Yizhen Sun, Qiyao Li, Jun Gao, Zheng Tian, Zhongwei Chen, Zehua He
{"title":"基于机器学习的电力物联网网络安全监测","authors":"Yizhen Sun, Qiyao Li, Jun Gao, Zheng Tian, Zhongwei Chen, Zehua He","doi":"10.1109/ICSCDE54196.2021.00050","DOIUrl":null,"url":null,"abstract":"The paper designs a new cyber-security monitoring of power Internet of Things based on learning. First, the paper analyzes the characteristics and application scenarios of terminal equipment, and designs the overall structure of network security monitoring based on machine learning method; then the flow model based on Power lot Protocol and the service intrusion detection model of Power lot platform are proposed to realize the intrusion detection function of power lot. Finally, the experiment results show that cyber-security monitoring of power Internet of Things based on machine learning achieves better results.","PeriodicalId":208108,"journal":{"name":"2021 International Conference of Social Computing and Digital Economy (ICSCDE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"IddCyber-security Monitoring of Power Internet of Things based on Machine Learning\",\"authors\":\"Yizhen Sun, Qiyao Li, Jun Gao, Zheng Tian, Zhongwei Chen, Zehua He\",\"doi\":\"10.1109/ICSCDE54196.2021.00050\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper designs a new cyber-security monitoring of power Internet of Things based on learning. First, the paper analyzes the characteristics and application scenarios of terminal equipment, and designs the overall structure of network security monitoring based on machine learning method; then the flow model based on Power lot Protocol and the service intrusion detection model of Power lot platform are proposed to realize the intrusion detection function of power lot. Finally, the experiment results show that cyber-security monitoring of power Internet of Things based on machine learning achieves better results.\",\"PeriodicalId\":208108,\"journal\":{\"name\":\"2021 International Conference of Social Computing and Digital Economy (ICSCDE)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference of Social Computing and Digital Economy (ICSCDE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCDE54196.2021.00050\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference of Social Computing and Digital Economy (ICSCDE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCDE54196.2021.00050","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
IddCyber-security Monitoring of Power Internet of Things based on Machine Learning
The paper designs a new cyber-security monitoring of power Internet of Things based on learning. First, the paper analyzes the characteristics and application scenarios of terminal equipment, and designs the overall structure of network security monitoring based on machine learning method; then the flow model based on Power lot Protocol and the service intrusion detection model of Power lot platform are proposed to realize the intrusion detection function of power lot. Finally, the experiment results show that cyber-security monitoring of power Internet of Things based on machine learning achieves better results.