Unlock instant, AI-driven research and patent intelligence for your innovation.

White-box detection method for single point data attack in power system

A technology of power system and detection method, which is applied in the direction of electric digital data processing, instrumentation, calculation, etc., and can solve the problem that it is difficult to identify linear intrusion attacks

Active Publication Date: 2018-11-13
SHANGHAI YUNJIAN INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These patents mainly use state estimation algorithms, which have the disadvantage of being difficult to identify linear intrusion attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • White-box detection method for single point data attack in power system
  • White-box detection method for single point data attack in power system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] figure 1 It is a system structure diagram of the present invention. There are six modules: power system data input module, control logic module, automatic identification module, output module, judgment module, and feedback module. Among them, the control logic module and the automatic identification module are the two core modules in the device. Different function programs are installed in these two modules, which can calculate and verify the input power system data. When the tampered data of the malicious attack is relatively simple, the control module can directly judge the attack location, and output the result feedback. When the tampered data of the malicious attack is more complex and the control module is not enough to judge, the result will be transferred to the automatic identification module, and the multiple functions defined in this ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a white-box detection method for a single-point data attack in a power system, aiming at behaviors in which only a single data is subjected to malicious attacks. The method obtains the function value range after establishing the function definition domain and defining the function program, and compares the change of the function value range under the operation of a complete set of control logic relationship functions to find malicious attack points. The invention is composed of a power system data input module, a control logic module, an automatic identification module, an output module, a judgment module, and a feedback module. Through the two modules of the control logic module and the automatic identification module, layer-by-layer verification is completed, and single-point maliciousness is automatically identified. The location of the attack. This detection method makes up for the limitation that the bad data identification algorithm in current power system state estimation cannot detect specific linear attacks.

Description

technical field [0001] The invention relates to the field of power system security, in particular to a white-box detection method for single-point data attacks in the power system. Background technique [0002] Modern power system is a complex coupling network system composed of physical power system and information communication system. That is to say, the failure or attack of components in any of these two systems may lead to the paralysis of the power grid. [0003] Malicious data attacks on power systems have attracted the most attention internationally in the past two years. This attack method first appeared in the Stuxnet virus in Iran, which caused the Iranian nuclear power plant to shut down. The essence of the attack is to pretend to be a legitimate user to enter the system, affect relevant data, obtain the controller, and further cause a large-scale power outage through the system influence of the power system to achieve the purpose of attacking the system. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 王勇张璧鸣刘蔚
Owner SHANGHAI YUNJIAN INFORMATION TECH CO LTD