Research on Edge Intelligence-based Security Analysis Method for Power Operation System



Download 183,24 Kb.
bet1/9
Sana15.09.2022
Hajmi183,24 Kb.
#848920
  1   2   3   4   5   6   7   8   9
Bog'liq
Research on Edge Intelligence


2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International
Conference on Edge Computing and Scalable Cloud (EdgeCom)
Research on Edge Intelligence-based Security Analysis Method for Power Operation System
Zheng Zhu1, Yingjie Tian1, Fan Li1, Hongshan Yang2, Zheng Ma3, and Guoping Rong4
Shanghai Electric Power Research Institute, Shanghai, China
2Transwarp Inc, Shanghai, China
3The Maersk Mc-Kinney Moller Institute, University of Southern Denmark, Odense, Denmark
4Software Institute, Nanjing University, Nanjing, China
Email: {zheng.zhu, yingjie.tian, li.fan}@sh.sgcc.com.cn, hongshan.yang@transwarp.io,
zma@mmmi.sdu.dk,ronggp@nju.edu.cn




978-1-7281-6550-9/20/$31.00 ©2020 IEEE 258
DOI 10.1109/CSCloud-EdgeCom49738.2020.00052


Abstract—At present, the on-site safety problems of substations and critical power equipment are mainly through inspection methods. Still, manual inspection is difficult, time-consuming, and uninterrupted inspection is not possible. The current safety management is mainly guaranteed by rules and regulations and standardized operating procedures. In the on-site environment, it is very dependent on manual execution and confirmation, and the requirements for safety supervision and operating personnel are relatively high. However, the reliability , the continuity of control and patrol cannot be fully guaranteed, and it is easy to cause security vulnerabilities and cause security accidents due to personnel slackness. In response to this shortcoming, this paper uses edge computing and image processing techniques to discover security risks in time and designs a deep convolution attention mechanism network to perform image processing. Then the network is cropped and compressed so that it can be processed at the edge, and the results are aggregated to the cloud for unified management. A comprehensive security assessment module is designed in the cloud to conduct an overall risk assessment of the results reported by all edges, and give an alarm prompt. The experimental results in the real environment show the effectiveness of this method.

Download 183,24 Kb.

Do'stlaringiz bilan baham:
  1   2   3   4   5   6   7   8   9




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish