Research on privacy data protection of power wireless network based on heterogeneous data sequence

被引:0
|
作者
Li, Furong [1 ]
Wang, Duan [1 ]
机构
[1] Huanghuai Univ, Sch Int Educ, Zhumadian 463000, Peoples R China
关键词
Power wireless network; Privacy data protection; Multi-source heterogeneous data; Data sequence detection; Isolated forest algorithm; AGGREGATION;
D O I
10.1016/j.egyr.2022.03.153
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
As an energy industry, the power industry is related to the national economy and the people's livelihood. It is applied to intensive technology types, and involves all walks of life. Due to the opening of power market and the changes of social economy, such as Internet economy and data economy, the traditional power industry is facing great challenges. Considering the practical problem that the private data anomaly detection model of power network lacks high-quality labeled data set and the anomaly detector is updated in time according to the feedback, an adaptive anomaly detection model of human in the loop is constructed so as to effectively reduce the phenomenon of false positives. This paper proposes an adaptive anomaly detection algorithm based on isolated forest and prediction analysis. The abnormal score is calculated according to the algorithm. The sorting list of abnormal data is given. The samples to be labeled are selected by pal strategy and handed over to the analysts, and then the weight of each side in the database is updated in time according to the labeling feedback. The experimental results show that the detection accuracy of this algorithm is 95% under the low manual annotation budget, which is 5%-10% higher than other algorithms. Besides, about 70% abnormal behaviors were detected from 20000 test data. It realizes the purpose of identifying directional network attacks from multi-source heterogeneous and noisy cyberspace data. This research can help the power department quickly find the abnormal behavior caused by network attack, which aims to solve the problems of low intelligence level and lack of correlation between multi-source heterogeneous data in power network attack detection. (C) 2022 The Author(s). Published by Elsevier Ltd.
引用
收藏
页码:687 / 695
页数:9
相关论文
共 50 条
  • [1] Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network
    Ren, Yongjun
    Leng, Yan
    Zhu, Fujian
    Wang, Jin
    Kim, Hye-Jin
    SENSORS, 2019, 19 (10)
  • [2] Research on a Network Communication Data Privacy Protection System Based on OFDM Technology
    Lu, Kong
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 1134 - 1141
  • [3] Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data
    Zhang H.
    Li P.
    Journal of Cyber Security and Mobility, 2023, 12 (06): : 845 - 868
  • [4] Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data
    Du, Jiawen
    Pi, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] Data Fusion and Processing Technology of Wireless Sensor Network for Privacy Protection
    Shi, Lusheng
    Li, Kai
    Zhu, Huibo
    JOURNAL OF APPLIED MATHEMATICS, 2023, 2023
  • [6] Research on the power control based on game theory in wireless data network
    Communication Research Center, Harbin Institute of Technology, Harbin 150001, China
    Harbin Gongye Daxue Xuebao, 2007, SUPPL. 1 (139-142):
  • [7] Research on data privacy protection technology of social network users based on differential disturbance
    Cheng, Shanying
    AIN SHAMS ENGINEERING JOURNAL, 2022, 13 (05)
  • [8] Research on wireless distributed financial risk data stream mining based on dual privacy protection
    Zhao, Yuhao
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [9] Research on wireless distributed financial risk data stream mining based on dual privacy protection
    Yuhao Zhao
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [10] Privacy Protection for Wireless Medical Sensor Data
    Yi, Xun
    Bouguettaya, Athman
    Georgakopoulos, Dimitrios
    Song, Andy
    Willemson, Jan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (03) : 369 - 380