Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-intrusion method for low-voltage power line carrier communication system

A low-voltage power line and carrier communication technology, which is applied in transmission systems, digital transmission systems, and security communication devices, can solve problems such as limiting the accuracy of intrusion detection and calculation efficiency, the inability to guarantee the security of low-voltage power line communication networks, and large data dimensions. Achieve the effects of improving accuracy and computing efficiency, improving the probability of anti-intrusion and the accuracy of intrusion detection

Pending Publication Date: 2022-02-08
POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, most of the intrusion detection systems at home and abroad are used for wireless network intrusion detection, which is not only slow in detection speed but also prone to false alarms and poor real-time performance. Coupled with the particularity of low-voltage power line communication, the security of low-voltage power line communication networks cannot be guaranteed. In recent years, methods such as injection clustering, association rule method, data mining and anomaly mining have appeared successively, but it is difficult to achieve the expected effect in today's complex power line communication network, and cannot meet the online intrusion detection system of modern power line carrier communication network. Improving the anti-intrusion level of low-voltage power line carrier communication and the ability of rapid and real-time detection of intrusion has become an urgent problem to be solved in the power line carrier network intrusion detection scheme.
[0003] In recent years, deep learning has achieved good results in the fields of speech recognition, image recognition, and natural language processing. Deep learning can extract abstract high-level features from original features, and does not need to select features based on expert experience. Because of its powerful learning Scholars at home and abroad have tried to apply deep learning technology to the field of network security. Although the above method has achieved good results, it only uses the official training set in model training and testing, which has certain limitations. , although the existing methods have a high anti-intrusion rate, due to the large dimension of the data, especially in the data processing stage, feature extraction will be performed based on expert experience, which not only takes a long time to select appropriate features, but may also damage the Due to the correlation between data, some effective features are missed, and because of the inherent low calculation efficiency, complex calculation process and poor convergence of the packaged feature selection mode, the existing optimization methods are difficult to achieve in practical applications. For real-time data of a huge power communication network, it is often easy to fall into the curse of dimensionality problem, which limits the accuracy and computational efficiency of intrusion detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-intrusion method for low-voltage power line carrier communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] refer to figure 1 , the present invention provides a low-voltage power line carrier communication system anti-intrusion method, comprising:

[0043] data preprocessing;

[0044] Judging the convergence of feature selection, if it is judged to be convergent, it will enter the online intrusion detection, otherwise, it will enter the next step;

[0045] Improved feature selection based on bidirectional search;

[0046]Improvement of learner based on neural network algorithm;

[0047] The learner trains the convergence judgment. If it is judged to be convergent, it will enter the feature selection convergence judgment. Otherwise, repeat the previous step.

[0048] Data preprocessing includes: data standardization processing on unknown data, one hot preprocessing, and conversion of a single piece of unknown data from 1×41 to 1×122.

[0049] Improvements to learners based on neural network algorithms include:

[0050] Train the CNN-Focal classification model through supe...

Embodiment 2

[0071] refer to figure 1 , the present invention provides a low-voltage power line carrier communication system anti-intrusion method, comprising:

[0072] Data preprocessing, data standardization processing and one hot preprocessing for unknown data, converting single unknown data from 1×41 to 1×122;

[0073] Judging the convergence of feature selection, if it is judged to be convergent, it will enter the online intrusion detection, otherwise, it will enter the next step;

[0074] Improved feature selection based on bidirectional search;

[0075] Improvements to learners based on neural network algorithms:

[0076] (1) Train the CNN-Focal classification model through supervised learning

[0077] The CNN-Focal classification model obtained through training includes an input layer, a convolutional layer, a Dropout layer, a Max-pooling layer, a fully connected layer, and a Softmax layer. Among them, the first layer of the CNN-Focal classification model is the input layer, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-intrusion method for a low-voltage power line carrier communication system, which comprises the following steps of: preprocessing data; judging feature selection convergence, wherein if convergence is judged, online intrusion detection is carried out, and otherwise, the next step is carried out; feature selection improvement based on bidirectional search; learning device improvement based on a neural network algorithm; and using a learning device for training convergence judgment, wherein if convergence is judged, feature selection convergence judgment is carried out, otherwise, the previous step is repeated, optimization is carried out on an unbalanced data set by adopting a FocalLoss loss function, the anti-intrusion probability and intrusion detection precision of the low-voltage power line communication network are effectively improved, a CNN-Focal classification model is provided. According to the model, threshold convolution and Softmax in the convolutional neural network are applied to the field of intrusion detection for multi-classification, the problems of low calculation efficiency, complex calculation process and poor convergence of a package type feature selection mode are solved, and the accuracy and calculation efficiency of intrusion detection are improved.

Description

technical field [0001] The invention relates to the technical field of carrier communication, in particular to an anti-intrusion method for a low-voltage power line carrier communication system. Background technique [0002] At present, most of the intrusion detection systems at home and abroad are used for wireless network intrusion detection, which is not only slow in detection speed but also prone to false alarms and poor real-time performance. Coupled with the particularity of low-voltage power line communication, the security of low-voltage power line communication networks cannot be guaranteed. In recent years, methods such as injection clustering, association rule method, data mining and anomaly mining have appeared successively, but it is difficult to achieve the expected effect in today's complex power line communication network, and cannot meet the online intrusion detection system of modern power line carrier communication network. Improving the anti-intrusion lev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40G06N3/04G06N3/08G06K9/62
CPCH04L63/1416H04L63/1441G06N3/08G06N3/047G06N3/045G06F18/2415Y04S40/20
Inventor 施展李波吴赞红杨志花王秀竹吴振田
Owner POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products