Affiliation:
1. 1 China National Grid Anhui Electric Power Co., Ltd ., Hefei , Anhui , , China .
Abstract
Abstract
The construction of an intelligent power grid system has promoted innovation and development in the power grid industry, but the distribution network covers a wide range and has more access data, and the network attack risk is the focus of attention. In this regard, the stochastic forest model is introduced to build the distribution network risk detection model based on the software-defined network. The first is to study the power grid system based on a software-defined network, realize the analysis and extraction of the characteristics of abnormal power grid engineering data, and realize the diagnosis of risk data through a random forest model. At the same time, considering the long modeling time of the random forest model and the low classification accuracy in unbalanced samples, the feature selection model is introduced to optimize the random forest model, and the sampling weight function is set to improve the insufficient sampling accuracy of random forest model in small samples. The model classification effect is evaluated during the model performance test. The proposed model is the most accurate of the three data sets. In the three data classification tests of Satimage, Senbased, and Cleveland, the accuracy of MICRO Average is respectively 0.886, 0.986 and 0.856. At the same time, the proposed model is superior to other models in terms of training time and variance stability test. When the data set is 18000, the model accuracy is 0.968, which is better than the other two models. The research content has important reference value for maintaining communication security and improving system stability in distribution networks.
Subject
Applied Mathematics,Engineering (miscellaneous),Modeling and Simulation,General Computer Science
Reference19 articles.
1. Priyadarsini, M., Bera, P., Das, S. K., Rahman, M. A. (2022). A security enforcement framework for SDN controller using game theoretic approach. IEEE Transactions on Dependable and Secure Computing, 20(2): 1500-1515.
2. Ren, J., Li, J., Liu, H., Qin, T. (2021). Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT. Tsinghua Science and Technology, 27(4): 760-776.
3. Glavan, A,. Gheorghica, D., Croitoru, V. (2023). Multi-access edge computing analysis of risks and security measures. Revue roumaine des sciences techniques—série électrotechnique et énergétique, 68(2): 206-211.
4. Malkawi, R., Alsmadi, I., Aleroud, A. (2021). A firewall-adversarial testing approach for software defined networks. Journal of Theoretical and Applied Information Technology, 99(1): 227-241.
5. Häckel, T., Meyer, P., Korf, F., Schmidt, T. (2022). Secure time-sensitive software-defined networking in vehicles. IEEE Transactions on Vehicular Technology, 72(1): 35-51.