Academic Journal of Engineering and Technology Science, 2021, 4(8); doi: 10.25236/AJETS.2021.040802.
Jianxun Wang1, Jia Li1, Chi Zhang2
1Beijing GD Power New Energy Technology Col, Ltd, Chaoyang 100101, Beijing, China
2Beijing ZTXY Technology Co., Ltd, Chaoyang 100101, Beijing, China
With the electric power information network system has been popularized to all aspects of life, and its accompanying problems also come one after another, that is, its internal and external invasion ways are diversified, then the information security problems will affect the national econo-my, infrastructure and many other livelihood issues. On the one hand, the information security of power network needs the general characteristics of computer information security, while considering the characteristics of high security. According to the structure of power information network, this paper proposes an intrusion detection model to detect power information network, which uses both deep learning theory and cloud computing platform. This model not only uses parallel anomaly de-tection and misuse detection methods, but also can deal with the problem that a single misuse detec-tion model can't detect new attack variants. At the same time, it can capture a large number of data flows of power information network, learn and extract the essential characteristics of data flows through the deep feature learning and extraction ability of deep learning, and quickly and accurate-ly detect through the platform Invasion. Based on the analysis of all kinds of intrusion behaviors in power information network, this paper proposes a data extraction and analysis method based on Hadoop, which improves the accuracy of intrusion detection by analyzing massive captured data flow packets and generating characterization data. At the same time, considering the important factors affecting the detection of power information network intrusion feature selection, we study the auto-matic encoder algorithm using spark platform. According to the experimental results, it is found that this method can improve the feature selection of power intrusion detection system.
Power Information Network, Intrusion Detection, Cloud Computing, Deep Learning
Jianxun Wang, Jia Li, Chi Zhang. Intrusion Detection in Power Information Network Based on Deep Learning and Cloud Computing. Academic Journal of Engineering and Technology Science (2021) Vol. 4, Issue 8: 10-21. https://doi.org/10.25236/AJETS.2021.040802.
 Valenzuela J, Wang J, Bissinger N. Real-time intrusion detection in power system operations. IEEE transactions on Power Systems, 2013, 28(2): 1052-1062.
 Anderson James P. Computer security threat monitoring and surveil lance [R] Fort Washington, PA: James P. Anderson Co., 1980.
 Denning, Dorothy E.An intrusion detection mode. IEEE Transactions on Software Engineering (SE-13), 1987, 4(2):222-232.
 Lunt T. IDES: An intellingent system for detecting intruders [A]. In Proceedings of the Symposium: Computer Security, Threat and Counterneasures, 1990.
 GE Liepins, H S Vaccaro. Anomaly detection: purpose and framework[C]. In Proceedings of the 12th National Computer Security Conference, 1989, 10:494-504.
 Forrest S, HofmeyrS A, Somayaji A. Computer immunology. Communications of the ACCM, 1997, 40(10):88-96.
 Y.Bengio, A. Courville, P. Vincent, Representation learning: a review and new perspectives, IEEE Trans. Pattern Anal. Mach. Intell. 35(2013) 1978-1828.
 Asja Fischer, Christian Igel. An introduction to restricted Boltzmann machines, Lecture Notes in Computer Science, 2012:14-36.
 Kui Jia, Lin Sun. Laplacian Auto-Encoders: An explicit learning of nonlinear data manifold. Neurocomputing, 2014.10.16:1-1.
 Armbrust M, Fox A, Griffith R. A view of cloud computing. Communication of the ACM, 2010, 53(4):50-58.
 D. Song, E. Shi, l. Fischer, U. Shankar. Cloud data protection for the masses. IEEE Comput-er.2012, 45(1):39-45.
 Shao-Zi Li, Bin Yu. Feature learning based on SAE-PCA network for human gesture recognition in RGBD images. Neurocomputing 151 (2015) 565-573.
 Sascha Lange, Martin Riedmiller. Deep Auto-Encoder Neural networks in reinforcement learn-ing. IEEE Conference on Computer Vision and Pattern Recognition, 2010.
 Chelsea Finn, Xinyu Tan, Yan Duan, Trevor Darrell, Sergey Levine, Pieter Abbeel. Deep spatial autoencoders for visuomotor learning. arXiv preprint arXiv:1509.06113, 2015.
 R. Girshick, J. Donahue, T. Darrell, and J. Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. In OVPR, 2014.
 B. Zhou, A. Lapedriza, J. Xiao, A. Torralba, A. Oliva, Learning deep feature for scene recogni-tion using places database. Advances in Neural Information Processing Systems, 2015.
 Karpathy. A, Fei-fei. L, Deep visual-semantic alignments for generating image descriptions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015.
 J. Donahue, L.A. Hendricks, S. Guadarrama, M. Rohrbach. Long-term recurrent convolutional networks for visual recognition and description. In CVPR, 2015.
 Alex Krizhevsky, Ilya Sulskever, Geoffrey E. Hinton. Imagenet classification with deep convolu-tional neural networks. In Advances in Neural Information Processing Systems, 2013.
 M. D. Zeiler and R. Fergus. Visualizing and understanding convolutional networks. In ECCV, vol.8689:818-833, 2015.
 Y. LeCun, Y. Bengio, G. Hinton, Deep learning. Nature 521:436-444, 2015.
 C. Szegedy, et. al, Going deeper with convolutions. 2015.
 Kaiming. He, Xiangyu. Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition, 2016.
 Ronen Eldan and Ohad Shamir. The power of depth for feedforward neural networks. 2016.
 V. Mnih, Human-level control through deep reinforcement learning. Nature 518, 529-533, 2019.
 David Silver, Mastering the game of go with deep neural networks and tree search, Nature, 529:484-489, 2016.
 Sergey Levine, Chelsea Finn, Trevor Darrell and Pieter Abbeel. End-to-End Training of Deep Visuomotor Policies. 2016.
 S. Venugopalan, H. Xu, J. Donahue, M. Rohrbach, R. Mooney, K. Saenko, translating videos to natural language using deep recurrent neural networks. In NAACL, 2015.
 L. C. Chen, Y. Wang, J. Xu, Attention to scale: Scale-aware semantic image segmentation, 2015.
 X. Kelvin, L.B. Jimmy, K. Ryan, Attend and Tell: Neural image caption generation with visual attention, 2016.