Unlock instant, AI-driven research and patent intelligence for your innovation.

A generalized false data injection attack identification method for power cps

A false data injection attack technology, applied in data processing applications, character and pattern recognition, instruments, etc., can solve problems such as easy overfitting, high data dimension, and data imbalance

Active Publication Date: 2022-06-28
NORTHEAST DIANLI UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to solve the problems of unbalanced data, too high data dimension, improper model configuration and easy over-fitting in the identification process of power CPS generalized false data injection attack, and propose a scientific, reasonable and efficient method from the perspective of data mining on the physical side , a generalized false data injection attack identification method for power CPS with strong applicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A generalized false data injection attack identification method for power cps
  • A generalized false data injection attack identification method for power cps
  • A generalized false data injection attack identification method for power cps

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described below with reference to the accompanying drawings and specific embodiments.

[0050] refer to Figure 1-Figure 3 , a power CPS generalized false data injection attack identification method of the present invention includes the following contents:

[0051] 1 Data balance processing method of cyber-physical fusion

[0052] The centralized KMeans-Smote is an improved algorithm for the traditional KMeans-Smote, which minimizes the sampling noise caused by the oversampling process and realizes the balanced processing of the power cyber-physical fusion dataset. First, the imbalance rate of the dataset is calculated, and if the imbalance rate is lower than 50%, the oversampling operation is performed. In order to control the error caused by oversampling, the sampling is performed in steps to control the sampling noise. The step-by-step sampling strategy is as follows: figure 2 shown. First, find the average of the samples of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identification method for generalized false data injection attack of electric power CPS. Its characteristics include: cyber-physical fusion data balance processing method, GFDIA recognition optimal feature subset determination method, GFDIA recognizer construction method and the content of obtaining the power CPS generalized false data injection attack recognition model. This method can overcome the traditional The deep forest algorithm has the following problems in the GFDIA identification of the power information physics fusion system: the problem of high false positive rate of recognition when the data is unbalanced, the problem of increased model complexity caused by excessive data dimensions, and the problem of GFDIA caused by unreasonable model construction. Insufficient recognition accuracy and easy over-fitting problems, and then provide a stable and efficient GFDIA recognition scheme. The method is scientific and reasonable, and can be applied to the identification of generalized false data injection attacks in the field of power CPS.

Description

technical field [0001] The invention relates to the field of power grid security, and relates to a generalized false data injection attack identification method for power CPS. Background technique [0002] With the continuous development of smart grid construction and the improvement of power system automation, the number of power grid sensors, the scale of information networks and the number of decision-making units have increased significantly. The modern power system is no longer a physical network composed of a single power device, but has developed into a Cyber-Physical-System (CPS) with a high degree of cyber-physical integration. Power CPS completes the state perception and dynamic control of the physical power grid by introducing sensing equipment, communication network and computing equipment, making the power system more stable and intelligent. However, due to the loopholes in the cyberspace and the complex information-physical coupling interaction process, inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62G06Q50/06
CPCG06Q50/06G06F18/211G06F18/23213G06F18/24323G06F18/214
Inventor 曹杰王达曲朝阳郭晓利奚洋王蕾
Owner NORTHEAST DIANLI UNIVERSITY