Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 464-468.

• Information Security • Previous Articles     Next Articles

EMD-based Anomaly Detection for Network Traffic in Power Plants

ZHAO Bo1, ZHANG Hua-feng1, ZHANG Xun2, ZHAO Jin-xiong2, SUN Bi-ying3, YUAN Hui2   

  1. (State Grid Gansu Electric Power Company,Lanzhou 730000,China)1;
    (State Grid Gansu Electric Power Research Institute,Lanzhou 730000,China)2;
    (State Grid Gansu Information & Telecommunications Company,Lanzhou 730000,China)3
  • Online:2019-11-10 Published:2019-11-20

Abstract: Aiming at the security threat detection requirements of new energy power plant network,and the problems of poor adaptive ability,more manual participation and false positives of existing network security anomaly detection me-thods,an adaptive real-time anomaly detection method based on Empirical Mode Decomposition (EMD) was proposed.Firstly,this method characterizes the traffic in the new energy power plant network in dimensions,and establishes the traffic metrics model.Then,the traffic mettrics are decomposed by adaptive EMD,variance calculation,Gauss fitting and threshold determination,and the adaptive anomaly detection and security alarm are realized.Typical attack datasets are used to compare this method and the anomaly detection method based on wavelet transform.The test results show that this method can identify the unknown traffic anomaly accurately,real-time and adaptively.The detection effect is better than the anomaly detection method based on wavelet transform in terms of accuracy and false positives.

Key words: Anomaly detection, Empirical mode decomposition, Network traffic, New energy power plant

CLC Number: 

  • TP391
[1]叶夏明,文福拴,尚金成,等.电力系统中信息物理安全风险传播机制[J].电网技术,2015,39(11):3072-3079.
[2]360,全球关键信息基础设施网络安全状况分析报告[EB/OL].https://max.book118.com/html/2018/0528/169235020.Shtm.
[3]王轶楠,林彦君,李焕,等.DoS攻击下电力网络控制系统脆弱性分析及防御[J].控制与决策,2017,32(3):411-418.
[4]WANG Y N,LIN Z Y,LIANG X,et al.On modeling of electrical cyber- physical systems considering cyber security[J].Frontiers of Information Technology & Electronic Engineering,2016,17(5):465-478.
[5]徐久强,周洋洋,王进法,等.基于流时间影响域的网络流量异常检测[J].东北大学学报(自然科学版),2019,40(1):26-31.
[6]金伟.基于统计方法的异常数据检测及其修复[D].南京:南京邮电大学,2016.
[7]程光,龚俭,丁伟.基于抽样测量的高速网络实时异常检测模型[J].软件学报,2003,14(3):594-599.
[8]DAINOTTI A,PESCAPE A,VENTRE G.Wavelet-based De-tection of DoS Attacks[C]∥IEEE Communications Society GLOBECOM.2006.
[9]BARFORD P,KLINE J,PLONKA D,et al.A signal analysis ofnetwork traffic anomalies[C]∥Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment.ACM,2002:71-82.
[10]LAKHINA A,CROVELLA M,DIOT C.Diagnosing network-wide trafficanomalies[C]∥ACM SIGCOMM Computer Communication Review.ACM,2004:219-230.
[11]李洪成,吴晓平,姜洪海.基于改进聚类分析的网络流量异常检测方法[J].网络与信息安全学报,2015,1(1):66-71.
[12]卜国卿.网络流量异常检测技术研究与实现[D].电子科技大学,2018.
[13]RINGBERG H,SOULE A,REXFORD J,et al.Sensitivity ofpcafor traffic anomaly detection[C]∥ ACM SIGMETRICS PerformanceEvaluation Review.ACM,2007:109-120.
[14]夏守璐.希尔伯特黄变换在网络流量中的研究与应用[D].成都:电子科技大学,2017.
[15]苟玲.基于经验模态分解的网络流量检测与分析方法[D].成都:电子科技大学,2018.
[16]王海涛,陈晖.网络性能测量评价指标体系研究[J].信息技术与标准化,2012(9):34-37.
[17]马云龙,张千里,王继龙.基于IPFIX的网络流量日志系统[J].通信学报,2013,2(4):5-8.
[18]BRAUCKHOFF D,SALAMATIAN K,MAY M.ApplyingPCA for traffic anomaly detection:Problems and solutions[C]∥INFOCOM 2009.IEEE,2009:2866-2870.
[19]AHMED T,COATES M,LAKHINA A.Multivariate online anomaly detection using kernel recursive least squares[C]∥26th IEEE International Conference on Computer Communications INFOCOM 2007.IEEE,2007:625-633.
[20]GAO J,HU G,YAO X,et al.Anomaly detection of network traffic based on wavelet packet[C]∥Asia-Pacific Conference on Communications,2006.APCC’06.IEEE,2006:1-5.
[21]BARFORD P,KLINE J,PLONKA D,et al.A signal analysis ofnetwork traffic anomalies[C]∥Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment.ACM,2002:71-82.
[22]肖政宏,潘梅森,尹浩.基于网络流量小波分析的异常检测研究[J].计算机应用研究,2007,2(1):299-301.
[23]GRABS E,PETERSONS E.Analysis of self-similar traffic parameters for network performance improvement with real-time discrete wavelet transform[C]∥2015 IEEE 3rd Workshop on Advances in Information,Electronic and Electrical Engineering (AIEEE).IEEE,2015:1-6.
[1] XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110.
[2] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[3] DU Hang-yuan, LI Duo, WANG Wen-jian. Method for Abnormal Users Detection Oriented to E-commerce Network [J]. Computer Science, 2022, 49(7): 170-178.
[4] SHEN Shao-peng, MA Hong-jiang, ZHANG Zhi-heng, ZHOU Xiang-bing, ZHU Chun-man, WEN Zuo-cheng. Three-way Drift Detection for State Transition Pattern on Multivariate Time Series [J]. Computer Science, 2022, 49(4): 144-151.
[5] WU Yu-kun, LI Wei, NI Min-ya, XU Zhi-cheng. Anomaly Detection Model Based on One-class Support Vector Machine Fused Deep Auto-encoder [J]. Computer Science, 2022, 49(3): 144-151.
[6] LENG Jia-xu, TAN Ming-pi, HU Bo, GAO Xin-bo. Video Anomaly Detection Based on Implicit View Transformation [J]. Computer Science, 2022, 49(2): 142-148.
[7] ZHANG Ye, LI Zhi-hua, WANG Chang-jie. Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method [J]. Computer Science, 2021, 48(9): 337-344.
[8] QING Lai-yun, ZHANG Jian-gong, MIAO Jun. Temporal Modeling for Online Anomaly Detection [J]. Computer Science, 2021, 48(7): 206-212.
[9] GUO Yi-shan, LIU Man-dan. Anomaly Detection Based on Spatial-temporal Trajectory Data [J]. Computer Science, 2021, 48(6A): 213-219.
[10] XING Hong-jie, HAO ZhongHebei. Novelty Detection Method Based on Global and Local Discriminative Adversarial Autoencoder [J]. Computer Science, 2021, 48(6): 202-209.
[11] XIANG Chang-sheng, CHEN Zhi-gang. Chaotic Prediction Model of Network Traffic for Massive Data [J]. Computer Science, 2021, 48(5): 289-293.
[12] ZOU Cheng-ming, CHEN De. Unsupervised Anomaly Detection Method for High-dimensional Big Data Analysis [J]. Computer Science, 2021, 48(2): 121-127.
[13] SHI Lin-shan, MA Chuang, YANG Yun, JIN Min. Anomaly Detection Algorithm Based on SSC-BP Neural Network [J]. Computer Science, 2021, 48(12): 357-363.
[14] ZHANG Ning, FANG Jing-wen, ZHAO Yu-xuan. Bitcoin Price Forecast Based on Mixed LSTM Model [J]. Computer Science, 2021, 48(11A): 39-45.
[15] YANG Yue-lin, BI Zong-ze. Network Anomaly Detection Based on Deep Learning [J]. Computer Science, 2021, 48(11A): 540-546.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!