Identification Method of Power Internet Attack Information Based on Machine Learning

Show simple item record

dc.contributor.author Niu, Y.
dc.contributor.author Korneev, A.
dc.contributor.author Корнеев, А. П.
dc.date.accessioned 2022-05-30T08:08:43Z
dc.date.available 2022-05-30T08:08:43Z
dc.date.issued 2022
dc.identifier.citation Niu, Y. Identification Method of Power Internet Attack Information Based on Machine Learning / Y. Niu, А. Korneev // Iraqi Journal for Computer Science and Mathematics. - 2022. - Vol. 3. - No. 2. - Р. 1-7. DOI: https://doi.org/10.52866/ijcsm.2022.02.01.001 ru_RU
dc.identifier.uri http://e.biblio.bru.by/handle/1212121212/21753
dc.description.abstract To solve the problem of large recognition errors in traditional attack information identification methods, we propose a machine learning (ML)-based identification method for electric power Internet attack information. Based on the Internet attack information, an Internet attack information model is constructed, the identification principle of the power Internet attack information is analysed based on ML, hash fixing is conducted to ensure that the same attack information will be assigned to the same thread and that the deviation generated by noise can be avoided so that the real-time lossless processing of the power Internet attack information can be ensured. The vulnerability adjacency matrix is constructed, and the vulnerability is quantitatively evaluated to complete the design of the optimal identification scheme for power Internet attack information. The experimental results show that the identification accuracy of the method сan reach 98%, which can effectively reduce the risk of power Internet network attacks and ensure the safe and stable operation of the network. ru_RU
dc.language.iso en ru_RU
dc.subject Machine learning ru_RU
dc.subject Power Internet ru_RU
dc.subject Attack information ru_RU
dc.subject Recognition ru_RU
dc.subject Публикации кафедры "Электропривод и автоматизация промышленных установок" ru_RU
dc.title Identification Method of Power Internet Attack Information Based on Machine Learning ru_RU
dc.type Article ru_RU


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account