Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack simulation method and system for electric power information physical system

A technology for power information and physical systems, applied in the field of attack simulation methods and systems, can solve problems such as highly concealed lines, poor security and stability, and large power outages, so as to avoid the attack simulation process, reduce implementation costs, and improve resistance.

Active Publication Date: 2021-05-28
STATE GRID HUNAN ELECTRIC POWER +2
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But in fact, in addition to important or critical lines in the power system, there are many lines that can have a non-negligible impact on the operation of the power grid. A single attack on such lines may have little impact on the operation of the power grid. This type of line may cause accidents such as blackouts, so this type of line is very easy to be ignored in the attack simulation, and the attack on this type of line is highly concealed and difficult to be detected
Therefore, when using the attack simulation method of the above-mentioned traditional power system, even after the attack simulation is completed, there may still be a lot of high-concealment line fault risks, resulting in poor security and stability of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack simulation method and system for electric power information physical system
  • Attack simulation method and system for electric power information physical system
  • Attack simulation method and system for electric power information physical system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described below with reference to the accompanying drawings and specific preferred embodiments, but the protection scope of the present invention is not limited thereby.

[0051] like figure 1 As shown, the steps of the attack simulation method for a power cyber-physical system in this embodiment include:

[0052] S1. Feature information acquisition: to obtain the topological structure feature information of the target power system;

[0053] S2. Topology model construction: build a power cyber-physical network topology model according to the topological structure feature information;

[0054] S3. Hidden line screening: Calculate the importance value of all lines in the power information physical network topology model, and screen out the hidden target line according to the importance value;

[0055] S4. Attack simulation: Take the selected target line as the attack object, carry out multiple coordinated attacks on the target line ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack simulation method and system for an electric power information physical system. The method comprises the following steps: S1, obtaining topological structure feature information of a target electric power system; S2, constructing an electric information physical network topology model according to the topological structure feature information; S3, calculating importance values of all lines in the electric information physical network topology model, and screening out a target line with concealment according to the calculated importance values; and S4, taking the screened target line as an attack object, and carrying out multiple times of cooperative attacks on the target line in the electric information physical network topology model to obtain an attack simulation result for carrying out optimal scheduling on a power grid. According to the invention, attack simulation of a high-concealment line can be realized, and the attack resistance of an electric power information physical system is improved.

Description

technical field [0001] The invention relates to the technical field of electric power cyber-physical systems, in particular to an attack simulation method and system for electric power cyber-physical systems. Background technique [0002] With the continuous advancement of smart grid construction, the modern power grid has developed into a power cyber-physical system that is deeply integrated with the physical grid and information network. In recent years, incidents of failures caused by attacks on power systems have emerged in an endless stream, such as attackers attacking a certain link or a certain line in the power system. However, the topological structure of the power cyber-physical system is huge and complex. For example, an attack on an important or key line in a power system attack causes a fault. The coupling relationship is propagated alternately, causing cascading failures, and eventually even causing serious blackouts, which seriously damage the stable operatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H02J3/00G06Q50/06G06Q10/06
CPCH02J3/001Y04S10/50Y02E40/70
Inventor 李龙李振文杨丹周舟沃潇潇魏培周鑫蔡晔钟悠
Owner STATE GRID HUNAN ELECTRIC POWER