Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious behavior detection method based on non-intrusive power terminal time sequence monitoring

A power terminal, non-intrusive technology, applied in the field of malicious behavior detection based on non-intrusive power terminal timing monitoring, can solve problems such as increasing the security risk of smart grids

Inactive Publication Date: 2020-11-13
UNIV OF ELECTRONICS SCI & TECH OF CHINA +1
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the continuous emergence of new equipment and new technologies in the fields of primary equipment intelligence and wireless communication, and gradually being widely used in the construction of power communication networks, the smart grid has a complex access environment, flexible and diverse access methods, and Features such as huge smart access terminals, which will increase the security risk of smart grid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious behavior detection method based on non-intrusive power terminal time sequence monitoring
  • Malicious behavior detection method based on non-intrusive power terminal time sequence monitoring
  • Malicious behavior detection method based on non-intrusive power terminal time sequence monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0051] Such as figure 1 As shown, a malicious behavior detection method based on non-intrusive power terminal timing monitoring includes the following steps:

[0052] S1. The edge computing device collects power terminal data, and builds a historical database for the power terminal that needs to be detected; the database includes several types of power terminal equipment to be detected and their electrical quantity data;

[0053] S2. Extract the time-series series of electrical quantities of each power terminal in the historical database to obtain the historical power consumption information of the corresponding power terminal. The historical power consumption information of the power terminal includes steady-state power, start-up time, run...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious behavior detection method based on non-intrusive power terminal time sequence monitoring. The method comprises the following steps that S1, edge computing equipmentconstructs a database of historical electrical quantities of power terminal equipment; S2, a power consumption behavior data set is constructed for each power terminal device; S3, event detection iscarried out on the electrical quantity time series of each power terminal, a sample set is obtained after feature extraction, and a load classifier is trained; S4, event detection is carried out on the electric power total outlet electric quantity time series, features are extracted and input into the trained classifier model, and the equipment type to which the electric power terminal to be detected belongs is determined; S5, the power consumption information of the to-be-tested power terminal is counted; S6, the power consumption behavior of the to-be-detected power terminal is detected, andwhether the power consumption equipment is abnormal or not is determined according to the power consumption behavior; and S7, the edge computing device records and reports an exception. On the basisof non-intrusive power terminal time sequence monitoring, online detection of malicious behaviors of the power terminal equipment is realized through comparison with power utilization behaviors formedby the historical power information.

Description

technical field [0001] The invention relates to a method for detecting malicious behaviors of power terminal equipment under an edge computing system, in particular to a method for detecting malicious behaviors based on non-intrusive timing monitoring of power terminals. Background technique [0002] With the continuous deployment of smart grid systems in recent years, smart grid devices such as smart meters play an important role in collecting data related to power usage and smart grid status. With the continuous emergence of new equipment and new technologies in the fields of primary equipment intelligence and wireless communication, and gradually being widely used in the construction of power communication networks, the smart grid has a complex access environment, flexible and diverse access methods, and Features such as huge smart access terminals will increase the security risks of smart grids. Therefore, it is necessary to take technical precautions against the unsafe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/06G06Q50/06G06K9/62
CPCG06Q10/0639G06Q50/06G06F18/24G06F18/214
Inventor 雷文鑫文红许爱东侯文静蒋屹新张宇南毛中麒
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products