Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Chengde Petroleum College》 2008-01
Add to Favorite Get Latest Update

Application of Intrusion Detection System Based on Data Mining and Rough Sets to Electric Power Network

LIU Cui-juan1,HENG Jun-shan2,CHANG Jing-wei3 (1.College of Information Engineering,Shijiazhuang University of Economics,Shijiazhuang 050031,Hebei,China;2.Department of Computer and Information Engineering,Chengde Petroleum College,Chengde 067000,Hebei,China;3.Chengde Garden Administration,Chengde 067000,Hebei,China)  
In view of the characteristics of network security of electric power system,the solution of each technical aspect is briefly introduced,and the deployment and structure of Intrusion Detection System in the network layer is designed.In the center console,the network IDS based on data mining and rough sets is used,together with misuse detection and anomaly detection methods,and the architecture and modeling process are presented.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 2 Hits
1 Wang Xianpei1 ,Xiong Ping1 ,L i Wenwu2 1. Wuhan U niversity,Wuhan 4 30 0 72 ,China 2 .Three Gorges U niversity,Yichang4 4 30 0 2 ,China;APPLICATION OF FIREWALL AND IDSIN THE INFORMATION NETWORK FOR POWER ENTERPRISES[J];Automation of Electric Power Systems;2002-05
2 Hu Yan1 ,Dong Mingchui2 ,H an Yingduo1 1.Tsinghua U niversity,Beijing10 0 0 84 ,China 2 .Institute of System s and Computer Engineering,Macau,China;CONSIDERATION OF INFORMATION SECURITY FOR ELECTRIC POWER INDUSTRY[J];Automation of Electric Power Systems;2002-07
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Wang Jun, Xu Jie (Nanjing Automation Research Institute, Nanjing 210003, China);NETWORK SECURITY OF COMPUTER SUPERVISORY AND CONTROL SYSTEM IN HYDROPOWER PLANTS[J];Dam Observation and Geotechnical Tests;2002-04
2 F.F. Wu, Wen Fushuan (The University of Hong Kong, Hong Kong, China);INTERNET APPLICATIONS IN ELECTRICITY MARKETS[J];Automation of Electric Power Systems;2003-05
3 Shang Jincheng 1, Huang Yonghao 1, Huang Yongqian 2, Meng Yuanjing 1, He Nanqiang 1, Chen Weihua 2 (1. Henan Electric Power Company, Zhengzhou 450052, China) (2. Beijing DIS Electronic Datasystem Co Ltd, Beijing 100031, China);NETWORK INFORMATION SECURITY SOLUTION FOR ELECTRICITY MARKET OPERATION SYSTEM[J];Automation of Electric Power Systems;2003-09
4 Li Jun'e 1, Luo Jianbo 2, Liu Kaipei 1, Zhou Dongru 1 (1. Wuhan University, Wuhan 430072, China) (2. Nanjing Automation Research Institute, Nanjing 210003, China);SECURITY DESIGN FOR ELECTRIC POWER DATA NETWORK[J];Automation of Electric Power Systems;2003-11
5 Wu Wencheng 1, Luo Hong 2, Zou Siyi 1, Xiao Jian 1 (1. Southwest Jiaotong University, Chengdu 610031, China) (2. Sichuan Aostar Information Technology Company, Chengdu 610041, China);APPLICATION OF THE FILE SYNCHRONIZATION THEORY IN THE BACKUP OF POWER SYSTEM DATA[J];Automation of Electric Power Systems;2003-13
6 Xiang Jidong, Huang Tianshu, Sun Dong (Wuhan University, Wuhan 430072, China);DESIGN AND IMPLEMENTATION OF AN INFORMATION NETWORK SECURITY MANAGEMENT SYSTEM FOR POWER ENTERPRISES[J];Automation of Electric Power Systems;2003-15
7 Li Zhimin, Cong Lin , Zheng Ying , Pan Minghui , Pian Ruiqi ( Harbin Institute of Technology, Harbin 150001, China) (China Electric Power Research Institute Beijing 100085, China) ( Liaoning Electric Power Corporations, Shenyang 110006, China );INFORMATION SECURITY ASSESSMENT OF POWER SYSTEMS BASED ON SSE-CMM[J];Automation of Electric Power Systems;2003-23
8 Cong Lin1 , Li Zhimin2 , Pan Minghui3 , Gao Kunlun1 , Pian Ruiqi3 (1. China Electric Power Research Institute, Beijing 100085, China) (2. Harbin Institute of Technology, Harbin 150001, China) (3. Liaoning Electric Power Corporations, Shenyang 110006, China);INFORMATION SECURITY EVALUATION IN POWER SYSTEMS BASED ON FUZZY COMPREHENSIVE JUDGEMENT[J];Automation of Electric Power Systems;2004-12
9 Cheng Bo;Zhang Xinyou;Fu Hualing;Yang Guowei University of Electronic Science & Technology of China, Chengdu 610054, China Chengdu University of Technology, Chengdu 610059, China;DESIGN AND IMPLEMENTATION OF A SECURITY INCREASING STRATEGY BASED ON PROACTIVE DECEIVING STRATEGY FOR THE POWER NETWORK[J];Automation of Electric Power Systems;2004-21
10 HU Yan, XIE Xiao-rong , XIN Yao-zhong ( NARI-Relays Electric Co Ltd, Nanjing 211100, China) ( Tsinghua University, Beijing 100084, China) ( National Electric Power Dispatching & Communication Center, Beijing 100031, China);Modeling and Quantitative Security Evaluation for Electric Power Information Systems[J];Automation of Electric Power Systems;2005-10
China Proceedings of conference Full-text Database 2 Hits
1 ;安徽电力调度数据网安全防护[A];[C];2005
2 Liu Chanjuan~1 Zou Ning~1 Zhang Zheng~1 Li Mingchu~2 1 School of Computer Science and Technology, Ludong University, Yantai, 264025, China 2 School of Software, Dalian University of Technology, Dalian, 116620, China;The Application of Security Audit in Power Enterprise Network Security[A];[C];2008
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 CAO Lian-jun1,WANG Wen2,MA Xiao2,DUAN Wen-jun3 (1.State Key Laboratory of Structural Analyses for Industrial Equipment,Dalian University of Technology,Dalian 116024,Liaoning Province,China;2.China Electric Power Research Institute,Haidian District,Beijing 100085, China;3.Beijing Information Science & Technology University,Haidian District,Beijing 100085,China);SECURITY ANALYSIS AND DEFENCE POLICY FOR ELECTRICITY MARKET OPERATION SYSTEM[J];Power System Technology;2005-07
2 Liang Kexin LI Tao Liu Yong Chen Huan(Dept.of Computer,Sichuan University,Chengdu610065);A New Model of Intrusion Detection Based on Artificial Immune Theory[J];Computer Engineering and Applications;2005-02
3 ZHANG Ke1,3 WU Yu2 LIU Nai-qi3 JIA Hai-tao1(Research Institute of Electronic Science and Technology,University of Electronic Science and Technology of China,Chengdu 610054,China)1(Intel Corp.Shanghai Research Center,Shanghai 201100,China)2(School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China)3;Design of Advanced IDS Architecture for Electricity Information Networks[J];Computer Science;2009-03
4 WU Zejun,QIAN Lijin,LIANG Yiwen (State Key Laboratory of Software Engineering/Computer Science School, Wuhan University, Wuhan 430072);An Immunity-based Clonal Selection Algorithm for Intrusion Detection Systems[J];Computer Engineering;2004-06
5 XU Chun,LI Tao,LIU Sun-jun,YANG Pin,LIU Nian,ZHANG Jian-hua(Department of Computer Science,Sichuan University,Chengdu,Sichuan 610064,China);The Research for an Improved Dynamic Clonal Selection Algorithm Applied to Intrusion Detection[J];Journal of Air Force Engineering University(Natural Science Edition);2006-03
6 XU Jing1,2,LI Yong-zhong1,ZHAO Bo1,YANG Ge1 1.College of Electrics and Information,Jiangsu University of Science and Technology,Zhenjiang,Jiangsu 212003,China 2.College of Electrical and Information Engineering,Yancheng Institute of Technology,Yancheng,Jiangsu 224003,China;Research of intrusion detection based on improved algorithm of dynamic clonal[J];Computer Engineering and Applications;2008-05
7 ZHENG Li-ping, YE Zhen (School of Computer Science and Information Engineering, Hefei University of Technology, Hefei 230009, China);Improvement in common intrusion detection framework (CIDF) and analysis[J];Computer Engineering and Design;2003-11
8 ZHANG Wei,WANG Tao,PAN Yan-hui,HAO Zhen-hua(Department of Computer Engineering,Ordnance Engineering College,Shijiazhuang 050003,China);Data packet capture and applications based on WinPcap[J];Computer Engineering and Design;2008-07
9 WEI Mianwei,WANG Quande,WANG Xianpei(Laboratory of System Integrated and Faults Diagnostics,Wuhan University,Wuhan 430072,China);Application of intrusion detection system to electric power system information network[J];Engineering Journal of Wuhan University;2006-02
10 ZHANG Si hai, LUO Wen jian, CAO Xian bin, WANG Xu fa (Department of Computer Science and Technology,University of Science and Technology of China, Hefei, 230026, China);An Immune Learning Sub-system Used in the Network Intrusion Detection System[J];Mini-micro Systems;2003-08
【Secondary Citations】
Chinese Journal Full-text Database 7 Hits
1 Xin Yaozhong,L u Changyan National Electric Power Dispatching and Communication Center,Beijing 1 0 0 761 ,China;ANALYSISOF DATA NETWORK TECHNOLOGY ARCHITECTURE FOR POWER SYSTEMS[J];AUTOMATION OF ELECTRIC POWER SYSTEMS;2000-21
2 Wang Yimin,Xin Yaozhong,X iang L i,L u Changyan,Zou Guohui,Peng Qingqing National Electric Power Dispatching & Com munication Center,Beijing 10 0 76 1,China;SECURITY AND PROTECTION OF DISPATCHING AUTOMATION SYSTEMS AND DIGITAL NETWORKS[J];Automation of Electric Power Systems;2001-21
3 Gao Zhuo,L uo Yi,Tu Guangyu,Wu Tong Huazhong U niversity of Science and Technology,Wuhan430 0 74,China;ANALYSISOF COMPUTER NETWORK SECURITY IN SUBSTATION[J];Automation of Electric Power Systems;2002-01
4 Hu Yan1 ,Dong Mingchui2 1.Tsinghua U niversity,Beijing 10 0 0 84,China 2 .Com puter and System Engineering Institute of Macau,Macau,China;SOLVING SIGNATURE PROBLEM OF SENSITIVE DOCUMENTSWITH DIGITAL SIGNATURE IN POWER SYSTEM[J];Automation of Electric Power Systems;2002-01
5 XIN Yao\|zhong (National Power Dispaching & Communication Centre, Beijing 100761, China);DEVELOPMENT TREND OF POWER SYSTEM DISPATCHING AUTOMATION TECHNIQUE IN 21st CENTURY[J];Power System Technology;2001-12
6 JIN Bo *, LIN Jia jun, WANG Xing yu (Information Technology and Engineering Center ECUST, Shanghai 200237, China);Intrusion Detection Technology, A Summary[J];JOURNAL OF EAST CHINA UNIVERSITY OF SCIENCE AND TECHNOLOGY;2000-02
7 ;Developmental Tendency and Strategy for Automation of Thermal Power Plant in China[J];ELECTRIC POWER;1999-10
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved