Active immune attack identification method and charging device

A technology of attack identification and active immunity, applied in electric vehicle charging technology, charging stations, electric vehicles, etc., can solve problems such as grid resonance, public grid voltage fluctuation, and attacks

Active Publication Date: 2020-05-01
SHENZHEN POWER SUPPLY BUREAU +2
View PDF11 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is an important bridge connecting the upper-level AC power distribution cabinet to provide electric energy to the user's electric vehicle. For the station-level monitoring system, it is an important source interface for providing data. The charging device will monitor the status of the charging process. Data analysis, electric energy billing and user information, etc. are uploaded to the station-level monitoring system for analysis and storage of relevant data. However, with the development of the network and changes in the international form, there are many hidden dangers in the network security of traditional charging devices , under normal circumstances, one or more security holes will give the attacker an opportunity, the attacker can use this security hole as a breakthrough to occupy the network resources of the attacked by means of creating a large amount of useless data or repeatedly sending requests or interfere with the normal communication of the victim
In traditional charging devices, it is easy for hackers to launch various attacks based on known security vulnerabilities
Attackers can inject Trojans into the charging device and use it as a springboard to gradually invade the upper-layer system; attackers can also repeatedly send malformed attack data based on the flaws in the transmission protocol of the charging device, such as tampering with electricity consumption data to steal electricity bills, real-time electricity prices, etc. The manipulation and tampering of voltage data will cause voltage fluctuations in the public grid, and even further cause adverse consequences such as grid resonance, which will directly affect the safe and stable operation of the grid.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active immune attack identification method and charging device
  • Active immune attack identification method and charging device
  • Active immune attack identification method and charging device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0084] Such as figure 1 As shown, in the existing electric vehicle charging system, each power station is equipped with a station-level monitoring system, an Internet of Vehicles platform, a charging device, an AC power distribution system, a transformer, and a public power grid. The system communicates with the charging device (charging pile) through the TCP / IP protocol, and the charging device is connected with the AC power distribution system. Publish the current situation of the site in real time.

[0085] Such as figure 2 As shown, the present invention discloses a method for identifying an active immune attack, comprising the following steps:

[0086] Step 1. Obtain the real-time data stream of the charging device. The data stream is characteristic data or influencing factors that can represent whether the data is attacked. The data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an active immune attack identification method. The active immune attack identification method comprises the following steps: acquiring a real-time data stream of a charging device; carrying out real-time detection and classification on the data flow through a stack type self-encoding network model so as to judge whether abnormal data exists in the data flow or not, and directly forwarding the data when the abnormal data does not exist; and when abnormal data exists, intercepting the real-time data flow, sending out an alarm prompt, generating a log record, and meanwhile,stopping the machine. The invention further provides a charging device. Compared with the prior art, the data obtained by the charging device is analyzed and classified through the stack type auto-encoder network model, and the probability of being attacked by the network is output, so that whether the data is attacked or not is judged, corresponding operation is executed, the information safetyand the operation reliability of the charging device are guaranteed, and the safety of a power grid is guaranteed.

Description

technical field [0001] The invention relates to a charging device, in particular to an active immune attack identification method for the charging device and the charging device. Background technique [0002] The automobile industry is a pillar industry of the national economy and a landmark industry that reflects national competitiveness. But at the same time, our country's environment is facing great pressure and challenges, especially air pollution. Automobile exhaust emissions are regarded as one of the culprits of air pollution by default. The number of fuel vehicles in my country ranks first in the world, and the number is still growing rapidly. In order to reduce exhaust pollution, it is imperative to promote the development of new energy vehicles. [0003] Since 1993, my country has become a net importer of oil, and the amount of oil imports has increased year by year. Due to the relatively insufficient production of fossil energy, especially oil and natural gas, m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06B60L53/60B60L53/66
CPCB60L53/60B60L53/66B60L53/665H04L63/1416H04L63/1425Y02T10/70Y02T10/7072Y02T90/12Y02T90/16Y04S40/20
Inventor 吴海涛徐成斌肖声远刘威陈锐罗伟峰汪伟李重杭习伟匡晓云姚浩于杨简淦杨杨祎巍祖连兴丁凯朱小帆贺生国黄植炜何鸿雁陈远生占捷文王乾刚
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products