Abstract
Intrusion detection technology plays an important role in ensuring information security. This paper briefly describes the intrusion detection technology and its development history. Based on the analysis of power information network structure and its security partition, this paper proposes a power information network intrusion detection framework for the intrusion attack problem of power information network and elaborates the implementation of each module. The association rule analysis algorithm and the association relationship between network data stream features can effectively detect the intrusion behaviour in the power information network. Experiments show that the intrusion detection system can effectively detect the intrusion attacks in the power information network and effectively protect the power information.





Similar content being viewed by others
References
Davis JJ, Clark AJ (2011) Data preprocessing for anomaly based network intrusion detection: a review. Comput Secur 30(6–7):353–375
Li Y, Yang L, Ding J (2016) A minimum enclosing ball-based support vector machine approach for detection of phishing websites. Optik Int J Light Electron Opt 127(1):345–351
Yufei W, Ting Z, Shaoyu LI, Baohua Z, Yujie LI (2013) An intrusion detection method for electric power information network based on improved minimum enclosing ball vector machine. Power Syst Technol 37(9):2675–2680
Shamshirband S, Amini A, Anuar NB, Mat Kiah ML, Teh YW, Furnell S (2014) D-ficca: a density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks. Measurement 55:212–226
Nadiammai GV, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inform J 15(1):37–50
Chen M, Liu Q (2016) Blow-up criteria of smooth solutions to a 3D model of electro-kinetic fluids in a bounded domain. Electron J Diff Equ 2016(128):1–8
Chen Miaochao, Shengqi Lu, Liu Qilin (2018) Global regularity for a 2D model of electro-kinetic fluid in a bounded domain. Acta Math Appl Sin Engl Ser 34(2):398–403
Kister I, Ge Y, Herbert J, Sinnecker T, Wuerfel J, Paul F (2013) Improved semi-supervised fuzzy clustering algorithm and application in effective intrusion detection system. Int J Adv Comput Technol 5(4):689–696
Shengqi Lu, Chen Miaochao, Liu Qilin (2018) On regularity for an Ericksen-Leslie’s parabolic-hyperbolic liquid crystals model. Zamm-Zeitschrift fur Angewandte Mathematik und Mechanik 98(9):1574–1584
Ravale U, Marathe N, Padiya P (2015) Feature selection based hybrid anomaly intrusion detection system using k means and rbf kernel function. Procedia Comput Sci 45(39):428–435
Han G, Xun L, Jiang J et al (2015) Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks. Comput J 58(6):1280–1292
Elbasiony RM, Sallam EA, Eltobely TE et al (2013) A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Eng J 4(4):753–762
Faisal MA, Aung Z, Williams JR, Sanchez A (2015) Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study. IEEE Syst J 9(1):31–44
Rawat S, Gulati VP, Pujari AK (2005) A fast host-based intrusion detection system using rough set theory. Lect Notes Comput Sci 3700(4):144–161
Louvieris P, Clewley N, Liu X (2013) Effects-based feature identification for network intrusion detection. Neurocomputing 121(18):265–273
Acknowledgements
This work is supported by the project of Hebei Power Technology of state grid from 2018 to 2019: Research and application of real-time situation assessment and visualization technology for information security of power enterprises based on simulation environment (No. kj2018-047).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zuo, X., Chen, Z., Dong, L. et al. Power information network intrusion detection based on data mining algorithm. J Supercomput 76, 5521–5539 (2020). https://doi.org/10.1007/s11227-019-02899-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-019-02899-2