Computer and Modernization ›› 2025, Vol. 0 ›› Issue (08): 48-56.doi: 10.3969/j.issn.1006-2475.2025.08.007

Previous Articles     Next Articles

A Intrusion Detection Method Based on Imbalanced Power Communication Traffic 

  

  1. (1. Electric Power Research Institute, Guangdong Power Grid Co., Ltd., Guangzhou 510080, China; 2. Key Laboratory of Power Equipment Reliability for Enterprises in Guangdong (Electric Power Research Institute of Guangdong Power Grid Co., Ltd.), Guangzhou 510080, China; 3. Nanjing University of Posts and Telecommunications, Nanjing 210003, China) 
  • Online:2025-08-27 Published:2025-08-27

Abstract: Abstract: With the proliferation of the Internet, cybersecurity issues have become increasingly prominent. Ensuring network security is crucial within electric power communication networks. However, one challenge faced by these networks is the disparity in the volume between normal and abnormal traffic, as well as the uneven distribution among different types of abnormal traffic. To address this issue, this paper proposes an intrusion detection method for imbalanced electric power communication traffic, named GSMOTE-EAVA. GSMOTE-EAVA firstly utilizes Recursive Feature Elimination for data preprocessing and feature selection by calculating the importance of features to identify the most critical ones. Secondly, to tackle the challenge of data imbalance, a Gaussian noise-based SMOTE algorithm is employed to augment the communication traffic data, thus enhancing the neural network model’s ability to learn and adapt to various situations. Finally, an ensemble adaptive voting algorithm based on classifiers like decision trees, random forests, KNN, and DNN is designed to implement intrusion detection in electric power communication network traffic. Through experiments on the IEC 60870-5-104 intrusion detection dataset and CICIDS2017 dataset, the proposed model significantly improves the detection rate of small sample categories in the dataset under four classifications, and can effectively identify and deal with abnormal traffic in the power communication network.

Key words: Key words: network security, machine learning, recursive feature elimination, intrusion detection, deep neural network

CLC Number: