Unlock instant, AI-driven research and patent intelligence for your innovation.

Smart power network neighborhood network malicious user detection method based on power stealing suspicion degree

A malicious user and smart grid technology, applied in electrical components, circuit devices, information technology support systems, etc., can solve problems such as low detection accuracy, high computational complexity, and violation of user privacy, and achieve the effect of speeding up detection

Active Publication Date: 2018-06-05
SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problems of the existing smart grid malicious user detection methods, such as high deployment cost, high computational complexity, low detection accuracy, and possible violation of user privacy, the present invention proposes a smart grid neighborhood network based on the suspected degree of power theft. Malicious user detection method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart power network neighborhood network malicious user detection method based on power stealing suspicion degree
  • Smart power network neighborhood network malicious user detection method based on power stealing suspicion degree
  • Smart power network neighborhood network malicious user detection method based on power stealing suspicion degree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0059] The method of the invention includes three stages of user suspicion degree evaluation, binary detection tree establishment and malicious user detection. Among them, in the evaluation stage of the user's suspicion degree, the present invention mainly analyzes the user's electricity stealing history from the perspective of criminology, and compares the predicted value of the user's power consumption with the reported value to analyze the possibility of the user's electricity stealing. Based on the user's suspected degree of power theft, a binary detection tree with the user as the leaf node is established, and it is used as a logical structure to assist in finding malicious users. In this tree, users with higher suspicion levels are closer to the root node and arranged to the left. In the malicious user detection stage, the top-down and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a smart power network neighborhood network malicious user detection method based on power stealing suspicion degree. The method comprises three phases: user suspicion degree evaluation, binary detection tree establishment and malicious user detection. In the user suspicion degree evaluation phase, user power stealing records are analyzed, and predicted values of power consumption of users are compared with reported values of the users, thereby analyzing power stealing possibility of the users. On the basis of the power stealing suspicion degree of the users, a binary detection tree taking the users as leaf nodes is established, and the binary detection tree is taken as a logic structure for assisting the search of the malicious users. In the malicious user detection phase, top-down and deep first search rules are employed. A sub-detector only carries out practical detection on left children of the binary detection tree. According to the detector provided by theinvention, the vast majority of logic nodes on the binary detection tree can be skipped, so the malicious users in a smart power network neighborhood area can be positioned rapidly and accurately.

Description

technical field [0001] The invention relates to smart grid technology, in particular to a method for detecting malicious users in smart grid neighborhood networks based on the suspected degree of power theft. Background technique [0002] Smart grid, also known as "grid 2.0", integrates the latest information, communication and control technologies on the basis of traditional grids to realize bidirectional power flow and information flow. In the smart grid, the power grid company can control the operation status of the power grid in real time, timely discover, quickly diagnose and eliminate potential failures; it can ensure the safety of people, equipment and power grids in different situations such as natural disasters, external damage and computer attacks. At the same time, the smart grid can optimize the allocation of resources, improve the transmission capacity and utilization of equipment, and realize the optimal operation of the entire power system. By supporting the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H02J13/00
CPCH02J13/0013H04L63/1416H04L63/1425Y04S40/20
Inventor 梁炜夏小芳郑萌肖扬
Owner SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More