CN109936133A - A Vulnerability Analysis Method of Power System Considering Cyber-Physical Joint Attack - Google Patents
A Vulnerability Analysis Method of Power System Considering Cyber-Physical Joint Attack Download PDFInfo
- Publication number
- CN109936133A CN109936133A CN201910152597.4A CN201910152597A CN109936133A CN 109936133 A CN109936133 A CN 109936133A CN 201910152597 A CN201910152597 A CN 201910152597A CN 109936133 A CN109936133 A CN 109936133A
- Authority
- CN
- China
- Prior art keywords
- power
- load
- cyber
- island
- loss
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000012038 vulnerability analysis Methods 0.000 title claims abstract description 24
- 230000005540 biological transmission Effects 0.000 claims abstract description 20
- 230000006870 function Effects 0.000 claims description 42
- 238000004458 analytical method Methods 0.000 claims description 27
- 230000008569 process Effects 0.000 claims description 13
- 238000010248 power generation Methods 0.000 claims description 12
- 230000006378 damage Effects 0.000 claims description 9
- 238000011156 evaluation Methods 0.000 claims description 7
- 230000008030 elimination Effects 0.000 claims description 4
- 238000003379 elimination reaction Methods 0.000 claims description 4
- 238000009987 spinning Methods 0.000 claims description 4
- 230000008859 change Effects 0.000 claims description 3
- 230000005611 electricity Effects 0.000 claims description 3
- 230000008447 perception Effects 0.000 claims 1
- 238000012546 transfer Methods 0.000 abstract description 2
- 238000004364 calculation method Methods 0.000 description 12
- 238000004422 calculation algorithm Methods 0.000 description 6
- 238000012360 testing method Methods 0.000 description 5
- 230000014509 gene expression Effects 0.000 description 3
- 230000010354 integration Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 239000011159 matrix material Substances 0.000 description 2
- 230000001681 protective effect Effects 0.000 description 2
- 238000004445 quantitative analysis Methods 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- OWWYREKLGMILGW-UHFFFAOYSA-N δline Chemical compound COC1C2C3C4(C5C6OC(C)=O)C(OC)CCC5(C)CN(CC)C4C46OCOC42CC(OC)C1C3 OWWYREKLGMILGW-UHFFFAOYSA-N 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005315 distribution function Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000010399 physical interaction Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
Landscapes
- Supply And Distribution Of Alternating Current (AREA)
Abstract
本公开提供了一种考虑信息物理联合攻击的电力系统脆弱性分析方法,当某地区电网一次设备(发电机、变压器和输电线路等)受到物理破坏后退出运行,引起电网拓扑结构的变化,可能会出现电力系统的潮流转移、支路功率越限和功率不平衡等问题。若此时信息系统遭受了信息攻击,则认为电力调度中心失去优化调节能力,电网采取等比例调节发用电功率的方式来保证功率平衡,越限支路将由继电保护装置动作切除,若信息系统没有遭受攻击,被破坏的设备停运后,电力调度中心以负荷损失量最小为目标进行优化,从电源侧和负荷侧协同调节控制,保证电网功率平衡的同时消除支路功率越限。
The present disclosure provides a power system vulnerability analysis method considering cyber-physical joint attacks. When the primary equipment (generators, transformers, transmission lines, etc.) of a power grid in a certain area is physically damaged and then withdraws from operation, it causes changes in the topology of the power grid, which may Problems such as power flow transfer, branch power limit and power imbalance will occur in the power system. If the information system is attacked by information at this time, it is considered that the power dispatching center has lost the ability to optimize and adjust, and the power grid adopts the method of proportionally adjusting the generated power to ensure power balance. The over-limit branch will be cut off by the relay protection device. After the equipment is not attacked and the damaged equipment is out of service, the power dispatching center will optimize the load loss with the goal of minimizing the load loss, and coordinate the adjustment and control from the power supply side and the load side to ensure the power balance of the power grid and eliminate the branch power exceeding the limit.
Description
技术领域technical field
本公开涉及一种考虑信息物理联合攻击的电力系统脆弱性分析方法。The present disclosure relates to a power system vulnerability analysis method considering cyber-physical joint attack.
背景技术Background technique
本部分的陈述仅仅是提供了与本公开相关的背景技术信息,不必然构成在先技术。The statements in this section merely provide background information related to the present disclosure and do not necessarily constitute prior art.
智能电网是一种由信息虚拟网络和物理实体网络构成的复合系统,其特点是信息系统和物理系统紧密协调配合。随着智能电网的不断发展,电力系统的自动化程度不断提高,电网的各种测量计算、决策控制单元数量大大增加,电力信息网络的规模越来越大。电力系统已然发展成为了一个信息物理深度融合的复杂系统,其稳定运行离不开其信息系统的实时调度。信息系统通过采集电力系统的运行数据,发送给电力调度中心进行分析处理,调度中心实时决策并对电力系统进行调节控制,来保证电力系统安全稳定的运行。当前国际上恐怖主义威胁、军事冲突等不稳定因素频繁出现,电力系统作为各种能源相互转化的枢纽,是国家的关键基础设施,对国家安全、经济发展、社会稳定有巨大的影响,成为了恐怖分子袭击的重点目标之一。Smart grid is a composite system composed of information virtual network and physical entity network, which is characterized by the close coordination of information system and physical system. With the continuous development of the smart grid, the automation of the power system has been continuously improved, the number of various measurement and calculation, decision-making and control units in the power grid has greatly increased, and the scale of the power information network has become larger and larger. The power system has developed into a complex system with deep integration of information and physics, and its stable operation is inseparable from the real-time scheduling of its information system. The information system collects the operation data of the power system and sends it to the power dispatching center for analysis and processing. The dispatching center makes real-time decisions and adjusts and controls the power system to ensure the safe and stable operation of the power system. At present, unstable factors such as terrorist threats and military conflicts appear frequently in the world. As a hub for the mutual conversion of various energy sources, the power system is the country's key infrastructure and has a huge impact on national security, economic development, and social stability. One of the key targets of terrorist attacks.
在上述背景之下,对电力信息物理融合系统脆弱性分析及其计算方法的研究就显得尤为重要。目前针对电力系统的攻击方式主要分为两种:第一种是直接对电力系统一次设备进行物理破坏,主要是针对发电厂、变电站、输电线路、母线节点甚至是某些重要负荷的人为蓄意攻击,这种攻击方式会使一个或多个电力设备发生故障而退出运行,从而改变电力网络的拓扑结构,严重影响正常的电能的传输和分配功能,甚至可能引发一系列连锁故障,使电网解列,造成大范围停电事故;另一种攻击方式是恐怖分子采用先进的网络技术,入侵电力信息网,破坏信息系统的功能。由于电力系统物理设备的控制与相互协调在很大程度上依赖信息系统,因此针对信息系统的攻击就有可能导致电力系统内发生复杂的物理交互过程,并最终威胁整个系统的安全。相比于物理攻击而言,信息攻击具有成本小、隐蔽性强的特点,对于电力系统的破坏可能更严重。信息系统与物理系统之间是相互作用的,由于二者紧密耦合,任意一个环节出现问题都可能导致严重的事故后果。目前大多数文献都是考虑单一攻击方式对电力系统的影响,没有将信息攻击与物理攻击结合一起研究分析。Under the above background, it is particularly important to study the vulnerability analysis and calculation methods of power-cyber-physical fusion systems. At present, there are two main ways of attacking the power system: the first is to directly physically damage the primary equipment of the power system, mainly targeting power plants, substations, transmission lines, bus nodes and even some important loads. , this attack method will cause one or more power equipment to fail and go out of operation, thereby changing the topology of the power network, seriously affecting the normal power transmission and distribution functions, and may even cause a series of cascading failures, causing the grid to de-load , causing large-scale power outages; another attack method is that terrorists use advanced network technology to invade the power information network and destroy the function of the information system. Since the control and mutual coordination of the physical equipment in the power system depend to a large extent on the information system, attacks on the information system may lead to complex physical interaction processes in the power system, and ultimately threaten the security of the entire system. Compared with physical attacks, information attacks have the characteristics of low cost and strong concealment, and the damage to the power system may be more serious. The information system and the physical system are interactive. Because of the close coupling between the two, a problem in any link may lead to serious accident consequences. At present, most of the literatures consider the impact of a single attack on the power system, and do not study and analyze the information attack and physical attack together.
发明内容SUMMARY OF THE INVENTION
本公开为了解决上述问题,提出了一种考虑信息物理联合攻击的电力系统脆弱性分析方法,本公开针对当前电力系统信息物理高度融合的特点,重点关注电力调度控制中心的功能,将电力信息系统和电力物理系统进行一体化建模。采用定量分析的方法对电力系统遭受攻击后的动态演化过程进行模拟,用失负荷量作为事故后果的评价指标,来分析电力系统的脆弱性。能够找出电网的脆弱性元件,从而采取针对性防护措施来降低电力系统遭受袭击后的损失。In order to solve the above problems, the present disclosure proposes a power system vulnerability analysis method considering cyber-physical joint attack. The present disclosure focuses on the functions of the power dispatching control center in view of the highly integrated cyber-physical characteristics of the current power system, and integrates the power information system Integrated modeling with power physics systems. Quantitative analysis method is used to simulate the dynamic evolution process of the power system after being attacked, and the loss of load is used as the evaluation index of the accident consequences to analyze the vulnerability of the power system. It is possible to identify the vulnerable elements of the power grid, so as to take targeted protective measures to reduce the losses of the power system after an attack.
为了实现上述目的,本公开采用如下技术方案:In order to achieve the above object, the present disclosure adopts the following technical solutions:
一种考虑信息物理联合攻击的电力系统脆弱性分析方法,包括以下步骤:A power system vulnerability analysis method considering cyber-physical joint attack, including the following steps:
(1)设定被破坏后退出运行的各电网元件的状态;(1) Set the state of each power grid element that is out of operation after being destroyed;
(2)进行拓扑分析,得到电网被攻击后解列成若干个互不相连的电力孤岛的个数,以及每个电力孤岛的电源、网络和负荷情况;(2) Carry out topology analysis to obtain the number of disconnected power islands after the power grid is attacked, as well as the power supply, network and load conditions of each power island;
(3)对每个既含发电机又含用电负荷的电力孤岛进行支路过载的消除;(3) Elimination of branch overload for each power island containing both generator and power load;
(4)不断拓扑分析得出所述电力孤岛由于连锁故障进一步解列成若干个互不相连的新电力孤岛的个数,以及每个新电力孤岛的电源、网络与负荷情况重复进行步骤(3)的消除操作,直到没有连锁故障发生为止;(4) Continue to analyze the topology to obtain the number of new power islands that are not connected to each other due to cascading failures, and repeat steps (3) for the power supply, network and load conditions of each new power island. ) until no cascading failure occurs;
(5)判断每个即含发电机组又含用电负荷的新电力孤岛是否均计算完毕,若是则统计负荷损失情况,否则返回(4),对剩余新电力孤岛进行分析计算;(5) Judging whether each new power island that includes both the generator set and the power load has been calculated, if so, count the load loss, otherwise return to (4) to analyze and calculate the remaining new power island;
(6)以负荷损失情况中失负荷量作为电力系统遭受信息物理联合攻击后的事故后果评估指标,被攻击后造成失负荷量最多的元件即为电网的脆弱元件。(6) Taking the loss of load in the case of load loss as the evaluation index of the accident consequences after the power system is attacked by cyber-physical joint attacks, the component that causes the most loss of load after being attacked is the vulnerable component of the power grid.
作为进一步的限定,所述步骤(1)中,以电力调度中心的功能为切入点,将信息系统和物理系统进行一体化建模分析。As a further limitation, in the step (1), taking the function of the power dispatching center as the starting point, the information system and the physical system are integrated into modeling and analysis.
作为进一步的限定,所述步骤(3)中,具体包括:模拟系统的潮流分配,具体的,对于发电大于用电的孤岛,根据每台机组的出力大小按照比例减小各自出力;对于用电大于发电的孤岛,则根据每台机组的旋转备用按照比例增大各个机组的出力,如果旋转备用不足,则在所有机组满发的基础上,各用电负荷按照比例相应降低负载水平,如果存在支路过载则进行连锁故障判断。As a further limitation, in the step (3), it specifically includes: simulating the power flow distribution of the system, specifically, for an island where the power generation is greater than the power consumption, the respective outputs are proportionally reduced according to the output of each unit; If the output of each unit is larger than the island of power generation, the output of each unit will be increased proportionally according to the spinning reserve of each unit. If the spinning reserve is insufficient, on the basis of full power generation of all units, the load level of each power consumption will be proportionally reduced. If the branch circuit is overloaded, the cascading fault will be judged.
作为更进一步的限定,所述步骤(3)中,连锁故障判断的具体过程包括若调度中心被网络攻击,丧失运行状态感知和控制能力,无法处理支路过载,则所有过载支路跳闸,并进行系统拓扑分析;若调度中心没有被网络攻击,具备运行状态感知和控制能力,处理支路过载,则调度中心按照使该孤岛负荷损失量最小的策略进行发电再调度及相应的减负荷措施来消除支路过载。As a further limitation, in the step (3), the specific process of judging the cascading failure includes that if the dispatch center is attacked by the network, loses the ability to sense and control the operating state, and cannot handle the overload of the branch, then all the overloaded branches are tripped, and the Carry out system topology analysis; if the dispatch center has not been attacked by the network, has the ability to sense and control the operating state, and handle branch overload, the dispatch center will re-dispatch power generation and take corresponding load reduction measures according to the strategy that minimizes the load loss of the island. Eliminate branch overload.
作为更进一步的限定,所述步骤(3)中,系统拓扑分析中通过拓扑分析得出该电力孤岛由于连锁故障又进一步解列成若干个互不相连的新电力孤岛的个数,以及每个新电力孤岛的电源、网络和负荷情况。As a further limitation, in the step (3), in the system topology analysis, it is obtained through the topology analysis that the power island is further delisted into a number of new disconnected power islands due to cascading failures, and the number of each power island Power, network and load profiles for new power islands.
作为更进一步的限定,所述步骤(3)中,以电力系统中的一次设备作为破坏目标,决策变量是调度中心控制下各个节点的发电机组出力和负荷水平,目标函数是使系统总的失负荷量最少。As a further limitation, in the step (3), the primary equipment in the power system is taken as the destruction target, the decision variables are the output and load levels of the generator sets of each node under the control of the dispatch center, and the objective function is to make the total loss of the system. minimum load.
作为更进一步的限定,所述步骤(3)中,所述目标函数的约束条件包括:当出现以下情况均会造成电力线路l不可用:电力系统中各个发电机组、输电线路、节点、变电所功能状态的向量为0-1,其中,功能状态的向量为1对应该电力元件遭受打击而功能失效,功能状态的向量为0对应该电力元件未遭受打击功能正常。As a further limitation, in the step (3), the constraints of the objective function include: when the following conditions occur, the power line 1 will be unavailable: each generator set, transmission line, node, substation in the power system The vector of the functional state is 0-1, wherein the vector of the functional state of 1 corresponds to the power element being hit and the function fails, and the vector of the functional state of 0 corresponds to the normal function of the power element without being hit.
作为更进一步的限定,所述步骤(3)中,所述目标函数的约束条件包括:电力线路l受到打击而功能失效、电力线路l的首/末端节点受到打击而功能失效、与电力线路l连接的变电所受到打击而功能失效,以及同杆多回线路中的一回故障则与其同杆的电力线路l也故障。As a further limitation, in the step (3), the constraints of the objective function include: the power line 1 is hit and the function fails, the head/end node of the power line 1 is hit and the function fails, and the power line 1 fails. When the connected substation is hit and the function fails, and a fault in the multi-circuit line on the same pole, the power line l on the same pole also fails.
作为更进一步的限定,所述步骤(3)中,所述目标函数的约束条件包括:当出现以下情况均会造成发电机组j不可用:发电机组j受到打击而功能失效或发电机组j所接入的节点受到打击而功能失效。As a further limitation, in the step (3), the constraints of the objective function include: when the following conditions occur, the generator set j will be unavailable: the generator set j is hit and the function fails or the generator set j is connected The incoming node is hit and the function fails.
作为更进一步的限定,所述步骤(3)中,所述目标函数的约束条件还包括直流潮流方程约束、支路潮流等式约束、功率平衡约束;不等式约束:支路潮流安全约束、发电机组出力约束和负荷有功变化量约束。As a further limitation, in the step (3), the constraints of the objective function also include DC power flow equation constraints, branch power flow equation constraints, and power balance constraints; inequality constraints: branch power flow safety constraints, generator sets Output constraint and load active power variation constraint.
一种考虑信息物理联合攻击的电力系统脆弱性分析系统,运行于处理器或存储器上,被配置为执行以下指令:A power system vulnerability analysis system considering cyber-physical joint attacks, running on a processor or memory, configured to execute the following instructions:
(1)设定被破坏后退出运行的各电网元件的状态;(1) Set the state of each power grid element that is out of operation after being destroyed;
(2)进行拓扑分析,得到电网被攻击后解列成若干个互不相连的电力孤岛的个数,以及每个电力孤岛的电源、网络和负荷情况;(2) Carry out topology analysis to obtain the number of disconnected power islands after the power grid is attacked, as well as the power supply, network and load conditions of each power island;
(3)对每个既含发电机又含用电负荷的电力孤岛进行支路过载的消除;(3) Elimination of branch overload for each power island containing both generator and power load;
(4)不断拓扑分析得出所述电力孤岛由于连锁故障进一步解列成若干个互不相连的新电力孤岛的个数,以及每个新电力孤岛的电源、网络与负荷情况重复进行步骤(3)的消除操作,直到没有连锁故障发生为止;(4) Continue to analyze the topology to obtain the number of new power islands that are not connected to each other due to cascading failures, and repeat steps (3) for the power supply, network and load conditions of each new power island. ) until no cascading failure occurs;
(5)判断每个即含发电机组又含用电负荷的新电力孤岛是否均计算完毕,若是则统计负荷损失情况,否则返回(4),对剩余新电力孤岛进行分析计算;(5) Judging whether each new power island that includes both the generator set and the power load has been calculated, if so, count the load loss, otherwise return to (4) to analyze and calculate the remaining new power island;
(6)以负荷损失情况中失负荷量作为电力系统遭受信息物理联合攻击后的事故后果评估指标,被攻击后造成失负荷量最多的元件即为电网的脆弱元件。(6) Taking the loss of load in the case of load loss as the evaluation index of the accident consequences after the power system is attacked by cyber-physical joint attacks, the component that causes the most loss of load after being attacked is the vulnerable component of the power grid.
与现有技术相比,本公开的有益效果为:Compared with the prior art, the beneficial effects of the present disclosure are:
本公开针对当前电力系统信息物理高度融合的特点,重点关注电力调度控制中心的功能,将电力信息系统和电力物理系统进行一体化建模。采用定量分析的方法对电力系统遭受攻击后的动态演化过程进行模拟,用失负荷量作为事故后果的评价指标,来分析电力系统的脆弱性。能够找出电网的脆弱性元件,从而采取针对性防护措施来降低电力系统遭受袭击后的损失;Aiming at the high integration of information and physics in the current power system, the present disclosure focuses on the functions of the power dispatching control center, and integrates the power information system and the power physics system into modeling. Quantitative analysis method is used to simulate the dynamic evolution process of the power system after being attacked, and the loss of load is used as the evaluation index of the accident consequences to analyze the vulnerability of the power system. Ability to identify vulnerable elements of the power grid, so that targeted protection measures can be taken to reduce losses after an attack on the power system;
本公开采用基于直流潮流的脆弱性分析方法,计算速度快,避免了交流潮流计算过程中出现迭代不收敛的问题。The present disclosure adopts the vulnerability analysis method based on the DC power flow, and the calculation speed is fast, and the problem of iterative non-convergence in the AC power flow calculation process is avoided.
本公开考虑了电力系统实际的拓扑结构影响,更符合系统运行工况,计算结果更准确,实用性更好。The present disclosure considers the influence of the actual topology structure of the power system, is more in line with the operating conditions of the system, has more accurate calculation results and better practicability.
附图说明Description of drawings
构成本申请的一部分的说明书附图用来提供对本申请的进一步理解,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。The accompanying drawings that form a part of the present application are used to provide further understanding of the present application, and the schematic embodiments and descriptions of the present application are used to explain the present application and do not constitute improper limitations on the present application.
图1是脆弱性分析流程图;Figure 1 is the flow chart of vulnerability analysis;
图2是IEEE RTS-24节点测试系统图。Figure 2 is a diagram of the IEEE RTS-24 node test system.
具体实施方式:Detailed ways:
下面结合附图与实施例对本公开作进一步说明。The present disclosure will be further described below with reference to the accompanying drawings and embodiments.
应该指出,以下详细说明都是例示性的,旨在对本申请提供进一步的说明。除非另有指明,本实施例使用的所有技术和科学术语具有与本申请所属技术领域的普通技术人员通常理解的相同含义。It should be noted that the following detailed description is exemplary and intended to provide further explanation of the application. Unless otherwise specified, all technical and scientific terms used in the examples have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
需要注意的是,这里所使用的术语仅是为了描述具体实施方式,而非意图限制根据本申请的示例性实施方式。如在这里所使用的,除非上下文另外明确指出,否则单数形式也意图包括复数形式,此外,还应当理解的是,当在本说明书中使用术语“包含”和/或“包括”时,其指明存在特征、步骤、操作、器件、组件和/或它们的组合。It should be noted that the terminology used herein is for the purpose of describing specific embodiments only, and is not intended to limit the exemplary embodiments according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural as well, furthermore, it is to be understood that when the terms "comprising" and/or "including" are used in this specification, it indicates that There are features, steps, operations, devices, components and/or combinations thereof.
在本公开中,术语如“上”、“下”、“左”、“右”、“前”、“后”、“竖直”、“水平”、“侧”、“底”等指示的方位或位置关系为基于附图所示的方位或位置关系,只是为了便于叙述本公开各部件或元件结构关系而确定的关系词,并非特指本公开中任一部件或元件,不能理解为对本公开的限制。In this disclosure, terms such as "upper", "lower", "left", "right", "front", "rear", "vertical", "horizontal", "side", "bottom", etc. The orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only a relational word determined for the convenience of describing the structural relationship of each component or element of the present disclosure, and does not specifically refer to any component or element in the present disclosure, and should not be construed as a reference to the present disclosure. public restrictions.
本公开中,术语如“固接”、“相连”、“连接”等应做广义理解,表示可以是固定连接,也可以是一体地连接或可拆卸连接;可以是直接相连,也可以通过中间媒介间接相连。对于本领域的相关科研或技术人员,可以根据具体情况确定上述术语在本公开中的具体含义,不能理解为对本公开的限制。In the present disclosure, terms such as "fixed connection", "connected", "connected", etc. should be understood in a broad sense, indicating that it may be a fixed connection, an integral connection or a detachable connection; it may be directly connected, or through an intermediate connection. media are indirectly connected. For the relevant scientific research or technical personnel in the field, the specific meanings of the above terms in the present disclosure can be determined according to specific situations, and should not be construed as limitations on the present disclosure.
本公开是在常规直流潮流模型基础上,计及实际电力系统拓扑结构约束后,改进形成的电力系统脆弱性分析计算方法。The present disclosure is based on the conventional DC power flow model, and after taking into account the constraints of the topology structure of the actual power system, an improved power system vulnerability analysis and calculation method is formed.
在电力系统遭受攻击后,若忽略短期的暂态过程,只关注事故后电力系统重新进入稳态的运行情况,可以采用电力系统稳态方法进行分析。电力系统遭受信息物理联合攻击后的动态演化过程可以描述为:当某地区电网一次设备(发电机、变压器和输电线路等)受到物理破坏后退出运行,引起电网拓扑结构的变化,可能会出现电力系统的潮流转移、支路功率越限和功率不平衡等问题。若此时信息系统遭受了信息攻击,则认为电力调度中心失去优化调节能力,电网采取等比例调节发用电功率的方式来保证功率平衡,越限支路将由继电保护装置动作切除,此时电网拓扑结构又会发生变化,甚至发生一系列连锁故障。若信息系统没有遭受攻击,被破坏的设备停运后,电力调度中心以负荷损失量最小为目标进行优化,从电源侧和负荷侧协同调节控制,保证电网功率平衡的同时消除支路功率越限,从而避免连锁故障的发生。整个过程中利用拓扑分析算法得出电网的解列情况,对各个电网区域进行计算。对于上述的动态演化过程,采用图1步骤进行模拟。After the power system is attacked, if the short-term transient process is ignored, and only the operation situation of the power system re-entering the steady state after the accident is concerned, the steady-state method of the power system can be used for analysis. The dynamic evolution process of the power system after the cyber-physical attack can be described as follows: when the primary equipment (generators, transformers and transmission lines, etc.) of the power grid in a certain area is physically damaged and then withdraws from operation, causing changes in the topology of the power grid, there may be power Problems such as power flow transfer, branch power limit and power imbalance of the system. If the information system suffers an information attack at this time, it is considered that the power dispatching center has lost the ability to optimize and adjust, and the power grid adopts the method of proportionally adjusting the generated power to ensure power balance. The topology will change again, and even a series of cascading failures will occur. If the information system is not attacked, after the damaged equipment is out of service, the power dispatching center will optimize the load loss with the goal of minimizing the load loss, and coordinate the adjustment and control from the power supply side and the load side to ensure the power balance of the power grid and eliminate the branch power exceeding the limit. , so as to avoid cascading failures. In the whole process, the topology analysis algorithm is used to obtain the disassembly of the power grid, and the calculation of each power grid area is carried out. For the above dynamic evolution process, the steps in Figure 1 are used to simulate.
对图1的流程说明如下:The process of Figure 1 is described as follows:
(1)设定元件运行状态。设定被破坏后退出运行的发电机、变电所和输电线路等电网元件;(1) Set the component running state. Set grid elements such as generators, substations and transmission lines that are out of service after being destroyed;
(2)系统拓扑分析。通过拓扑分析得出电网被攻击后解列成若干个互不相连的电力孤岛(子系统)的个数,以及每个电力孤岛的电源、网络、负荷情况;(2) System topology analysis. Through topology analysis, we can get the number of disconnected power islands (subsystems) after the power grid is attacked, and the power supply, network and load of each power island;
(3)对每个既含发电机又含用电负荷的电力孤岛(子系统)进行如下分析:(3) Perform the following analysis on each power island (subsystem) that contains both generators and power loads:
(3.1)模拟系统潮流分配。首先为了保证该区域功率平衡,对于发电大于用电的孤岛,根据每台机组的出力大小按照比例减小各自出力;对于用电大于发电的孤岛,则根据每台机组的旋转备用按照比例增大各个机组的出力,如果旋转备用不足,则需在所有机组满发的基础上,各用电负荷按照比例相应降低负载水平。根据调节后的发电和负荷进行潮流计算,判断是否存在支路过载,则不存在进入(4),如果存在支路过载,则进入(3.2);(3.1) Simulation system power flow distribution. First of all, in order to ensure the power balance in the area, for the island with more power generation than electricity consumption, the output of each unit is reduced proportionally according to the output size of each unit; for the island with power consumption greater than power generation, it is increased proportionally according to the rotating reserve of each unit If the output of each unit is insufficient, it is necessary to reduce the load level of each power consumption proportionally on the basis of full power of all units. Carry out power flow calculation according to the adjusted power generation and load, and judge whether there is branch overload, then there is no entry (4), if there is branch overload, enter (3.2);
(3.2)连锁故障判断。若调度中心被网络攻击,丧失运行状态感知和控制能力,无法处理支路过载,则所有过载支路跳闸,并进入(3.3);若调度中心没有被网络攻击,具备运行状态感知和控制能力,可以处理支路过载,则调度中心按照使该孤岛负荷损失量最小的策略进行发电再调度及相应的减负荷措施来消除支路过载,之后进入(4);(3.2) Cascading failure judgment. If the dispatch center is attacked by the network, loses the ability to sense and control the operating state, and cannot handle the overload of the branch, all overloaded branches will trip and enter (3.3). If the dispatch center is not attacked by the network, it has the ability to sense and control the operating state If the branch overload can be handled, the dispatching center will re-dispatch the power generation according to the strategy to minimize the load loss of the island and take corresponding load reduction measures to eliminate the branch overload, and then enter (4);
(3.3)系统拓扑分析。通过拓扑分析得出该电力孤岛由于连锁故障又进一步解列成若干个互不相连的新电力孤岛(子系统)的个数,以及每个新电力孤岛的电源、网络、负荷情况;(3.3) System topology analysis. Through topology analysis, it is obtained that the power island is further delisted into several new disconnected power islands (subsystems) due to cascading failures, as well as the power supply, network and load conditions of each new power island;
(4)判断每个即含发电机组又含用电负荷的电力孤岛(子系统)是否均计算完毕,若是则进入(5),否则返回(3),对剩余电力孤岛进行分析计算;(4) Determine whether each power island (subsystem) that includes both the generator set and the power load has been calculated, and if so, enter (5), otherwise return to (3), and analyze and calculate the remaining power island;
(5)对每个即含发电机组又含用电负荷的新电力孤岛(子系统)再模拟系统潮流分配、连锁故障判断、系统拓扑分析等步骤,直到没有连锁故障发生为止(没有出现新的电力孤岛);(5) Simulate the steps of system power flow distribution, cascading failure judgment, and system topology analysis for each new power island (subsystem) that includes both generator sets and power loads, until no cascading failure occurs (no new power island);
(6)判断每个即含发电机组又含用电负荷的新电力孤岛(子系统)是否均计算完毕,若是则进入(7),否则返回(5),对剩余新电力孤岛进行分析计算;(6) Judging whether each new power island (subsystem) containing both the generator set and the power load has been calculated, if so, enter (7), otherwise return to (5), and analyze and calculate the remaining new power island;
(7)统计负荷损失情况。(7) Statistical load loss.
根据该方法可得出每个电力孤岛的负荷损失情况,将各个电气孤岛的负荷损失量相加即为该攻击方式下的破坏效果,并将总负荷损失量作为电力系统脆弱性评估指标。According to this method, the load loss of each power island can be obtained, and the sum of the load loss of each electrical island is the damage effect under this attack mode, and the total load loss is used as the power system vulnerability assessment index.
本公开考虑信息系统和物理系统的相互影响,以电力调度中心的功能为切入点,将信息系统和物理系统进行一体化建模分析。考虑恐怖分子对电力系统发动信息物理联合攻击:电力系统遭受了物理攻击,即电力系统的某些一次设备被物理破坏后退出运行。同时电力调度中心可能承受了信息攻击,若遭受信息攻击,那么调度中心的功能失效,不能对电网各个节点的发电机出力、负荷进行优化调节控制;若没有遭受信息攻击,那么调度中心能够正常工作,可以采取启动备用机组、发电机功率再调度以及对非重要负荷减载等措施,对电网进行优化调节,目标是使全网的失负荷量最小。在拓扑分析算法的基础上,提出了基于直流潮流的脆弱性分析方法,对电力系统事故演化的动态过程进行定量模拟分析,采用失负荷量作为电力系统遭受信息物理联合攻击后的事故后果评估指标,被攻击后造成失负荷量最多的元件即为电网的脆弱元件,需要加以重点保护。本公开通过建立电网脆弱性的分析模型,找出电网的脆弱性元件,从而采取有效地防护措施来降低电力系统遭受袭击的损失。所构建的模型属于混合整数非线性规划问题,采用IEEE RTS-24节点测试系统对所提算法进行验证,算例分析表明了所提出问题及其模型的可行性和有效性。The present disclosure considers the mutual influence of the information system and the physical system, takes the function of the power dispatch center as the starting point, and conducts an integrated modeling analysis of the information system and the physical system. Consider the cyber-physical joint attack launched by terrorists on the power system: the power system has suffered a physical attack, that is, some primary equipment of the power system is physically damaged and out of operation. At the same time, the power dispatching center may have suffered an information attack. If it is attacked by information, the function of the dispatching center will fail, and it cannot optimize the adjustment and control of the generator output and load of each node of the power grid; if it is not attacked by information, the dispatching center can work normally. , the power grid can be optimized and adjusted by starting the standby unit, rescheduling the power of the generator, and reducing the load of the non-important load. The goal is to minimize the loss of load in the entire network. On the basis of the topology analysis algorithm, a vulnerability analysis method based on DC power flow is proposed, and the dynamic process of power system accident evolution is quantitatively simulated and analyzed. , the components that cause the most load loss after being attacked are the vulnerable components of the power grid, which need to be protected. The present disclosure finds out the vulnerable components of the power grid by establishing an analysis model of the vulnerability of the power grid, so as to take effective protection measures to reduce the loss of the power system from being attacked. The model constructed is a mixed integer nonlinear programming problem. The IEEE RTS-24 node test system is used to verify the proposed algorithm. The example analysis shows the feasibility and effectiveness of the proposed problem and its model.
本公开的目的是,构建电力信息物理系统一体化模型,在直流潮流方程的基础上,计及实际电力系统拓扑结构约束,改进形成一种面向电力系统输电网的脆弱性分析方法。The purpose of the present disclosure is to construct an integrated model of a power cyber-physical system, and based on the DC power flow equation, taking into account the constraints of the actual power system topology, improve and form a vulnerability analysis method oriented to the power system transmission network.
本公开的目的是由以下技术方案来实现的:The purpose of this disclosure is achieved by the following technical solutions:
电力调度控制中心可用性Availability of power dispatch control center
首先定义电力调度中心可用性变量:First define the availability variable of the power dispatch center:
式(1)中η表示调度控制中心的可用性,为0-1变量。为1代表调度中心正常工作,为0代表调度中心失去功能。In formula (1), η represents the availability of the dispatch control center, which is a 0-1 variable. A value of 1 means that the dispatch center is working normally, and a value of 0 means that the dispatch center is out of function.
目标函数objective function
该规划问题以电力系统中的发电机组、电力线路、节点和变电所等一次设备作为破坏目标,决策变量是调度中心控制下各个节点的发电机组出力和负荷水平(如果该节点可控),目标函数是使系统总的失负荷量最少:The planning problem takes primary equipment such as generator sets, power lines, nodes and substations in the power system as the destruction targets, and the decision variables are the output and load levels of the generator sets at each node under the control of the dispatch center (if the node is controllable), The objective function is to minimize the total loss of load in the system:
式(2)中:PG,PL是系统运行人员所控制的系统决策变量,分别为节点发电机的有功出力、节点负荷水平的向量表达形式,其维数等于电网总节点的个数。ΔPLi为负荷i的有功损失量。In formula (2): P G , P L are the system decision variables controlled by the system operator, which are the vector expressions of the active power output of the node generator and the node load level respectively, and their dimension is equal to the total number of nodes in the power grid. ΔP Li is the amount of active power loss of load i.
约束条件Restrictions
针对电网元件遭受物理破坏后,考虑到继电保护设备动作使受损元件退出运行,电力系统网络拓扑结构变化的约束如下:After the power grid components are physically damaged, considering that the action of the relay protection equipment makes the damaged components out of operation, the constraints on the change of the power system network topology are as follows:
式(3)中,δGen,δLine,δBus,δSub分别为表征电力系统中各个发电机组、输电线路、节点、变电所功能状态的向量表达形式,其向量维数与发电机组、输电线路、节点及变电所数目相同,其元素为0或1,为1对应该电力元件遭受打击而功能失效,为0对应该电力元件未遭受打击功能正常。为向量δGen中第j个元素,即发电机组j的功能状态,为0-1变量;为向量δLine中第l个元素,即输电线路l的功能状态,为0-1变量;为向量δBus中第n个元素,即节点n的功能状态,为0-1变量;为向量δSub中第s个元素,即变电所s的功能状态,为0-1变量。In formula (3), δ Gen , δ Line , δ Bus , and δ Sub are the vector expressions representing the functional states of each generator set, transmission line, node, and substation in the power system, respectively. The vector dimension is related to the generator set, The number of transmission lines, nodes and substations is the same, and its elements are 0 or 1. 1 corresponds to the power element being hit and the function fails, and 0 corresponds to the power element that is not hit and functions normally. is the jth element in the vector δ Gen , that is, the functional state of the generator set j, which is a 0-1 variable; is the l-th element in the vector δ Line , that is, the functional state of the transmission line l, and is a 0-1 variable; is the nth element in the vector δ Bus , that is, the functional state of node n, which is a 0-1 variable; is the s-th element in the vector δ Sub , that is, the functional state of the substation s, which is a 0-1 variable.
式(4)(5)中,Y,H分别为表征电力系统在拓扑结构影响下,电力线路、发电机组是否可用的向量表达形式,其向量维数与电力线路、发电机组数目相同,其元素为1或0,为0对应该电力元件不可用,为1对应该电力元件可用。式(4)的含义为,当出现以下情况均会造成电力线路l不可用:即电力线路l受到打击而功能失效、电力线路l的首/末端节点受到打击而功能失效、与电力线路l连接的变电所受到打击而功能失效以及若电力线路l为同杆多回线路中的一回,则对于物理破坏而言,同杆的多回线路一般会同时退出运行,对于程序分析而言即同杆多回线路中的一回l'故障则与其同杆的电力线路l也故障。Yl为电力线路l的可用状态,和分别为电力线路l连接的首末节点的功能状态,均为0-1变量;为与变电所s相连接的所有电力线路所组成的集合,的含义为与电力线路l相连接的所有变电所s;为与电力线路l同杆并列运行的其他电力线路所组成的集合,为与电力线路同杆并列运行的所有电力线路l′。式(5)的含义为,当出现以下情况均会造成发电机组j不可用:即发电机组j受到打击而功能失效或发电机组j所接入的节点受到打击而功能失效,式中Hj为发电机组j的可用状态,为发电机组j接入的节点的功能状态,均为0-1变量。In formulas (4) and (5), Y and H are respectively the vector expression forms that characterize whether the power lines and generator sets are available under the influence of the topological structure of the power system. The vector dimension is the same as the number of power lines and generator sets. 1 or 0, 0 corresponds to the power element unavailable, and 1 corresponds to the power element available. The meaning of formula (4) is that the power line l will be unavailable when the following conditions occur: that is, the power line l is hit and the function fails, the first/end node of the power line l is hit and the function fails, and the power line l is connected to the power line l. The substation is hit and the function fails, and if the power line l is one of the multi-circuit lines on the same pole, for physical damage, the multi-circuit lines on the same pole will generally be out of operation at the same time. For program analysis, that is If one circuit l' of the multi-circuit lines on the same pole fails, the power line l on the same pole also fails. Y l is the available state of power line l, and are the functional states of the first and last nodes connected by the power line l, both are 0-1 variables; is the set of all power lines connected to substation s, means all substations s connected to power line l; is a set composed of other power lines running in parallel with the power line l on the same pole, For all power lines l' running in parallel with the same pole of the power line. The meaning of formula (5) is that the generator set j will be unavailable when the following conditions occur: that is, the generator set j is hit and the function fails, or the node connected to the generator set j is hit and the function fails, where H j is the availability status of genset j, is the functional state of the node connected to the generator set j, both are 0-1 variables.
除了上述的拓扑结构约束外,约束条件还包含等式约束:直流潮流方程约束、支路潮流等式约束、功率平衡约束;不等式约束:支路潮流安全约束、发电机组出力约束和负荷有功变化量约束。In addition to the above topology constraints, the constraints also include equation constraints: DC power flow equation constraints, branch power flow equation constraints, power balance constraints; inequality constraints: branch power flow safety constraints, generator output constraints and load active power changes constraint.
PG-PL=Bθ (6)P G -P L =Bθ (6)
式(6)为直流潮流方程式,其中PG为各节点发电机注入有功功率向量,PL为各节点负荷有功功率向量,B为直流潮流电纳矩阵,θ为节点相角向量。Equation (6) is the DC power flow equation, where PG is the active power vector injected by the generator at each node, PL is the active power vector of each node load, B is the DC power flow susceptance matrix, and θ is the node phase angle vector.
式(7)为输电支路有功潮流等式约束,式中Pl为输电支路l的有功潮流,xl为输电支路l的电抗,Aln为线路-节点关联矩阵中的元素,θn为节点n的相角,N为系统节点集合,D为电力线路集合。Equation (7) is the equation constraint of the active power flow of the transmission branch, where P l is the active power flow of the transmission branch l, x l is the reactance of the transmission branch l, A ln is the element in the line-node correlation matrix, θ n is the phase angle of node n, N is the set of system nodes, and D is the set of power lines.
式(8)为功率平衡方程,式中PGj为发电机j的有功出力,ΔPGj为调度中心控制下发电机j的有功功率调节量,Gn为系统中节点n上的所有发电机集合;PLi为负荷i的有功功率,ΔPLi为负荷i的有功损失量,Ln为系统中节点n上的所有负荷集合。Equation (8) is the power balance equation, where P Gj is the active power output of generator j, ΔP Gj is the active power regulation amount of generator j under the control of the dispatch center, and G n is the set of all generators on node n in the system ; P Li is the active power of load i, ΔP Li is the active power loss of load i, and L n is the set of all loads on node n in the system.
式(9)为输电支路l功率上下限约束,为输电支路l的有功功率传输值上限。Equation (9) is the upper and lower limit constraints of the transmission branch l power, is the upper limit of the active power transmission value of the transmission branch l.
式(10)为发电机j的有功出力上下限约束,分别为发电机j的有功出力上下限。Equation (10) is the upper and lower limit constraints of the active power output of generator j, are the upper and lower limits of the active power output of generator j, respectively.
式(11)为负荷i的有功功率损失约束,L为系统中所有的负荷集合。Equation (11) is the active power loss constraint of load i, and L is the set of all loads in the system.
具体的,IEEE RTS-24节点系统算例Specifically, the calculation example of IEEE RTS-24 node system
图2给出了IEEE RTS-24节点测试系统,该系统包括10个含发电机组的节点(32台发电机);17个含负荷的节点;38条支路;支路3-24为变电所1的联络变压器、支路9-11、9-12、10-11、10-12为变电所2的联络变压器。Figure 2 shows the IEEE RTS-24 node test system, which includes 10 nodes with generator sets (32 generators); 17 nodes with loads; 38 branches; branches 3-24 are substations The tie transformers and branches 9-11, 9-12, 10-11 and 10-12 of Substation 1 are the tie transformers of Substation 2.
表1给出了IEEE RTS-24节点系统发电机组数据。Table 1 presents the IEEE RTS-24 node system generator set data.
表1IEEE RTS-24节点系统发电机组数据Table 1 IEEE RTS-24 node system generator set data
表2给出了IEEE RTS-24节点系统支路电抗及传输功率限值的数据。Table 2 gives the data of the branch reactance and transmission power limit of the IEEE RTS-24 node system.
表2IEEE RTS-24节点系统支路电抗及传输功率限值Table 2 IEEE RTS-24 node system branch reactance and transmission power limits
表3给出了IEEE RTS-24节点系统负荷数据。Table 3 presents the IEEE RTS-24 node system load data.
表3IEEE RTS-24节点系统负荷数据Table 3 IEEE RTS-24 node system load data
依据上述给定的参数,利用本实施例提出的算法对IEEE RTS-24测试系统进行计算。According to the above given parameters, the algorithm proposed in this embodiment is used to calculate the IEEE RTS-24 test system.
表4给出了模拟电网遭受信息攻击,调度中心功能失效,再对电网的一次设备随机抽样模拟物理破坏后,每种破坏方案下电网的失负荷量以及占总负荷的比例(总负荷量为2850MW)。Table 4 shows the load loss of the power grid under each damage scheme and the proportion of the total load (the total load is 2850MW).
表4IEEE RTS-24节点系统遭受信息物理联合攻击的脆弱性计算结果Table 4 Calculation results of vulnerability of IEEE RTS-24 node system to cyber-physical joint attack
表4表明,在电网失负荷占比达到70%以上时,节点13、15及18均作为攻击目标出现,是电网的脆弱节点;线路12-23及同杆双回线路20-23几乎出现在所有破坏方案中,线路7-8及16-17也出现较多次数,是电网的脆弱支路。无论针对哪种攻击方案,电网的脆弱性节点和支路是基本不变的。通过以上分析,应该加强对这些节点和支路的安全防护,从而降低电网遭受攻击时的损失。Table 4 shows that when the power grid loss ratio reaches more than 70%, nodes 13, 15 and 18 all appear as attack targets and are vulnerable nodes of the power grid; lines 12-23 and double-circuit lines 20-23 on the same pole almost appear in Among all the destruction schemes, lines 7-8 and 16-17 also appeared more frequently, which are vulnerable branches of the power grid. No matter which attack scheme is aimed at, the vulnerable nodes and branches of the power grid are basically unchanged. Through the above analysis, the security protection of these nodes and branches should be strengthened to reduce the loss when the power grid is attacked.
表5给出了电网仅遭受物理攻击和同时信息物理联合攻击的失负荷量对比结果。如果电网仅遭受物理攻击,调度中心功能正常,可以优化控制电网的失负荷量最少。选取表1中的攻击方案2、攻击方案5,分别在调度中心可用、调度中心不可用的情况下,进行失负荷量对比。Table 5 shows the comparison results of the load loss of the power grid under only physical attack and simultaneous cyber-physical attack. If the power grid is only physically attacked, the dispatch center functions normally and can optimally control the power grid with the least amount of lost load. Select attack plan 2 and attack plan 5 in Table 1, and compare the load loss when the dispatch center is available and the dispatch center is unavailable.
表5仅遭受物理攻击和同时信息物理联合攻击的失负荷量对比Table 5 Comparison of the load loss of only physical attack and simultaneous cyber-physical attack
表5表明,对于同一种攻击方案,在调度中心的优化调节作用下电网失负荷量明显降低,因此调度控制中心也是需要重点保护的目标。在供电恢复过程中,应该首先保证调度中心恢复正常工作,才能最大程度地降低损失。Table 5 shows that for the same attack scheme, the load loss of the power grid is significantly reduced under the optimal regulation of the dispatching center, so the dispatching control center is also a target that needs to be protected. In the process of power supply recovery, the dispatch center should be guaranteed to resume normal work first, in order to minimize losses.
综上,本发明基于当前电力系统信息物理高度融合的背景,在常规直流潮流模型的基础上,计及电力系统的实际拓扑结构约束,提出了电力系统遭受信息物理联合攻击的脆弱性分析模型并求解,将这类攻击问题描述为一个混合整数非线性规划问题,用失负荷量作为事故后果的评价指标,来分析电力系统的脆弱性。应用本发明模型,分析比较不同的攻击方案,可以有效挖掘电力系统中的脆弱性节点和支路,从而采取相应的防护措施,降低电力系统遭受攻击的风险和损失,提高电力系统的运行安全性。由于考虑了电力系统实际的拓扑结构影响,本算法更符合系统运行工况,计算结果更准确,实用性更好。通过IEEERTS-24节点测试系统的算例分析,表明了本算法对于电力系统输电网的脆弱性分析与计算,是切实有效的。To sum up, based on the background of the current high integration of cyber-physics in the current power system, on the basis of the conventional DC power flow model, and taking into account the constraints of the actual topology structure of the power system, the present invention proposes a vulnerability analysis model for the power system to be attacked by cyber-physical joint attacks. This kind of attack problem is described as a mixed integer nonlinear programming problem, and the loss of load is used as the evaluation index of the accident consequences to analyze the vulnerability of the power system. By applying the model of the invention, analyzing and comparing different attack schemes, the vulnerable nodes and branches in the power system can be effectively excavated, so as to take corresponding protective measures, reduce the risk and loss of the power system being attacked, and improve the operation security of the power system . Since the influence of the actual topology structure of the power system is considered, the algorithm is more in line with the operating conditions of the system, the calculation results are more accurate, and the practicability is better. Through the example analysis of the IEEERTS-24 node test system, it is shown that the algorithm is practical and effective for the vulnerability analysis and calculation of the power system transmission network.
以上所述仅为本申请的优选实施例而已,并不用于限制本申请,对于本领域的技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。The above descriptions are only preferred embodiments of the present application, and are not intended to limit the present application. For those skilled in the art, the present application may have various modifications and changes. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this application shall be included within the protection scope of this application.
上述虽然结合附图对本公开的具体实施方式进行了描述,但并非对本公开保护范围的限制,所属领域技术人员应该明白,在本公开的技术方案的基础上,本领域技术人员不需要付出创造性劳动即可做出的各种修改或变形仍在本公开的保护范围以内。Although the specific embodiments of the present disclosure have been described above in conjunction with the accompanying drawings, they do not limit the protection scope of the present disclosure. Those skilled in the art should understand that on the basis of the technical solutions of the present disclosure, those skilled in the art do not need to pay creative efforts. Various modifications or variations that can be made are still within the protection scope of the present disclosure.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910152597.4A CN109936133B (en) | 2019-02-28 | 2019-02-28 | A Vulnerability Analysis Method of Power System Considering Cyber-Physical Joint Attack |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910152597.4A CN109936133B (en) | 2019-02-28 | 2019-02-28 | A Vulnerability Analysis Method of Power System Considering Cyber-Physical Joint Attack |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109936133A true CN109936133A (en) | 2019-06-25 |
CN109936133B CN109936133B (en) | 2020-11-20 |
Family
ID=66986241
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910152597.4A Active CN109936133B (en) | 2019-02-28 | 2019-02-28 | A Vulnerability Analysis Method of Power System Considering Cyber-Physical Joint Attack |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109936133B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110994619A (en) * | 2019-10-12 | 2020-04-10 | 国家电网公司西南分部 | Emergency command-oriented cross-regional power grid integrated automatic power dispatching system |
CN111131331A (en) * | 2020-01-15 | 2020-05-08 | 国网陕西省电力公司电力科学研究院 | Network vulnerability guided information attack-oriented moving target defense deployment optimization method |
CN111832907A (en) * | 2020-06-22 | 2020-10-27 | 华中科技大学 | Correlated Electricity-Gas System Vulnerability Assessment Method under Different Faults |
CN112491034A (en) * | 2020-10-20 | 2021-03-12 | 东北电力大学 | Electric power information physical system modeling method based on alternating current power flow model |
CN112636357A (en) * | 2020-12-10 | 2021-04-09 | 南京理工大学 | Power grid vulnerability analysis method based on reinforcement learning |
CN113065218A (en) * | 2021-05-13 | 2021-07-02 | 南京工程学院 | Power system reliability assessment method, device and system considering LR attack |
CN113361054A (en) * | 2021-06-11 | 2021-09-07 | 山东大学 | Route optimization method and system for power information physical system |
CN113516357A (en) * | 2021-05-10 | 2021-10-19 | 湖南大学 | Electric power system fragile line evaluation method and system considering cyber attack risk |
CN113991643A (en) * | 2021-09-30 | 2022-01-28 | 国网山东省电力公司武城县供电公司 | Power grid intelligent dispatching system based on traction power model |
CN114069724A (en) * | 2021-12-06 | 2022-02-18 | 国网四川省电力公司电力科学研究院 | Method for analyzing vulnerability of information link of power information physical system |
CN114282855A (en) * | 2022-03-07 | 2022-04-05 | 四川大学 | Comprehensive protection method of electric-gas coupling system under heavy load distribution attack |
CN115034694A (en) * | 2022-08-11 | 2022-09-09 | 成都数之联科技股份有限公司 | Power grid vulnerability assessment method and device, electronic equipment and storage medium |
CN115208814A (en) * | 2022-07-13 | 2022-10-18 | 上海大学 | Electric power information network routing processing method considering information transmission characteristics under network attack |
CN115663813A (en) * | 2022-12-29 | 2023-01-31 | 天津大学 | Fault analysis method considering information physical attack of substation topology |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105429133A (en) * | 2015-12-07 | 2016-03-23 | 国网智能电网研究院 | Information network attack-oriented vulnerability node evaluation method for power grid |
CN106100877A (en) * | 2016-06-02 | 2016-11-09 | 东南大学 | A kind of power system reply network attack vulnerability assessment method |
CN107274110A (en) * | 2017-07-06 | 2017-10-20 | 广东电网有限责任公司电力调度控制中心 | Electric power networks vulnerability assessment method under Information Level web influence |
CN107679716A (en) * | 2017-09-19 | 2018-02-09 | 西南交通大学 | Consider the risk assessment of interconnected network cascading failure and the alarm method of communication fragile degree |
CN109118098A (en) * | 2018-08-21 | 2019-01-01 | 山东大学 | The cascading failure methods of risk assessment and system of high proportion wind-electricity integration |
-
2019
- 2019-02-28 CN CN201910152597.4A patent/CN109936133B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105429133A (en) * | 2015-12-07 | 2016-03-23 | 国网智能电网研究院 | Information network attack-oriented vulnerability node evaluation method for power grid |
CN106100877A (en) * | 2016-06-02 | 2016-11-09 | 东南大学 | A kind of power system reply network attack vulnerability assessment method |
CN107274110A (en) * | 2017-07-06 | 2017-10-20 | 广东电网有限责任公司电力调度控制中心 | Electric power networks vulnerability assessment method under Information Level web influence |
CN107679716A (en) * | 2017-09-19 | 2018-02-09 | 西南交通大学 | Consider the risk assessment of interconnected network cascading failure and the alarm method of communication fragile degree |
CN109118098A (en) * | 2018-08-21 | 2019-01-01 | 山东大学 | The cascading failure methods of risk assessment and system of high proportion wind-electricity integration |
Non-Patent Citations (3)
Title |
---|
YANBING JIA 等: "Risk assessment of cascading failures in power grid based on complex network theory", 《 2016 14TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION》 * |
丁明 等: "基于事故链及动态故障树的电网连锁故障风险评估模型", 《中国电机工程学报》 * |
郭嘉: "考虑连锁故障的电网信息物理系统脆弱性评估方法研究", 《中国博士学位论文全文数据库 工程科技Ⅱ辑》 * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110994619A (en) * | 2019-10-12 | 2020-04-10 | 国家电网公司西南分部 | Emergency command-oriented cross-regional power grid integrated automatic power dispatching system |
CN111131331B (en) * | 2020-01-15 | 2022-02-22 | 国网陕西省电力公司电力科学研究院 | Network vulnerability guided information attack-oriented moving target defense deployment optimization method |
CN111131331A (en) * | 2020-01-15 | 2020-05-08 | 国网陕西省电力公司电力科学研究院 | Network vulnerability guided information attack-oriented moving target defense deployment optimization method |
CN111832907A (en) * | 2020-06-22 | 2020-10-27 | 华中科技大学 | Correlated Electricity-Gas System Vulnerability Assessment Method under Different Faults |
CN112491034A (en) * | 2020-10-20 | 2021-03-12 | 东北电力大学 | Electric power information physical system modeling method based on alternating current power flow model |
CN112636357A (en) * | 2020-12-10 | 2021-04-09 | 南京理工大学 | Power grid vulnerability analysis method based on reinforcement learning |
CN112636357B (en) * | 2020-12-10 | 2022-11-04 | 南京理工大学 | Power grid vulnerability analysis method based on reinforcement learning |
CN113516357B (en) * | 2021-05-10 | 2024-04-19 | 湖南大学 | Electric power system vulnerable line assessment method and system considering network attack risk |
CN113516357A (en) * | 2021-05-10 | 2021-10-19 | 湖南大学 | Electric power system fragile line evaluation method and system considering cyber attack risk |
CN113065218A (en) * | 2021-05-13 | 2021-07-02 | 南京工程学院 | Power system reliability assessment method, device and system considering LR attack |
CN113065218B (en) * | 2021-05-13 | 2024-02-13 | 南京工程学院 | Electric power system reliability evaluation method, device and system considering LR attack |
CN113361054A (en) * | 2021-06-11 | 2021-09-07 | 山东大学 | Route optimization method and system for power information physical system |
CN113361054B (en) * | 2021-06-11 | 2023-07-28 | 山东大学 | Route optimization method and system for power information physical system |
CN113991643A (en) * | 2021-09-30 | 2022-01-28 | 国网山东省电力公司武城县供电公司 | Power grid intelligent dispatching system based on traction power model |
CN113991643B (en) * | 2021-09-30 | 2022-08-26 | 国网山东省电力公司武城县供电公司 | Intelligent power grid dispatching system based on traction power model |
CN114069724B (en) * | 2021-12-06 | 2023-06-20 | 国网四川省电力公司电力科学研究院 | A Vulnerability Analysis Method for Information Links in Power Cyber-Physical Systems |
CN114069724A (en) * | 2021-12-06 | 2022-02-18 | 国网四川省电力公司电力科学研究院 | Method for analyzing vulnerability of information link of power information physical system |
CN114282855A (en) * | 2022-03-07 | 2022-04-05 | 四川大学 | Comprehensive protection method of electric-gas coupling system under heavy load distribution attack |
CN115208814A (en) * | 2022-07-13 | 2022-10-18 | 上海大学 | Electric power information network routing processing method considering information transmission characteristics under network attack |
CN115034694B (en) * | 2022-08-11 | 2022-10-21 | 成都数之联科技股份有限公司 | Power grid vulnerability assessment method and device, electronic equipment and storage medium |
CN115034694A (en) * | 2022-08-11 | 2022-09-09 | 成都数之联科技股份有限公司 | Power grid vulnerability assessment method and device, electronic equipment and storage medium |
CN115663813A (en) * | 2022-12-29 | 2023-01-31 | 天津大学 | Fault analysis method considering information physical attack of substation topology |
CN115663813B (en) * | 2022-12-29 | 2023-02-28 | 天津大学 | Fault analysis method considering information physical attack of substation topology |
Also Published As
Publication number | Publication date |
---|---|
CN109936133B (en) | 2020-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109936133B (en) | A Vulnerability Analysis Method of Power System Considering Cyber-Physical Joint Attack | |
Yan et al. | Cascading failure analysis with DC power flow model and transient stability analysis | |
Zang et al. | Integrated fault propagation model based vulnerability assessment of the electrical cyber-physical system under cyber attacks | |
Fang et al. | Identification of vulnerable lines in power grids with wind power integration based on a weighted entropy analysis method | |
CN103440401B (en) | Improve the emergent control measure risk quantification appraisal procedure of transmitting capacity of the electric wire netting | |
CN108512226B (en) | Method for evaluating resilience of power system under disaster | |
CN114282855B (en) | A Comprehensive Protection Method of Electric-Pneumatic Coupled System Under Load Redistribution Attack | |
CN105160459A (en) | A method for evaluating the stable operation status of power system | |
CN103310296A (en) | Operation ticket security check method based on disturbance evaluation and trend analysis | |
Rasmussen et al. | A review of cyber-physical energy system security assessment | |
CN115034510A (en) | The whole-process closed-loop management and control optimization method and device of power grid security risk suitable for typhoon scenarios | |
Zhu et al. | Power system structure optimization based on reinforcement learning and sparse constraints under DoS attacks in cloud environments | |
Qin et al. | Risk assessment and defense resource allocation of cyber-physical distribution system under denial of service attack | |
CN111639841B (en) | A comprehensive assessment method for lightning trip risk of high-voltage transmission lines | |
Wang et al. | Evaluation for risk of cascading failures in power grids by inverse-community structure | |
Liang et al. | Cyber-physical Test Case for Distribution Grid Operation and Control | |
CN115130691B (en) | A method and device for identifying and simulating paralysis of weak links in a cyber-physical system | |
Liu et al. | A resilience enhancement scheme of cyber-physical power system for extreme natural disasters | |
Wu et al. | A cascading failure model of power systems considering components’ multi-state failures | |
CN111799781B (en) | Method and device for analyzing and processing power system | |
CN105006818B (en) | A Planned Active Power Flow Adjustment Method | |
Tian et al. | Power System Protection Operation and Optimization of Dispatching Work | |
Xu et al. | A detection method for cascading failure of power systems based on epidemic model | |
Wang et al. | A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch | |
Jiang et al. | Stochastic planning for resilient infrastructure of distribution system under extreme weather events |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |