CN110647908A - Automatic transformer substation feature fingerprint extraction method - Google Patents

Automatic transformer substation feature fingerprint extraction method Download PDF

Info

Publication number
CN110647908A
CN110647908A CN201910719367.1A CN201910719367A CN110647908A CN 110647908 A CN110647908 A CN 110647908A CN 201910719367 A CN201910719367 A CN 201910719367A CN 110647908 A CN110647908 A CN 110647908A
Authority
CN
China
Prior art keywords
sequence
frequent
transformer substation
feature
byte
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910719367.1A
Other languages
Chinese (zh)
Inventor
汪繁荣
向堃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University of Technology
Original Assignee
Hubei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University of Technology filed Critical Hubei University of Technology
Priority to CN201910719367.1A priority Critical patent/CN110647908A/en
Publication of CN110647908A publication Critical patent/CN110647908A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/16Electric power substations

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention belongs to the field of transformer substation network security, in particular to a transformer substation feature fingerprint automatic extraction method, aiming at the problems that the workload is large and the protocol interaction process related to network flow needs to be deeply understood when transformer substation feature fingerprint acquisition is carried out manually, the following scheme is provided, the transformer substation feature fingerprint automatic extraction method is used for automatically extracting the transformer substation network flow feature fingerprint, the transformer substation network flow feature fingerprint is extracted through a sequence mode mining algorithm and a feature fingerprint extraction algorithm, and the transformer substation feature fingerprint automatic extraction method comprises the following steps: and capturing the data packet by using a Netflow technology. The invention provides a transformer substation flow characteristic fingerprint analysis method based on a hierarchical analysis method, which is provided by the invention according to a communication structure of three layers and two networks of a transformer substation and the communication characteristics of devices among the layers.

Description

Automatic transformer substation feature fingerprint extraction method
Technical Field
The invention relates to the field of transformer substation network security, in particular to a transformer substation feature fingerprint automatic extraction method.
Background
Attacks on power system information are also typically implemented by security threats to one or more parts of the information system. Due to the high degree of interconnection throughout the power network, the operating state of each section can have a significant impact on the power system. As the transformer substation of the necessary route of electric energy transmission and configuration, the function mainly realizes the functions of converting and adjusting the voltage at two ends of the transformer substation, receiving and redistributing superior electric energy, controlling the electric power flow direction and the like. The transformer substation plays a key role in the whole power system, and because the related functions of the transformer substation are more and more important, the safe and stable operation of the transformer substation becomes one of the key conditions for the normal operation of the whole power system.
At present, the extraction of the characteristic fingerprint is carried out manually, the workload is large, and deep understanding of a protocol interaction process related to network traffic is required. Therefore, it is desirable to provide a method for automatically extracting a feature fingerprint, so as to establish a feature fingerprint library.
Because the original data used for analyzing the network flow characteristics of the transformer substation is captured in a complex transformer substation network environment, the network flow statistical characteristics are obviously influenced by the network environment, for example, the packet interval characteristics of the data are more obviously influenced by the network environment if the characteristics are influenced by the data receiving direction. Meanwhile, the statistical characteristics generated by some burst data (such as switch tripping) cannot represent the normal data volume characteristics of the existing application. It is necessary to reduce the original high-dimensional data to a lower data dimension by retaining the primary information in the original data and eliminating the related secondary information, i.e. retaining the primary features of the traffic.
Because the normal power monitoring and scheduling of the intelligent substation communication system has obvious regularity, frequent sequences in flow data packets can be mined. The flow processed after the main component retention and the secondary component elimination can better mine frequent sequences in the flow and can be used as a characteristic sequence of the network flow data of the transformer substation.
And carrying out similarity comparison on the feature sequence mined in a certain time period of the transformer substation and the features mined at the historical time. Assuming that the similarity threshold is set to be 90%, the feature sequence with the similarity exceeding 90% can be used as the feature fingerprint of the substation network.
Disclosure of Invention
The invention provides a transformer substation feature fingerprint automatic extraction method based on the technical problems that the transformer substation feature fingerprint acquisition is carried out manually, the workload is large, and the protocol interaction process related to network flow needs to be deeply understood.
The invention provides an automatic transformer substation characteristic fingerprint extraction method, which is used for automatically extracting transformer substation network flow characteristic fingerprints, wherein the transformer substation network flow characteristic fingerprints are extracted through a sequence pattern mining algorithm and a characteristic fingerprint extraction algorithm, and the transformer substation characteristic fingerprint automatic extraction method comprises the following steps:
(1) data packet capture
The capture of the data packet is carried out by a Netflow technology;
(2) data principal component information processing
Extracting main information of each captured data packet, removing secondary information, and storing application layer load content of the data packet to be analyzed, wherein the application layer load content is required to be met;
(3) frequent sequence processing
And reading the stored data information from the data linked list, and calling an improved GSP algorithm to carry out frequent sequence mode set statistics.
(4) Similarity contrast of historical features
Carrying out similarity comparison on the feature sequence mined in a certain time period of the transformer substation and the features mined at the historical time, and reserving the feature sequence above a similarity threshold;
(5) result output
And (4) extracting the sequence set statistically obtained in the step (4) as a characteristic fingerprint, and saving an output result in a text item file.
Preferably, the Netflow traffic acquisition technology in step (1) is a set of network traffic statistical protocols, and the main principle is that Netflow processes the first IP packet data of data by using a standard switching mode to generate a Netflow cache, and then the same data is transmitted in the same data based on cache information, and is not matched with related access control and other strategies. A Netflow system comprises three main parts: the system comprises a detector, a collector and a reporting system. The probe is used to listen to network data. The collector is used for collecting the data transmitted by the detector. The reporting system is used to generate easily readable reports from the data collected by the collectors.
Preferably, the definition of the sequence pattern mining algorithm is as follows: let C be the set of transactions T, i.e. C ═ T1,t2,…,tpHere, transaction T is a set of sequences, which can be expressed as: t ═ T1,t2,…,tpAnd
Figure BDA0002155603060000031
each element i in TjJ 1,2, …, p is referred to as a sequence element. Each transaction has a unique identifier, such as a transaction number, which is denoted as TIC. Let I ═ I1,i2,…,imIs the set of all sequences in the dataset and I is the set of binary words. Any subsequence in I is referred to as a sequence pattern, and if | X | ═ K, the set X is referred to as a K-sequence pattern. Let tkAnd X are respectively the set of transaction and sequence patterns in C, if
Figure BDA0002155603060000041
Weighing tkContaining sequence pattern X. The support rate of the sequence pattern X is support (X), and if the support (t) X is not less than the specified minimum support rate, the support rate is marked as minsupport: and if not, the X is called as an infrequent sequence mode. Let X, Y be the sequence pattern in the data set C. If it is
Figure BDA0002155603060000042
Then support (X) is not less than support (Y); if it is
Figure BDA0002155603060000043
If X is an infrequent sequence pattern, then Y is also an infrequent sequence pattern; if it is
Figure BDA0002155603060000044
If Y is a frequent sequence pattern, then X is also a frequent sequence pattern.
Preferably, the GSP algorithm in step (3) is to generate a frequent sequence pattern set by a candidate sequence pattern set method, and its core idea is that all subsequences of any frequent sequence pattern set must be frequent sequences. The algorithm divides the process of mining the sequence pattern into two steps: the first step is that through iteration, all sequence mode sets in a transaction database are retrieved, namely the sequence sets with the support degree not lower than a threshold value set by a user; and in the second step, a rule meeting the minimum trust degree of the user is constructed by utilizing the frequent sequence set.
Preferably, the feature fingerprint extraction algorithm is a modified GSP algorithm, and the desired feature set of the feature fingerprint is continuous because the sequence pattern mining results in a discrete sequence set. The GSP algorithm cannot be used directly to build a library of feature fingerprints. And the result of the sequence pattern mining does not contain the position information of the characteristic fingerprint, and the characteristic fingerprint extraction efficiency is low when the result is directly used, so that the improvement needs to be carried out, and the improved algorithm is used as the algorithm for extracting the characteristic fingerprint.
Preferably, the process of extracting the feature code by the improved GSP algorithm is as follows:
1) assume that 100 flows are tested and 8 packets are acquired from each flow as a qualified flow. Setting a support threshold of the frequent sequence mode to be 90%;
2) calculating the support degree of all 1-byte frequent sequence modes, namely all 1 bytes from 0x00 to Oxff, and outputting items meeting the support degree of more than 80 percent as 1-byte feature codes;
3) and combining every two 1-byte frequent sequence modes meeting the support degree to generate candidate 2-byte frequent sequence modes. Calculating the support degree of all 2-byte frequent sequence modes, and outputting the 2-byte frequent sequence modes meeting the conditions;
4) and merging the 2-byte frequent sequence patterns meeting the conditions to generate candidate 3-byte frequent sequence patterns. Calculating the support degree of all 3-byte frequent sequence modes, and outputting the 3-byte frequent sequence modes meeting the conditions;
by analogy, the process flow proceeds until no more frequent sequence patterns are generated.
In the process of merging from the 2-byte frequent sequence mode to the 3-byte frequent sequence mode, the merging principle is that the head bytes and the tail bytes are different, and the frequent sequence modes with the same middle bytes can be merged. For example, the 0x 010 x02 frequent sequence pattern can only be combined with the 0x 020 x03 frequent sequence pattern to generate the 0x 010 x 020 x03 frequent sequence pattern, and the theory basis of the combination is a priori principle.
The beneficial effects of the invention are as follows:
the invention provides a transformer substation flow characteristic fingerprint analysis method based on a hierarchical analysis method, which is provided by the invention according to a communication structure of three layers and two networks of a transformer substation and the communication characteristics of devices among the layers. Taking a substation bay level as an example, the flow characteristic fingerprint takes four levels of protocol flow, protocol type, protocol attribute and protocol content as conditional levels. In the case of the MMS protocol, the traffic and attributes and the protocol content all contain certain characteristics, which are used as the basic layer. The substation flow characteristic fingerprint analysis method based on the hierarchical analysis method establishes weights among hierarchical characteristics, retains coupling characteristics among the characteristic fingerprints, and can effectively reflect the characteristics of the communication flow of the substation.
Drawings
Fig. 1 is a flowchart of an automatic transformer substation feature fingerprint extraction method provided by the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Examples
Referring to fig. 1, an automatic transformer substation feature fingerprint extraction method is used for automatically extracting transformer substation network flow feature fingerprints, wherein the transformer substation network flow feature fingerprints are extracted through a sequence pattern mining algorithm and a feature fingerprint extraction algorithm, and the automatic transformer substation feature fingerprint extraction method includes the following steps:
(1) data packet capture
The capture of the data packet is carried out by a Netflow technology;
(2) data principal component information processing
Extracting main information of each captured data packet, removing secondary information, and storing application layer load content of the data packet to be analyzed, wherein the application layer load content is required to be met;
(3) frequent sequence processing
And reading the stored data information from the data linked list, and calling an improved GSP algorithm to carry out frequent sequence mode set statistics.
(4) Similarity contrast of historical features
Carrying out similarity comparison on the feature sequence mined in a certain time period of the transformer substation and the features mined at the historical time, and reserving the feature sequence above a similarity threshold;
(5) result output
And (4) extracting the sequence set statistically obtained in the step (4) as a characteristic fingerprint, and saving an output result in a text item file.
The Netflow flow acquisition technology in the step (1) is a set of network flow statistical protocols, and the main principle is that Netflow processes the first IP packet data of data by using a standard exchange mode to generate a Netflow cache, and then the same data is transmitted in the same data based on cache information and is not matched with related access control and other strategies. A Netflow system comprises three main parts: the system comprises a detector, a collector and a reporting system. The probe is used to listen to network data. The collector is used for collecting the data transmitted by the detector. The reporting system is used to generate easily readable reports from the data collected by the collectors.
The definition of the sequence pattern mining algorithm is as follows: let C be the set of transactions T, i.e. C ═ T1,t2,…,tpHere, transaction T is a set of sequences, which can be expressed as: t ═ T1,t2,…,tpAnd
Figure BDA0002155603060000071
each element i in TjJ 1,2, …, p is referred to as a sequence element. Each transaction has a unique identifier, such as a transaction number, which is denoted as TIC. Let I ═ I1,i2,…,imIs the set of all sequences in the dataset and I is the set of binary words. Any subsequence in I is referred to as a sequence pattern, and if | X | ═ K, the set X is referred to as a K-sequence pattern. Let tkAnd X are respectively the set of transaction and sequence patterns in C, if
Figure BDA0002155603060000072
Weighing tkContaining sequence pattern X. The support rate of the sequence pattern X is support (X), and if support (X) is not less than the specified minimum support rate, it is denoted as minsupport: and if not, the X is called as an infrequent sequence mode. Let X, Y be the sequence pattern in the data set C. If it is
Figure BDA0002155603060000073
Then support (X) is not less than support (Y); if it is
Figure BDA0002155603060000081
If X is an infrequent sequence pattern, then Y is also an infrequent sequence pattern; if it is
Figure BDA0002155603060000082
If Y is a frequent sequence pattern, then X is also a frequent sequence pattern.
The GSP algorithm in the step (3) generates a frequent sequence pattern set by a candidate sequence pattern set method, and the core idea is that all subsequences of any frequent sequence pattern set must be frequent sequences. The algorithm divides the process of mining the sequence pattern into two steps: the first step is that through iteration, all sequence mode sets in a transaction database are retrieved, namely the sequence sets with the support degree not lower than a threshold value set by a user; and in the second step, a rule meeting the minimum trust degree of the user is constructed by utilizing the frequent sequence set.
The feature fingerprint extraction algorithm is an improved GSP algorithm, and a discrete sequence set is obtained by mining a sequence pattern, and a desired feature set of the feature fingerprint is continuous. The GSP algorithm cannot be used directly to build a library of feature fingerprints. And the result of the sequence pattern mining does not contain the position information of the characteristic fingerprint, and the characteristic fingerprint extraction efficiency is low when the result is directly used, so that the improvement needs to be carried out, and the improved algorithm is used as the algorithm for extracting the characteristic fingerprint.
The improved GSP algorithm extraction process of the feature codes comprises the following steps:
1) assume that 100 flows are tested and 8 packets are acquired from each flow as a qualified flow. Setting a support threshold of the frequent sequence mode to be 90%;
2) calculating the support degree of all 1-byte frequent sequence modes, namely all 1 bytes from 0x00 to Oxff, and outputting items meeting the support degree of more than 80 percent as 1-byte feature codes;
3) and combining every two 1-byte frequent sequence modes meeting the support degree to generate candidate 2-byte frequent sequence modes. Calculating the support degree of all 2-byte frequent sequence modes, and outputting the 2-byte frequent sequence modes meeting the conditions;
4) and merging the 2-byte frequent sequence patterns meeting the conditions to generate candidate 3-byte frequent sequence patterns. Calculating the support degree of all 3-byte frequent sequence modes, and outputting the 3-byte frequent sequence modes meeting the conditions;
by analogy, the process flow proceeds until no more frequent sequence patterns are generated.
In the process of merging from the 2-byte frequent sequence mode to the 3-byte frequent sequence mode, the merging principle is that the head bytes and the tail bytes are different, and the frequent sequence modes with the same middle bytes can be merged. For example, the 0x 010 x02 frequent sequence pattern can only be combined with the 0x 020 x03 frequent sequence pattern to generate the 0x 010 x 020 x03 frequent sequence pattern, and the theory basis of the combination is a priori principle.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (6)

1. The automatic transformer substation feature fingerprint extraction method is used for automatically extracting transformer substation network flow feature fingerprints, wherein the transformer substation network flow feature fingerprints are extracted through a sequence pattern mining algorithm and a feature fingerprint extraction algorithm, and the automatic transformer substation feature fingerprint extraction method is characterized by comprising the following steps of:
(1) data packet capture
The capture of the data packet is carried out by a Netflow technology;
(2) data principal component information processing
Extracting main information of each captured data packet, removing secondary information, and storing application layer load content of the data packet to be analyzed, wherein the application layer load content is required to be met;
(3) frequent sequence processing
And reading the stored data information from the data linked list, and calling an improved GSP algorithm to carry out frequent sequence mode set statistics.
(4) Similarity contrast of historical features
Carrying out similarity comparison on the feature sequence mined in a certain time period of the transformer substation and the features mined at the historical time, and reserving the feature sequence above a similarity threshold;
(5) result output
And (4) extracting the sequence set statistically obtained in the step (4) as a characteristic fingerprint, and saving an output result in a text item file.
2. The automatic extraction method of the transformer substation characteristic fingerprint according to claim 1, wherein the Netflow flow acquisition technology in the step (1) is a set of network flow statistical protocols, and the main principle is that Netflow processes first IP packet data of data by using a standard exchange mode to generate a Netflow cache, and then the same data is transmitted in the same data based on cache information and is not matched with related access control and other strategies. A Netflow system comprises three main parts: the system comprises a detector, a collector and a reporting system. The probe is used to listen to network data. The collector is used for collecting the data transmitted by the detector. The reporting system is used to generate easily readable reports from the data collected by the collectors.
3. The automatic substation feature fingerprint extraction method according to claim 1, wherein the definition of the sequence pattern mining algorithm is as follows: let C be the set of transactions T, i.e. C ═ T1,t2,…,tpHere, transaction T is a set of sequences, which can be expressed as: t ═ T1,t2,…,tpAnd
Figure FDA0002155603050000021
each element i in TjJ 1,2, …, p is referred to as a sequence element. Each transaction has a unique identifier, such as a transaction number, which is denoted as TIC. Let I ═ I1,i2,…,imIs the set of all sequences in the dataset and I is the set of binary words. Any subsequence in I is referred to as a sequence pattern, and if | X | ═ K, the set X is referred to as a K-sequence pattern. Let tkAnd X are respectively the set of transaction and sequence patterns in C, if
Figure FDA0002155603050000022
Weighing tkContaining sequence pattern X. The support rate of the sequence pattern X is support (X) if
Figure FDA0002155603050000026
Not less than a specified minimum support rate, denoted as minor: and if not, the X is called as an infrequent sequence mode. Let X, Y be the sequence pattern in the data set C. If it is
Figure FDA0002155603050000023
Then support (X) is not less than support (Y); if it isIf X is an infrequent sequence pattern, then Y is also infrequentA complex sequence mode; if it is
Figure FDA0002155603050000025
If Y is a frequent sequence pattern, then X is also a frequent sequence pattern.
4. The automatic substation feature fingerprint extraction method according to claim 1, wherein the GSP algorithm in step (3) is a method for generating a frequent sequence pattern set by using a candidate sequence pattern set, and the core idea is that all subsequences of any frequent sequence pattern set must be frequent sequences. The algorithm divides the process of mining the sequence pattern into two steps: the first step is that through iteration, all sequence mode sets in a transaction database are retrieved, namely the sequence sets with the support degree not lower than a threshold value set by a user; and in the second step, a rule meeting the minimum trust degree of the user is constructed by utilizing the frequent sequence set.
5. The automatic substation feature fingerprint extraction method according to claim 1, wherein the feature fingerprint extraction algorithm is a modified GSP algorithm, and a discrete sequence set is obtained by sequence pattern mining, and a desired feature set of feature fingerprints is continuous. The GSP algorithm cannot be used directly to build a library of feature fingerprints. And the result of the sequence pattern mining does not contain the position information of the characteristic fingerprint, and the characteristic fingerprint extraction efficiency is low when the result is directly used, so that the improvement needs to be carried out, and the improved algorithm is used as the algorithm for extracting the characteristic fingerprint.
6. The method for automatically extracting the characteristic fingerprint of the transformer substation according to claim 1, wherein the improved GSP algorithm is used for extracting the characteristic code in the following steps:
1) assume that 100 flows are tested and 8 packets are acquired from each flow as a qualified flow. Setting a support threshold of the frequent sequence mode to be 90%;
2) calculating the support degree of all 1-byte frequent sequence modes, namely all 1 bytes from 0x00 to Oxff, and outputting items meeting the support degree of more than 80 percent as 1-byte feature codes;
3) and combining every two 1-byte frequent sequence modes meeting the support degree to generate candidate 2-byte frequent sequence modes. Calculating the support degree of all 2-byte frequent sequence modes, and outputting the 2-byte frequent sequence modes meeting the conditions;
4) and merging the 2-byte frequent sequence patterns meeting the conditions to generate candidate 3-byte frequent sequence patterns. Calculating the support degree of all 3-byte frequent sequence modes, and outputting the 3-byte frequent sequence modes meeting the conditions;
by analogy, the process flow proceeds until no more frequent sequence patterns are generated.
In the process of merging from the 2-byte frequent sequence mode to the 3-byte frequent sequence mode, the merging principle is that the head bytes and the tail bytes are different, and the frequent sequence modes with the same middle bytes can be merged. For example, the 0x 010 x02 frequent sequence pattern can only be combined with the 0x 020 x03 frequent sequence pattern to generate the 0x 010 x 020 x03 frequent sequence pattern, and the theory basis of the combination is a priori principle.
CN201910719367.1A 2019-08-05 2019-08-05 Automatic transformer substation feature fingerprint extraction method Pending CN110647908A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910719367.1A CN110647908A (en) 2019-08-05 2019-08-05 Automatic transformer substation feature fingerprint extraction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910719367.1A CN110647908A (en) 2019-08-05 2019-08-05 Automatic transformer substation feature fingerprint extraction method

Publications (1)

Publication Number Publication Date
CN110647908A true CN110647908A (en) 2020-01-03

Family

ID=68990018

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910719367.1A Pending CN110647908A (en) 2019-08-05 2019-08-05 Automatic transformer substation feature fingerprint extraction method

Country Status (1)

Country Link
CN (1) CN110647908A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070195344A1 (en) * 2006-02-01 2007-08-23 Sony Corporation System, apparatus, method, program and recording medium for processing image
CN101640666A (en) * 2008-08-01 2010-02-03 北京启明星辰信息技术股份有限公司 Device and method for controlling flow quantity facing to target network
CN104360192A (en) * 2014-11-12 2015-02-18 华北电力大学 Electromagnetic disturbance waveform feature extracting method for transformer substation gas insulation switch
CN104520676A (en) * 2013-04-15 2015-04-15 弗莱克斯电子有限责任公司 Virtual personality vehicle communications with third parties
CN106559261A (en) * 2016-11-03 2017-04-05 国网江西省电力公司电力科学研究院 A kind of substation network intrusion detection of feature based fingerprint and analysis method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070195344A1 (en) * 2006-02-01 2007-08-23 Sony Corporation System, apparatus, method, program and recording medium for processing image
CN101640666A (en) * 2008-08-01 2010-02-03 北京启明星辰信息技术股份有限公司 Device and method for controlling flow quantity facing to target network
CN104520676A (en) * 2013-04-15 2015-04-15 弗莱克斯电子有限责任公司 Virtual personality vehicle communications with third parties
CN104360192A (en) * 2014-11-12 2015-02-18 华北电力大学 Electromagnetic disturbance waveform feature extracting method for transformer substation gas insulation switch
CN106559261A (en) * 2016-11-03 2017-04-05 国网江西省电力公司电力科学研究院 A kind of substation network intrusion detection of feature based fingerprint and analysis method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WANG FANRONG: "Summary of distribution network fault location technique", 《IEEE》 *
汪繁荣: "智能变电站网络通信流量实时监测系统及仿真研究", 《中国博士学位论文全文数据库》 *
马刚编著: "《商务智能》", 30 July 2010, 出版发行:沈阳:东北财经大学出版社 *

Similar Documents

Publication Publication Date Title
M Al-Qurabat A lightweight Huffman-based differential encoding lossless compression technique in IoT for smart agriculture
Abdulzahra et al. Compression-based data reduction technique for IoT sensor networks
CN113676464A (en) Network security log alarm processing method based on big data analysis technology
CN109831422B (en) Encrypted flow classification method based on end-to-end sequence network
CN104616092A (en) Distributed log analysis based distributed mode handling method
CN107704610A (en) A kind of power distribution network operation data event correlation analysis system and analysis method
CN115883213B (en) APT detection method and system based on continuous time dynamic heterogeneous graph neural network
Zhongsheng et al. Retracted: Traffic identification and traffic analysis based on support vector machine
Tchamkerten et al. Communication under strong asynchronism
CN116070206B (en) Abnormal behavior detection method, system, electronic equipment and storage medium
Abdulzahra MSc et al. Energy conservation approach of wireless sensor networks for IoT applications
Hei et al. Feature extraction optimization for bitstream communication protocol format reverse analysis
Jayaweera Bayesian fusion performance and system optimization for distributed stochastic Gaussian signal detection under communication constraints
CN109002856B (en) Automatic flow characteristic generation method and system based on random walk
Alani et al. A two-stage cyber attack detection and classification system for smart grids
Chien et al. Active learning in the geometric block model
CN100493001C (en) Automatic clustering method for multi-particle size network under G bit flow rate
CN110647908A (en) Automatic transformer substation feature fingerprint extraction method
CN117119535A (en) Data distribution method and system for mobile terminal cluster hot spot sharing
Alani et al. A Survey of Smart Grid Intrusion Detection Datasets
Xin et al. Research on feature selection of intrusion detection based on deep learning
CN112072783A (en) Method and device for transmitting second-level load data between end-side equipment and edge-side equipment
CN110401451A (en) Automatic machine space compression method and system based on character set transformation
Usman et al. A novel Internet of Things-centric framework to mine malicious frequent patterns
Roh et al. Energy-efficient two-dimensional skyline query processing in wireless sensor networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200103

WD01 Invention patent application deemed withdrawn after publication