Based on this, in the existing power monitoring system, an algorithm for compressing alarm data is designed for network security alarm information. China Energy Construction Group Hunan Electric Power Design Institute Co., Ltd. Alarm Merging and Traceability Method" (Application No.: CN201810882998.0, Announcement No.: CN108520370A, Appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q50/06
CPCG06Q10/06311G06Q10/0639G06Q50/06
Inventor 庞晓健苏扬陶文伟吴金宇张文哲曾初阳易思瑶陈刚
Owner CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products