Research Article
[Retracted] Network Interconnection Security Buffer Technology for Power Monitoring System
Table 5
Abnormal behavior recognition algorithm.
| Input: a Training set of normal behavior sequence S and a unknown behavior sequence s’ | | Output: 1/0, 1 represents s’, belonging to normal behavior, and 0 indicates abnormal behavior | 1 read the training set of normal behavior sequence S | 2 The constructed vector model transform it into k-dimensional feature vector xk to generate the training sample set X | 3 train the OCSVM model based on the training sample set | 4 vectorize the unknown behavior sequence s’ to obtain the feature vector x’ | 5 substitute x’ into OCSVM model and check whether x’ is normal behavior | 6 If it is normal behavior of the model | 7 output 1 | 8 else output 0 |
|
|