Research on Attack Identification Method and Device Method Based on Random Forest Algorithm
Because the energy storage system has the function of stabilizing the voltage and frequency of the grid, when the energy storage system is connected to the grid, it is necessary to obtain its operating status information in a timely and accurate manner. The operating status data of the energy storag...
Gespeichert in:
Veröffentlicht in: | Journal of physics. Conference series 2020-09, Vol.1646 (1), p.12012 |
---|---|
Hauptverfasser: | , , , , , , , , , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 1 |
container_start_page | 12012 |
container_title | Journal of physics. Conference series |
container_volume | 1646 |
creator | Yu, Yang Xiao, Shengyuan Chen, Rui Du, Yu Ding, Kai Zhu, Xiaofan Zhou, Guoqi He, Shengguo He, Hongyan Huang, Zhiwei Gao, Xiaoquan Yao, Hao Xi, Wei Xian, Qing Fu, Yang Ding, Qing |
description | Because the energy storage system has the function of stabilizing the voltage and frequency of the grid, when the energy storage system is connected to the grid, it is necessary to obtain its operating status information in a timely and accurate manner. The operating status data of the energy storage system is uploaded to the higher-level dispatch center via the energy storage coordination control device. However, with the intelligence and informationization of the power grid, various cyber attack methods have emerged endlessly. There are various security risks in the way of information interaction based on the network. Attackers can analyze the communication protocols within them, or implement Eavesdropping attacks, Dos attacks, and tampering with sensitive data, etc., causing the energy storage coordination control device to obtain the wrong data sent by the dispatch center. The wrong data causes the energy storage system to output the wrong power, which may have the opposite effect when adjusting the voltage and frequency of the power grid, causing an imbalance in the voltage and frequency of the power grid, resulting in great economic losses, and even causing casualties due to equipment failure. Attackers can also gradually invade the upper-level dispatch center by using the energy storage coordination control device as a springboard. In view of the above problems, this paper uses a random forest-based network attack detection module is used to make real-time judgments on all data flows of the energy storage coordination control device. That is, when the energy storage coordination control device is subjected to a network attack, all data flows of the energy storage coordination control device pass a trained random forest attack detection model, thereby implementing attack detection on real-time data flows. |
doi_str_mv | 10.1088/1742-6596/1646/1/012012 |
format | Article |
fullrecord | <record><control><sourceid>proquest_iop_j</sourceid><recordid>TN_cdi_proquest_journals_2612081340</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2612081340</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2742-778041c7ce3558c0a6e44d14f382dcc57648bd87cf90427489cfd161c8afef053</originalsourceid><addsrcrecordid>eNqFkN1KAzEQhYMoWKvPYMA7oTbZzSbpZa1WKxWl6pUXIebHbm032yQVfHuzrFYEwRAyYeacmeED4BijM4w472NGsh4tBrSPKUlPH-Es3R3Q2VZ2t3_O98FBCAuE8nRYBzzPTDDSqzl0FRzGKNUbnGhTxdKWSsYyZW9NnDsNZaXhhXkvlfnOnMtgdOObpZpbwbHzJkQ4XL46X8b56hDsWbkM5ugrdsHT-PJxdN2b3l1NRsNpT2XNVoxxRLBiyuRFwRWS1BCiMbE5z7RSBaOEv2jOlB0gkhx8oKzGFCsurbGoyLvgpO1be7fepBXEwm18lUaKjCYYHOcEJRVrVcq7ELyxovblSvoPgZFoSIqGkWh4iYakwKIlmZynrbN09U_rm_vRw2-hqLVN4vwP8X8jPgHTL4HQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2612081340</pqid></control><display><type>article</type><title>Research on Attack Identification Method and Device Method Based on Random Forest Algorithm</title><source>IOP Publishing Free Content</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>IOPscience extra</source><source>Alma/SFX Local Collection</source><source>Free Full-Text Journals in Chemistry</source><creator>Yu, Yang ; Xiao, Shengyuan ; Chen, Rui ; Du, Yu ; Ding, Kai ; Zhu, Xiaofan ; Zhou, Guoqi ; He, Shengguo ; He, Hongyan ; Huang, Zhiwei ; Gao, Xiaoquan ; Yao, Hao ; Xi, Wei ; Xian, Qing ; Fu, Yang ; Ding, Qing</creator><creatorcontrib>Yu, Yang ; Xiao, Shengyuan ; Chen, Rui ; Du, Yu ; Ding, Kai ; Zhu, Xiaofan ; Zhou, Guoqi ; He, Shengguo ; He, Hongyan ; Huang, Zhiwei ; Gao, Xiaoquan ; Yao, Hao ; Xi, Wei ; Xian, Qing ; Fu, Yang ; Ding, Qing</creatorcontrib><description>Because the energy storage system has the function of stabilizing the voltage and frequency of the grid, when the energy storage system is connected to the grid, it is necessary to obtain its operating status information in a timely and accurate manner. The operating status data of the energy storage system is uploaded to the higher-level dispatch center via the energy storage coordination control device. However, with the intelligence and informationization of the power grid, various cyber attack methods have emerged endlessly. There are various security risks in the way of information interaction based on the network. Attackers can analyze the communication protocols within them, or implement Eavesdropping attacks, Dos attacks, and tampering with sensitive data, etc., causing the energy storage coordination control device to obtain the wrong data sent by the dispatch center. The wrong data causes the energy storage system to output the wrong power, which may have the opposite effect when adjusting the voltage and frequency of the power grid, causing an imbalance in the voltage and frequency of the power grid, resulting in great economic losses, and even causing casualties due to equipment failure. Attackers can also gradually invade the upper-level dispatch center by using the energy storage coordination control device as a springboard. In view of the above problems, this paper uses a random forest-based network attack detection module is used to make real-time judgments on all data flows of the energy storage coordination control device. That is, when the energy storage coordination control device is subjected to a network attack, all data flows of the energy storage coordination control device pass a trained random forest attack detection model, thereby implementing attack detection on real-time data flows.</description><identifier>ISSN: 1742-6588</identifier><identifier>EISSN: 1742-6596</identifier><identifier>DOI: 10.1088/1742-6596/1646/1/012012</identifier><language>eng</language><publisher>Bristol: IOP Publishing</publisher><subject>Algorithms ; Casualties ; Control equipment ; Coordination ; Cybersecurity ; Eavesdropping ; Economic impact ; Electric potential ; Electric power grids ; Energy storage ; Identification methods ; Physics ; Real time ; Voltage</subject><ispartof>Journal of physics. Conference series, 2020-09, Vol.1646 (1), p.12012</ispartof><rights>Published under licence by IOP Publishing Ltd</rights><rights>2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c2742-778041c7ce3558c0a6e44d14f382dcc57648bd87cf90427489cfd161c8afef053</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://iopscience.iop.org/article/10.1088/1742-6596/1646/1/012012/pdf$$EPDF$$P50$$Giop$$Hfree_for_read</linktopdf><link.rule.ids>314,776,780,27901,27902,38845,38867,53815,53842</link.rule.ids></links><search><creatorcontrib>Yu, Yang</creatorcontrib><creatorcontrib>Xiao, Shengyuan</creatorcontrib><creatorcontrib>Chen, Rui</creatorcontrib><creatorcontrib>Du, Yu</creatorcontrib><creatorcontrib>Ding, Kai</creatorcontrib><creatorcontrib>Zhu, Xiaofan</creatorcontrib><creatorcontrib>Zhou, Guoqi</creatorcontrib><creatorcontrib>He, Shengguo</creatorcontrib><creatorcontrib>He, Hongyan</creatorcontrib><creatorcontrib>Huang, Zhiwei</creatorcontrib><creatorcontrib>Gao, Xiaoquan</creatorcontrib><creatorcontrib>Yao, Hao</creatorcontrib><creatorcontrib>Xi, Wei</creatorcontrib><creatorcontrib>Xian, Qing</creatorcontrib><creatorcontrib>Fu, Yang</creatorcontrib><creatorcontrib>Ding, Qing</creatorcontrib><title>Research on Attack Identification Method and Device Method Based on Random Forest Algorithm</title><title>Journal of physics. Conference series</title><addtitle>J. Phys.: Conf. Ser</addtitle><description>Because the energy storage system has the function of stabilizing the voltage and frequency of the grid, when the energy storage system is connected to the grid, it is necessary to obtain its operating status information in a timely and accurate manner. The operating status data of the energy storage system is uploaded to the higher-level dispatch center via the energy storage coordination control device. However, with the intelligence and informationization of the power grid, various cyber attack methods have emerged endlessly. There are various security risks in the way of information interaction based on the network. Attackers can analyze the communication protocols within them, or implement Eavesdropping attacks, Dos attacks, and tampering with sensitive data, etc., causing the energy storage coordination control device to obtain the wrong data sent by the dispatch center. The wrong data causes the energy storage system to output the wrong power, which may have the opposite effect when adjusting the voltage and frequency of the power grid, causing an imbalance in the voltage and frequency of the power grid, resulting in great economic losses, and even causing casualties due to equipment failure. Attackers can also gradually invade the upper-level dispatch center by using the energy storage coordination control device as a springboard. In view of the above problems, this paper uses a random forest-based network attack detection module is used to make real-time judgments on all data flows of the energy storage coordination control device. That is, when the energy storage coordination control device is subjected to a network attack, all data flows of the energy storage coordination control device pass a trained random forest attack detection model, thereby implementing attack detection on real-time data flows.</description><subject>Algorithms</subject><subject>Casualties</subject><subject>Control equipment</subject><subject>Coordination</subject><subject>Cybersecurity</subject><subject>Eavesdropping</subject><subject>Economic impact</subject><subject>Electric potential</subject><subject>Electric power grids</subject><subject>Energy storage</subject><subject>Identification methods</subject><subject>Physics</subject><subject>Real time</subject><subject>Voltage</subject><issn>1742-6588</issn><issn>1742-6596</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>O3W</sourceid><sourceid>BENPR</sourceid><recordid>eNqFkN1KAzEQhYMoWKvPYMA7oTbZzSbpZa1WKxWl6pUXIebHbm032yQVfHuzrFYEwRAyYeacmeED4BijM4w472NGsh4tBrSPKUlPH-Es3R3Q2VZ2t3_O98FBCAuE8nRYBzzPTDDSqzl0FRzGKNUbnGhTxdKWSsYyZW9NnDsNZaXhhXkvlfnOnMtgdOObpZpbwbHzJkQ4XL46X8b56hDsWbkM5ugrdsHT-PJxdN2b3l1NRsNpT2XNVoxxRLBiyuRFwRWS1BCiMbE5z7RSBaOEv2jOlB0gkhx8oKzGFCsurbGoyLvgpO1be7fepBXEwm18lUaKjCYYHOcEJRVrVcq7ELyxovblSvoPgZFoSIqGkWh4iYakwKIlmZynrbN09U_rm_vRw2-hqLVN4vwP8X8jPgHTL4HQ</recordid><startdate>20200901</startdate><enddate>20200901</enddate><creator>Yu, Yang</creator><creator>Xiao, Shengyuan</creator><creator>Chen, Rui</creator><creator>Du, Yu</creator><creator>Ding, Kai</creator><creator>Zhu, Xiaofan</creator><creator>Zhou, Guoqi</creator><creator>He, Shengguo</creator><creator>He, Hongyan</creator><creator>Huang, Zhiwei</creator><creator>Gao, Xiaoquan</creator><creator>Yao, Hao</creator><creator>Xi, Wei</creator><creator>Xian, Qing</creator><creator>Fu, Yang</creator><creator>Ding, Qing</creator><general>IOP Publishing</general><scope>O3W</scope><scope>TSCCA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>H8D</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20200901</creationdate><title>Research on Attack Identification Method and Device Method Based on Random Forest Algorithm</title><author>Yu, Yang ; Xiao, Shengyuan ; Chen, Rui ; Du, Yu ; Ding, Kai ; Zhu, Xiaofan ; Zhou, Guoqi ; He, Shengguo ; He, Hongyan ; Huang, Zhiwei ; Gao, Xiaoquan ; Yao, Hao ; Xi, Wei ; Xian, Qing ; Fu, Yang ; Ding, Qing</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2742-778041c7ce3558c0a6e44d14f382dcc57648bd87cf90427489cfd161c8afef053</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Casualties</topic><topic>Control equipment</topic><topic>Coordination</topic><topic>Cybersecurity</topic><topic>Eavesdropping</topic><topic>Economic impact</topic><topic>Electric potential</topic><topic>Electric power grids</topic><topic>Energy storage</topic><topic>Identification methods</topic><topic>Physics</topic><topic>Real time</topic><topic>Voltage</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yu, Yang</creatorcontrib><creatorcontrib>Xiao, Shengyuan</creatorcontrib><creatorcontrib>Chen, Rui</creatorcontrib><creatorcontrib>Du, Yu</creatorcontrib><creatorcontrib>Ding, Kai</creatorcontrib><creatorcontrib>Zhu, Xiaofan</creatorcontrib><creatorcontrib>Zhou, Guoqi</creatorcontrib><creatorcontrib>He, Shengguo</creatorcontrib><creatorcontrib>He, Hongyan</creatorcontrib><creatorcontrib>Huang, Zhiwei</creatorcontrib><creatorcontrib>Gao, Xiaoquan</creatorcontrib><creatorcontrib>Yao, Hao</creatorcontrib><creatorcontrib>Xi, Wei</creatorcontrib><creatorcontrib>Xian, Qing</creatorcontrib><creatorcontrib>Fu, Yang</creatorcontrib><creatorcontrib>Ding, Qing</creatorcontrib><collection>IOP Publishing Free Content</collection><collection>IOPscience (Open Access)</collection><collection>CrossRef</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Aerospace Database</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Journal of physics. Conference series</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yu, Yang</au><au>Xiao, Shengyuan</au><au>Chen, Rui</au><au>Du, Yu</au><au>Ding, Kai</au><au>Zhu, Xiaofan</au><au>Zhou, Guoqi</au><au>He, Shengguo</au><au>He, Hongyan</au><au>Huang, Zhiwei</au><au>Gao, Xiaoquan</au><au>Yao, Hao</au><au>Xi, Wei</au><au>Xian, Qing</au><au>Fu, Yang</au><au>Ding, Qing</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Research on Attack Identification Method and Device Method Based on Random Forest Algorithm</atitle><jtitle>Journal of physics. Conference series</jtitle><addtitle>J. Phys.: Conf. Ser</addtitle><date>2020-09-01</date><risdate>2020</risdate><volume>1646</volume><issue>1</issue><spage>12012</spage><pages>12012-</pages><issn>1742-6588</issn><eissn>1742-6596</eissn><abstract>Because the energy storage system has the function of stabilizing the voltage and frequency of the grid, when the energy storage system is connected to the grid, it is necessary to obtain its operating status information in a timely and accurate manner. The operating status data of the energy storage system is uploaded to the higher-level dispatch center via the energy storage coordination control device. However, with the intelligence and informationization of the power grid, various cyber attack methods have emerged endlessly. There are various security risks in the way of information interaction based on the network. Attackers can analyze the communication protocols within them, or implement Eavesdropping attacks, Dos attacks, and tampering with sensitive data, etc., causing the energy storage coordination control device to obtain the wrong data sent by the dispatch center. The wrong data causes the energy storage system to output the wrong power, which may have the opposite effect when adjusting the voltage and frequency of the power grid, causing an imbalance in the voltage and frequency of the power grid, resulting in great economic losses, and even causing casualties due to equipment failure. Attackers can also gradually invade the upper-level dispatch center by using the energy storage coordination control device as a springboard. In view of the above problems, this paper uses a random forest-based network attack detection module is used to make real-time judgments on all data flows of the energy storage coordination control device. That is, when the energy storage coordination control device is subjected to a network attack, all data flows of the energy storage coordination control device pass a trained random forest attack detection model, thereby implementing attack detection on real-time data flows.</abstract><cop>Bristol</cop><pub>IOP Publishing</pub><doi>10.1088/1742-6596/1646/1/012012</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1742-6588 |
ispartof | Journal of physics. Conference series, 2020-09, Vol.1646 (1), p.12012 |
issn | 1742-6588 1742-6596 |
language | eng |
recordid | cdi_proquest_journals_2612081340 |
source | IOP Publishing Free Content; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; IOPscience extra; Alma/SFX Local Collection; Free Full-Text Journals in Chemistry |
subjects | Algorithms Casualties Control equipment Coordination Cybersecurity Eavesdropping Economic impact Electric potential Electric power grids Energy storage Identification methods Physics Real time Voltage |
title | Research on Attack Identification Method and Device Method Based on Random Forest Algorithm |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T09%3A00%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_iop_j&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Research%20on%20Attack%20Identification%20Method%20and%20Device%20Method%20Based%20on%20Random%20Forest%20Algorithm&rft.jtitle=Journal%20of%20physics.%20Conference%20series&rft.au=Yu,%20Yang&rft.date=2020-09-01&rft.volume=1646&rft.issue=1&rft.spage=12012&rft.pages=12012-&rft.issn=1742-6588&rft.eissn=1742-6596&rft_id=info:doi/10.1088/1742-6596/1646/1/012012&rft_dat=%3Cproquest_iop_j%3E2612081340%3C/proquest_iop_j%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2612081340&rft_id=info:pmid/&rfr_iscdi=true |