Information network attack-oriented vulnerability node evaluation method for power grid

An information network and vulnerability technology, applied in the field of power grid cyber-physical systems, can solve problems such as relay protection error actions, economic losses, false control of PMU & SCADA systems, etc., to ensure information security and stable operation, and the analysis results are objective and accurate. Comprehensive effect of the structure

Active Publication Date: 2016-03-23
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +3
View PDF5 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Network security and information attacks based on power cyber-physical systems will have new impacts on the system, including faults that may cause line overload in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information network attack-oriented vulnerability node evaluation method for power grid
  • Information network attack-oriented vulnerability node evaluation method for power grid
  • Information network attack-oriented vulnerability node evaluation method for power grid

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be described in detail below with reference to the accompanying drawings, and the objects and effects of the present invention will become more apparent.

[0038] figure 1 It is a schematic diagram of the topology structure of the power cyber-physical system. The system presents a two-layer network topology, including the components of the power physical network and the power information network, as well as gateways and routers that ensure the interconnection of the two networks.

[0039] The lower nodes A to H are the power physical network nodes, representing generators, transformers and load nodes. The undirected solid lines between the nodes are transmission lines, and the black squares on the connection line are circuit breakers. The entire lower network represents the power physical network system. Correspondingly, the upper nodes 1 to 8 are information network nodes, representing various secondary equipment of the power grid, includin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information network attack-oriented vulnerability node evaluation method for a power grid. The method comprises the steps as follows: a topology frame of a physical power grid information system is generated; a frame model comprises all target states of a physical power grid system; information attack action position and way are constructed; and evaluation of the system vulnerability is carried out. According to the information network attack-oriented vulnerability node evaluation method for the power grid, the vulnerability in the physical power grid information system is analyzed by combining a malicious attack of an information network from a global viewpoint; the method disclosed by the invention is relatively objective and accurate; security defense opinions and suggestions are provided for grid companies and related departments; and information security and stable operation of a power transmission network and a power distribution network are ensured.

Description

technical field [0001] The invention relates to the field of power grid cyber-physical systems, in particular to a method for evaluating network security and grid vulnerability nodes. technical background [0002] With the rapid development of network technology and the massive reliance on real-time information and data for smart grid intelligent decision-making, the network security of ECPS has become a key factor restricting the development of smart grids. Many undiscovered security risks. In recent years, the major incidents of using the information network to attack the power grid system have caused widespread concern and concern. In order to cope with the increasingly severe power grid network security problems, various network security defense and control technologies for ECPS have been developed. Considering the complexity of the power grid, the wired network represented by power carrier communication and optical fiber communication and the wireless network represen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H02J3/00G06F17/50
CPCG06F30/367H02J3/00H02J2203/20Y02E60/00
Inventor 王宇飞赵婷梁潇刘贺魏明磊史善哲孙辰军王轶楠林志赟徐文渊杨强张泰民卢毅徐昀
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products