Abnormal Detection of Wireless Power Terminals in Untrusted Environment Based on Double Hidden Markov Model

被引:1
作者
Wu, Kehe [1 ]
Li, Jiawei [1 ]
Zhang, Bo [2 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
[2] Global Energy Interconnect Res Inst, Nanjing 210008, Peoples R China
关键词
Hidden Markov models; Security; Analytical models; Data models; Wireless communication; Communication system security; Intrusion detection; HMM; abnormal detection; power IoT device;
D O I
10.1109/ACCESS.2020.3040856
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wireless power terminals are deployed in harsh public places and lack strict control, facing security problems. Thus, they are faced with security problems such as illegal and counterfeit terminal access, unlawful control of connected terminals, etc. The intrusion detection system based on machine learning and artificial intelligence significantly improve the terminal side's abnormal detection capacity. In this article, we aim at identifying the abnormal behavior of wireless power terminals based on a double Hidden Markov Model (HMM), which solves the computational complexity problem caused by high dimensions in intrusion detection systems using a single HMM. The lower-layer HMM is used to identify the discrete single network abnormal behavior. Simultaneously, the upper-layer can obtain more extended period attack behavior in multiple independent abnormal events identified by the low-level. The experiment results indicate that the intrusion detection system using proposed double HMM can effectively detect the terminal's abnormal behavior and identify the network attack behavior for an extended period.
引用
收藏
页码:18682 / 18691
页数:10
相关论文
共 24 条
[1]   Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection [J].
Aminanto, Muhamad Erza ;
Choi, Rakyong ;
Tanuwidjaja, Harry Chandra ;
Yoo, Paul D. ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :621-636
[2]  
[Anonymous], 1990, Hidden Markov Models for Speech Recognition
[3]  
Atli BG, 2017, ANOMALY BASED INTRUS
[4]   STATISTICAL INFERENCE FOR PROBABILISTIC FUNCTIONS OF FINITE STATE MARKOV CHAINS [J].
BAUM, LE ;
PETRIE, T .
ANNALS OF MATHEMATICAL STATISTICS, 1966, 37 (06) :1554-&
[5]  
Bilmes J. A., 1997, ALGORITHM ITS APPL P
[6]   Detecting homogeneous segments in DNA sequences by using hidden Markov models [J].
Boys, RJ ;
Henderson, DA ;
Wilkinson, DJ .
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES C-APPLIED STATISTICS, 2000, 49 :269-285
[7]  
Bunke Horst., 2001, HIDDEN MARKOV MODELS
[8]  
CERT Insider Threat Center, 2011, CERT INSIDER THREAT
[9]   Multi-Domain Information Fusion for Insider Threat Detection [J].
Eldardiry, Hoda ;
Bart, Evgeniy ;
Liu, Juan ;
Hanley, John ;
Price, Bob ;
Brdiczka, Oliver .
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, :45-51
[10]  
Ester M., 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P226