Method and system for detecting malicious attacks on electric power network based on data restoration
A malicious attack and power network technology, applied in the field of information physical security of power systems, can solve problems such as misleading the control center, line tripping and even cascading failures
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0118] Further, the present invention provides an embodiment of malicious data attack detection of IEEE14 nodes. Such as figure 2 As shown, the topology structure of the IEEE14 nodes adopted in the embodiment of the present invention can be divided into an attack area A and a non-attack area N. Among them, for the attack area A, node nd 1 , nd 2 , nd 3 As a non-boundary node, node nd 4 and node nd 5 As a border node, attack area A contains lines with l 1-2 , l 1-5 , l 2-3 , l 2-4 , l 2-5 , l 3-4 and l 4-5 . The embodiment of the present invention assumes that z 1 Target attack samples for attackers to launch malicious data attacks.
[0119] Further, in the embodiment of the present invention, the reference load z under the optimal power flow is obtained according to the IEEE14 node standard calculation example 0 , and simulate n samples of normal measurement values by Monte Carlo method, so that these n samples are in [0.9~1.1]×z 0 The range conforms to norm...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


