Data Security Knowledge Graph for Active Distribution Network

被引:1
|
作者
Li, Qianliang [1 ]
Dai, Renjie [2 ]
Wei, Siming [2 ]
Zhang, Jie [1 ]
Deng, Song [3 ]
机构
[1] Nanjing Univ Posts Telecommun, Coll Automat, Nanjing 210003, Peoples R China
[2] State Grid Shanghai Municipal Elect Power Co, Shanghai 200122, Peoples R China
[3] Nanjing Univ Posts Telecommun, Inst Adv Technol, Nanjing 210003, Peoples R China
来源
ARTIFICIAL INTELLIGENCE AND ROBOTICS, ISAIR 2022, PT I | 2022年 / 1700卷
关键词
Active distribution network; Data security; Knowledge graph named entity recognition; Entity relation extraction; CYBER-SECURITY; INTERNET; ALGORITHM;
D O I
10.1007/978-981-19-7946-0_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The openness, interconnection and sharing mechanism of the active distribution network bring great security risks to business system data. The existing data security protection strategies for the active distribution network are basically based on encryption, access control, and blockchain technology, which cannot enable the active distribution network operation and maintenance and management personnel to intuitively understand the data security situation affecting the active distribution network from a global perspective. Therefore, this paper combines the concept of knowledge graph to explore the key technologies of data security knowledge graphs for the active distribution network. First, the key technologies for constructing knowledge graph are explained in detail from named entity recognition, entity relation extraction and entity alignment. And then, with the active distribution network data as the object, the process of constructing data security knowledge graph for active distribution network is explained. Finally, the challenge of constructing a data security knowledge map for active distribution network is given.
引用
收藏
页码:193 / 204
页数:12
相关论文
共 50 条
  • [41] Design and Implementation of Node Degree Centrality Computing of Network Security Database Based on Knowledge Graph
    Wu, Chao
    Wu, Feng
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [42] Robust State Estimation Method for Distribution Network Based on Graph Neural Network Incorporating Topology Knowledge
    Hu J.
    Cao D.
    Hu W.
    Chen J.
    Chen Z.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2023, 47 (10): : 84 - 97
  • [43] Static security analysis of active distribution network considering time sequence characteristics
    Fu Y.
    Liao J.
    Li Z.
    Zhang J.
    Tang X.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2016, 40 (24): : 64 - 70
  • [44] Optimization and Control of Voltage Security in Active Distribution Network Considering Global Correlation
    Chen Z.
    Gu D.
    Guo Q.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2023, 47 (21): : 99 - 107
  • [45] Comprehensive fault simulation method in active distribution network with the consideration of cyber security
    Sheng, Wanxing
    Liu, Keyan
    Liang, Ying
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2021, 6 (01) : 27 - 40
  • [46] Data security equals graph connectivity
    Kao, MY
    SIAM JOURNAL ON DISCRETE MATHEMATICS, 1996, 9 (01) : 87 - 100
  • [47] Distribution Knowledge Embedding for Graph Pooling
    Chen, Kaixuan
    Song, Jie
    Liu, Shunyu
    Yu, Na
    Feng, Zunlei
    Han, Gengshi
    Song, Mingli
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (08) : 7898 - 7908
  • [48] Graph database-based network security situation awareness data storage method
    Tao, Xiaoling
    Liu, Yang
    Zhao, Feng
    Yang, Changsong
    Wang, Yong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [49] Graph database-based network security situation awareness data storage method
    Xiaoling Tao
    Yang Liu
    Feng Zhao
    Changsong Yang
    Yong Wang
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [50] Differentiating data security and network security
    Kartalopoulos, Stamatios V.
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1469 - 1473