Unlock instant, AI-driven research and patent intelligence for your innovation.

A Detection Method of Malicious Data in Power System Based on Jensen-Shannon Distance

A technology of malicious data and detection methods, applied in the fields of electrical digital data processing, instruments, computing, etc., can solve the problem of inability to detect malicious data, and achieve the goal of improving engineering practicability, improving success rate, good stability and practicability. Effect

Active Publication Date: 2018-09-21
HOHAI UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the distribution function of the measured variation is discontinuous, the proposed method cannot detect malicious data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Detection Method of Malicious Data in Power System Based on Jensen-Shannon Distance
  • A Detection Method of Malicious Data in Power System Based on Jensen-Shannon Distance
  • A Detection Method of Malicious Data in Power System Based on Jensen-Shannon Distance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0080] Introduce the calculation example of the present invention below:

[0081] The calculation example tested by the present invention is a standard IEEE14 node system, such as figure 2 shown. The load change curve in this system is the load data of the 220 kV bus in an actual area, and the sampling interval is 5 minutes; The redundancy is 2.5 (the measurement redundancy of the actual transmission network is around 3).

[0082] The power system is a quasi-steady state system, so the state of the system changes slowly at adjacent moments, and the corresponding quantity measurement changes are also small. Assume that the real-time quantity measurement of the system at time k is z k , the measurement change at this moment is Δz k =z k -z k-1 . Such as Figure 3 to Figure 6 Shown is the histogram of the IEEE14 power-saving system measurement change from December 2010 to March 2011.

[0083] Depend on Figure 3 to Figure 6 It can be seen that when the power system is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a detection method of malicious data in an electric power system based on Jensen-Shannon distance. The method firstly utilizes Jensen-Shannon distance to detect malicious data in the electric power system in the modern world so that the engineering practicality of the detection method of malicious data is improved. The method is used for calculating Jensen-Shannon distance between real-time measurement of probability distribution of variable quantity and historical measurement of variable quantity probability distribution, that is to say, Jensen-Shannon distance between probability distribution of variable quantity in the historical and normal conditions to determine whether the current electric power system is hacked by the malicious data. Furthermore, effectively detection is carried out when the measurement of variable quantity distribution is not continuous. The method fully utilizes distribution features of existing measurement data so that success rate of detection of malicious data is increased. Without affection of influence of hacking types, stability and practicability are improved.

Description

technical field [0001] The invention relates to a method for detecting malicious data in a modern power system based on the Jensen-Shannon distance, and belongs to the technical field of power system monitoring, analysis and control. Background technique [0002] State estimation is one of the basic applications of power grid energy management system (EMS), and the accuracy of state estimation directly affects advanced applications of real-time monitoring of power systems. In recent years, false data injection attack (FDIA) has seriously threatened the safe and stable operation of power systems. This new type of network attack can successfully avoid the bad data detection link in state estimation, making the estimation result seriously deviate from the actual operation of the power grid, which in turn leads to misjudgment or misoperation by dispatchers. [0003] Malicious data injection attackers attack information systems represented by supervisory control and data acquisi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F2221/034
Inventor 黄蔓云孙国强卫志农孙永辉
Owner HOHAI UNIV