CN108985566A - Power information physics emerging system elasticity Promotion Strategy method for solving - Google Patents

Power information physics emerging system elasticity Promotion Strategy method for solving Download PDF

Info

Publication number
CN108985566A
CN108985566A CN201810616403.7A CN201810616403A CN108985566A CN 108985566 A CN108985566 A CN 108985566A CN 201810616403 A CN201810616403 A CN 201810616403A CN 108985566 A CN108985566 A CN 108985566A
Authority
CN
China
Prior art keywords
node
route
layer
factor
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810616403.7A
Other languages
Chinese (zh)
Other versions
CN108985566B (en
Inventor
韩冬
叶磊
孙伟卿
张垠
陈金涛
赵舫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Shanghai for Science and Technology
Original Assignee
University of Shanghai for Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Shanghai for Science and Technology filed Critical University of Shanghai for Science and Technology
Priority to CN201810616403.7A priority Critical patent/CN108985566B/en
Publication of CN108985566A publication Critical patent/CN108985566A/en
Application granted granted Critical
Publication of CN108985566B publication Critical patent/CN108985566B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0637Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • Educational Administration (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Public Health (AREA)
  • Primary Health Care (AREA)
  • Water Supply & Treatment (AREA)
  • Development Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to a kind of power information physics emerging system elasticity Promotion Strategy method for solving; route, node enhanced transformation scheme are formulated by upper layer electric network protection model; middle layer power grid challenge model is intended to maximize system loss; bottom power grid resists purpose of model and is to minimize system loss; the attacking and defending game of electric power dynamic is carried out to the model by traversal, may finally obtain that the smallest track remodelling scheme of attacker's prospective earnings and node is made to strengthen scheme.Power grid elasticity is divided into " resist and absorb ", " response and adaptation " and " recovery " three phases, the present invention can instruct power engineering personnel to be transformed before calamity to critical circuits and to nodal information system configuration information security technology appropriate, the system performance in " resist and absorb " stage, the redundancy ability of lifting system can be optimized.When system response time does not change with failure change and the resume speed of different elements is identical, it is able to ascend elasticity of the electric system when coping with disaster sexual assault.

Description

Power information physics emerging system elasticity Promotion Strategy method for solving
Technical field
The present invention relates to the crossing domains of a kind of mathematical computations and information security, in particular to a kind of rich based on dynamic attacking and defending The power information physics emerging system elasticity Promotion Strategy method for solving played chess.
Background technique
In the 1st safe leader's summit of China Internet that Beijing is held, the information-based specially committee of China Electrical Engineering Society Meeting deputy managing director concerns safely electric power CPS system, claims " if American electricity Grids are by the loss of network attack most serious 1 trillion dollars will be surpassed ".(Tang Yi, Chen Qian, Li Mengya wait the network attack in power information physics emerging system environment to Tang Yi Review Study [J] Automation of Electric Systems, 2016,40 (17): 59-69.) et al. publish an article and point out modern power systems Through being no longer only adjusted and controlling according to internal system information, more and more external informations are direct by various businesses approach Or electric power system control decision is influenced indirectly.
As China's power grid is increasingly intelligent, most of grid nodes introduce data acquisition and monitoring control (SCADA) System, this not only facilitates dispatching of power netwoks personnel and carries out load prediction, long-range grid switching operation etc., while also burying for hacker attacks Huge hidden danger.(Zhao Junhua, deck-molding fine jade, Wen Fushuan wait the enlightenment of Ukraine event: prevention is directed to the false number of power grid to Zhao Junhua According to injection attacks [J] Automation of Electric Systems, 2016,40 (7): 1-3.) et al. research article summarize and analyze false number According to the principle and its influence of injection SCADA system.Therefore, upgrading is carried out to the node and route most possibly attacked in advance to change It makes, and then the importance for raising electric power CPS system disaster tolerance ability is more prominent.
In view of the above problems, (Ye Xiaming, Zhao Junhua, Wen Fu are fastened and are believed based on the electric power of adjacency matrix Zhejiang University Ye Xiaming Ceasing system vulnerability and [J] Automation of Electric Systems, 2013,37 (22): 41-46. be quantitatively evaluated) research team proposes and is based on The power information system fragility quantitative evaluating method of adjacency matrix will be directed to power information system from the angle of attacker The attack process of system is divided into 2 stages and is described attacker using metastatic potential index between node and attacked against each other the intelligence of beat time point Selective power.The document can obtain the maximum node of fragility from topology, can upgrade in advance to gained node Transformation, but the problem of how reducing system vulnerability is not illustrated, do not provide actual operation scheme yet.
Summary of the invention
The present invention be directed to lack the problem of instructing network operation personnel to formulate track remodelling and node reinforcing scheme now, A kind of power information physics emerging system elasticity Promotion Strategy method for solving is proposed, can accurately determine protection resource distribution side Case, and using this allocation plan as power information emerging system elasticity Promotion Strategy, optimization system redundancy ability improves system bullet Property.
The technical solution of the present invention is as follows: a kind of power information physics emerging system elasticity Promotion Strategy method for solving, specifically Include the following steps:
1) obtain power network topology, rack, load data, including capacity of trunk, generator position and capacity, load position and Load key parameter;
2) letter that can be used for being promoted node data acquisition and supervisor control redundancy ability is calculated by analytic hierarchy process (AHP) Cease protection resource corresponding to safe practice:
Steps are as follows for calculating:
2.1) it establishes hierarchy Model: information system defence capability will be improved as destination layer;In order to promote the target Four rule layers can be divided into, " hardware and software platform safety ", " data safety ", " network access security " and " safety are respectively as follows: Control and management ";There is respectively different safety approach for different criterion, forms solution layer;
2.2) Judgement Matricies: message request security fields expert evaluates all kinds of safety approach, is marked by 1-9 Degree method obtains any two lower layer factors to the quantitative description of degree relatively superior the factor of Mr. Yu upper layer, and scale 1 refers under two kinds Layer factor is of equal importance to certain upper layer factor, the former is higher with respect to the higher scale of the latter's significance level between two lower layer factors;If Lower layer factors a is more important than lower layer factors b, and scale is 2, then it is 1/2 to the scale of a that a, which is 2, b to the scale of b,;
For three layer model, judgment matrix include rule layer to destination layer and solution layer to rule layer, if mesh in model Mark layer has 1 factor, rule layer to have α factor, solution layer to have β factor, then rule layer is gone in the judgment matrix of destination layer It is some criterion factor in rule layer with column, is α × α matrix, what value was obtained between two criterion factors by expert estimation Scale;Due to destination layer factor only 1, therefore rule layer only has 1 to the judgment matrix of destination layer;In addition, solution layer is to criterion Layer has α judgment matrix, if having λ under γ criterion factorγA improved scheme factor, then factor of judgment is to γ standard Then the judgment matrix of factor is λγ×λγDimension, the scale that value is obtained between two scheme factors by expert estimation;
2.3) Mode of Level Simple Sequence is carried out, i.e., each factor of each level is ranked up:
Firstly, to each column element b of the judgment matrix B obtained by expert estimationijIt is normalized respectively:
Then, judgment matrix of each column after normalized is added by row, obtains vectorW i:
Finally, to vectorW iIt is normalized, the characteristic vector W of this layer of each factor can be arrivedi, pass through WiCan carry out Each Mode of Level Simple Sequence, normalized are as follows:
In formula, n be certain level intrinsic factor number, for rule layer to n in the judgment matrix of destination layer be criterion it is total because Plain α is total factor number β that scheme is corresponded under certain criterion factor to n in the judgment matrix of rule layer for solution layer;
2.4) consistency check is carried out after each factor sequence of each level, passes through random consistency ratio CR inspection result logic On it is whether consistent, when CR < 0.1 thinks that result meets logical consistency, calculation method are as follows:
In formula, CI is coincident indicatorB be expert estimation obtained by judgment matrix, RI be with Machine coincident indicator can table look-up to obtain;
2.5) total hierarchial sorting: using the calculated result of Mode of Level Simple Sequence, all certain layers all factors are found out, promotion is believed The sequencing weight process of systemic defence ability relative importance is ceased, result is as defence resource, value corresponding to the program Interior, the calculation method for [0,1] are as follows:
In formula, α is the total number of rule layer factor, and β is the total number of solution layer factor, WγFor rule layer γ feature to Amount,For the feature vector of the tec kind scheme for rule layer γ, restecFor the money of defence corresponding to tec kind scheme Source;
3) dynamic attacking and defending betting model is established:
Dynamic attacking and defending model defends three parts to constitute by protection resource allocation, power grid attack and power grid, constitutes dynamic and attacks Anti- game upper, middle and lower three layer model;
In formula, g is that the objective function of each section is system expected loss, and h is the constraint condition of each section, and u refers to protection The constraint of resource allocation part, s refer to the constraint of power grid attack part, and l refers to the constraint of power grid defence part, and d is protection resource point With scheme, atFor attacker's attack strategies, inside is the node number attacked and the line attacked respectively comprising two elements Lu Hao, f be defender's defence policies, inside be all load bus make the smallest optimal cutting load value of system loss and in order to Optimal Power Flow is distributed the line number that defender actively cuts off, and subscript * is the optimal case under this layer;
In computing system loss, actually damaged caused by system after establishing the probability and consequence-destruction that fragility-is destroyed The dual factors loss evaluation model of mistake, obtaining system expected loss g is
Only when random number is greater than br articles of route or n-th d node fragility parameter, just it is destroyed, it is crisp Weak property will likely influence Ploss.br-nd, it is by the available their own fragility of the protection resource of route and node
In formula, VbrFor the fragility of the br articles route, VndFor the fragility of n-th d node, Ploss.br-ndTo attack simultaneously The practical burden with power loss of system, N after route br and node ndndFor node total number, NbrFor route sum, route here and Node refers to route and node in power network topology;
It calculates at currently known defence policies f and protection resource allocation d, makes the maximum attack strategies of system loss at
4) pass through traversal solution procedure 3) dynamic attacking and defending betting model, carry out protection resource allocation:
5) after protection resource is all assigned, introducing threat parameter for two-parameter expected loss model conversation is three parameters Comprehensive expected loss model:
Calculate system expected loss when only attack route does not attack node, and it is normalized to by maximum-minimum [0, 1] the threat parameter T in section, as routebranch
For node, the maximum loss under being combined by attack between attack node and each route is taken out, calculates each section one by one The expected loss after being destroyed is put, and it is normalized in [0,1] section by maximum-minimum, the threat as node is joined Number Tnode
6) the comprehensive expected loss of system before and after protection resource allocation is calculated by formula (15) respectivelyTo its compare Compared with analysis, elastic Promotion Strategy is obtained,
In formula, TbrIt is the threat parameter of the br articles route;TndIt is the threat parameter of n-th d node;VbrFor the br bars line The fragility on road;VndFor the fragility of n-th d node;Ploss.br-ndIt is practical to attack system after route br and node nd simultaneously Burden with power loss;NndFor node total number;NbrFor route sum;Here route and node is in power network topology;
7) elastic Promotion Strategy is exported, i.e., defends resource allocation to export from big to small by route, node and needs emphasis strong The node serial number that the circuit number of change or transformation and output need to configure information security technology answers the specific name of configuration technology with it Claim.
The step 4) pass through traversal solution procedure 3) dynamic attacking and defending betting model, carry out protection resource allocation it is specific Realize that steps are as follows:
4.1) 1 node and 1 route, as the 1st kind of attack option, initiating line and node institute, are attacked in order The protection resource of distribution is 0;
4.2) it, generates random number and is compared with the fragility value of node obtained by formula (8), formula (9), route, if at random Number is larger, destroys the node or route;It is disconnected in network topology by attack route, if node is broken if route is destroyed Load bad then that node institute band can not be cut off during defence;If route forms isolated network after disconnecting, generator in isolated network is taken Capacity is maximum to be used as balance nodes;
4.3), do not cut off out-of-limit maximum route first, by particle swarm algorithm using each load bus cutting load value as Optimized variable, with route it is not out-of-limit under conditions of, the minimum optimization aim of system expected loss calculates, most by DC power flow The optimum defense scheme under the attack option can be obtained eventuallyThen out-of-limit maximum route is cut off, finds out the phase with same method Hope the defense schemes of loss reductionAfter comparing two schemes, retain the smaller defense schemes of expected loss as the attacker Optimal defense schemes under case;
4.4) it, checks whether the calculating for completing all attack options, is returned 4.1) if not completing;
4.5) maximum value of all attack options in the minimum expectation loss after defence optimization, can be obtained by formula (7), and Know the optimal attack scheme corresponding to it
4.6), judge whether node and route can distribute protection resource:
In formula, DbranchAnd DnodeIt is the defence total resources of route and node;It can be right if meeting formula (10) or formula (11) Node or route the distribution defence resource attacked in gained attack option;
4.7), for it may cause the maximum route br of expected loss, according to precision KaccRoute defence resource is total Measure DbranchIt is divided into KaccPart, portion protection resource allocation is given to the route by formula (12);
For node nd, all attack options containing the node are extracted, taking out maximum be used as of expected loss should Node be destroyed after expected loss, according to the guarantor as corresponding to various information safe practice obtained by analytic hierarchy process (AHP) in step 2) Resource is protected, it is every for each information security technology according to formula (13), formula (14) from small to large to node configuration information safe practice A node can only at most configure once;
αnd-tec∈ { 0,1 }, (nd=1,2 ..., NndTec=1,2......, β) (14)
In formula, β is the number of information security technology, the i.e. total number of solution layer factor;dbrIt is the protection of route br distribution Resource;dndIt is the defence resource of node nd distribution;αnd-tecInformation security technology tec whether is distributed for characterization node nd, for 0, 1 } variable;
4.8) it, is returned 4.1) if node or route always protect stock number still and have residue, under new protection resource distribution New attacking and defending game is carried out, configuration next round protects resource.
The beneficial effects of the present invention are: power information physics emerging system elasticity Promotion Strategy method for solving of the present invention, The weak route reversed by protection resource and key node list can be provided to power engineering personnel, for each key node Corresponding information system can also provide its particular technique title for needing to configure information security technology to power engineering personnel.It can It instructs power engineering personnel to be transformed before calamity to weak route while the information system configuration for being directed to key node is most appropriate Information security technology, improve electric system physical message fusion attack under redundancy ability, thus reduce disaster occur when Performance loss.When system response time does not change with failure change and the resume speed of different elements is identical, energy Enough improve the elasticity of the electric system.
Detailed description of the invention
Fig. 1 is power information physics emerging system elasticity Promotion Strategy method for solving schematic diagram of the present invention;
Fig. 2 is mentioned information security technology hierarchy Model schematic diagram by the present invention;
Fig. 3 is that the present invention uses elasticity promotion schematic diagram after the elastic Promotion Strategy of present invention gained.
Specific embodiment
It is strong to formulate route, node by upper layer electric network protection model for power information physics emerging system elasticity Promotion Strategy Change modification scheme, middle layer power grid challenge model is intended to maximize system loss, and bottom power grid, which resists purpose of model and is to make, is Minimization of loss of uniting may finally obtain keeping attacker pre- by traversal to model progress electric power CPS dynamic attacking and defending game The smallest track remodelling scheme of phase income and node strengthen scheme.Power grid elasticity is divided into " resist and absorb ", " response and adaptation " " recovery " three phases, the present invention can instruct power engineering personnel to be transformed before calamity to critical circuits and believe to node System configuration information security technology appropriate is ceased, the system performance in " resist and absorb " stage, the appearance of lifting system can be optimized Calamity ability.When system response time does not change with failure change and the resume speed of different elements is identical, it is able to ascend electricity Elasticity of the Force system when coping with disaster sexual assault.
Power information physics emerging system elasticity Promotion Strategy method for solving, first acquisition power grid relevant information, pass through layer Fractional analysis obtains the corresponding defence resource of various information safe practice, then establish Dynamic Game Model and by traversal into Row solves.Finally, export from big to small according to the protection resource that different routes and node need and need emphasis reinforcing or be transformed Circuit number, while output needs the node serial number of nodal information system configuration information safe practice and its answers the tool of configuration technology Body title.The emerging system elasticity Promotion Strategy method for solving schematic diagram of power information physics shown in Fig. 1, the specific steps are as follows:
Step 1, obtain power network topology, rack, load data, including and be not limited only to capacity of trunk, generator position and The key parameters such as capacity, load position and load.
Step 2 can be used for being promoted node data acquisition and supervisor control redundancy ability by analytic hierarchy process (AHP) calculating Information security technology corresponding to protection resource.Steps are as follows for calculating:
1) mentioned information security technology hierarchy Model schematic diagram shown in Fig. 2, establishes hierarchy Model.Believe improving Systemic defence ability is ceased as destination layer;Four rule layers can be divided into order to promote the target, are respectively as follows: " hardware and software platform Safety ", " data safety ", " network access security " and " security control and management ";There is respective difference for different criterion Safety approach, formed solution layer;As included under hardware and software platform safety criterion and being not limited only to " credible password module ", " electricity Power special firewall " scheme.
2) Judgement Matricies.Message request security fields expert evaluates all kinds of safety approach, passes through 1-9 scale Method obtains any two lower layer factors to the quantitative description of degree relatively superior the factor of Mr. Yu upper layer.1 Zhi Liangzhong lower layer of scale Factor is of equal importance to certain upper layer factor, the former is more important between scale 3 refers to two lower layer factors, and scale 2 is then scale 1 and scale It is then scale 2 that 3 compromise, i.e. significance level, which compare not as good as scale 3, the former is with respect to the latter's significance level between two lower layer factors Higher scale is higher, and so on.If lower layer factors a is more important than lower layer factors b, and scale is 2, then a is 2, b to the scale of b Scale to a is 1/2.
For three layer model, judgment matrix include rule layer to destination layer and solution layer to rule layer.If mesh in model Mark layer has 1 factor, rule layer to have α factor, solution layer to have β factor, then rule layer is gone in the judgment matrix of destination layer It is some criterion factor in rule layer with column, is α × α matrix, what value was obtained between two criterion factors by expert estimation Scale.Due to destination layer factor only 1, therefore rule layer only has 1 to the judgment matrix of destination layer.In addition, solution layer is to criterion Layer has α judgment matrix, if having λ under γ criterion factorγA improved scheme factor, then factor of judgment is to γ standard Then the judgment matrix of factor is λγ×λγDimension, the scale that value is obtained between two scheme factors by expert estimation.Institute according to fig. 2 5 judgment matrixs can be constructed by showing hierarchy Model, including 1 destination layer to rule layer and 4 rule layers to solution layer Judgment matrix.
3) Mode of Level Simple Sequence is carried out.Each factor of each level is ranked up.
Firstly, to each column element b of the judgment matrix B obtained by expert estimationijIt is normalized respectively:
Then, judgment matrix of each column after normalized is added by row, obtains vectorW i:
Finally, to vectorW iIt is normalized, the characteristic vector W of this layer of each factor can be arrivedi, pass through WiCan carry out Each Mode of Level Simple Sequence.Normalized is as follows:
In formula, n be certain level intrinsic factor number, for rule layer to n in the judgment matrix of destination layer be criterion it is total because Plain α is total factor number β that scheme is corresponded under certain criterion factor to n in the judgment matrix of rule layer for solution layer.
4) consistency check is carried out after each factor sequence of each level.Pass through random consistency ratio (CR) inspection result logic On it is whether consistent, when CR < 0.1 thinks that result meets logical consistency, calculation method are as follows:
In formula, CI is coincident indicatorB be expert estimation obtained by judgment matrix, RI be with Machine coincident indicator can table look-up to obtain.
5) total hierarchial sorting.Using the calculated result of Mode of Level Simple Sequence, all certain layers all factors are found out to promotion information The sequencing weight process of systemic defence ability relative importance, result are as defence resource, value corresponding to the program In [0,1], calculation method are as follows:
In formula, α is the total number of rule layer factor, and β is the total number of solution layer factor, WγFor rule layer γ feature to Amount,For the feature vector of the tec kind scheme for rule layer γ, restecFor the money of defence corresponding to tec kind scheme Source.
Step 3 establishes dynamic attacking and defending betting model.
Dynamic attacking and defending model defends three parts to constitute by protection resource allocation, power grid attack and power grid, constitutes dynamic and attacks Anti- game upper, middle and lower three layer model.
In formula, g is that the objective function of each section is system expected loss, and h is the constraint condition of each section, and u refers to protection The constraint of resource allocation part, s refer to the constraint of power grid attack part, and l refers to the constraint of power grid defence part, and d is protection resource point With scheme, atFor attacker's attack strategies, inside is the node number attacked and the line attacked respectively comprising two elements Lu Hao, f be defender's defence policies, inside be all load bus make the smallest optimal cutting load value of system loss and in order to Optimal Power Flow is distributed the line number that defender actively cuts off, and subscript * is the optimal case under this layer, such as f*For optimal defender Case.
In computing system loss, establishes fragile (probability being destroyed) and consequence is (practical caused by system after destruction Loss) dual factors loss evaluation model, obtaining system expected loss g is
Only when random number is greater than br articles of route or n-th d node fragility parameter, just it is destroyed, it is crisp Weak property will likely influence Ploss.br-nd.It is by the available their own fragility of the protection resource of route and node
In formula, VbrFor the fragility of the br articles route, VndFor the fragility of n-th d node, Ploss.br-ndTo attack simultaneously The practical burden with power loss of system, N after route br and node ndndFor node total number, NbrFor route sum, route here and Node is in power network topology.
The optimization aim of different piece is identical, but it is different to optimize direction.For attacker, its purpose is utmostly broken Bad system, therefore its optimization direction is calculated at currently known defence policies f and protection resource allocation d, makes to big optimization The maximum attack strategies a of system losst
Step 4, the dynamic attacking and defending betting model by traversal solution procedure 3.
It respectively mutually covers, influences each other between three layer model, calculate complicated.The present invention will be solved by traversal, accurately Property it is high.Since attacker's attack strategies are limited, the defence policies that defender copes with the different attack strategies of attacker are only One, so protection resource allocation policy is also unique.In the case that attacking and defending both sides are rational bubbles, there are Nash Equilibriums only One solution.Solution procedure is as follows:
One, 1 node and 1 route are attacked in order, as the 1st kind of attack option.(initiating line and node divide 0) the protection resource matched is
Two, it generates random number and is compared with the fragility value of node obtained by formula (8), formula (9), route, if random number It is larger, destroy the node or route.It is disconnected in network topology by attack route, if node is destroyed if route is destroyed The load of node institute band can not be then cut off during defence.If route forms isolated network after disconnecting, generator in isolated network is taken to hold It measures maximum as balance nodes.
Three, out-of-limit maximum route is not cut off first, by particle swarm algorithm using each load bus cutting load value as excellent Change variable, with route it is not out-of-limit under conditions of, the minimum optimization aim of system expected loss calculates, finally by DC power flow The optimum defense scheme under the attack option can be obtainedThen out-of-limit maximum route is cut off, finds out expectation with same method The defense schemes of loss reductionAfter comparing two schemes, retain the smaller defense schemes of expected loss as the attack option Under optimal defense schemes.
Four, it checks whether the calculating for completing all attack options, returns to one if not completing.
Five, maximum value of all attack options in the minimum expectation loss after defence optimization can be obtained by formula (7), and can Know the optimal attack scheme corresponding to it
Six, judge whether node and route can distribute protection resource.
In formula, DbranchAnd DnodeIt is the defence total resources of route and node.It can be right if meeting formula (10) or formula (11) Node or route the distribution defence resource attacked in gained attack option.
Seven, for it may cause the maximum route br of expected loss, according to precision KaccRoute is defendd into total resources DbranchIt is divided into KaccPart, portion protection resource allocation is given to the route by formula (12).
For node nd, all attack options containing the node are extracted, taking out maximum be used as of expected loss should Node be destroyed after expected loss, according to the guarantor as corresponding to various information safe practice obtained by analytic hierarchy process (AHP) in step 2 Resource is protected, it is every for each information security technology according to formula (13), formula (14) from small to large to node configuration information safe practice A node can only at most configure once.
αnd-tec∈ { 0,1 }, (nd=1,2 ..., NndTec=1,2......, β) (14)
In formula, β is the number of information security technology, the i.e. total number of solution layer factor;dbrIt is the protection of route br distribution Resource;dndIt is the defence resource of node nd distribution;αnd-tecInformation security technology tec whether is distributed for characterization node nd, for 0, 1 } variable.
Eight, one is returned to if node or route always protect stock number still and have residue, is carried out under new protection resource distribution New attacking and defending game, configuration next round protect resource.
After step 5, protection resource are all assigned, introduce and parameter (probability attacked) is threatened to damage two-parameter expectation Mistake model conversation is three parametric synthesis expected loss models.
Calculate system expected loss when only attack route does not attack node, and it is normalized to by maximum-minimum [0, 1] the threat parameter T in section, as routebranch
For node, the maximum loss under being combined by attack between attack node and each route is taken out, calculates each section one by one The expected loss after being destroyed is put, and it is normalized in [0,1] section by maximum-minimum, the threat as node is joined Number Tnode
Step 6 passes through the comprehensive expected loss of system before and after formula (15) calculating protection resource allocation respectivelyIt can be right It is compared analysis, and can obtain elasticity promotion schematic diagram after the elastic Promotion Strategy of gained shown in Fig. 3.
In formula, TbrIt is the threat parameter of the br articles route, TndIt is the threat parameter of n-th d node.
Step 7 exports elastic Promotion Strategy, i.e., defends resource allocation to export from big to small by route, node and need weight The node serial number that the circuit number and output of point reinforcing or transformation need to configure information security technology answers the tool of configuration technology with it Body title.

Claims (2)

1. a kind of power information physics emerging system elasticity Promotion Strategy method for solving, which is characterized in that specifically include following step It is rapid:
1) power network topology, rack, load data, including capacity of trunk, generator position and capacity, load position and load are obtained Measure key parameter;
2) the information peace that can be used for being promoted node data acquisition with supervisor control redundancy ability is calculated by analytic hierarchy process (AHP) Protection resource corresponding to full technology:
Steps are as follows for calculating:
2.1) it establishes hierarchy Model: information system defence capability will be improved as destination layer;It can be drawn to promote the target It is divided into four rule layers, is respectively as follows: " hardware and software platform safety ", " data safety ", " network access security " and " security control With management ";There is respectively different safety approach for different criterion, forms solution layer;
2.2) Judgement Matricies: message request security fields expert evaluates all kinds of safety approach, passes through 1-9 scaling law Any two lower layer factors are obtained between the quantitative description of degree relatively superior the factor of Mr. Yu upper layer, 1 Zhi Liangzhong lower layer of scale because Element is of equal importance to certain upper layer factor, the former is higher with respect to the higher scale of the latter's significance level between two lower layer factors;If lower layer Factor a is more important than lower layer factors b, and scale is 2, then it is 1/2 to the scale of a that a, which is 2, b to the scale of b,;
For three layer model, judgment matrix include rule layer to destination layer and solution layer to rule layer, if destination layer in model There are 1 factor, rule layer to there is α factor, solution layer to have β factor, then rule layer is in the judgment matrix of destination layer, row and column It is some criterion factor in rule layer, is α × α matrix, the scale that value is obtained between two criterion factors by expert estimation; Due to destination layer factor only 1, therefore rule layer only has 1 to the judgment matrix of destination layer;In addition, solution layer has α to rule layer A judgment matrix, if having λ under γ criterion factorγA improved scheme factor, then factor of judgment to γ criterion because The judgment matrix of element is λγ×λγDimension, the scale that value is obtained between two scheme factors by expert estimation;
2.3) Mode of Level Simple Sequence is carried out, i.e., each factor of each level is ranked up:
Firstly, to each column element b of the judgment matrix B obtained by expert estimationijIt is normalized respectively:
Then, judgment matrix of each column after normalized is added by row, obtains vectorW i:
Finally, to vectorW iIt is normalized, the characteristic vector W of this layer of each factor can be arrivedi, pass through WiIt can carry out each layer Secondary single sequence, normalized are as follows:
In formula, n is the number of certain level intrinsic factor, is the total factor of alpha of criterion to n in the judgment matrix of destination layer for rule layer, It is total factor number β that scheme is corresponded under certain criterion factor to n in the judgment matrix of rule layer for solution layer;
2.4) consistency check is carried out after each factor sequence of each level, is in logic by random consistency ratio CR inspection result It is no consistent, when CR < 0.1 thinks that result meets logical consistency, calculation method are as follows:
In formula, CI is coincident indicatorB is judgment matrix obtained by expert estimation, and RI is random one Cause property index, can table look-up to obtain;
2.5) using the calculated result of Mode of Level Simple Sequence, all certain layers all factors total hierarchial sorting: are found out to promotion information system Unite defence capability relative importance sequencing weight process, result be used as defence resource corresponding to the program, value for [0, 1] in, calculation method are as follows:
In formula, α is the total number of rule layer factor, and β is the total number of solution layer factor, WγFor the feature vector of rule layer γ,For the feature vector of the tec kind scheme for rule layer γ, restecFor defence resource corresponding to tec kind scheme;
3) dynamic attacking and defending betting model is established:
Dynamic attacking and defending model defends three parts to constitute by protection resource allocation, power grid attack and power grid, and it is rich to constitute dynamic attacking and defending Play chess upper, middle and lower three layer model;
In formula, g is that the objective function of each section is system expected loss, and h is the constraint condition of each section, and u refers to protection resource The constraint of distribution portion, s refer to the constraint of power grid attack part, and l refers to the constraint of power grid defence part, and d is protection resource allocation side Case, atFor attacker's attack strategies, internal comprising two elements is the node number attacked and the line number attacked respectively, F be defender's defence policies, inside be that all load bus make the smallest optimal cutting load value of system loss and in order to optimize Trend is distributed the line number that defender actively cuts off, and subscript * is the optimal case under this layer;
In computing system loss, the actual loss caused by system after the probability and consequence-destruction that fragility-is destroyed is established Dual factors loss evaluation model, obtaining system expected loss g is
Only when random number is greater than br articles of route or n-th d node fragility parameter, just it is destroyed, fragility It will likely influence Ploss.br-nd, it is by the available their own fragility of the protection resource of route and node
In formula, VbrFor the fragility of the br articles route, VndFor the fragility of n-th d node, Ploss.br-ndTo attack route simultaneously The practical burden with power loss of system, N after br and node ndndFor node total number, NbrFor route sum, route and node here Refer to the route and node in power network topology;
It calculates at currently known defence policies f and protection resource allocation d, makes the maximum attack strategies a of system losst
4) pass through traversal solution procedure 3) dynamic attacking and defending betting model, carry out protection resource allocation:
5) after protection resource is all assigned, introducing threat parameter for two-parameter expected loss model conversation is three parametric synthesis Expected loss model:
System expected loss when only attack route does not attack node is calculated, and it is normalized into [0,1] area by maximum-minimum In, the threat parameter T as routebranch
For node, the maximum loss under being combined by attack between attack node and each route is taken out, calculates each node quilt one by one Expected loss after destruction, and it is normalized in [0,1] section by maximum-minimum, the threat parameter as node Tnode
6) the comprehensive expected loss of system before and after protection resource allocation is calculated by formula (15) respectivelyIt is compared point Analysis, obtains elastic Promotion Strategy,
In formula, TbrIt is the threat parameter of the br articles route;TndIt is the threat parameter of n-th d node;VbrFor the br articles route Fragility;VndFor the fragility of n-th d node;Ploss.br-ndFor simultaneously attack route br and node nd after system it is actually active Load loss;NndFor node total number;NbrFor route sum;Here route and node is in power network topology;
7) export elastic Promotion Strategy, i.e., by route, node defend resource allocation export from big to small need emphasis reinforcing or The node serial number that the circuit number and output of transformation need to configure information security technology answers the specific name of configuration technology with it.
2. power information physics emerging system elasticity Promotion Strategy method for solving according to claim 1, which is characterized in that institute Step 4) is stated by traversal solution procedure 3) dynamic attacking and defending betting model, carry out protection resource allocation specific implementation step such as Under:
4.1) 1 node and 1 route, are attacked in order, and as the 1st kind of attack option, initiating line and node are distributed Protection resource be 0;
4.2), generate random number and with formula (8), the fragility value of node, route obtained by formula (9) be compared, if random number compared with It is big then destroy the node or route;It is disconnected in network topology by attack route, if node is destroyed if route is destroyed The load of node institute band can not be cut off during defence;If route forms isolated network after disconnecting, generator capacity in isolated network is taken It is maximum to be used as balance nodes;
4.3) out-of-limit maximum route, is not cut off first, by particle swarm algorithm using each load bus cutting load value as optimization Variable, with route it is not out-of-limit under conditions of, the minimum optimization aim of system expected loss calculates by DC power flow, finally may be used Obtain the optimum defense scheme f under the attack option1 *, out-of-limit maximum route is then cut off, finds out expectation damage with same method Lose the smallest defense schemesAfter comparing two schemes, retain the smaller defense schemes of expected loss as under the attack option Optimal defense schemes;
4.4) it, checks whether the calculating for completing all attack options, is returned 4.1) if not completing;
4.5) maximum value of all attack options in the minimum expectation loss after defence optimization, can be obtained by formula (7), and is known Optimal attack scheme corresponding to it
4.6), judge whether node and route can distribute protection resource:
In formula, DbranchAnd DnodeIt is the defence total resources of route and node;It can be to gained if meeting formula (10) or formula (11) Node or route the distribution defence resource attacked in attack option;
4.7), for it may cause the maximum route br of expected loss, according to precision KaccRoute is defendd into total resources DbranchIt is divided into KaccPart, portion protection resource allocation is given to the route by formula (12);
For node nd, all attack options containing the node are extracted, it is maximum as the node to take out expected loss Expected loss after being destroyed, according to the money of protection corresponding to the various information safe practice as obtained by analytic hierarchy process (AHP) in step 2) Source, according to formula (13), formula (14) from small to large to node configuration information safe practice, section each for each information security technology Point can only at most configure primary;
αnd-tec∈ { 0,1 }, (nd=1,2 ..., NndTec=1,2......, β) (14)
In formula, β is the number of information security technology, the i.e. total number of solution layer factor;dbrIt is the protection resource of route br distribution; dndIt is the defence resource of node nd distribution;αnd-tecInformation security technology tec whether is distributed for characterization node nd, is become for { 0,1 } Amount;
4.8) it, returns 4.1) if node or route always protect stock number still and have residue, is carried out under new protection resource distribution New attacking and defending game, configuration next round protect resource.
CN201810616403.7A 2018-06-14 2018-06-14 Electric power information physical fusion system elastic lifting strategy solving method Active CN108985566B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810616403.7A CN108985566B (en) 2018-06-14 2018-06-14 Electric power information physical fusion system elastic lifting strategy solving method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810616403.7A CN108985566B (en) 2018-06-14 2018-06-14 Electric power information physical fusion system elastic lifting strategy solving method

Publications (2)

Publication Number Publication Date
CN108985566A true CN108985566A (en) 2018-12-11
CN108985566B CN108985566B (en) 2021-07-13

Family

ID=64540486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810616403.7A Active CN108985566B (en) 2018-06-14 2018-06-14 Electric power information physical fusion system elastic lifting strategy solving method

Country Status (1)

Country Link
CN (1) CN108985566B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110766306A (en) * 2019-10-16 2020-02-07 大连理工大学 Reservoir flood control dispatching rule determining method based on elastic theory
CN111045334A (en) * 2019-12-31 2020-04-21 哈尔滨工业大学 Active defense elastic sliding mode control method of information physical fusion system
CN111314387A (en) * 2020-03-24 2020-06-19 东南大学 Power system information physical double-layer strategy optimization method considering network attack influence
CN113991643A (en) * 2021-09-30 2022-01-28 国网山东省电力公司武城县供电公司 Intelligent power grid dispatching system based on traction power model

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104361247A (en) * 2014-11-24 2015-02-18 国网河南省电力公司电力科学研究院 Leader-follower game alternating current and direct current hybrid electric power system active defense strategy making method
CN105205627A (en) * 2015-11-05 2015-12-30 中国南方电网有限责任公司电网技术研究中心 Power grid electric power operation project determination method and system
EP3063545A2 (en) * 2013-10-29 2016-09-07 C3 Energy, Inc. Systems and methods for processing data relating to energy usage
CN106815687A (en) * 2017-01-22 2017-06-09 电子科技大学中山学院 Micro-grid optimal and elastic energy trading method and system based on double-layer game
CN107819785A (en) * 2017-11-28 2018-03-20 东南大学 A kind of double-deck defence method towards power system false data injection attacks
CN107909276A (en) * 2017-11-20 2018-04-13 广东电网有限责任公司电力调度控制中心 A kind of vulnerability assessment method of power information physics emerging system
CN107944757A (en) * 2017-12-14 2018-04-20 上海理工大学 Electric power interacted system regenerative resource digestion capability analysis and assessment method
CN108053116A (en) * 2017-12-14 2018-05-18 国网江苏省电力有限公司扬州供电分公司 A kind of city elasticity distribution network restoration force estimation method
CN108108875A (en) * 2017-11-29 2018-06-01 国家电网公司 A kind of distribution Running State fuzzy synthetic appraisement method based on cooperative game method and trapezoidal cloud model
CN108108856A (en) * 2018-01-12 2018-06-01 上海大学 More micro-capacitance sensor multi-user demand response management methods based on Stackelberg theory of games

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3063545A2 (en) * 2013-10-29 2016-09-07 C3 Energy, Inc. Systems and methods for processing data relating to energy usage
CN104361247A (en) * 2014-11-24 2015-02-18 国网河南省电力公司电力科学研究院 Leader-follower game alternating current and direct current hybrid electric power system active defense strategy making method
CN105205627A (en) * 2015-11-05 2015-12-30 中国南方电网有限责任公司电网技术研究中心 Power grid electric power operation project determination method and system
CN106815687A (en) * 2017-01-22 2017-06-09 电子科技大学中山学院 Micro-grid optimal and elastic energy trading method and system based on double-layer game
CN107909276A (en) * 2017-11-20 2018-04-13 广东电网有限责任公司电力调度控制中心 A kind of vulnerability assessment method of power information physics emerging system
CN107819785A (en) * 2017-11-28 2018-03-20 东南大学 A kind of double-deck defence method towards power system false data injection attacks
CN108108875A (en) * 2017-11-29 2018-06-01 国家电网公司 A kind of distribution Running State fuzzy synthetic appraisement method based on cooperative game method and trapezoidal cloud model
CN107944757A (en) * 2017-12-14 2018-04-20 上海理工大学 Electric power interacted system regenerative resource digestion capability analysis and assessment method
CN108053116A (en) * 2017-12-14 2018-05-18 国网江苏省电力有限公司扬州供电分公司 A kind of city elasticity distribution network restoration force estimation method
CN108108856A (en) * 2018-01-12 2018-06-01 上海大学 More micro-capacitance sensor multi-user demand response management methods based on Stackelberg theory of games

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
ZHAOHONG BIE ETAL.: "Battling the Extreme: A Study on the Power System Resilience", 《PROCEEDINGS OF THE IEEE》 *
叶夏明 等: "基于邻接矩阵的电力信息系统脆弱性定量评估", 《电力系统自动化》 *
汤奕 等: "电力信息物理融合系统环境中的网络攻击研究综述", 《电力系统自动化》 *
赵俊华 等: "乌克兰事件的启示:防范针对电网的虚假数据注入攻击", 《电力系统自动化》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110766306A (en) * 2019-10-16 2020-02-07 大连理工大学 Reservoir flood control dispatching rule determining method based on elastic theory
CN110766306B (en) * 2019-10-16 2022-09-16 大连理工大学 Reservoir flood control dispatching rule determining method based on elastic theory
CN111045334A (en) * 2019-12-31 2020-04-21 哈尔滨工业大学 Active defense elastic sliding mode control method of information physical fusion system
CN111045334B (en) * 2019-12-31 2022-10-25 哈尔滨工业大学 Active defense elastic sliding mode control method of information physical fusion system
CN111314387A (en) * 2020-03-24 2020-06-19 东南大学 Power system information physical double-layer strategy optimization method considering network attack influence
CN113991643A (en) * 2021-09-30 2022-01-28 国网山东省电力公司武城县供电公司 Intelligent power grid dispatching system based on traction power model
CN113991643B (en) * 2021-09-30 2022-08-26 国网山东省电力公司武城县供电公司 Intelligent power grid dispatching system based on traction power model

Also Published As

Publication number Publication date
CN108985566B (en) 2021-07-13

Similar Documents

Publication Publication Date Title
CN107819785B (en) Double-layer defense method for false data injection attack of power system
CN108985566A (en) Power information physics emerging system elasticity Promotion Strategy method for solving
Wang et al. Coordinated topology attacks in smart grid using deep reinforcement learning
Lin et al. Self-healing attack-resilient PMU network for power system operation
Rahman et al. Impact analysis of topology poisoning attacks on economic operation of the smart power grid
Li Network Security Evaluation and Optimal Active Defense based on Attack and Defense Game Model
CN112819300A (en) Power distribution network risk assessment method based on random game network under network attack
Rahman et al. A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids
Anwar et al. Anomaly detection in electric network database of smart grid: Graph matching approach
CN105933361A (en) Big data security protection cloud system based on trusted calculation
Dong et al. A framework for modeling and structural vulnerability analysis of spatial cyber-physical power systems from an attack–defense perspective
CN107578137A (en) A kind of Power Grid Vulnerability Assessment method for considering minimum singular value sensitivity entropy
Wu et al. Research on power communication network planning based on information transmission reachability against cyber-attacks
Liu et al. Pre-overload-graph-based vulnerable correlation identification under load redistribution attacks
Yang et al. Identification of vulnerable lines in smart grid systems based on improved agglomerative hierarchical clustering
Fan et al. Review of cyber physical system and cyber attack modeling
Bian et al. Network security situational assessment model based on improved AHP_FCE
CN111262856A (en) Mobile target defense response method guided by economic and safety requirements
Emadi et al. An efficient computational strategy for cyber-physical contingency analysis in smart grids
Xu et al. Cyber protection for malware attack resistance in cyber-physical power systems
CN108989335A (en) A kind of guard method and equipment of power information physics emerging system
CN112434922B (en) Urban power grid system security control method and device based on zero sum game
Rahdan et al. Phasor measurement units allocation against load redistribution attacks based on Greedy algorithm
Wang et al. Distributed secondary control strategy against bounded fdi attacks for microgrid with layered communication network
Wang et al. Lightweight IT operation and maintenance integrated monitoring method for APP system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant