Skip to main content
Log in

Power information network intrusion detection based on data mining algorithm

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Intrusion detection technology plays an important role in ensuring information security. This paper briefly describes the intrusion detection technology and its development history. Based on the analysis of power information network structure and its security partition, this paper proposes a power information network intrusion detection framework for the intrusion attack problem of power information network and elaborates the implementation of each module. The association rule analysis algorithm and the association relationship between network data stream features can effectively detect the intrusion behaviour in the power information network. Experiments show that the intrusion detection system can effectively detect the intrusion attacks in the power information network and effectively protect the power information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Davis JJ, Clark AJ (2011) Data preprocessing for anomaly based network intrusion detection: a review. Comput Secur 30(6–7):353–375

    Article  Google Scholar 

  2. Li Y, Yang L, Ding J (2016) A minimum enclosing ball-based support vector machine approach for detection of phishing websites. Optik Int J Light Electron Opt 127(1):345–351

    Article  Google Scholar 

  3. Yufei W, Ting Z, Shaoyu LI, Baohua Z, Yujie LI (2013) An intrusion detection method for electric power information network based on improved minimum enclosing ball vector machine. Power Syst Technol 37(9):2675–2680

    Google Scholar 

  4. Shamshirband S, Amini A, Anuar NB, Mat Kiah ML, Teh YW, Furnell S (2014) D-ficca: a density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks. Measurement 55:212–226

    Article  Google Scholar 

  5. Nadiammai GV, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egypt Inform J 15(1):37–50

    Article  Google Scholar 

  6. Chen M, Liu Q (2016) Blow-up criteria of smooth solutions to a 3D model of electro-kinetic fluids in a bounded domain. Electron J Diff Equ 2016(128):1–8

    MathSciNet  Google Scholar 

  7. Chen Miaochao, Shengqi Lu, Liu Qilin (2018) Global regularity for a 2D model of electro-kinetic fluid in a bounded domain. Acta Math Appl Sin Engl Ser 34(2):398–403

    Article  MathSciNet  Google Scholar 

  8. Kister I, Ge Y, Herbert J, Sinnecker T, Wuerfel J, Paul F (2013) Improved semi-supervised fuzzy clustering algorithm and application in effective intrusion detection system. Int J Adv Comput Technol 5(4):689–696

    Google Scholar 

  9. Shengqi Lu, Chen Miaochao, Liu Qilin (2018) On regularity for an Ericksen-Leslie’s parabolic-hyperbolic liquid crystals model. Zamm-Zeitschrift fur Angewandte Mathematik und Mechanik 98(9):1574–1584

    Article  MathSciNet  Google Scholar 

  10. Ravale U, Marathe N, Padiya P (2015) Feature selection based hybrid anomaly intrusion detection system using k means and rbf kernel function. Procedia Comput Sci 45(39):428–435

    Article  Google Scholar 

  11. Han G, Xun L, Jiang J et al (2015) Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks. Comput J 58(6):1280–1292

    Article  Google Scholar 

  12. Elbasiony RM, Sallam EA, Eltobely TE et al (2013) A hybrid network intrusion detection framework based on random forests and weighted k-means. Ain Shams Eng J 4(4):753–762

    Article  Google Scholar 

  13. Faisal MA, Aung Z, Williams JR, Sanchez A (2015) Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study. IEEE Syst J 9(1):31–44

    Article  Google Scholar 

  14. Rawat S, Gulati VP, Pujari AK (2005) A fast host-based intrusion detection system using rough set theory. Lect Notes Comput Sci 3700(4):144–161

    Article  Google Scholar 

  15. Louvieris P, Clewley N, Liu X (2013) Effects-based feature identification for network intrusion detection. Neurocomputing 121(18):265–273

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the project of Hebei Power Technology of state grid from 2018 to 2019: Research and application of real-time situation assessment and visualization technology for information security of power enterprises based on simulation environment (No. kj2018-047).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaojun Zuo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zuo, X., Chen, Z., Dong, L. et al. Power information network intrusion detection based on data mining algorithm. J Supercomput 76, 5521–5539 (2020). https://doi.org/10.1007/s11227-019-02899-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-019-02899-2

Keywords

Navigation