Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An active defense method applied to power control system network attack

A power control system and active defense technology, applied in the field of network security, can solve problems such as difficulty in finding loopholes and easy occurrence of loopholes, and achieve the effect of easy deployment, good effect, and fewer tampered nodes.

Active Publication Date: 2022-07-29
ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID NINGXIA ELECTRIC POWER COMPANY +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, this type of control strategy is usually more prone to loopholes at the classification boundary, and this loophole is difficult to find during model training

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An active defense method applied to power control system network attack
  • An active defense method applied to power control system network attack
  • An active defense method applied to power control system network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of the present application, but not all of the embodiments. The components of the embodiments of the present application generally described and illustrated in the drawings herein may be arranged and designed in a variety of different configurations, and the order of some steps may be changed.

[0031] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in detail:

[0032] The active defense method involved in this embodiment includes:

[0033] Step S102: Based on the deep neural network, construct a virtual controller network F for simulati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an active defense method applied to a network attack on an electric power control system. A virtual controller network, a virtual attack sample library and an attack sample generator are constructed through a black box method, and a virtual attack event is constructed, so as to investigate and repair the electric power system. , the active defense method of the present invention is easy to implement, easy to deploy in the power control system, so as to improve the stability of the system, and has a good effect on the investigation of concealed attacks.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to an active defense method applied to a network attack of a power control system. Background technique [0002] Compared with traditional power systems, today's power systems are connected to a large number of sensing, communication, computing and control equipment, which can perform wide-area measurement and control of power systems. For such measurement systems and control systems, artificial intelligence control strategies are developed. [0003] However, this type of control strategy is usually more prone to loopholes at the classification boundary, and this loophole is difficult to detect during model training. SUMMARY OF THE INVENTION [0004] The present application provides an active defense method applied to a power control system network attack. [0005] Step S102: Based on the deep neural network, construct a virtual controller network F for simulating the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06N3/04G06N3/08G06K9/62
CPCH04L63/1433H04L63/1441H04L63/20G06N3/08G06N3/045G06F18/214
Inventor 梁剑李宏强田蓓任勇王琦刘增稷蔡星浦
Owner ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID NINGXIA ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products