Erxia Li , Zilong Han , Chaoqun Kang , Tao Yu , Yupeng Huang
{"title":"基于设备肖像的电力终端信任评估模型","authors":"Erxia Li , Zilong Han , Chaoqun Kang , Tao Yu , Yupeng Huang","doi":"10.1016/j.gloei.2023.11.009","DOIUrl":null,"url":null,"abstract":"<div><p>As the number of power terminals continues to increase and their usage becomes more widespread, the security of power systems is under great threat. In response to the lack of effective trust evaluation methods for terminals, we propose a trust evaluation model based on equipment portraits for power terminals. First, we propose an exception evaluation method based on the network flow order and evaluate anomalous terminals by monitoring the external characteristics of network traffic. Second, we propose an exception evaluation method based on syntax and semantics. The key fields of each message are extracted, and the frequency of keywords in the message is statistically analyzed to obtain the keyword frequency and time-slot threshold for evaluating the status of the terminal. Thus, by combining the network flow order, syntax, and semantic analysis, an equipment portrait can be constructed to guarantee security of the power network terminals. We then propose a trust evaluation method based on an equipment portrait to calculate the trust values in real time. Finally, the experimental results of terminal anomaly detection show that the proposed model has a higher detection rate and lower false detection rate, as well as a higher real-time performance, which is more suitable for power terminals.</p></div>","PeriodicalId":36174,"journal":{"name":"Global Energy Interconnection","volume":"6 6","pages":"Pages 758-771"},"PeriodicalIF":1.9000,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2096511723001007/pdf?md5=12f2b9254d3852893f7134e253a8708f&pid=1-s2.0-S2096511723001007-main.pdf","citationCount":"0","resultStr":"{\"title\":\"Trust evaluation model of power terminal based on equipment portrait\",\"authors\":\"Erxia Li , Zilong Han , Chaoqun Kang , Tao Yu , Yupeng Huang\",\"doi\":\"10.1016/j.gloei.2023.11.009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>As the number of power terminals continues to increase and their usage becomes more widespread, the security of power systems is under great threat. In response to the lack of effective trust evaluation methods for terminals, we propose a trust evaluation model based on equipment portraits for power terminals. First, we propose an exception evaluation method based on the network flow order and evaluate anomalous terminals by monitoring the external characteristics of network traffic. Second, we propose an exception evaluation method based on syntax and semantics. The key fields of each message are extracted, and the frequency of keywords in the message is statistically analyzed to obtain the keyword frequency and time-slot threshold for evaluating the status of the terminal. Thus, by combining the network flow order, syntax, and semantic analysis, an equipment portrait can be constructed to guarantee security of the power network terminals. We then propose a trust evaluation method based on an equipment portrait to calculate the trust values in real time. Finally, the experimental results of terminal anomaly detection show that the proposed model has a higher detection rate and lower false detection rate, as well as a higher real-time performance, which is more suitable for power terminals.</p></div>\",\"PeriodicalId\":36174,\"journal\":{\"name\":\"Global Energy Interconnection\",\"volume\":\"6 6\",\"pages\":\"Pages 758-771\"},\"PeriodicalIF\":1.9000,\"publicationDate\":\"2023-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2096511723001007/pdf?md5=12f2b9254d3852893f7134e253a8708f&pid=1-s2.0-S2096511723001007-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Global Energy Interconnection\",\"FirstCategoryId\":\"1087\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2096511723001007\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"ENERGY & FUELS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Global Energy Interconnection","FirstCategoryId":"1087","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2096511723001007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENERGY & FUELS","Score":null,"Total":0}
Trust evaluation model of power terminal based on equipment portrait
As the number of power terminals continues to increase and their usage becomes more widespread, the security of power systems is under great threat. In response to the lack of effective trust evaluation methods for terminals, we propose a trust evaluation model based on equipment portraits for power terminals. First, we propose an exception evaluation method based on the network flow order and evaluate anomalous terminals by monitoring the external characteristics of network traffic. Second, we propose an exception evaluation method based on syntax and semantics. The key fields of each message are extracted, and the frequency of keywords in the message is statistically analyzed to obtain the keyword frequency and time-slot threshold for evaluating the status of the terminal. Thus, by combining the network flow order, syntax, and semantic analysis, an equipment portrait can be constructed to guarantee security of the power network terminals. We then propose a trust evaluation method based on an equipment portrait to calculate the trust values in real time. Finally, the experimental results of terminal anomaly detection show that the proposed model has a higher detection rate and lower false detection rate, as well as a higher real-time performance, which is more suitable for power terminals.