sis 23(4): e20

Research Article

Research on Intrusion Detection Technology of Computing Nodes in Digital Power Grid based on Artificial Intelligence

Download87 downloads
  • @ARTICLE{10.4108/eetsis.v10i3.3092,
        author={Xubin Lin and Situo Zhang and Feifei Hu and Liu Wu},
        title={Research on Intrusion Detection Technology of Computing Nodes in Digital Power Grid based on Artificial Intelligence},
        journal={EAI Endorsed Transactions on Scalable Information Systems},
        volume={10},
        number={4},
        publisher={EAI},
        journal_a={SIS},
        year={2023},
        month={5},
        keywords={Intrusion detection, artificial intelligence, performance analysis},
        doi={10.4108/eetsis.v10i3.3092}
    }
    
  • Xubin Lin
    Situo Zhang
    Feifei Hu
    Liu Wu
    Year: 2023
    Research on Intrusion Detection Technology of Computing Nodes in Digital Power Grid based on Artificial Intelligence
    SIS
    EAI
    DOI: 10.4108/eetsis.v10i3.3092
Xubin Lin1,*, Situo Zhang1, Feifei Hu1, Liu Wu1
  • 1: Power dispatching control center of China Southern Power Grid, Guangzhou, China
*Contact email: xubinlin2023@hotmail.com

Abstract

This paper aims to investigate an intrusion detection network for digital power grid networks, which consists of an edge server and two computational nodes that work collaboratively to detect any potential intrusion in the network. The primary objective of this study is to enhance the effectiveness of intrusion detection in the network. To achieve this objective, we first define the outage probability of the intrusion detection system under consideration. This is done to provide a measure of the probability that the system fails to detect an intrusion when it occurs. We then derive a closed-form expression for the outage probability to enable further analysis on the system behavior. Since the system resources, such as transmit power, are limited, we further design a transmit power allocation strategy to improve the system performance. This strategy seeks to optimize the allocation of transmit power across the different nodes of the intrusion detection network to maximize the likelihood of detecting intrusions while minimizing the resource usage. Finally, to evaluate the performance of the proposed system, we conduct simulations and provide results that demonstrate the accuracy of the closed-form expression and the effectiveness of the transmit power allocation strategy. These simulation results serve as evidence of the efficacy of the proposed approach in detecting intrusions in a resource-constrained network, especially for the digital power grid networks.