CN105930724A - Intrusion detection method on basis of big data for intelligent electric meters - Google Patents

Intrusion detection method on basis of big data for intelligent electric meters Download PDF

Info

Publication number
CN105930724A
CN105930724A CN201610429718.1A CN201610429718A CN105930724A CN 105930724 A CN105930724 A CN 105930724A CN 201610429718 A CN201610429718 A CN 201610429718A CN 105930724 A CN105930724 A CN 105930724A
Authority
CN
China
Prior art keywords
data
intelligent electric
power
electric
cpu load
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610429718.1A
Other languages
Chinese (zh)
Inventor
黄麒元
朱俊
王致杰
周泽坤
王鸿
王浩清
王东伟
杜彬
吕金都
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Dianji University
Original Assignee
Shanghai Dianji University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Dianji University filed Critical Shanghai Dianji University
Priority to CN201610429718.1A priority Critical patent/CN105930724A/en
Publication of CN105930724A publication Critical patent/CN105930724A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Abstract

The invention discloses an intrusion detection method on the basis of big data for intelligent electric meters. The intrusion detection method includes steps of 1, regularly collecting data of CPU (central processing unit) load rates, communication flow, currents, voltages, power factors, power and electric quantity rates and uploading the data to electric power utilization databases; 2, extracting data of CUP load rates and communication flow of the same types of electric meters from the electric power utilization databases and unloading the extracted data to electric power utilization management centers; 3, enabling the electric power utilization management centers to compute standard deviation and root-mean-square errors by the aid of the CPU load rates and the communication flow in selected later collected data and the selected original stored data, selecting anomaly thresholds according to statistic characteristics and identifying the intelligent electric meters which exceed the thresholds. The data of the CPU load rates, the communication flow, the currents, the voltages, the power factors, the power and the electric quantity rates are recorded by the intelligent electric meters of users. Historical data stored in the electric power utilization databases contain electric quantity measurement data of CPU load rates, communication flow, currents, voltages, power factors, power, electric quantity rates and the like corresponding to the various intelligent electric meters in original normal running periods. The electric meters of which the data of the CUP load rates and the communication flow are extracted at the step 2 are manufactured by the same manufacturers.

Description

A kind of intelligent electric meter intrusion detection method based on big data
Technical field
The invention belongs to intelligent power grid technology field, particularly to a kind of intelligence based on big data Can ammeter intrusion detection method.
Background technology
Traditional energy day by day shortage and problem of environmental pollution are the most seriously that human society is persistently sent out The ultimate challenge that exhibition is faced.For solving energy crisis and environmental problem, can effect technique, can The various low-carbon technologies such as renewable sources of energy technology, novel traffic technology are fast-developing, and will obtain Large-scale application.The large-scale application of various low-carbon technologies is concentrated mainly on development of renewable energy Electricity and terminal use's aspect, make the Generation Side of tradition electrical network and user side characteristic there occurs great Change, and bring new challenge to defeated, the development of power distribution network and safe operation.So Its development under, the concept of intelligent grid is arisen at the historic moment, and obtains wide in the world General approval, becomes the common development trend of world power industry.
Meanwhile, as the terminal of intelligent grid, intelligent electric meter is close with the daily life of user Cut is closed, and is the solid bridge between electrical network and user.Intelligent electric meter record and transmission electricity consumption The sensitive informations such as rate, belong to the high pay-off target of network attack, and some disabled user can steal Take user profile or distort electricity consumption data, causing grid company analysis decision mistake and use Family and the direct economic loss of grid company.Therefore be badly in need of a kind of Intrusion Detection Technique prevent through The loss of Ji and the generation of fault.
Intrusion detection is according to certain rule or statistical analysis, by computer system or network In some key points collect and analytical auditing record, security log, user behavior and network Whether the information such as packet, check currently to exist in network or system and violate entering of security strategy Invade behavior and the sign being hacked.
Mass data support under, the every field of scientific research all occur in that from test-type, Theoretical type, calculation type scientific discovery develop to data-intensive scientific discoveries based on big data New normal form.Power system the most just has data-intensive feature, and user classifies, bears The data analysing methods such as lotus prediction and fail-safe analysis have permanent popularizing in power industry Application.In the last few years, the enforcement built along with intelligent grid and intelligent sensing equipment a large amount of Installing and using, popularizing of the most senior measurement system, Utilities Electric Co. obtains unprecedented The data of extensive number.Intelligent electric meter is recordable can be used as security audit and invasion inspection in a large number The secure data surveyed, utilizes this characteristic, can be from the angle of big data statistics for using Power information security protection provides new thinking.
A kind of monitoring technology monitoring object existed is to occupy upper strata in system Server and data acquisition unit, and the intelligent electric meter occuping bottom is multi-point and wide-ranging because of it, calculates, Poke and limited communications resources, it is difficult to provide the security audit data needed for intrusion detection, still It is in the state lacking monitoring.
Summary of the invention
It is an object of the invention to provide a kind of intelligent electric meter intrusion detection side based on big data Method.
The technical scheme is that, a kind of intelligent electric meter intrusion detection sides based on big data Method, including step:
Step 1, the cpu load rate of periodic collection user's intelligent electric meter record, communication flows, electric current, Voltage, power factor, power and electricity tariff data, be uploaded to electricity consumption database, electricity consumption number Historical data according to storehouse storage inside include corresponding with each intelligent electric meter original The cpu load rate in properly functioning period, communication flows, electric current, voltage, power factor, The electrical measurement data such as power and electricity rate;
Step 2, extracts same producer, same model ammeter cpu load rate from electricity consumption database and communicates Data on flows, and the data these extracted upload to management of power use center;
Step 3, management of power use center utilizes the later stage selected to collect in data and original stored data Cpu load rate and communication flows, calculate standard deviation and root-mean-square error, further according to statistics Characteristic selects outlier threshold, identifies the intelligent electric meter of exceeded threshold;
Step 4, retrieval cpu load rate or communication flows are higher than setting threshold value intelligent electric meter Check meter address, confirm the position of ammeter according to the stoichiometric point numbering of association.
The present invention, on the basis of existing power information acquisition system, utilizes embedded operation system The cpu load rate of system offer and communication flows query function, set up CPU in intelligent electric meter Rate of load condensate and communication flows inspection software module;Then using the data of detection as security audit Data, transmit to management of power use center together with original electrical measurement data;Again by exception Detecting system arranges abnormality detection threshold according to the statistical property of same producer same model mass data Value, by the lateral comparison between ammeter, or according to single ammeter on a timeline longitudinally Change, identify exception table meter.Institute's extracting method is without installing and updating disease on intelligent electric meter Poison inspection software, only need to according to the cpu load rate of intelligent electric meter and communication flows laterally and Longitudinal comparison differentiates, is not affected with approach by poisoning intrusion mode, can be at intelligent electric meter The basic need of its protecting information safety are met under limited computing capability and communication bandwidth constraint Ask.For exploring new applications based on big data, the value-rising of excavation mass data provides Solid foundation.
Accompanying drawing explanation
Fig. 1 is intelligent electric meter intrusion detection method flow processs based on big data in the embodiment of the present invention Figure.
Detailed description of the invention
The principle that realizes of the present invention is, for novel intelligent based on chip development such as ARM electricity For table, because of same model table meter function fix, software and hardware configuration identical, cpu busy percentage base This is consistent, and communication flows is because of the communication media bit error rate difference, but the most very close.Right For general computer system, cpu busy percentage rises and network traffic is extremely Suffer modal sign after malicious intrusions.For intelligent electric meter, same.
Utilize the feature that after suffering Malware invasion, CPU computational load and communication flows increase, Firstly for having the intelligent electric meter of embedded OS, increase cpu load therein Rate and the software detection module of communication flows, utilize Linux embedded OS to provide The interface functions such as Mrtg or Uptime, periodic collection cpu load rate and communication flows number According to, by these data and the electric current of intelligent electric meter internal gathering, voltage, power factor, merit Rate uploads to electricity consumption database together with electricity tariff data, the storage of electricity consumption data store internal Historical data has included the original properly functioning period corresponding with each intelligent electric meter Cpu load rate, communication flows, electric current, voltage, power factor, power and electricity take The electrical measurement data such as rate, these can be just whether detection intelligent electric meter entered by Malware Offer security audit data are provided.
Secondly because different manufacturers, the hardware configuration of different model intelligent electric meter and software function are each Variant, in order to avoid the degree of accuracy of this differentia influence intrusion detection, management of power use center Abnormality detection system the most all extracts same producer, same model intelligent electric meter from electricity consumption database Cpu busy percentage and communication flows data, and the data these extracted upload to electricity consumption Administrative center.Management of power use center utilizes the later stage selected to collect data and original stored data In cpu busy percentage and communication flows calculate the statistics such as their standard deviation and root-mean-square error Index, selects specific threshold further according to statistical property, identifies the intelligent electric meter of exceeded threshold.
Then retrieval cpu load rate or communication flows are higher than setting threshold value intelligent electric meter Check meter address, confirm the position of ammeter according to the stoichiometric point numbering of association.In the ordinary course of things, The user that contact staff passes through phone, mobile phone is corresponding with internet remote guide checks and gets rid of Malware, can also use internet works software to carry out remote assistance to improve efficiency, side User unversed to computer is helped to put the axe in the helve.If utilizing mobile terminal and internet end all In the case of cannot solving customer problem, it is necessary for sending contact staff to visit inspection Intelligent electric Table and catch Malware.
Finally for confirming problematic intelligent electric meter, it is taken off from user's family and profit It is contained in home position, it is ensured that subscriber household normal electricity consumption with standby ammeter.Then by problem electricity Watchband goes back to company and analyses in depth its characteristic of malware code, for further further exploration for intelligence Route of transmission and the attack mode of the similar Malware of energy ammeter lay the foundation.In understanding During learn, then according to its mechanism of action specify countermeasure for such Malware, Must open thought, each side leak under attack may be considered that comprehensively, maximum to the greatest extent is exerted Try hard to avoid and exempt from security incident and economic loss.

Claims (1)

1. an intelligent electric meter intrusion detection method based on big data, it is characterised in that include step Rapid:
Step 1, the cpu load rate of periodic collection user's intelligent electric meter record, communication flows, electric current, Voltage, power factor, power and electricity tariff data, be uploaded to electricity consumption database, electricity consumption number Historical data according to storehouse storage inside include corresponding with each intelligent electric meter original The cpu load rate in properly functioning period, communication flows, electric current, voltage, power factor, The electrical measurement data such as power and electricity rate;
Step 2, extracts same producer, same model ammeter cpu load rate from electricity consumption database and communicates Data on flows, and the data these extracted upload to management of power use center;
Step 3, management of power use center utilizes the later stage selected to collect in data and original stored data Cpu load rate and communication flows, calculate standard deviation and root-mean-square error, further according to statistics Characteristic selects threshold value, identifies the intelligent electric meter of exceeded threshold;
Step 4, retrieval cpu load rate or communication flows are higher than the intelligent electric meter of setting threshold value Check meter address, confirm the position of ammeter according to the stoichiometric point numbering of association.
CN201610429718.1A 2016-06-16 2016-06-16 Intrusion detection method on basis of big data for intelligent electric meters Pending CN105930724A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610429718.1A CN105930724A (en) 2016-06-16 2016-06-16 Intrusion detection method on basis of big data for intelligent electric meters

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610429718.1A CN105930724A (en) 2016-06-16 2016-06-16 Intrusion detection method on basis of big data for intelligent electric meters

Publications (1)

Publication Number Publication Date
CN105930724A true CN105930724A (en) 2016-09-07

Family

ID=56830913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610429718.1A Pending CN105930724A (en) 2016-06-16 2016-06-16 Intrusion detection method on basis of big data for intelligent electric meters

Country Status (1)

Country Link
CN (1) CN105930724A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111797436A (en) * 2020-09-10 2020-10-20 深圳华工能源技术有限公司 Energy-saving data counterfeiting identification method for energy-saving equipment of power distribution and utilization system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120144486A1 (en) * 2010-12-07 2012-06-07 Mcafee, Inc. Method and system for protecting against unknown malicious activities by detecting a heap spray attack on an electronic device
CN103457791A (en) * 2013-08-19 2013-12-18 国家电网公司 Self-diagnosis method of network sampling and control link of intelligent substation
CN104239186A (en) * 2014-09-30 2014-12-24 陈凤 Intelligent electric meter virus detection method based on load rate of CPU

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120144486A1 (en) * 2010-12-07 2012-06-07 Mcafee, Inc. Method and system for protecting against unknown malicious activities by detecting a heap spray attack on an electronic device
CN103457791A (en) * 2013-08-19 2013-12-18 国家电网公司 Self-diagnosis method of network sampling and control link of intelligent substation
CN104239186A (en) * 2014-09-30 2014-12-24 陈凤 Intelligent electric meter virus detection method based on load rate of CPU

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李志强等: ""基于大数据的智能电表入侵检测方法"", 《电力科学与技术学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111797436A (en) * 2020-09-10 2020-10-20 深圳华工能源技术有限公司 Energy-saving data counterfeiting identification method for energy-saving equipment of power distribution and utilization system
CN111797436B (en) * 2020-09-10 2020-12-25 深圳华工能源技术有限公司 Energy-saving data counterfeiting identification method for energy-saving equipment of power distribution and utilization system

Similar Documents

Publication Publication Date Title
Jaradat et al. The internet of energy: smart sensor networks and big data management for smart grid
Trakas et al. Spatial risk analysis of power systems resilience during extreme events
CN105426980B (en) Power distribution network health index assessment engineering application system
Kang et al. Big data analytics in China's electric power industry: modern information, communication technologies, and millions of smart meters
CN115063058B (en) Comprehensive energy situation perception system based on model driving and data driving
Jokar et al. Intrusion detection in advanced metering infrastructure based on consumption pattern
CN103198139A (en) Energy consumption analyzing method of user electricity data
Shobol et al. Overview of big data in smart grid
CN117132025A (en) Power consumption monitoring and early warning system based on multisource data fusion
Marlen et al. Application of big data in smart grids: Energy analytics
Althobaiti et al. Energy theft in smart grids: a survey on data-driven attack strategies and detection methods
CN106022640B (en) Electric quantity index checking system and method
CN115049410A (en) Electricity stealing behavior identification method and device, electronic equipment and computer readable storage medium
Alomar An IOT based smart grid system for advanced cooperative transmission and communication
CN116996220B (en) Safe storage method and system for big data of power grid
AU2020101173A4 (en) Advance metering infrastructure system for large scale iot networks data collection by streaming
Ausmus et al. Big data analytics and the electric utility industry
CN105930724A (en) Intrusion detection method on basis of big data for intelligent electric meters
CN111366889A (en) Abnormal electricity utilization detection method for intelligent electric meter
CN105897776A (en) Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system
CN203261124U (en) User side response system of smart power grid
Dhupia et al. A review: Big data analytics in smart grid management
Jiang Design and implementation of smart community big data dynamic analysis model based on logistic regression model
Mukherjee et al. Using phasor data for visualization and data mining in smart-grid applications
CN109450934A (en) Terminal accesses data exception detection method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160907