Method and system for detecting illegal data implantation internal attack in smart power grid

An internal attack and data injection technology, applied in transmission systems, information technology support systems, electrical components, etc., can solve the lack of research and solutions for smart grid illegal data injection internal attack detection, analysis, and inability to apply smart grid physics- information system issues

Active Publication Date: 2015-05-20
ZHEJIANG GONGSHANG UNIVERSITY
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this system only uses Markov theory to build hardware component models, and cannot be used to analyze the behavior characteristics of attackers in smart grid systems with physical-information fusion
[0004] In summary, the existing research on illegal data injection attacks in smart grids is almost all focused on external attack detection, and there is a lack of research and solutions for internal attack detection of illegal data injection in smart grids.
Moreover, the method of internal attack research on general information systems cannot be applied to typical physical-information systems such as smart grids.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting illegal data implantation internal attack in smart power grid
  • Method and system for detecting illegal data implantation internal attack in smart power grid
  • Method and system for detecting illegal data implantation internal attack in smart power grid

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention is described in further detail below in conjunction with the accompanying drawings.

[0043] Such as figure 1 As shown, the overall architecture of the present invention: the inner and outer layer double-layer two-way communication architecture, the inner layer architecture includes several aggregations of physical coupling belonging to the same cluster, and the aggregations are connected through multi-hop network links connected to the source node and the destination node. Carry out data communication, and finally through PDC (Phase Angle Data Controller): aggregate all data in the cluster; the outer layer connects the data aggregation nodes PDC of each inner layer to form a local area network and communicate with each other to realize different Data exchange between clusters. Its specific components: aggregation: including generator / load, PMU (synchronous phase angle measurement unit), local controller; clustering: according to the physical coup...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for detecting illegal data implantation internal attack in a smart power grid. The method adopts a bidirectional channel architecture consisting of gathering, clustering and control centers. The method comprises: (1) a gathering classification module; (2) a system initialization module; (3) a local trust evaluation module; (4) a global trust evaluation module; (5) an internal attach detection module. According to the method and the system, a trust model and a behavior model detection method are focused, and a monitoring and detection system for the illegal data implantation internal attack of the smart power grid is realized by utilizing the intrinsic characteristics of physical coupling and data consistency of the smart power grid on the basis of a graph theory, biotic community, power grid system characteristic vector and characteristic value, markov transition probability matrix theory and technology. The system can resist the internal attack of the smart power grid with high imperceptibility and powerful attack capacity; the implantation attack of illegal data can be high efficiently and accurately detected in the transient stable state process caused by external disturbance or faults.

Description

technical field [0001] The invention belongs to the technical field of smart grids, and in particular relates to a method and system for detecting internal attacks of illegal data injection in smart grids. Background technique [0002] Through the integration of communication, computing and advanced control technologies, the smart grid realizes fine-grained, real-time acquisition and transmission of power grid information, as well as efficient information resource allocation and optimal reorganization of the power system. However, as a new generation of power grid system, the smart grid integrates the information space into the physical space of the power system, making it easier for attackers to launch attacks through open networks. Therefore, the security of the grid system is facing unprecedented challenges. For example, attackers can launch attacks on the power grid through the information space, causing power system failures, large-scale power outages, and even causing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H02J13/00H04L29/06
CPCY04S40/20
Inventor 鲍海勇陆荣幸
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products