Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power Internet of Things network security risk prediction method based on Levenshtein distance algorithm

A power Internet of Things and network security technology, applied in computing, platform integrity maintenance, structured data retrieval, etc., can solve problems such as poor long-term forecasting effect, and achieve the effect of facilitating medium and long-term forecasting and enriching the causal database

Pending Publication Date: 2022-01-04
INFORMATION & TELECOMM COMPANY SICHUAN ELECTRIC POWER
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on the above problems, the present invention provides a method for predicting the security risk of the electric power Internet of Things network based on the Levenshtein distance algorithm, which solves the problem of poor mid- and long-term prediction effect of the existing technology for the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power Internet of Things network security risk prediction method based on Levenshtein distance algorithm
  • Power Internet of Things network security risk prediction method based on Levenshtein distance algorithm
  • Power Internet of Things network security risk prediction method based on Levenshtein distance algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described below in conjunction with the accompanying drawings. Embodiments of the present invention include, but are not limited to, the following examples.

[0033] like figure 1 The shown method for predicting the security risk of the power Internet of Things network based on the Levenshtein distance algorithm includes the following steps:

[0034] Step 1. Build a causal database.

[0035] Among them, a single alarm event in the power Internet of Things specifically includes the attack source IP, attack behavior, attack IP, start time and end time, and the attack source IP, attack behavior, and attack IP in a single alarm event are regarded as a valid alarm information.

[0036] In addition, for each alarm information, build a causal database, first sort all alarm events by start time, then take the current alarm event as the result, and advance forward with the start time of the alarm event as the reference point, and start wit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of network security prediction, in particular to a power Internet of Things network security risk prediction method based on a Levenshtein distance algorithm. The method comprises the following steps of: firstly, taking an attack source IP, an attack behavior and an attack target IP in a single alarm event as effective alarm information, and aiming at each piece of alarm information, taking a current alarm event as a result, searching six most similar alarm events before the occurrence time of the alarm event as causes, thereby constructing a piece of causal data, and storing the causal data into a database to form a causal database; secondly, filtering the causal database; and finally, predicting an alarm event by using the Levenshtein distance algorithm. The problem of poor long-term prediction effect in the system in the prior art is solved.

Description

technical field [0001] The invention relates to the field of network security prediction, and specifically refers to a method for predicting network security risks of the electric power Internet of Things based on the Levenshtein distance algorithm. Background technique [0002] When the scale of the power Internet of Things network gradually increases, the number of accompanying network attack events also gradually increases. The research on network security is very necessary. The traditional protection methods represented by intrusion detection technology and firewall have been difficult to meet the needs of large-scale network attacks. Security protection requirements. Network security protection is based on security situation analysis and security risk prediction. The risk prediction link is in the final stage of the network security situation awareness system. Only by predicting possible alarm events can we do To prevent problems before they happen, and better maintain ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F16/28G06F21/56G06F30/20G06Q10/06
CPCG06F21/55G06F21/56G06Q50/06G06Q10/0635G06F30/20G06F16/284G06F16/285
Inventor 吕磊刘萧黄林许珂王卓蒋天宇谌文杰杨茜常健李嘉周
Owner INFORMATION & TELECOMM COMPANY SICHUAN ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products