Unlock instant, AI-driven research and patent intelligence for your innovation.

Double-layer evaluation model, double-layer evaluation system and double-layer evaluation calculation method for network security risk of power system

A network security and power system technology, which is applied to a two-layer evaluation model of power system network security risk and its calculation field, can solve problems such as low calculation efficiency and insufficient convergence, achieve wide adaptability, avoid insufficient research and judgment, and complex calculation. low degree of effect

Active Publication Date: 2021-08-20
HUNAN UNIV
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide a two-layer evaluation model and calculation method for power system network security risks in view of the deficiencies of the existing technology, and to solve the problems of low calculation efficiency and insufficient convergence of traditional methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-layer evaluation model, double-layer evaluation system and double-layer evaluation calculation method for network security risk of power system
  • Double-layer evaluation model, double-layer evaluation system and double-layer evaluation calculation method for network security risk of power system
  • Double-layer evaluation model, double-layer evaluation system and double-layer evaluation calculation method for network security risk of power system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The invention proposes a two-layer evaluation model for solving electric system network security risks by using a cut set constraint calculation method. Solving the two-layer optimization model based on the cut set constraints is divided into three stages: the first stage is to solve the main problem model of network security risk assessment to obtain the initial solution and pass it to the sub-problem; the second stage is to relax the initial solution of the main problem as the network security The variables of the risk assessment sub-problem model; in the third stage, the sub-problem model is solved to obtain the final approximate solution, and the cut constraint is formed and passed to the main problem to realize iterative calculation until the convergence condition is met. The two-layer evaluation model of power system network security risk takes the maximization of system network security risk as the goal of the attacker in the upper layer; the goal of the defender ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a double-layer evaluation model, a double-layer evaluation system and a double-layer evaluation calculation method for a network security risk of a power system, and the method comprises the following steps: S1, setting a lower bound LB of a main problem objective function value and an upper bound UB of a sub-problem objective function value, and building a main problem model for network security risk evaluation; S2, solving an upper layer model, loosening an attack vector and updating a lower limit LB; S3, establishing an assessment sub-problem model for network security risk; S4, solving a lower-layer model, updating the upper limit UB, and constructing a cut set constraint; and S5, calculating a convergence error, and judging convergence. The problems that an existing calculation method is low in efficiency, insufficient in convergence, limited in solving range, not suitable for a large-scale system and the like are solved, and double-layer evaluation model calculation of the network security risk of the large-scale power system is achieved. The invention has the advantages of being low in calculation complexity, small in number of iterations and fast in convergence, and the network attack risk faced by the power system can be effectively evaluated.

Description

technical field [0001] The invention relates to the technical field of electric power systems, in particular to a two-layer evaluation model and a calculation method for electric power system network security risks. Background technique [0002] In recent years, the high integration of information technology and communication technology has promoted the intelligence of the power grid, and at the same time, it has also caused the power grid to face serious threats of cyber attacks. In recent years, cyber attacks on power systems around the world have occurred frequently. For example, power grids in Pakistan, Ukraine, and Israel have all suffered physical or cyber attacks. Cyber ​​attackers can effectively tamper with the working condition data in the power system, which directly affects the decision-making of the power dispatching center, resulting in overloading of transmission lines, load shedding and even cascading failures. Therefore, from the perspective of power system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F30/20G06Q10/06G06Q50/06G06F111/10
CPCG06F30/20G06Q10/0635G06Q50/06G06F2111/10
Inventor 刘绚杜敏田建伟褚旭朱宏宇
Owner HUNAN UNIV