Paper
16 October 2024 Anomaly detection method for power IoT terminals in zero-trust environment
Dongdong Lv, Qiang Li, Di Liu, Wenjing Li, Guangping Zhu
Author Affiliations +
Proceedings Volume 13291, Ninth International Symposium on Advances in Electrical, Electronics, and Computer Engineering (ISAEECE 2024); 1329139 (2024) https://doi.org/10.1117/12.3034423
Event: Ninth International Symposium on Advances in Electrical, Electronics, and Computer Engineering (ISAEECE 2024), 2024, Changchun, China
Abstract
With the digitalization of power grids and the development of new power systems, more and more IoT terminals are used in various scenarios of power grid business transmission and distribution, so as to realize full perception of system status and full service penetration in all links of electric energy production, transmission and consumption, and ensure the high-quality construction of power grids. The explosive growth of the number of IoT terminals (such as sensor devices, inspection robots, etc.) has transformed the system IT infrastructure from "boundary" to "borderless", and the network security boundary is gradually disintegrating, so the continuous anomaly detection security of power IoT terminals connected to the power grid system is becoming more and more important. To solve this problem, this paper proposes an anomaly detection method for power IoT terminals in a zero-trust environment. In this method, a BSREM credibility evaluation model based on behavioral sequence is designed to complete the anomaly detection task of IoT terminals, improve the information learning ability of the model by maintaining the information matrix, and expand the adaptation scope of the method. Finally, this paper uses simulation comparison to verify the BSREM model and LightLog model to evaluate the credibility of the device's traffic behavior and activity log. The results show that the BSREM model can complete the credibility evaluation task more efficiently.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Dongdong Lv, Qiang Li, Di Liu, Wenjing Li, and Guangping Zhu "Anomaly detection method for power IoT terminals in zero-trust environment", Proc. SPIE 13291, Ninth International Symposium on Advances in Electrical, Electronics, and Computer Engineering (ISAEECE 2024), 1329139 (16 October 2024); https://doi.org/10.1117/12.3034423
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data modeling

Internet of things

Instrument modeling

Matrices

Performance modeling

Environmental sensing

Network security

Back to Top