White-box detection method for single point data attack in power system
A technology of power system and detection method, which is applied in the direction of electric digital data processing, instrumentation, calculation, etc., and can solve the problem that it is difficult to identify linear intrusion attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.
[0039] figure 1 It is a system structure diagram of the present invention. There are six modules: power system data input module, control logic module, automatic identification module, output module, judgment module, and feedback module. Among them, the control logic module and the automatic identification module are the two core modules in the device. Different function programs are installed in these two modules, which can calculate and verify the input power system data. When the tampered data of the malicious attack is relatively simple, the control module can directly judge the attack location, and output the result feedback. When the tampered data of the malicious attack is more complex and the control module is not enough to judge, the result will be transferred to the automatic identification module, and the multiple functions defined in this ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

