{"title":"可再生能源电力系统网络边界异常数据流检测","authors":"Zhang Lingkang, L. Yuwei, Jiang Xue","doi":"10.1109/AUTEEE50969.2020.9315697","DOIUrl":null,"url":null,"abstract":"As more and more renewable energy stations are built and access the power grid, the network security risks of renewable energy power systems are increasing. This paper analyzes the typical network attacks that renewable energy plants face and researches the network boundary abnormal data flow detection technology to realize the identification of potential threats and improve the level of network security protection for renewable energy power system.","PeriodicalId":6767,"journal":{"name":"2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE)","volume":"5 1","pages":"309-312"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Detection of Abnormal Data Flow at Network Boundary of Renewable Energy Power System\",\"authors\":\"Zhang Lingkang, L. Yuwei, Jiang Xue\",\"doi\":\"10.1109/AUTEEE50969.2020.9315697\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As more and more renewable energy stations are built and access the power grid, the network security risks of renewable energy power systems are increasing. This paper analyzes the typical network attacks that renewable energy plants face and researches the network boundary abnormal data flow detection technology to realize the identification of potential threats and improve the level of network security protection for renewable energy power system.\",\"PeriodicalId\":6767,\"journal\":{\"name\":\"2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE)\",\"volume\":\"5 1\",\"pages\":\"309-312\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AUTEEE50969.2020.9315697\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AUTEEE50969.2020.9315697","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection of Abnormal Data Flow at Network Boundary of Renewable Energy Power System
As more and more renewable energy stations are built and access the power grid, the network security risks of renewable energy power systems are increasing. This paper analyzes the typical network attacks that renewable energy plants face and researches the network boundary abnormal data flow detection technology to realize the identification of potential threats and improve the level of network security protection for renewable energy power system.