Skip to main content
Top

2018 | OriginalPaper | Chapter

Power Network Vulnerability Detection Based on Improved Adaboost Algorithm

Authors : Wenwei Tao, Song Liu, Yang Su, Chao Hu

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The impact of the Internet on the power industry is increasing, the detection of power network vulnerability becomes more and more important. Traditional power network vulnerabilities detection methods are relatively labor-intensive and inefficient, so, the power network vulnerability detection algorithm based on improved Adaboost is proposed in this paper. It is a kind of machine learning algorithm, which select C4.5 decision tree as weak classifier to integrate a strong classifier. Compared with neural network, KNN and other methods, the proposed algorithm is more efficient in power network vulnerability detection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Liu, Y., Che, W., Liu, T., Zhang, M.: A comparison study of sequence labeling methods for Chinese word segmentation, POS tagging models. J. Chin. Inf. Process. 27, 30–36 (2013) Liu, Y., Che, W., Liu, T., Zhang, M.: A comparison study of sequence labeling methods for Chinese word segmentation, POS tagging models. J. Chin. Inf. Process. 27, 30–36 (2013)
2.
go back to reference Feng, X.Z., Hao, P.: Information of product review mining based on analyzing of part of speech. Comput. Eng. Des. 34(1), 283–288 (2013) Feng, X.Z., Hao, P.: Information of product review mining based on analyzing of part of speech. Comput. Eng. Des. 34(1), 283–288 (2013)
3.
go back to reference Juan, Y.U., Dang, Y.Z.: Chinese term extraction based on POS analysis & string frequency. Syst. Eng.-Theory Pract. (2010) Juan, Y.U., Dang, Y.Z.: Chinese term extraction based on POS analysis & string frequency. Syst. Eng.-Theory Pract. (2010)
4.
go back to reference Wei, Y.G., Zhang, G.C., Chang, Y., Yuan, F.: Deep web semantic annotation method based on Chinese part-of-speech and domain knowledge. J. Zhengzhou Univ. (2009) Wei, Y.G., Zhang, G.C., Chang, Y., Yuan, F.: Deep web semantic annotation method based on Chinese part-of-speech and domain knowledge. J. Zhengzhou Univ. (2009)
5.
go back to reference Ouerdi, N., Elfarissi, I., Azizi, A., Azizi, M., et al.: Artificial neural network-based methodology for vulnerabilities detection in EMV cards. In: International Conference on Information Assurance and Security, pp. 85–90. IEEE (2015) Ouerdi, N., Elfarissi, I., Azizi, A., Azizi, M., et al.: Artificial neural network-based methodology for vulnerabilities detection in EMV cards. In: International Conference on Information Assurance and Security, pp. 85–90. IEEE (2015)
6.
go back to reference Tarik, H., Ouerdi, N.: EMV cards vulnerabilities detection using ANN. In: International Conference on Information Technology for Organizations Development (2016) Tarik, H., Ouerdi, N.: EMV cards vulnerabilities detection using ANN. In: International Conference on Information Technology for Organizations Development (2016)
7.
go back to reference Chow, M.Y., Sharpe, R.N., Hung, J.C.: On the application and design of artificial neural networks for motor fault detection. IEEE Trans. Ind. Electron. 40(2), 189–196 (1993)CrossRef Chow, M.Y., Sharpe, R.N., Hung, J.C.: On the application and design of artificial neural networks for motor fault detection. IEEE Trans. Ind. Electron. 40(2), 189–196 (1993)CrossRef
8.
go back to reference Tzafestas, S.G., Dalianis, P.J.: Fault diagnosis in complex systems using artificial neural networks. In: Proceedings of the Third IEEE Conference on Control Applications, pp. 877–882. IEEE Xplore, Glasgow (1994) Tzafestas, S.G., Dalianis, P.J.: Fault diagnosis in complex systems using artificial neural networks. In: Proceedings of the Third IEEE Conference on Control Applications, pp. 877–882. IEEE Xplore, Glasgow (1994)
9.
go back to reference Wang, H.: Actuator fault diagnosis for nonlinear dynamic system. Trans. Inst. Meas. Control. 17(2), 63–71 (1995)CrossRef Wang, H.: Actuator fault diagnosis for nonlinear dynamic system. Trans. Inst. Meas. Control. 17(2), 63–71 (1995)CrossRef
10.
go back to reference Polycarpou, M.M., Helmicki, A.J.: Automated fault detection and accommodation: a learning systems approach. IEEE Trans. Syst. Man Cybern. 25(11), 1447–1458 (1995)CrossRef Polycarpou, M.M., Helmicki, A.J.: Automated fault detection and accommodation: a learning systems approach. IEEE Trans. Syst. Man Cybern. 25(11), 1447–1458 (1995)CrossRef
11.
go back to reference Patton, R.J., Chen, J., Siew, T.M.: Fault diagnosis in nonlinear dynamic systems via neural networks. In: International Conference on Control, IET, vol. 2, pp. 1346–1351 (2002) Patton, R.J., Chen, J., Siew, T.M.: Fault diagnosis in nonlinear dynamic systems via neural networks. In: International Conference on Control, IET, vol. 2, pp. 1346–1351 (2002)
12.
go back to reference Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. Mol. Biol. 147, 195–197 (1981)CrossRef Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. Mol. Biol. 147, 195–197 (1981)CrossRef
13.
go back to reference Valiant, L.G.: A theory of the learnable. Commun. ACM 27(11), 1134–1142 (1984)CrossRef Valiant, L.G.: A theory of the learnable. Commun. ACM 27(11), 1134–1142 (1984)CrossRef
15.
go back to reference Pitts, W.: A logical calculus of the ideas immanent in nervous activity. Bull. Math. Biophys. 5(4), 115–133 (1943)MathSciNetCrossRef Pitts, W.: A logical calculus of the ideas immanent in nervous activity. Bull. Math. Biophys. 5(4), 115–133 (1943)MathSciNetCrossRef
16.
go back to reference Cover, T., Hart, P.: Nearest neighbor pattern classification. IEEE Press 13(1), 21–27 (1967)MATH Cover, T., Hart, P.: Nearest neighbor pattern classification. IEEE Press 13(1), 21–27 (1967)MATH
17.
go back to reference Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., Burlington (1993) Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., Burlington (1993)
Metadata
Title
Power Network Vulnerability Detection Based on Improved Adaboost Algorithm
Authors
Wenwei Tao
Song Liu
Yang Su
Chao Hu
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_58

Premium Partner