skip to main content
10.1145/3674225.3674339acmotherconferencesArticle/Chapter ViewAbstractPublication PagespeaiConference Proceedingsconference-collections
research-article

Multidimensional Data Sensitivity Calculation and Classification Based on Information Entropy

Published: 31 July 2024 Publication History

Abstract

In order to evaluate the sensitivity of power data in business systems, the combined entropy of multi-dimensional attributes of data is used to calculate and classify data sensitivity. First, preprocess the power data, and then calculate the power data information entropy; then, filter the features through their information gain ratio and drift degree to reduce redundant and unstable features; finally, combine the availability and correlation of the data and quality, completing the calculation and grading of data sensitivity. This method fully considers the difference in sensitivity of different attribute information, can effectively and accurately measure the sensitivity of data, and improves the robustness of data sensitivity calculation.

References

[1]
L. F. Eliyan and R. D. Pietro, "DeMi: A Solution to Detect and Mitigate DoS Attacks in SDN," in IEEE Access, vol. 11, pp. 82477-82495, 2023.
[2]
M. Elnour, M. Noorizadeh, M. Shakerpour and R. Jain, "A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems," IEEE Access, vol. 11, pp. 86977-86998, 2023.
[3]
M. Amin, F. F. M. El-Sousy, G. A. A. Aziz, K. Gaber and O. A. Mohammed, "CPS Attacks Mitigation Approaches on Power Electronic Systems With Security Challenges for Smart Grid Applications: A Review," in IEEE Access, vol. 9, pp. 38571-38601, 2021.
[4]
Y. Song, K. Zhou, and X. Chen, “Fake bts attacks of gsm system on software radio platform,” Journal of Networks, 2012, 7(2): 275.
[5]
Y. Song, Q. Huang, J. Yang, M. Fan, A. Hu, and Y. Jiang, “IoT device fingerprinting for relieving pressure in the access control,” in Proceedings of the ACM Turing Celebration Conference-China, 2019, pp. 1–8.
[6]
L. Yang, Y. Song, S. Gao, B. Xiao, and A. Hu, “Griffin: an ensemble of autoencoders for anomaly traffic detection in SDN,” in GLOBECOM 2020-2020 IEEE Global Communications Conference, IEEE, 2020, pp. 1–6. Accessed: Oct. 27, 2023.
[7]
R. Song, Y. Song, Q. Dong, A. Hu and S. Gao, "WebLogger: Stealing your personal PINs via mobile web application," 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 2017, pp. 1-6.
[8]
Song, Rui, "GaiaWorld: A Novel Blockchain System Based on Competitive PoS Consensus Mechanism." Computers, Materials & Continua 60.3 (2019).
[9]
Y. Song, X. Zhu, Y. Hong, H. Zhang and H. Tan, "A Mobile Communication Honeypot Observing System," 2012 Fourth International Conference on Multimedia Information Networking and Security, Nanjing, China, 2012, pp. 861-865.
[10]
S. Yubo, Z. Kan, Y. Bingxin and C. Xi, "A GSM/UMTS Selective Jamming System," 2010 International Conference on Multimedia Information Networking and Security, Nanjing, China, 2010.

Index Terms

  1. Multidimensional Data Sensitivity Calculation and Classification Based on Information Entropy

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        PEAI '24: Proceedings of the 2024 International Conference on Power Electronics and Artificial Intelligence
        January 2024
        969 pages
        ISBN:9798400716638
        DOI:10.1145/3674225
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 31 July 2024

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        • Science and Technology Project of State Grid Jiangsu Electric Power Co., Ltd. Research

        Conference

        PEAI 2024

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 12
          Total Downloads
        • Downloads (Last 12 months)12
        • Downloads (Last 6 weeks)3
        Reflects downloads up to 30 Jan 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media