Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power grid upgrade method against malicious data attacks based on attack-defense structure

A malicious data attack and malicious data technology, applied in the field of power systems, can solve the problems of inability to upgrade and strengthen system components, not revealing the mechanism of system security, and not considering the security risks of dispatch centers.

Active Publication Date: 2021-01-05
HUNAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to achieve the above purpose, the present invention provides an attack-defense structure-based power grid upgrade method against malicious data attacks, which solves the problem in the prior art that does not consider the impact of malicious data injected by FDIA, and does not reveal that malicious data affects system security. The mechanism of this kind of risk cannot be quantitatively analyzed and planned; the existing method is based on component failure planning, and the considered failure is a discrete object, which does not consider the malicious data of FDA, which is essentially a continuous variable of multiple nodes in the network; now Most of the methods do not consider whether the dispatch center can take mitigation measures to effectively stabilize security risks in the upgraded network; traditional power system long-term planning methods cannot be used for systems with high attack sensitivity and high system security relevance according to the security risks of FDAA The problem of upgrading and strengthening components

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power grid upgrade method against malicious data attacks based on attack-defense structure
  • Power grid upgrade method against malicious data attacks based on attack-defense structure
  • Power grid upgrade method against malicious data attacks based on attack-defense structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0060] Such as figure 1 As shown, an attack-defense structure-based power grid upgrade method against malicious data attacks is characterized in that it includes the following steps:

[0061]Step S1, input data: input the initial case of the power system to be upgraded, including the physical parameters of the power system and the planned system data case and malicious data degree factor ρ, which will become a constant in the subsequent step model; the applica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious data attack resisting power grid upgrading method based on an attack-defense structure. The method comprises the following steps: S1, inputting physical parametersof a power system, system data cases adopted by planning and a malicious data degree factor rho; S2, simulating an attacker to inject malicious data by utilizing the simulated attack model, and obtaining a power grid security risk under the worst attack condition; S3, judging an upgrading effect; S4, power grid upgrading: based on the solution in the step S2, executing the power grid upgrading model to solve the most economical power grid upgrading scheme, and returning to the step S2 after the completion, wherein the optimal solution of the power grid upgrading model continues to increase thepower grid line capacity vector r to upgrade the power grid; S5, outputting a result. The method solves the problems that in the prior art, malicious data attacks are not considered, the malicious data influence the system security mechanism is not revealed, and quantitative analysis and planning cannot be carried out on the risk.

Description

technical field [0001] The invention belongs to the technical field of electric power systems, and relates to a defensive upgrading method of a power transmission network based on an "attack-defense" model iterative algorithm for defending against malicious data injection attacks. Background technique [0002] As the power system evolves into a cyber-physical coupling system, cyber attacks affecting power system security have occurred repeatedly in recent years, such as the South American blackout in June 2019, the Venezuelan power grid attack in 2019, the US nuclear power plant network intrusion in 2017, Israel in 2016 and 2015. Ukrainian power grid attack incident, etc. Cyber ​​attacks aimed at power system security can take various forms, among which "False Data Injection Attack" (FDIA) was proposed by Y.Liu of the University of South Florida in 2009 and received widespread attention. It has the characteristics of concealed attack, difficult to defend and huge influence....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F30/20G06Q10/04G06Q50/06
CPCG06Q10/04G06Q50/06
Inventor 车亮刘绚
Owner HUNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products