Research on Security Mechanism of Power Intranet Based on Data Mining Technology

被引:0
|
作者
Luo Zhenyu [1 ]
机构
[1] Informat Ctr Yunnan Power Grid Co Ltd, Kunming 650000, Yunnan, Peoples R China
关键词
Electric power internal network; Security mechanism; Intellectualization; big data;
D O I
10.1145/3469213.3471380
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the continuous expansion of the power grid scale and the extensive application of intelligent equipment, massive, diverse and complex data will be generated during the operation of the power grid, which leads to new opportunities and challenges for the security management and control of the power grid. In today's big data era, data mining technology is the key to the rapid development of this era. This technology is a process of extracting useful information from a large number of data analysis. Computer network has undoubtedly enriched people's lives, but the network security problems it brings can not be ignored. This paper mainly introduces the importance of standardization of power grid safety inspection, and how to use data mining technology to mine useful information, and puts forward the security mechanism of power intranet based on data mining technology. Therefore, the inspection items in the safety inspection standard library are dynamically updated, the potential safety hazards of the power grid are indirectly reduced, and an important guarantee is provided for the safe and stable operation of the power grid.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Research on Application of Network Security Technology Based on Data Mining
    Wang, Ning
    Qin, Yanyan
    Guo, Shuyang
    [J]. CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 626 - 635
  • [2] Research on the application of the security technology in Intranet
    Yu, LY
    [J]. NEW TECHNOLOGIES ON COMPUTER SOFTWARE, 1997, : 272 - 275
  • [3] Research of data mining technology in the construction of network security
    Wu, Yong
    [J]. INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS 1 & 2, 2014, : 671 - 677
  • [4] Research on IS application based on the Intranet technology
    Xing, YH
    Xing, ZY
    [J]. '99 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, PROCEEDINGS, VOLS 1 AND 2, 1999, : 26 - 29
  • [5] Research on network and information security based on data mining
    Academy of Armored Forces Engineering, Beijing 100072, China
    不详
    [J]. Lect. Notes Electr. Eng., VOL. 4 (597-603):
  • [6] Research of Elevator Security Data Mining Based on Hadoop
    Wang, Guicheng
    Han, Changxi
    Zhang, Chunming
    Xu, Ye
    Zhang, Min
    [J]. PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019), 2019, : 4441 - 4444
  • [7] Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining
    Sheng, Jingyuan
    [J]. MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [8] Research on security access control method of power intranet terminal
    Chen, L.
    Liu, X.
    Deng, S.
    [J]. Manufacturing and Engineering Technology, 2015, : 409 - 412
  • [9] The Research on Security Access Control Method of Power Intranet Terminal
    Shao Zhipeng
    Chen Huazhi
    Li Weiwei
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 764 - 768
  • [10] Research on Distributed Data Mining Technology Based on Grid
    Zhang, Ning
    Bao, Hong
    [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 440 - +