Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200157-7.doi: 10.11896/jsjkx.241200157

• Information Security • Previous Articles     Next Articles

Intrusion Detection Method for Power Monitoring System Based on Multi-source Network Data

JIANG Yakun, LIN Xu   

  1. Yunnan Power Grid Corporation Yunnan Power Dispatch Control Centre,Kunming 650000,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    China Southern Power Grid Co.,Ltd.(0500002023030301XT00152).

Abstract: With the continuous advancement of informatization,networking,and intelligence in the power system,the power monitoring system is facing increasingly severe network security threats.It is particularly important to conduct a comprehensive and in-depth analysis of the multi-source data covered by the power monitoring system network,taking into account various factors such as network asset security risks,user behavior,and business characteristics.Based on this,a multi-source data cleaning me-thod and intrusion detection method for power monitoring systems are proposed.The improved maximum correlation and minimum redundancy algorithm is used to select the multi-source security data features of the power monitoring system network,retain appropriate security data features,and use a network intrusion detection model to detect and classify multi-source network security data,effectively solving the problem of complex feature attributes of multi-source data in power monitoring systems leading to decreased accuracy of model classification in the later stage.Simulation experiments show that the proposed multi-source data feature selection method and intrusion detection algorithm have significantly improved the detection rate and classification accuracy of attacks on power monitoring systems.

Key words: Power monitoring system, Long short-term memroy, Feature processing, Intrusion detection, Data cleaning

CLC Number: 

  • TP309
[1]SONG L,FAN Y,LIU M,et al.State estimation method of anew energy power system based on SC-DNN and multi-source data fusion[J].Power System Protection and Control,2023,51:177-187.
[2]WU B,HU Y.Analysis of substation joint safety control system and model based on multi-source heterogeneous data fusion[J].IEEE Access,2023,11:35281-35297.
[3]SAHU A,MAO Z,WLAZLO P,et al.Multi-source data fusion for cyberattack detection in power systems[J].arXiv:2101.06897.
[4]GUO H,LIU Y,XU L,et al.Recognition of demand response potential resident users based on multi-source heterogeneous data association rule analysis[J].Dianwang Jishu/Power System Technology,2023,47(5):1950-1960.
[5]HE J,JIANG W,LIU G,et al.Advanced monitoring infrastructure system architecture for massive multi-source data[C]//2023 IEEE 13th International Conference on Electronics Information and Emergency Communication(ICEIEC).IEEE,2023:148-152.
[6]JIANG L,WANG W,ZHENG S,et al.A novel data edge mining algorithm with euclidean distance weighted optimization for integrated energy station[C]//2023 IEEE 7th Information Technology and Mechatronics Engineering Conference(ITOEC).IEEE,2023,7:67-71.
[7]PARK J K,LEE H,KIM W,et al.Degradation feature extraction method for prognostics of an extruder screw using multi-source monitoring data[J].Sensors,2023,23(2):637.
[8]LI Y,YU X.The multi-mode FBN multi-source heterogeneous data fusion technology based on AES algorithm[C]//2023 IEEE 5th International Conference on Civil Aviation Safety and Information Technology(ICCASIT).IEEE,2023:1198-1202.
[9]DONG Y,WEN C,WANG Z.A motor bearing fault diagnosis method based on multi-source data and one-dimensional lightweight convolution neural network[C]//Proceedings of the Institution of Mechanical Engineers,Part I:Journal of Systems and Control Engineering.2023:272-283.
[10]XIONG Z,LI W,CAI Z.Federated generative model on multi-source heterogeneous data in iot[C]//Proceedings of the AAAI Conference on Artificial Intelligence.202310537-10545.
[11]ANKITDESHPANDE Y,KARTHI R.Development of intru-sion detection system using deep learning for classifying attacks in power systems[C]//Soft Computing:Theories and Applications(SoCTA 2019).Singapore:Springer,2020:755-766.
[12]HAN Y,WANG Y,CAO Y,et al.A novel wrapped feature selection framework for developing power system intrusion detection based on machine learning methods[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems,2023,53(11):7066-7076.
[13]DASGUPTA R,PRAMANIK M,MITRA P,et al.Intrusion detection for power grid:a review[J].International Journal of Information Security,2024,23(2):1317-1329.
[14]LIU J Q,WANG R,CAO J W.An overview of new informationtransmission methods for power systems[J].Journal of Northeast Dianli University,2024,44(4):1-8,76.
[15]ZHANG D,ZHANG Y,ZANG X X.Anomalous Intrusion Detection Method for Surveillance Video Based on Self-Organising Mathematical Models[J].Journal of Northeast Dianli University,2022,42(4):63-69.
[16]DURAIRA D,VENKATASAMY T K,MEHBODNIYA A,et al.Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network[J].Energy Sources,Part A:Recovery,Utilization,and Environmental Effects,2024,46(1):1519-1541.
[17]RAJASOUNDARAN S,KUMAR S V N S,SELVI M,et al.Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks[J].Wireless Networks,2024,30(1):209-231.
[18]NUGROHO S A,TAHA A F,QI J J.Robust dynamic state estimation of synchronous machines with asymptotic state estimation error performance guarantees[J].IEEE Transactions on Power Systems,2020,35(3):1923-1935.
[1] GONG Zian, GU Zhenghui, CHEN Di. Cross-subject Driver Fatigue Detection Based on Local and Global Feature Integrated Network [J]. Computer Science, 2025, 52(6): 200-210.
[2] SUN Hongbin, WANG Su, WANG Zhiliang, JIANG Zheyu, YANG Jiahai, ZHANG Hui. Augmenter:Event-level Intrusion Detection Based on Data Provenance Graph [J]. Computer Science, 2025, 52(2): 344-352.
[3] HE Yuankang, MA Hailong, HU Tao, JIANG Yiming, ZHANG Peng, LIANG Hao. Traffic Adversarial Example Defense Based on Feature Transfer [J]. Computer Science, 2025, 52(2): 362-373.
[4] LI Xiaogeng, HAN Xiao, XIAO Haiyi. Cooperative Defense Method for Network Space Object of Power Monitoring System [J]. Computer Science, 2025, 52(11A): 241200158-7.
[5] HE Hao, ZHANG Hui. Intrusion Detection Method Based on Improved Active Learning [J]. Computer Science, 2025, 52(10): 357-365.
[6] QIAN Zekai, DING Xiaoou, SUN Zhe, WANG Hongzhi, ZHANG Yan. Intelligent Evidence Set Selection Method for Diverse Data Cleaning Tasks [J]. Computer Science, 2024, 51(8): 124-132.
[7] LIU Dongqi, ZHANG Qiong, LIANG Haolan, ZHANG Zidong, ZENG Xiangjun. Study on Smart Grid AMI Intrusion Detection Method Based on Federated Learning [J]. Computer Science, 2024, 51(6A): 230700077-8.
[8] LOU Ren, HE Renqiang, ZHAO Sanyuan, HAO Xin, ZHOU Yueqi, WANG Xinyuan, LI Fangfang. Single Stage Unsupervised Visible-infrared Person Re-identification [J]. Computer Science, 2024, 51(6A): 230600138-7.
[9] PENG Bo, LI Yaodong, GONG Xianfu. Improved K-means Photovoltaic Energy Data Cleaning Method Based on Autoencoder [J]. Computer Science, 2024, 51(6A): 230700070-5.
[10] WANG Chundong, LEI Jiebin. Intrusion Detection Model Based on Combinatorial Optimization of Improved Pigeon SwarmAlgorithm [J]. Computer Science, 2024, 51(11A): 231100054-7.
[11] WANG Chundong, ZHANG Jiakai. Study on Open Set Based Intrusion Detection Method [J]. Computer Science, 2024, 51(11A): 231000033-6.
[12] FAN Yi, HU Tao, YI Peng. System Call Host Intrusion Detection Technology Based on Generative Adversarial Network [J]. Computer Science, 2024, 51(10): 408-415.
[13] BING Ying’ao, WANG Wenting, SUN Shengze, LIU Xin, NIE Qigui, LIU Jing. Network Reliability Analysis of Power Monitoring System Based on Improved Fuzzy ComprehensiveEvaluation Method [J]. Computer Science, 2023, 50(6A): 220400293-7.
[14] YANG Pengfei, CAI Ruijie, GUO Shichen, LIU Shengli. Container-based Intrusion Detection Method for Cisco IOS-XE [J]. Computer Science, 2023, 50(4): 298-307.
[15] LI Haitao, WANG Ruimin, DONG Weiyu, JIANG Liehui. Semi-supervised Network Traffic Anomaly Detection Method Based on GRU [J]. Computer Science, 2023, 50(3): 380-390.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!