Skip to main content

Study on Distributed Intrusion Detection Systems of Power Information Network

  • Conference paper
  • First Online:
The 10th International Conference on Computer Engineering and Networks (CENet 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1274))

Included in the following conference series:

Abstract

This paper takes the electric power information network as the model of research, studies the captured data packets and the characteristics of data flow, analyzes the specific characteristics of the audit data from the angle of anomalynetwork traffic, and combines statistical variance method and regression analysis method to put forward an intrusion detection system on bases of distributed Network flow.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bawany, N.Z., Shamsi, J.A.: SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks. J. Netw. Comput. Appl. 145, 102381 (2019)

    Article  Google Scholar 

  2. Conti, M., Lal, C., Mohammadi, R., Rawat, U.: Lightweight solutions to counter DDoS attacks in software defined networking. Wire. Netw. 25(5), 2751–2768 (2019)

    Article  Google Scholar 

  3. Nabil, H.R., Kamoun, S.F.: DDoS flooding attack detection scheme based on F-divergence: Comput. Commun. 35(11), 1380–1391 (2012)

    Article  Google Scholar 

  4. Yu, S., Zhou, W., Doss, R., Jia, W.: Traceback of DDoS attacks using entropy variations. IEEE Trans. Parallel Distrib. Syst. 22(3), 412–425 (2011)

    Article  Google Scholar 

  5. Xiang, Y., Li, K., Zhou, W.: Low-Rate DDoS attacks detection and traceback by using new information metrics. IEEE Trans. Inf. Forensics Secur. 6(2), 426–437 (2011)

    Article  Google Scholar 

  6. Zhang, C.W., Yin, J.P., Cai, Z.P., Chen, W.F.: RRED: Robust RED algorithm to counter low-rate denial-of-service attacks. IEEE Commun. Lett. 14(5), 489–491 (2010)

    Article  Google Scholar 

  7. Ramadhan, G., Kurniawan, Y., Kim, C.S.: Design of TCP SYN Flood DDo S attack detection using artificial immune systems. In: International Conference on Frontiers of Information Technology (2016)

    Google Scholar 

  8. Kumar, M., Tripathi, S., Agrawal, N., Singh, S.N.: Growth of premature neonates admitted in a level III neonatal unit. Clin. Epidemiol. Glob. Health 2(2), 56–60 (2014)

    Article  Google Scholar 

  9. Ji, Q.J., Dong, Y.Q.: A load-adaptive active queue management algorithm. J. Softw. 17(5), 1140–1148 (2006)

    Article  MATH  Google Scholar 

  10. Buragohain, C., Yoti, M.J., Singh, S., et al.: Anomaly based DDoS attack detection. Int. J. Comput. Applications (2015)

    Google Scholar 

  11. Sun, Z.X., Li, Q.D.: Defending DDos attacks based on the source and destination IP address database. J. Softw. 18(10), 2613–2623 (2007)

    Article  Google Scholar 

  12. Minghui, Y., Ruchuan, R.: DDoS detection based on wavelet kernel support vector machine. J. Chin. Univ. Posts Telecommun. 15(3), 59–94 (2008)

    Article  Google Scholar 

  13. LU, N., Wang, Y., Shi, W., Diao, D.: Filtering location optimization for defending against large-scale BDoS attacks. Chin. J. Electron. 26(2), 435–444 (2017)

    Article  Google Scholar 

  14. Li, M. Li M.: An adaptive approach for defending against DDoS attacks (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shu Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, S., Taojun, Lulu, Z. (2021). Study on Distributed Intrusion Detection Systems of Power Information Network. In: Liu, Q., Liu, X., Shen, T., Qiu, X. (eds) The 10th International Conference on Computer Engineering and Networks. CENet 2020. Advances in Intelligent Systems and Computing, vol 1274. Springer, Singapore. https://doi.org/10.1007/978-981-15-8462-6_99

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8462-6_99

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8461-9

  • Online ISBN: 978-981-15-8462-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics