Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for detecting malicious attacks on electric power network based on data restoration

A malicious attack and power network technology, applied in the field of information physical security of power systems, can solve problems such as misleading the control center, line tripping and even cascading failures

Active Publication Date: 2021-12-03
HUNAN UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During this process, attackers can inject malicious data into the collected real-time power measurement values, mislead the control center to make wrong decisions, and lead to serious security incidents such as line tripping or even cascading failures.
[0003] Existing malicious data detection methods can only detect traditional noisy data or malicious data with obvious "outlier" characteristics

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting malicious attacks on electric power network based on data restoration
  • Method and system for detecting malicious attacks on electric power network based on data restoration
  • Method and system for detecting malicious attacks on electric power network based on data restoration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0118] Further, the present invention provides an embodiment of malicious data attack detection of IEEE14 nodes. Such as figure 2 As shown, the topology structure of the IEEE14 nodes adopted in the embodiment of the present invention can be divided into an attack area A and a non-attack area N. Among them, for the attack area A, node nd 1 , nd 2 , nd 3 As a non-boundary node, node nd 4 and node nd 5 As a border node, attack area A contains lines with l 1-2 , l 1-5 , l 2-3 , l 2-4 , l 2-5 , l 3-4 and l 4-5 . The embodiment of the present invention assumes that z 1 Target attack samples for attackers to launch malicious data attacks.

[0119] Further, in the embodiment of the present invention, the reference load z under the optimal power flow is obtained according to the IEEE14 node standard calculation example 0 , and simulate n samples of normal measurement values ​​by Monte Carlo method, so that these n samples are in [0.9~1.1]×z 0 The range conforms to norm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for detecting malicious attacks on electric power networks based on data restoration. According to historical sample data, a dynamic security domain of a sample set is established, and the clustering center of the dynamic security domain of the sample set is calculated; The symmetry point of the class center determines the nearest measurement value sample set to the symmetry point; calculates and injects malicious data, and realizes the judgment of network attack behavior through deep matching of malicious data attack characteristics. The invention realizes the detection of hidden malicious data attacks, and overcomes the defect that the current detection method can only effectively detect network attack behaviors with obvious abnormal point characteristics.

Description

technical field [0001] The invention relates to the technical field of power system information physical security, in particular to a method and system for detecting a malicious attack on a power network based on data restoration. Background technique [0002] The power system is a key national infrastructure, and its safe operation is crucial to ensuring national economic and social stability. In order to realize the reliable and efficient operation of the power grid, a large number of sensors transmit the real-time working condition data on site to the control center through the power communication network, and the dispatcher monitors the operation of the power system through the received real-time data. During this process, attackers can inject malicious data into the collected real-time power measurement values, mislead the control center to make wrong decisions, and lead to serious security incidents such as line tripping or even cascading failures. [0003] Existing m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62
CPCH04L63/1416H04L63/1441G06F18/23
Inventor 刘绚宋宇飞
Owner HUNAN UNIV