CN108182536A - A kind of power distribution network CPS safety defense methods based on bounded rationality - Google Patents

A kind of power distribution network CPS safety defense methods based on bounded rationality Download PDF

Info

Publication number
CN108182536A
CN108182536A CN201711463221.2A CN201711463221A CN108182536A CN 108182536 A CN108182536 A CN 108182536A CN 201711463221 A CN201711463221 A CN 201711463221A CN 108182536 A CN108182536 A CN 108182536A
Authority
CN
China
Prior art keywords
defences
setting
strategy
attacker
distribution network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711463221.2A
Other languages
Chinese (zh)
Other versions
CN108182536B (en
Inventor
刘鑫蕊
孙秋野
张化光
赵汀
汪刚
杨珺
吴泽群
原欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN201711463221.2A priority Critical patent/CN108182536B/en
Publication of CN108182536A publication Critical patent/CN108182536A/en
Application granted granted Critical
Publication of CN108182536B publication Critical patent/CN108182536B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Abstract

The invention discloses a kind of power distribution network CPS safety defense methods based on bounded rationality, fully with power grids multi-source datas such as Distribution Network Equipment data, power distribution network operation data, the residence time of history attacker, average reaction time, mean repair times, overall power distribution net CPS risk assessment indexs are established in terms of physical system and information system two so that each circuit risk evaluation result effectively helps the side of setting up defences to realize tactful selection of setting up defences by the learning method of playing chess based on bounded rationality.It is specific to obtain each benefit value of setting up defences for attacking strategy pair of setting up defences in terms of economic benefit and safety two respectively, final expected utility when the side of setting up defences takes Different Strategies and average benefit are obtained using logarithm synthetic method, represent that attacker and the side of setting up defences choose the dynamic change rate of certain strategy, and then the dynamic differential equation group for establishing learning model obtains power distribution network CPS Prevention-Securities satisfaction strategy with dynamic differential equation.

Description

A kind of power distribution network CPS safety defense methods based on bounded rationality
Technical field
The present invention relates to transmission & distribution electro-technical field more particularly to a kind of power distribution network CPS Prevention-Securities based on bounded rationality Method.
Background technology
With the continuous development of intelligent grid construction, the extensive access of distributed generation resource, electric vehicle etc., power distribution network It has been developing progressively to have the power distribution network CPS of various CPS characteristic features, it is higher and higher to the interdependency of information network.Due to Distribution net work structure and the very big variation of operational management, if a kind of effectively reliable distribution of state-of-the-art technology research cannot be utilized Net Prevention-Security strategy choosing method, power distribution network is difficult to successfully manage various bursts and cascading failure can to meet user security By the demand of power supply.Therefore, there is an urgent need to carry out the research of power distribution network CPS Prevention-Security strategy choosing methods.
Risk assessment is the working condition of the various accidents and electrical equipment occurred according to power distribution network to predict distribution The probability that net breaks down leads to the size of risk so as to predict to break down, is the important foundation of early warning and Prevention-Security, It has been obtained for widely studying and applying;Traditional risk assessment index only considers electric system physical part, with electric power Physics-information depth coupling, the integrity problem of information link also results in the operation risk of physical system, to ensure distribution Net CPS it is safe and stable, it is continuous, effectively run, power distribution network CPS integrated risk evaluation indexes need to be built.
Existing power grid security defence control is mainly Passive Defence, and real time information availability is low.Learning method play chess in work The rise of journey practical application provides new thinking to the selection of power distribution network Prevention-Security strategy.But the application of the strategy is built mostly It stands on the basis of rational, and actual conditions deviation is larger, reduces the confidence level that strategy chooses result.
Currently based on the study of playing chess of bounded rationality as a kind of cross-cutting, across task method, in field of power In cause the concern of more and more scholars.Study of playing chess is that the problem of different but related field is asked with existing knowledge One kind side of setting up defences decision choosing method of solution.It is premised on bounded rationality:(1) due to the influence of a large amount of uncertain factors, appoint One participant can not accurately all grasp feature, set of strategies and the Efficiency set of every other participant.(2) since attacker is every Secondary adversely affected to system is not necessarily consequence most serious under current operating conditions, i.e., participant need to seek satisfied determine Plan rather than optimizing decision.The situation that interdepends between color this strategy of jade under same power distribution network CPS is considered simultaneously, is obtained closer The practical side's of setting up defences decision is chosen as a result, the analysis and prediction of power distribution network CPS Prevention-Securities can be realized effectively.
Invention content
According to problem of the existing technology, the invention discloses a kind of power distribution network CPS based on bounded rationality is anti-safely Imperial method, by obtaining power grid multi-source data, risk evaluation model is established in terms of physical system and information system two, The integrated risk of each circuit can effectively be assessed;Build the learning model of playing chess based on bounded rationality;Again respectively from economic benefit and Two aspect of safety obtains each benefit value of setting up defences for attacking strategy pair of setting up defences, and obtains the side of setting up defences using logarithm synthetic method and adopts Final expected utility and average benefit when taking Different Strategies;And then establish the dynamic differential equation group of learning model, it obtains Obtain Prevention-Security satisfaction strategy.
Concrete scheme is:
Step 1:Power grid multi-source data is obtained, including meteorological data, Distribution Network Equipment data, power distribution network operation data, is gone through Residence time, average reaction time, mean repair time of history attacker etc., in terms of physical system and information system two Risk evaluation model is established, for describing the value-at-risk of each circuit;
Step 2:According to the risk evaluation result of each circuit, the learning model of playing chess based on bounded rationality is built, including structure Build attacker's type space set, the side's of setting up defences type space set, attacker's set of strategies, the side's of setting up defences set of strategies, participant play chess Efficiency set, participant are played chess probability set;
Step 3:For attacker choose strategy, according to participant play chess probability set choose reasonably set up defences strategy omit, Each benefit value of setting up defences for attacking strategy pair of setting up defences is obtained in terms of economic benefit and safety two respectively, is synthesized using logarithm Method obtains the side of setting up defences and takes the final expected utility of Different Strategies and average benefit;
Step 4:Strategy of specifically setting up defences for some omit, the circuit ratio for choosing the strategy is the function of time, with move The state differential equation represents its dynamic change rate.Similarly, the arbitrarily optional attack strategies of attacker can be obtained dynamically micro- accordingly Divide equation.Consequence most serious under current operating conditions is not necessarily since attacker adversely affects every time to system, i.e., Participant need to seek satisfactory decision-making rather than optimizing decision.It establishes the dynamic differential equation group of learning model, acquires differential side Journey stable equilibrium solution obtains Prevention-Security satisfaction strategy.
Further, the step 1 includes:
Risk assessment is carried out from tripartites such as customer impact, electric network influencing, external factor in face of power distribution network physical system, is commented Estimate index and include power failure number ratio, Custom interruption cost rate, it is rate of energy loss after heavily loaded overload prevention device number, failure, important User's power failure risk, emergency set are equipped with ability, repair time influence factor and weather conditions etc..
Risk assessment, assessment are carried out from information security, communication security and physical security tripartite in face of distribution web information system Index includes completeness check, identity discriminating, access control, end user privacy safety, communication protocol safety, information transmission Safety, operating system security, virus prevention, equipment safety, network environment safety etc..
Further, the step 2 includes:
The power distribution network CPS attacks the learning model M that sets up defences against, and can be expressed as 4 tuples, i.e. M=(N, S, B, P), N =(NA, NP) it is the participant space pair of learning model of playing chess, wherein, NAFor attacker's type space set, NPFor the side of setting up defences Type space set;S=(SA, SP) it is participant's set of strategies pair, SA={ SA1, SA2, SAn, n ∈ N and n >=2 represent attacker Set of strategies, SP={ SP1, SP2, SPnRepresent the side's of setting up defences set of strategies;B=(BA, BP) it is that participant plays chess Efficiency set, by all ginsengs It is codetermined with the strategy of person;P=(p, q) is that participant plays chess probability set, piRepresent that attacker selects attack strategies SAiIt is general Rate, qjThe expression side of setting up defences selects the tactful S that sets up defencesPiProbability.Due to the influence of a large amount of uncertain factors, any participant is not Feature, set of strategies and the Efficiency set of every other participant can accurately be grasped.
Further, the step 3 includes:
Step 31:Played chess using Different Strategies, obtain corresponding economic benefit matrix and safety matrix:
Wherein, aij、bijRepresent that attacker and the side of setting up defences take S respectivelyAi、SPjWhen economic benefit, cij、dijTable respectively Show that attacker and the side of setting up defences take SAi、SPjWhen safety, n, m represent in the side of setting up defences and attacker's set of strategies element respectively Number.
Step 32:For the side of setting up defences, policymaker is with different probability qiS is omited to each strategy of setting up defencesPiIt is chosen, but Condition is met for entire set of strategies:Equally, attacker policymaker is with different Probability psiTo each attack strategies SAiIt is chosen, entire set of strategies is met:Calculate the economic benefit expectation that the side's of setting up defences difference is set up defences tactful IncomeAnd its average yield
Calculate the side's of setting up defences difference set up defences strategy safety expected revenusAnd its average yield
Using logarithm synthetic method calculate the side's of setting up defences difference set up defences strategy synthesis expected revenusWith comprehensive average yield
Further, the step 4 includes:
Step 41:Since the side of setting up defences income junior can learn to imitate the strategy selected by high yield person, for the side of setting up defences Optional strategy in set of strategies, choosing the circuit ratio of Different Strategies will change over time, use qi(t) It represents, wherein, qi(t) it represents to select the strategy summary S that sets up defencesPiCircuit ratio, and meetAttacker chooses different The circuit ratio dynamic change at any time of strategy, uses pi(t) it is indicated, wherein, pi(t) meet
Step 42:For some specific defence policies Spi, the circuit ratio for choosing the strategy is the function of time, is moved State rate of change can be represented with dynamic differential equation:
Wherein λiRepresent the random variability using the tactful i that sets up defences, kαiFor strength factor.
For the arbitrary optional attack strategies S of attackerAiIt can obtain corresponding dynamic differential equation:
Wherein ρiRepresent the random variability using attack strategies i, kβiFor strength factor.
Step 43:It enablesStable equilibrium solution is acquired, obtains Prevention-Security satisfaction strategy, i.e., The side of setting up defences can defend successful most simple strategy.By drawing the phase diagram of dynamic differential equation, power distribution network Prevention-Security is realized The analysis and prediction of strategy.
By adopting the above-described technical solution, a kind of power distribution network CPS based on bounded rationality provided by the invention is anti-safely Imperial method, when fully using Distribution Network Equipment data, power distribution network operation data, the residence time of history attacker, average response Between, the power grids multi-source data such as mean repair time, establish overall power distribution net CPS in terms of physical system and information system two Risk assessment index so that each circuit risk evaluation result is effectively helped by the learning method of playing chess based on bounded rationality It realizes the selection for strategy of setting up defences, in particular to works as since attacker adversely affects to be not necessarily every time to system in the side of setting up defences Consequence most serious under preceding operation conditions, i.e. participant need to seek satisfactory decision-making rather than optimizing decision, respectively from economic benefit and Two aspect of safety obtains each benefit value of setting up defences for attacking strategy pair of setting up defences, and obtains the side of setting up defences using logarithm synthetic method and adopts Final expected utility and average benefit when taking Different Strategies represent that attacker and the side of setting up defences choose certain with dynamic differential equation The dynamic change rate of strategy, and then the dynamic differential equation group for establishing learning model obtains power distribution network CPS Prevention-Securities Satisfied strategy.The essence of this method is to build the integrated risk evaluation index of physics-information coupling, and limited by being based on The method of playing chess of rationality makes the strategy of setting up defences of selection slightly more meet reality, realize power distribution network CPS Prevention-Security strategies analysis and Prediction.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only Some embodiments described in the application, for those of ordinary skill in the art, in the premise not made the creative labor Under, it can also be obtained according to these attached drawings other attached drawings.
Fig. 1 is the corresponding flow chart of steps of the method for the invention;
Fig. 2 is the corresponding core procedure figure of the method for the invention;
Fig. 3 is the corresponding power distribution network CPS integrated risk evaluation indexes of the method for the invention;
Fig. 4 is that the corresponding attacker of the method for the invention and the side's of setting up defences study play chess to set;
Fig. 5 (1) is the corresponding side's of the setting up defences dynamic differential equation phase diagram of the method for the invention;
Fig. 5 (2) is the corresponding side's of the setting up defences dynamic differential equation phase diagram of the method for the invention
Specific embodiment
To make technical scheme of the present invention and advantage clearer, with reference to the attached drawing in the embodiment of the present invention, to this Technical solution in inventive embodiments is clearly completely described:
A kind of power distribution network CPS safety defense methods based on bounded rationality as Figure 1-Figure 5, the specific steps are:
Step 1:Power grid multi-source data is obtained, including meteorological data, Distribution Network Equipment data, power distribution network operation data, is gone through Residence time, average reaction time, mean repair time of history attacker etc., in terms of physical system and information system two Risk evaluation model is established, for describing the value-at-risk of each circuit;Wherein history attacker includes power distribution network in past several years Physical attacks person and information attack person, phenomena such as physical attacks person includes harsh weather, equipment is impaired, information attack person packet Virus is included, phenomena such as hacker.Wherein participant refers to the side of setting up defences and attacker
Further, the step 1 includes:
As Fig. 1 gives the present invention power distribution network CPS integrated risk evaluation indexes used.The index includes physical system Risk assessment index and evaluating information system risk index.
Risk assessment is carried out from tripartites such as customer impact, electric network influencing, external factor in face of power distribution network physical system, is commented Estimate index and include power failure number ratio, Custom interruption cost rate, it is rate of energy loss after heavily loaded overload prevention device number, failure, important User's power failure risk, emergency set are equipped with ability, repair time influence factor and weather conditions etc..Table 1 provides power distribution network physics System risk grade and quantized value.
1 physical system risk indicator value of table and corresponding risk class quantized value
Risk assessment, assessment are carried out from information security, communication security and physical security tripartite in face of distribution web information system Index includes completeness check, identity discriminating, access control, end user privacy safety, communication protocol safety, information transmission Safety, operating system security, virus prevention, equipment safety, network environment safety etc..According to evaluating information system risk index System, safe class are divided into 7 grades, respectively very safe (95-100), safety (85-90), safer (80-85), general (70- 80), relatively hazardous (65-70), dangerous (60-65), danger close (<60).
Step 2:According to the risk evaluation result of each circuit, the learning model of playing chess based on bounded rationality is built, including structure Build attacker's type space set, the side's of setting up defences type space set, attacker's set of strategies, the side's of setting up defences set of strategies, participant play chess Efficiency set, participant are played chess probability set;Further, wherein
The step 2 includes:
The power distribution network CPS attacks the learning model M that sets up defences against, and can be expressed as 4 tuples, i.e. M=(N, S, B, P), N =(NA, NP) it is the participant space pair of learning model of playing chess, wherein, NAFor attacker's type space set, NPFor the side of setting up defences Type space set;S=(SA, SP) it is participant's set of strategies pair, it is assumed that { SA1,SA2And { SP1,SP2Be respectively attacker and The set of strategies for the side of setting up defences,;P=(p, q) is that participant plays chess probability set, piRepresent that attacker selects attack strategies SAiProbability, qjThe expression side of setting up defences selects the tactful S that sets up defencesPiProbability, both sides with different probability in respective set of strategies strategy carry out It chooses.Due to the influence of a large amount of uncertain factors, any participant can not accurately all grasp the spy of every other participant Sign, set of strategies and Efficiency set.Its both sides study plays chess to set such as Fig. 4.
Step 3:For attacker choose strategy, according to participant play chess probability set choose reasonably set up defences strategy omit, Each benefit value of setting up defences for attacking strategy pair of setting up defences is obtained in terms of economic benefit and safety two respectively, is synthesized using logarithm Method obtains the final expected utility and average benefit when the side of setting up defences takes Different Strategies;Further, the step 3 includes:
Step 31:Played chess using Different Strategies, obtain corresponding economic benefit matrix and safety matrix:
Step 32:For the side of setting up defences, policymaker is with different probability qiEach strategy of setting up defences is omitedIt is chosen, but Condition is met for entire set of strategies:Equally, attacker policymaker is with different Probability psiTo each attack strategies SAiIt is chosen, entire set of strategies is met:Calculate the economic benefit expectation that the side's of setting up defences difference is set up defences tactful IncomeAnd its average yield
Calculate the side's of setting up defences difference set up defences strategy safety expected revenusAnd its average yield
Using logarithm synthetic method calculate the side's of setting up defences difference set up defences strategy synthesis expected revenusWith comprehensive average yield
It similarly, can be in the hope of calculating attacker's Different Strategies in terms of economic benefit and safety two for attacker Expected revenus and average yield.
Calculate the safety expected revenus of attacker's difference attack strategiesAnd its average yield
Using logarithm synthetic method calculate attacker's difference set up defences strategy synthesis expected revenusWith comprehensive average yield
Step 4:Strategy of specifically setting up defences for some omit, the circuit ratio for choosing the strategy is the function of time, with move The state differential equation represents its dynamic change rate.Similarly, the arbitrarily optional attack strategies of attacker can be obtained dynamically micro- accordingly Divide equation.Consequence most serious under current operating conditions is not necessarily since attacker adversely affects every time to system, i.e., Participant need to seek satisfactory decision-making rather than optimizing decision.It establishes the dynamic differential equation group of learning model, acquires differential side Journey stable equilibrium solution obtains Prevention-Security satisfaction strategy;Further, the step 4 includes:
For some specific defence policies SP1, the circuit ratio for choosing the strategy is the function of time, and dynamic change is fast Rate can be represented with dynamic differential equation:
Enable SP(q)=0 solution q=0, q=1, then can be obtained,
For some specific defence policies SA1, the circuit ratio for choosing the strategy is the function of time, and dynamic change is fast Rate can be represented with dynamic differential equation:
Enable SA(p)=0 solution p=0, p=1, then can be obtained,
It enablesThe equilibrium state that the study is played chess can be obtained.Finally it is solved to:Wherein F1Choose pure strategy S in the expression side of setting up defencesP2, attacker's selection pure strategy SA2Wherein F2Expression is set Anti- side chooses pure strategy SP2, attacker's selection pure strategy SA1Wherein F3Choose pure strategy S in the expression side of setting up defencesP1, attack Choose pure strategy S in the side of hittingA2Wherein F1Choose pure strategy S in the expression side of setting up defencesP1, attacker's selection pure strategy SA1Wherein F5The expression side of setting up defences is to mix probabilistic combination (M, 1-M) Selection Strategy { SP1,SP2, attacker is general to mix Rate combination (N, 1-N) Selection Strategy { SA1,SA2}。
Play chess the dynamic differential equation that is individually present of both sides in model for study, by taking the side of setting up defences as an example, it is micro- to draw dynamic Divide the phase diagram of equation, learn the stable equilibrium solution progress detailed analysis that model obtains of playing chess to it.
WhenAndWhen, then q is the Prevention-Security satisfaction strategy for the side of setting up defences.I.e. dynamic differential equation is bent Line intersects with horizontal axis and tangent slope be negative point is exactly the side's of setting up defences Prevention-Security satisfaction strategy.
(1) work as p<During M, the side of setting up defences dynamic differential equation phase diagram such as Fig. 5 (1), q=0, q=1 are 2 stable states, Based on above-mentioned analysis, q=0 is the Prevention-Security satisfaction strategy for the side of setting up defences;
(2) work as p>During M, the side of setting up defences dynamic differential equation phase diagram such as Fig. 5 (2), q=0, q=1 are 2 stable states, Based on above-mentioned analysis, q=1 is the Prevention-Security satisfaction strategy for the side of setting up defences;
The stable equilibrium of dynamic differential equation can be obtained by the analysis for result of playing chess to study, and can be to strategy The variation of selection mechanism is analyzed and predicted, and realizes the selection of power distribution network CPS Prevention-Securities satisfaction strategy.
The foregoing is only a preferred embodiment of the present invention, but protection scope of the present invention be not limited to This, any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention And its inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (4)

1. a kind of power distribution network CPS safety defense methods based on bounded rationality, it is characterised in that include the following steps:
S1:Power grid multi-source data information is obtained, is used for describing the value-at-risk of each circuit from physical system and information system foundation Power grid risk assessment model, wherein power grid multi-source data include meteorological data, Distribution Network Equipment data, power distribution network operation data, Residence time, average reaction time and the mean repair time of history attacker;
S2:Power distribution network CPS is built according to the risk evaluation result of circuit each in power grid and attacks the learning model M that sets up defences against;Wherein The model is built to include building attacker's type space set, the side's of setting up defences type space set, attacker's set of strategies, the side of setting up defences Set of strategies, participant play chess Efficiency set and participant plays chess probability set;
S3:For attacker choose strategy according to participant play chess probability set selection set up defences strategy omit, respectively from economic benefit Each benefit value of setting up defences for attacking strategy pair of setting up defences is obtained with safety, the side of setting up defences is obtained using logarithm synthetic method and takes difference Final expected utility and average benefit when tactful;
S4:The circuit ratio that strategy of specifically setting up defences for some slightly chooses the strategy is the function of time, with dynamic differential side Journey represents its dynamic change rate, establishes the dynamic differential equation group of learning model, acquires differential equation stable equilibrium solution Obtain Prevention-Security satisfaction strategy.
2. a kind of power distribution network CPS safety defense methods based on bounded rationality according to claim 1, feature also exist In:Power distribution network CPS described in S2 attacks the learning model M that sets up defences against, and can be expressed as four-tuple, i.e. M=(N, S, B, P), N= (NA, NP) it is the participant space pair of learning model of playing chess, wherein, NAFor attacker's type space set, NPFor the side's of setting up defences type Spatial aggregation;S=(SA, SP) it is participant's set of strategies pair, SA={ SA1, SA2, SAn, n ∈ N and n >=2 represent attackers' strategy Collection, SP={ SP1, SP2, SPnRepresent the side's of setting up defences set of strategies;B=(BA, BP) it is that participant plays chess Efficiency set, by all participants' Strategy codetermines;P=(p, q) is that participant plays chess probability set, piRepresent that attacker selects attack strategies SAiProbability, qjTable Show that the side of setting up defences selects the tactful S that sets up defencesPiProbability.
3. a kind of power distribution network CPS safety defense methods based on bounded rationality according to claim 1, feature also exist In:In S3 specifically in the following way:
S31:Played chess using Different Strategies, obtain corresponding economic benefit matrix and safety matrix:
Wherein, aij、bijRepresent that attacker and the side of setting up defences take S respectivelyAi、SPjWhen economic benefit, cij、dijAttack is represented respectively Side and the side of setting up defences take SAi、SPjWhen safety, n, m represent element number in the side of setting up defences and attacker's set of strategies respectively;
S32:For the side of setting up defences, policymaker is with different probability qiS is omited to each strategy of setting up defencesPiIt is chosen, for entire plan Slightly collection meets condition:Equally, attacker policymaker is with different Probability psiTo each attack strategies SAiIt is chosen, Entire set of strategies is met:Calculate the side's of setting up defences difference set up defences strategy economic benefit expected revenusIt is and its flat Equal income
Calculate the side's of setting up defences difference set up defences strategy safety expected revenusAnd its average yield
Using logarithm synthetic method calculate the side's of setting up defences difference set up defences strategy synthesis expected revenusWith comprehensive average yield
4. a kind of power distribution network CPS safety defense methods based on bounded rationality according to claim 1, feature also exist In:S4 specifically uses following scheme:
S41:For the optional strategy that strategy of setting up defences slightly is concentrated, choose Different Strategies circuit ratio will over time and It changes, uses qi(t) it represents, wherein, qi(t) it represents to select the strategy summary S that sets up defencesPiCircuit ratio, and meet Attacker chooses the circuit ratio dynamic change at any time of Different Strategies, uses pi(t) it is indicated, wherein, pi(t) meet
S42:For some specific defence policies SPi, the circuit ratio for choosing the strategy is the function of time, and dynamic change is fast Rate is represented with dynamic differential equation:
Wherein λiRepresent the random variability using the tactful i that sets up defences, kαiFor strength factor;
For the arbitrary optional attack strategies S of attackerAiObtain corresponding dynamic differential equation:
Wherein ρiRepresent the random variability using attack strategies i, kβiFor strength factor;
S42:It enablesStable equilibrium solution is acquired, obtains Prevention-Security satisfaction strategy, that is, setting up defences can Enough successful most simple strategies of defence;By drawing the phase diagram of dynamic differential equation, point of power distribution network Prevention-Security strategy is realized Analysis and prediction.
CN201711463221.2A 2017-12-28 2017-12-28 CPS security defense method for power distribution network based on finiteness Active CN108182536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711463221.2A CN108182536B (en) 2017-12-28 2017-12-28 CPS security defense method for power distribution network based on finiteness

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711463221.2A CN108182536B (en) 2017-12-28 2017-12-28 CPS security defense method for power distribution network based on finiteness

Publications (2)

Publication Number Publication Date
CN108182536A true CN108182536A (en) 2018-06-19
CN108182536B CN108182536B (en) 2021-11-16

Family

ID=62548563

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711463221.2A Active CN108182536B (en) 2017-12-28 2017-12-28 CPS security defense method for power distribution network based on finiteness

Country Status (1)

Country Link
CN (1) CN108182536B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769062A (en) * 2018-06-26 2018-11-06 国网福建省电力有限公司 A kind of defence method towards power information physical system multi-Stage Network Attack
CN109005152A (en) * 2018-06-25 2018-12-14 全球能源互联网研究院有限公司 The appraisal procedure and system of one provenance net G system attack harm
CN109191326A (en) * 2018-08-23 2019-01-11 东北大学 The interdependent deposit system network attack methods of risk assessment of power distribution network CPS based on attacker visual angle
CN109299160A (en) * 2018-10-30 2019-02-01 东北大学 A kind of electric power CPS Safety Analysis Method excavated based on monitoring big data
CN109961172A (en) * 2018-12-28 2019-07-02 东南大学 A kind of CPS rare event probability forecasting method examined based on statistical model
CN110740143A (en) * 2019-11-22 2020-01-31 南京邮电大学 network attack emergency coping method based on attack tracing
CN111563330A (en) * 2020-05-07 2020-08-21 东北大学 Information physical system security optimization analysis method based on zero sum game strategy
CN112688315A (en) * 2020-12-16 2021-04-20 国网辽宁省电力有限公司经济技术研究院 Attack and defense system and method based on electric vehicle power distribution network information physical system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100235285A1 (en) * 2004-09-10 2010-09-16 Hoffberg Steven M Game theoretic prioritization system and method
CN106953879A (en) * 2017-05-12 2017-07-14 中国人民解放军信息工程大学 The cyber-defence strategy choosing method of best response dynamics Evolutionary Game Model
CN107483486A (en) * 2017-09-14 2017-12-15 中国人民解放军信息工程大学 Cyber-defence strategy choosing method based on random evolution betting model

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100235285A1 (en) * 2004-09-10 2010-09-16 Hoffberg Steven M Game theoretic prioritization system and method
CN106953879A (en) * 2017-05-12 2017-07-14 中国人民解放军信息工程大学 The cyber-defence strategy choosing method of best response dynamics Evolutionary Game Model
CN107483486A (en) * 2017-09-14 2017-12-15 中国人民解放军信息工程大学 Cyber-defence strategy choosing method based on random evolution betting model

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
丁明等: "考虑有限理性的电力系统连锁故障多阶段动态博弈防御模型", 《电力自动化设备》 *
郝然等: "区域综合能源系统多主体非完全信息下的双层博弈策略", 《电力系统自动化》 *
黄健明等: "基于攻防演化博弈模型的防御策略选取方法", 《通信学报》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109005152A (en) * 2018-06-25 2018-12-14 全球能源互联网研究院有限公司 The appraisal procedure and system of one provenance net G system attack harm
CN108769062A (en) * 2018-06-26 2018-11-06 国网福建省电力有限公司 A kind of defence method towards power information physical system multi-Stage Network Attack
CN108769062B (en) * 2018-06-26 2020-12-29 国网福建省电力有限公司 Defense method for multi-stage network attack of power information physical system
CN109191326B (en) * 2018-08-23 2021-11-30 东北大学 Attack party view angle-based network attack risk assessment method for CPS (control Performance Standard) mutual existence system of power distribution network
CN109191326A (en) * 2018-08-23 2019-01-11 东北大学 The interdependent deposit system network attack methods of risk assessment of power distribution network CPS based on attacker visual angle
CN109299160A (en) * 2018-10-30 2019-02-01 东北大学 A kind of electric power CPS Safety Analysis Method excavated based on monitoring big data
CN109299160B (en) * 2018-10-30 2021-10-29 东北大学 Power CPS security analysis method based on monitoring big data mining
CN109961172A (en) * 2018-12-28 2019-07-02 东南大学 A kind of CPS rare event probability forecasting method examined based on statistical model
CN109961172B (en) * 2018-12-28 2023-11-03 东南大学 CPS rare event probability prediction method based on statistical model test
CN110740143A (en) * 2019-11-22 2020-01-31 南京邮电大学 network attack emergency coping method based on attack tracing
CN110740143B (en) * 2019-11-22 2020-11-17 南京邮电大学 Network attack emergency coping method based on attack tracing
CN111563330A (en) * 2020-05-07 2020-08-21 东北大学 Information physical system security optimization analysis method based on zero sum game strategy
CN111563330B (en) * 2020-05-07 2023-08-04 东北大学 Information physical system security optimization analysis method based on zero and game countermeasures
CN112688315B (en) * 2020-12-16 2023-04-07 国网辽宁省电力有限公司经济技术研究院 Attack and defense system and method based on electric vehicle power distribution network information physical system
CN112688315A (en) * 2020-12-16 2021-04-20 国网辽宁省电力有限公司经济技术研究院 Attack and defense system and method based on electric vehicle power distribution network information physical system

Also Published As

Publication number Publication date
CN108182536B (en) 2021-11-16

Similar Documents

Publication Publication Date Title
CN108182536A (en) A kind of power distribution network CPS safety defense methods based on bounded rationality
CN107819785B (en) Double-layer defense method for false data injection attack of power system
CN106101252A (en) Information Security Risk guard system based on big data and trust computing
CN110138627B (en) A kind of edge side terminal security access strategy selection method based on security risk quantization
CN104901306B (en) Power grid operation safety margin calculating method taking cascading faults into consideration
CN106230773A (en) Risk evaluating system based on fuzzy matrix analytic hierarchy process (AHP)
CN108769062A (en) A kind of defence method towards power information physical system multi-Stage Network Attack
CN106529181A (en) Identification method and system for cascading failure critical line of power system
CN109217296A (en) A kind of power grid key node discrimination method based on weighting trend entropy and voltage stabilization
CN110210229B (en) Method and system for evaluating vulnerability of power grid information physical system and storage medium
CN105933316B (en) The determination method and apparatus of network security level
CN109039766B (en) Power CPS network risk propagation threshold determination method based on seepage probability
CN104598739B (en) A kind of index system construction method of network-oriented overall efficiency
CN108388975A (en) A kind of Information Security Risk transmission control method and device based on Epidemic Model
WO2024051822A1 (en) Multi-terminal collaborative dynamic security analysis method and system for distributed power supply
CN103870695A (en) Judgment method for voltage level of high power accessing power grid
CN103595734A (en) On-line social network rapid repairing method based on user associative structure partition
CN107707412A (en) Commander based on more attribute weights controls network modeling method
CN103729553A (en) Classification control method for urban safety complex events on basis of Bayesian network learning
CN106713233A (en) Method for judging and protecting network security state
Hyder et al. Optimization of cybersecurity investment strategies in the smart grid using game-theory
CN106203627A (en) A kind of method that network target range is evaluated
CN107679744B (en) Line vulnerability index-based large power grid strategic channel dynamic identification method
CN106446674B (en) Virtual machine monitoring resource allocation methods under cloud computing environment based on Attack Prediction
CN110022293A (en) A kind of electric network information physics emerging system methods of risk assessment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant