Energy data, especially power data, has the advantages of covering a wide range of industries, high value density, and good accuracy, relying on energy big data can widely describe all kinds of terminal production and...
详细信息
ISBN:
(数字)9798350366099
ISBN:
(纸本)9798350366105
Energy data, especially power data, has the advantages of covering a wide range of industries, high value density, and good accuracy, relying on energy big data can widely describe all kinds of terminal production and life activities. However, the privacy computing platforms of various vendors often adopt different technical architectures and algorithm protocols in the early implementation process, which makes the implementation of various platforms have great differences, resulting in the direct interconnection between heterogeneous privacy computing platforms of various organizations. Aiming at the interoperability needs and problems of energy big data privacy computing platforms with different technical architectures, this paper decouple the management plane and data plane of the privacy computing platform, and in accordance with the principle of business priority, proposes a new privacy computing interconnection model of “unified business collaboration component + flexible configuration algorithm engine” suitable for energy big data. Through the design of the east-west and North-South interface framework of the privacy computing platform and the security access principle of the algorithm engine, the whole process control, cross-platform interconnection, and internal and external network penetration modeling and analysis of energy big data collaboration with the outside world are realized, which meets the key data securityprotection requirements of the stategrid such as distributed computing and storage of data inside and outside the platform. It is of great significance to promote energy big data to empower external institutions such as governments, banks and operators.
With the rapid development of digitalization and intelligence in smart grids, how to identify untrusted users in the electric power system and implement user access control based on electronic evidence has become an i...
详细信息
Identifying hidden anomalous behavior is a major challenge in anomaly detection, particularly in complex systems where anomalies are buried within massive log data and cannot be easily identified through simple patter...
详细信息
During cross-domain access, both communication ends need zero-trust evaluation by the trust assessment node and policy matching for permission. Nodes handling these may face concurrent computing and policy search task...
详细信息
During cross-domain access, both communication ends need zero-trust evaluation by the trust assessment node and policy matching for permission. Nodes handling these may face concurrent computing and policy search task...
详细信息
ISBN:
(数字)9798331506797
ISBN:
(纸本)9798331506803
During cross-domain access, both communication ends need zero-trust evaluation by the trust assessment node and policy matching for permission. Nodes handling these may face concurrent computing and policy search tasks that need to be performed. We propose a new method to enhance security and efficiency. By introducing a trust hash value from access-end features and optimizing the policy tree, along with a better trust calc method, experiments show improved cross-domain access efficiency and accuracy, offering a new view for powergrid services.
With the large-scale deployment of loT devices, loT security faces huge threats from zero-day attacks, and there is an urgent need to conduct research on loT zero-day attack detection technologies. Aiming at the probl...
详细信息
ISBN:
(数字)9798350388343
ISBN:
(纸本)9798350388350
With the large-scale deployment of loT devices, loT security faces huge threats from zero-day attacks, and there is an urgent need to conduct research on loT zero-day attack detection technologies. Aiming at the problem of lack of available samples for zero-day attack detection in loT, we propose a zero-day attack detection method based on generative zero-shot learning. Feature extraction is performed based on the LightGBM model, and then multi-layer perceptron is used to generate attribute vectors. We generate pseudo feature space of data category based on conditional variational autoencoders to train zero-day attack detectors. To comply with real attack detection scenarios, we adopt the generalized zero-shot learning method to conduct verification on the UNSW-NB15 data set. Experiment results show that the precision, recall and Fl of most attack types are above 90%. The average accuracy of our method in detecting zero-day attacks is 93.6%, which is much higher than the baseline method and achieve great detection results.
The sources of digital resources in the distribution network mainly include three aspects: equipment ontology, production operation, and management. The data is described in various forms and stored in various types o...
详细信息
Given the issue that certain key components of the dedicated securityprotection equipment for the power system rely heavily on large-scale imported FPGA chips and specialized integrated circuits, and mature domestic ...
详细信息
ISBN:
(数字)9798331516086
ISBN:
(纸本)9798331516093
Given the issue that certain key components of the dedicated securityprotection equipment for the power system rely heavily on large-scale imported FPGA chips and specialized integrated circuits, and mature domestic alternatives and solutions have not yet been formed, this paper proposes the application concept of reconfigurable computing technology in the process of high-performance network security processing. The reconfigurable CGRA chip is led by China, with independently controllable technology, combining energy efficiency and flexibility, enabling efficient processing of computation-intensive tasks and completing the substitution for foreign FPGA chips.
In view of the performance and security problems existing after the replacement of specialized securityprotection equipment for powergrids with domestic software and hardware, and in response to the security protect...
详细信息
ISBN:
(数字)9798331532765
ISBN:
(纸本)9798331532772
In view of the performance and security problems existing after the replacement of specialized securityprotection equipment for powergrids with domestic software and hardware, and in response to the securityprotection requirements of different application scenarios, the research on heterogeneous fusion computing technology based on domestic CPUs and reconfigurable chips is proposed. The optimal mapping of national secret algorithms, isolation exchange, protocol processing, and data analysis on reconfigurable chips is realized, supporting the parallel computing of special processors for scene acceleration and domestic CPUs, and meeting the requirements of different network security analysis and computing scenarios in the power system.
With the rapid development of massive distributed energy resources integration and load demand-side response in the powergrid, distribution network power flows have become bidirectional, and the grid topology has exh...
详细信息
ISBN:
(纸本)9798400707087
With the rapid development of massive distributed energy resources integration and load demand-side response in the powergrid, distribution network power flows have become bidirectional, and the grid topology has exhibited characteristics of complexity, high-dimensionality, and multi-state. This has created an urgent need for comprehensive dynamic topology service capabilities, bringing new challenges in areas such as topology data mapping, topology state synchronization, and full-domain topology computation. In response to these needs, this paper investigates the technology for constructing and maintaining powergrid topology and proposes a method for constructing a comprehensive dynamic topology for distribution networks based on a real-time measurement center. By integrating measurement data with distribution network topology information, a fine-grained foundational topology model is constructed, which is then dynamically adjusted based on real-time switch state information to form a comprehensive dynamic topology. This approach effectively supports the business analysis needs of multiple dimensions and multiple time states, aiming to enhance the grid's response speed and processing performance.
暂无评论