Cargando…

Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing

Numerous internal and external intrusion attacks have appeared one after another, which has become a major problem affecting the normal operation of the power system. The power system is the infrastructure of the national economy, ensuring that the information security of its network not only is an...

Descripción completa

Detalles Bibliográficos
Autores principales: Li, Tong, Zhao, Hai, Tao, Yaodong, Huang, Donghua, Yang, Chao, Xu, Shuheng
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9110159/
https://www.ncbi.nlm.nih.gov/pubmed/35586098
http://dx.doi.org/10.1155/2022/1415713
_version_ 1784709039248113664
author Li, Tong
Zhao, Hai
Tao, Yaodong
Huang, Donghua
Yang, Chao
Xu, Shuheng
author_facet Li, Tong
Zhao, Hai
Tao, Yaodong
Huang, Donghua
Yang, Chao
Xu, Shuheng
author_sort Li, Tong
collection PubMed
description Numerous internal and external intrusion attacks have appeared one after another, which has become a major problem affecting the normal operation of the power system. The power system is the infrastructure of the national economy, ensuring that the information security of its network not only is an aspect of computer information security but also must consider high-standard security requirements. This paper analyzes the intrusion threat brought by the power information network and conducts in-depth research and investigation combined with the intrusion detection technology of the power information network. It analyzes the structure of the power knowledge network and cloud computing through deep learning-based methods and provides a network interference detection model. The model combines the methods of abuse detection and anomaly detection, which solves the problem that the abuse analysis model does not detect new attack variants. At the same time, for big data network data retrieval, it retrieves and analyzes data flow quickly and accurately with the help of deep learning of data components. It uses a fuzzy integral method to optimize the accuracy of power information network intrusion prediction, and the accuracy reaches 98.11%, with an increase of 0.6%.
format Online
Article
Text
id pubmed-9110159
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-91101592022-05-17 Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing Li, Tong Zhao, Hai Tao, Yaodong Huang, Donghua Yang, Chao Xu, Shuheng Comput Intell Neurosci Research Article Numerous internal and external intrusion attacks have appeared one after another, which has become a major problem affecting the normal operation of the power system. The power system is the infrastructure of the national economy, ensuring that the information security of its network not only is an aspect of computer information security but also must consider high-standard security requirements. This paper analyzes the intrusion threat brought by the power information network and conducts in-depth research and investigation combined with the intrusion detection technology of the power information network. It analyzes the structure of the power knowledge network and cloud computing through deep learning-based methods and provides a network interference detection model. The model combines the methods of abuse detection and anomaly detection, which solves the problem that the abuse analysis model does not detect new attack variants. At the same time, for big data network data retrieval, it retrieves and analyzes data flow quickly and accurately with the help of deep learning of data components. It uses a fuzzy integral method to optimize the accuracy of power information network intrusion prediction, and the accuracy reaches 98.11%, with an increase of 0.6%. Hindawi 2022-05-09 /pmc/articles/PMC9110159/ /pubmed/35586098 http://dx.doi.org/10.1155/2022/1415713 Text en Copyright © 2022 Tong Li et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Li, Tong
Zhao, Hai
Tao, Yaodong
Huang, Donghua
Yang, Chao
Xu, Shuheng
Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing
title Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing
title_full Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing
title_fullStr Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing
title_full_unstemmed Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing
title_short Power Intelligent Terminal Intrusion Detection Based on Deep Learning and Cloud Computing
title_sort power intelligent terminal intrusion detection based on deep learning and cloud computing
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9110159/
https://www.ncbi.nlm.nih.gov/pubmed/35586098
http://dx.doi.org/10.1155/2022/1415713
work_keys_str_mv AT litong powerintelligentterminalintrusiondetectionbasedondeeplearningandcloudcomputing
AT zhaohai powerintelligentterminalintrusiondetectionbasedondeeplearningandcloudcomputing
AT taoyaodong powerintelligentterminalintrusiondetectionbasedondeeplearningandcloudcomputing
AT huangdonghua powerintelligentterminalintrusiondetectionbasedondeeplearningandcloudcomputing
AT yangchao powerintelligentterminalintrusiondetectionbasedondeeplearningandcloudcomputing
AT xushuheng powerintelligentterminalintrusiondetectionbasedondeeplearningandcloudcomputing