Unlock instant, AI-driven research and patent intelligence for your innovation.

An attack simulation method and system for power cyber-physical systems

A technology of power information and physical systems, applied in the field of attack simulation methods and systems, can solve problems such as multiple high-concealment lines, poor security and stability, and blackouts, and achieve the effects of avoiding attack simulation processes, reducing implementation costs, and improving resistance

Active Publication Date: 2022-05-03
STATE GRID HUNAN ELECTRIC POWER +2
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But in fact, in addition to important or critical lines in the power system, there are many lines that can have a non-negligible impact on the operation of the power grid. A single attack on such lines may have little impact on the operation of the power grid. This type of line may cause accidents such as blackouts, so this type of line is very easy to be ignored in the attack simulation, and the attack on this type of line is highly concealed and difficult to be detected
Therefore, when using the attack simulation method of the above-mentioned traditional power system, even after the attack simulation is completed, there may still be a lot of high-concealment line fault risks, resulting in poor security and stability of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An attack simulation method and system for power cyber-physical systems
  • An attack simulation method and system for power cyber-physical systems
  • An attack simulation method and system for power cyber-physical systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described below in conjunction with the accompanying drawings and specific preferred embodiments, but the protection scope of the present invention is not limited thereby.

[0051] Such as figure 1 As shown, the steps of the attack simulation method for power cyber-physical systems in this embodiment include:

[0052] S1. Acquisition of characteristic information: obtain the characteristic information of the topology structure of the target power system;

[0053] S2. Topology model construction: construct a power information physical network topology model according to the topology feature information;

[0054] S3. Hidden line screening: Calculate the importance value of all lines in the topological model of the power cyber-physical network, and screen out hidden target lines according to the importance value;

[0055] S4. Attack simulation: take the screened target line as the attack object, conduct multiple coordinated attacks o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack simulation method and system for an electric power cyber-physical system. The steps of the method include: S1. Acquiring topology characteristic information of a target electric power system; S2. Constructing a power cyber-physical network topology model according to the topology characteristic information; S3. Calculate the importance value of all lines in the topological model of the power cyber-physical network, and screen out the hidden target lines according to the calculated importance value; S4. Take the screened target line as the attack object, and attack the power cyber-physical network The target line in the topology model conducts multiple coordinated attacks, and the attack simulation results are obtained for optimal scheduling of the power grid. The invention can realize the attack simulation of the highly concealed circuit, and improve the ability of resisting the attack of the power information physical system.

Description

technical field [0001] The invention relates to the technical field of electric power cyber-physical systems, in particular to an attack simulation method and system for electric power cyber-physical systems. Background technique [0002] With the continuous advancement of smart grid construction, the modern power grid has developed into a power cyber-physical system that is deeply integrated with the physical grid and information network. In recent years, incidents of failures caused by attacks on power systems have emerged in an endless stream, such as attackers attacking a certain link or a certain line in the power system. However, the topological structure of the power cyber-physical system is huge and complex. For example, an attack on an important or key line in a power system attack causes a fault. The coupling relationship is propagated alternately, causing cascading failures, and eventually even causing serious blackouts, which seriously damage the stable operatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H02J3/00G06Q50/06G06Q10/06
CPCH02J3/001Y04S10/50Y02E40/70
Inventor 李龙李振文杨丹周舟沃潇潇魏培周鑫蔡晔钟悠
Owner STATE GRID HUNAN ELECTRIC POWER