4.4 Article

Detection of probe flow anomalies using information entropy and random forest method

期刊

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
卷 39, 期 1, 页码 433-447

出版社

IOS PRESS
DOI: 10.3233/JIFS-191448

关键词

Power system; flow detection; network probe; random forest algorithms

资金

  1. Natural Science Foundation of China [U196620027, 51777015]
  2. project of Practical Innovation and Enhancement of Entrepreneurial Ability for Professional Degree Postgraduates of Changsha University of Science Technology [SJCX201970]
  3. Open fund project of Hunan Provincial Key Laboratory of Processing of Big Data on Transportation [A1605]
  4. key scientific and technological project of Research and Application of Key Technologies for Network Security Situational Awareness of Electric Power Monitoring System of China Southern Power Grid Corporation [ZDKJXM20170002]

向作者/读者索取更多资源

Aiming at the problems of excessive dependence on manual work, low detection accuracy and poor real-time performance of current probe flow anomaly detection in power system network security detection, a detection method for calculating information entropy of probe flow and random forest classification is proposed. Firstly, the network probe stream data are captured and aggregated in real-time to extract network stream metadata. Secondly, by calculating Pearson correlation coefficient and maximum mutual information coefficient, feature selection of network metadata is carried out. Finally, the information entropy and stochastic forest algorithm are combined to detect the anomaly of probe traffic based on the selected key feature groups, and the probe traffic is accurately classified by multiple incremental learning. The results show that the proposed method can quickly locate the abnormal position of probe traffic and analyze the abnormal points, which greatly reduces the workload of application platform for power system security monitoring, and has high detection accuracy. It effectively improves the reliability and early warning ability of power system network security.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据