Security protection strategy of power terminal based on deep learning

被引:0
|
作者
Cai, RongYan [1 ]
Cheng, Yong [1 ]
Jia, YongLiang [2 ]
机构
[1] State Grid Fujian Elect Power Co Ltd, 257 Wusi Rd, Fuzhou 350000, Fujian, Peoples R China
[2] State Grid Hebei Mkt Serv Ctr, Shijiazhuang, Hebei, Peoples R China
关键词
Deep learning; Long short-term memory neural network; Security protection; Power terminal; MODEL;
D O I
10.1109/ISCSIC57216.2022.00069
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to solve the problem of security vulnerabilities in embedded power terminals, this paper studies the application of long short-term memory neural network to the security protection of power terminals, and establishes a security protection model. According to the characteristic that the protection model lacks negative samples for training in the training process, the study uses the characteristics of long short-term memory neural network to improve the model, and compares and analyzes it with the same type of model in practical applications. The results show that the model designed by the research has a model accuracy of 0.99 in the original dataset and a model accuracy of 0.98 in the mixed dataset, and the model performance data is the best among the same type of models. It can be seen that the model of research design has sufficient practicability and can provide a new idea for related fields.
引用
收藏
页码:301 / 305
页数:5
相关论文
共 50 条
  • [31] Optimal Dispatch Strategy of Integrated Energy System Based on Deep Reinforcement Learning Considering Security Constraints
    Lin W.
    Wang X.
    Sun Q.
    Wang X.
    Liu Z.
    He J.
    Dianwang Jishu/Power System Technology, 2023, 47 (05): : 1970 - 1978
  • [32] Learning to upgrade internet information security and protection strategy in big data era
    Guo, Junjun
    Wang, Le
    COMPUTER COMMUNICATIONS, 2020, 160 : 150 - 157
  • [33] Evaluation of Network Security Grade Protection Combined With Deep Learning for Intrusion Detection
    Lin, Shaodan
    Feng, Chen
    Jiang, Tao
    Jing, Huasong
    IEEE ACCESS, 2023, 11 : 130990 - 131000
  • [34] Research on the protection strategy of network security
    Ji, Hong
    ADVANCED RESEARCH ON INFORMATION SCIENCE, AUTOMATION AND MATERIAL SYSTEMS III, 2013, 703 : 236 - 239
  • [35] Research on Network Security Protection Strategy
    Ye Yalin
    Yan Lina
    Ren Shuai
    Zhang Qian
    2019 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS 2019), 2019, : 152 - 154
  • [36] An Example of Intelligent Security System Based on Deep Learning
    Ramakic, Adnan
    Bundalo, Zlatko
    Bundalo, Dusanka
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2024, 33 (12)
  • [37] Deep Learning based Face Recognition for Security Robot
    Lee, Min-Fan Ricky
    Huang, Yun-Min
    Sun, Jia-Yang
    Chen, Xue-Qin
    Huang, Ting-Fu
    2022 18TH IEEE/ASME INTERNATIONAL CONFERENCE ON MECHATRONIC AND EMBEDDED SYSTEMS AND APPLICATIONS (MESA 2022), 2022,
  • [38] Deep Learning based Security Enhancement of Wireless Connectivity
    Ryu, Seonghan
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 996 - 997
  • [39] LEMNA: Explaining Deep Learning based Security Applications
    Guo, Wenbo
    Mu, Dongliang
    Xu, Jun
    Su, Purui
    Wang, Gang
    Xing, Xinyu
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 364 - 379
  • [40] Network Protection Security Enhancement based on Power Flow Assessment
    Kundu, Pratim
    Pradhan, Ashok Kumar
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON POWER SYSTEMS (ICPS), 2016,