CN110311915B - False data injection attack cost evaluation method and system - Google Patents
False data injection attack cost evaluation method and system Download PDFInfo
- Publication number
- CN110311915B CN110311915B CN201910597262.3A CN201910597262A CN110311915B CN 110311915 B CN110311915 B CN 110311915B CN 201910597262 A CN201910597262 A CN 201910597262A CN 110311915 B CN110311915 B CN 110311915B
- Authority
- CN
- China
- Prior art keywords
- node
- attack
- nodes
- branch
- injection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000002347 injection Methods 0.000 title claims abstract description 196
- 239000007924 injection Substances 0.000 title claims abstract description 196
- 238000011156 evaluation Methods 0.000 title claims abstract description 68
- 238000000034 method Methods 0.000 claims abstract description 26
- 238000005259 measurement Methods 0.000 claims description 70
- 238000004364 calculation method Methods 0.000 claims description 33
- 238000010276 construction Methods 0.000 claims description 13
- 239000000243 solution Substances 0.000 claims description 7
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 230000007123 defense Effects 0.000 abstract description 10
- 230000009286 beneficial effect Effects 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 230000008859 change Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 206010063385 Intellectualisation Diseases 0.000 description 1
- 230000005856 abnormality Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000035772 mutation Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Supply And Distribution Of Alternating Current (AREA)
Abstract
The invention discloses a false data injection attack cost evaluation method and a system, wherein the method comprises the steps of constructing an attack area based on a power grid topological structure, and evaluating attack costs in single-node attack and multi-node attack by considering the connection characteristics among nodes in the attack area and an attack purpose, wherein multiple possibilities are given when the multi-node attack cost evaluation is carried out. The method and the system realize the evaluation of the false data injection attack cost under various conditions, can provide the weak point of the power grid which is easy to be attacked by the false data injection from the attack cost perspective, and are beneficial to pertinently carrying out the active defense of the power grid side facing the threat of the false data injection attack.
Description
Technical Field
The invention relates to a false data injection attack cost evaluation method and system, and belongs to the technical field of power automation.
Background
With the development of smart grids, the grids have been deeply coupled systems by information communication systems and physical power systems. The penetration of the information communication technology improves the informatization and the intellectualization of the operation of the power grid on the one hand, and brings the hidden danger of the safety of an information system on the other hand, and the safe and economic operation of the smart power grid can be threatened. In the last two decades, a power grid is attacked many times to cause major accidents due to the attack of an information communication network, And a concept of false Data injection attack is proposed for the first time in 2009, namely Data tampering is performed through a cryptographic system which organizes And predictively breaks measurement equipment, or Data transmitted to a Control center by a Supervisory Control And Data Acquisition (SCADA) system is intercepted And tampered through an optical fiber interception technology, so that the purpose of an interference state estimation result is achieved. At present, false data injection attack is a hotspot problem, related research results are quite many, and three aspects of attack strategies, attack influence and security defense measures for coping with the attack are mainly focused. In terms of attack strategies, numerous methods have been proposed for a crowd-source student to stand at the attacker's perspective and to guess the attacker's mind and situation. The early attack construction is mainly based on a direct current model, is easy to be found in a bad data identification link based on an alternating current model in an actual power system, and has low success rate. Therefore, related research develops exploration on an attack construction method based on an exchange model and achieves certain results. The above research is divided into two cases of grasping the global information and the local information of the power grid according to the degree of grasping the information by an attacker, namely the grasping degree of the topology and the parameter information of the power grid. Relatively speaking, the attack success rate under the condition of mastering the global information of the power grid is higher, but the attack under the condition of mastering the local information is more practical. From the perspective of the attacker, it is desirable to achieve efficient attack with the least cost of attack, i.e., the least amount of attack. Therefore, attack cost evaluation is carried out before attack, which is beneficial to reducing attack cost and improving attack efficiency, and on the other hand, the evaluation of the attack cost can also provide the vulnerable weak point of the power grid from the attack cost perspective, thereby being convenient for pertinently carrying out power grid side security defense facing false data injection attack threat. While the attack cost evaluation method is still under exploration, the attack is mainly optimized by starting from the sparsity of an attack vector at present, but the calculation process is relatively complicated.
Disclosure of Invention
In order to solve the technical problems, the invention provides a false data injection attack cost evaluation method and a false data injection attack cost evaluation system based on a power grid topological structure, and solves the problem that the existing attack cost evaluation method is complex in calculation.
In order to achieve the above object, the technical scheme adopted by the invention is as follows: a false data injection attack cost evaluation method is characterized by comprising the following steps:
constructing false data injection single-node and multi-node attack areas based on a power grid topological structure;
respectively evaluating the attack cost corresponding to the single-node attack area and the multi-node attack area;
and comparing the attack costs of different attack areas, and finding out the weak points of the power grid which are easy to be attacked by false data injection.
The method for evaluating the cost of the dummy data injection attack is characterized in that the construction of the dummy data injection single-node and multi-node attack area comprises the following steps:
determining with each attacked node imSingle node attack zone formed for centerComprises the following steps:
wherein m is the number of the attacked power node, k is the number of the power nodes,to a node imA set of nodes within the region that is central,to a node imSet of branches, set of nodes within a centered areaIncludes a node imAnd nodes, sets of branches connected theretoIncludes a and node imAll the branches connected; i.e. imBelongs to a power node set of gamma ═ i as the center of an attack area1,i2,…,ikThe mth power node in (1).
The method for evaluating the cost of the dummy data injection attack is characterized in that the node i is used for evaluating the cost of the dummy data injection attackmThe node set and the branch set in the region which is the center are obtained by the following steps:
1) let m equal to 1;
3) Judgment and node imWhether a zero injection node exists in the connected nodes;
if the zero injection node exists, forming a zero injection node set P, and aiming at each zero injection node in the zero injection node set P, selecting any non-zero injection node connected with the zero injection node, and adding the non-zero injection node into the setAdding the zero injection node and the selected non-zero injection node connected with the zero injection node into the branch set
If not, the node set is describedHas been completed and assembledIncluding a collectionAnd node imAll the connected branches and the branches between the zero injection node and the selected non-zero injection node connected with the zero injection node are made to be m +1, if m is less than or equal to k, the step 2 is returned, and if m is more than k, a final node set is obtainedAnd set of tributaries
The method for evaluating the attack cost of the injection of the false data is characterized in that the method for evaluating the attack cost corresponding to the single-node attack area comprises the following specific steps:
attack cost H for single node attackiAnd (4) evaluating, wherein the calculation formula is as follows:
in the formula: upsilon isd1Is a single node attack area A taking a power node i as a centeriNode setNumber of injected power measurements, ω, at the d1 th nodeb1Is a single node attack area A taking a power node i as a centeriBranch collectionNumber of power measurements, γ, on branch b1iAttacking region A for a Single nodeiNumber of nodes of medium generator, etaiFor zero number of injection nodes, d1 represents the setThe serial number of the middle node ranges from 1 to Ni(ii) a b1 denotes a collectionBranch serial number in the range of 1-Bi,card () represents the number of elements in the solution set, NiRepresenting a set of nodesNumber of electric power nodes in, BiRepresenting sets of branchesThe number of branches in (1).
The method for evaluating the attack cost of injecting the false data is characterized in that the corresponding attack cost of a multi-section attack area is evaluated by the following specific method:
if no connecting branch exists between every two nodes in the attack node set gamma', the attack cost H is reached when the nodes are attacked31The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 represents the node set MS corresponding to the attack area MAnodeThe serial number of the middle node ranges from 1 to N; b2 represents the branch set MS corresponding to the attack area MAbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchThe number of power measurements on the b2 th branch;
if two nodes i and j with connected branches exist in the attack node set gamma', and the aim of false data injection attack for the two nodes is to increase the voltage phase angle of the state quantity by c respectivelyiAnd cjIf c isi=cjThen θ'i-θ′j=θi-θj+ci-cj=θi-θj,θ′iAnd θ'jVoltage phase angle values, theta, for nodes i and j, respectively, after a dummy data injection attackiAnd thetajInjecting voltage phase angle values of the nodes i and j before attack for the dummy data respectively; attack cost H during multi-node attack at the moment32The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node;
if two nodes i and j with connected branches exist in the attack node set gamma', and the aim of false data injection attack for the two nodes is to increase the voltage phase angle of the state quantity by c respectivelyiAnd cjIf c isi≠cjAt this time, the attack cost H of the multi-node attack is carried out33The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; b2 denotes a set MSbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchThe number of power measurements on the b2 th branch;
when m is attacked to more than or equal to 2 nodes, the attack node set is gamma' ═ i1,i2,…,im},The node set corresponding to the multi-node attack area MA is MSnodeAnd MSbranchThe number of the collection elements is as follows:
N=card(MSnode) (8)
B=card(MSbranch) (9)
in the formula: n represents a node set MS in a multi-node attack area MAnodeB represents a branch set MS in a multi-node attack area MAbranchThe number of branches in (1).
The method for evaluating the cost of the injection attack of the false data is characterized in that the attack costs of different attack areas are compared to find out the weak point of the power grid which is vulnerable to the injection attack of the false data, and the method specifically comprises the following steps:
and sequencing the attack cost evaluation results of different attack areas from low to high, comparing the evaluation results with a set value, and judging that the evaluation results are lower than the set value as a weak point of the power grid which is easy to be attacked by injecting false data.
A system for evaluating a cost of a dummy data injection attack, comprising:
the false data injection attack region construction module is used for constructing false data injection single-node and multi-node attack regions;
the single-node attack cost evaluation module is used for evaluating the cost of the single-node attack area;
the multi-node attack cost evaluation module is used for evaluating the cost of a multi-node attack area;
and the weak point determining module is used for comparing the attack cost evaluation results and finding out the weak points of the power grid which are easy to be attacked by false data injection.
The system for evaluating the cost of the dummy data injection attack is characterized in that the dummy data injection attack region construction module comprises:
a single-node attack area determination unit for determining each attacked node imSingle node attack zone formed for centerComprises the following steps:
a multi-node attack area determination unit, configured to determine that the multi-node attack area a is:node set S in multi-node attack area AnodeComprises the following steps:branch set S in multi-node attack area AbranchComprises the following steps:
wherein m is the number of the attacked power node, k is the number of the power nodes,to a node imA set of nodes within the region that is central,to a node imSet of branches, set of nodes within a centered areaIncludes a node imAnd nodes, sets of branches connected theretoIncludes a and node imAll the branches connected; i.e. imBelongs to a power node set of gamma ═ i as the center of an attack area1,i2,…,ikThe mth power node in (1).
The system for evaluating the attack cost of the dummy data injection is characterized in that the single-node attack cost evaluation module is specifically configured to: adopting the following calculation formula to attack the attack cost H of the single nodeiPerforming evaluation and calculationThe formula is as follows: :
in the formula: upsilon isd1Is a single node attack area A taking a power node i as a centeriNode setNumber of injected power measurements, ω, at the d1 th nodeb1Is a single node attack area A taking a power node i as a centeriBranch collectionNumber of power measurements, γ, on branch b1iAttacking region A for a Single nodeiNumber of nodes of medium generator, etaiFor zero number of injection nodes, d1 represents the setThe serial number of the middle node ranges from 1 to Ni(ii) a b1 denotes a collectionBranch serial number in the range of 1-Bi,card () represents the number of elements in the solution set, NiRepresenting a set of nodesNumber of electric power nodes in, BiRepresenting sets of branchesThe number of branches in (1).
The system for evaluating the attack cost of the dummy data injection is characterized in that the multi-node attack cost evaluation module specifically comprises:
a first evaluation unit, configured to, if there is no connected branch between every two nodes in the attack node set Γ', evaluate the attack cost H during multi-node attack31The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 represents the node set MS corresponding to the attack area MAnodeThe serial number of the middle node ranges from 1 to N; b2 represents the branch set MS corresponding to the attack area MAbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchThe number of power measurements on the b2 th branch;
a second evaluation unit for, if there are two nodes i and j with connected branches in the attack node set Γ', and the goal of the spurious data injection attack for these two nodes is to increase the state quantity voltage phase angle by c respectivelyiAnd cjIf c isi=cjThen θ'i-θ′j=θi-θj+ci-cj=θi-θj,θ′iAnd θ'jVoltage phase angle values, theta, for nodes i and j, respectively, after a dummy data injection attackiAnd thetajInjecting voltage phase angle values of the nodes i and j before attack for the dummy data respectively; attack cost H during multi-node attack at the moment32The calculation formula is as follows:
in the formula: γ and η are respectively the number of generator nodes in the multi-node attack area MA (if a generator node is an unmeasured point, γ is regarded as 0) and the number of zero injection nodes (if a zero injection node is an unmeasured point, η is regarded as 0); d2 denotes a set MSnodeThe number of the middle node is in the range of1~N;υd2As a set MSnodeThe number of injected power measurements at the d2 th node;
a third evaluation unit for, if there are two nodes i and j with connected branches in the attack node set Γ', and the goal of the spurious data injection attack for these two nodes is to increase the state quantity voltage phase angle by c respectivelyiAnd cjIf c isi≠cjAt this time, the attack cost H of the multi-node attack is carried out33The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; b2 denotes a set MSbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchNumber of power measurements on the b-th 2 th branch.
The system for evaluating the cost of the false data injection attack is characterized in that the weak point determining module is specifically configured to sort the attack cost evaluation results of different attack regions from low to high, compare the attack cost evaluation results with a set value, and judge that the weak point which is lower than the set value is a weak point of the power grid and is vulnerable to the false data injection attack.
The invention has the following beneficial effects:
the method and the system construct the false data injection attack area based on the power grid topological structure, consider the connection characteristics and the attack purpose among the nodes in the attack area, realize the attack cost evaluation during single-node attack and multi-node attack, provide the weak point of the power grid which is easy to be attacked by the false data injection from the attack cost perspective, and are beneficial to pertinently carrying out the power grid side active defense facing the threat of the false data injection attack.
Drawings
FIG. 1 is a flow chart of a cost evaluation method according to an embodiment of the present invention;
fig. 2 is a flowchart of constructing a cost evaluation attack area according to an embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
Example 1:
as shown in fig. 1, a method for evaluating a cost of a dummy data injection attack includes the following steps:
constructing a false data injection attack area based on a power grid topological structure;
the selection of the attack area determines the size of the attack cost to a certain extent, and depends on the mastery degree of the attacker on the topology and the structural parameters of the power grid and the selection of the attack target. In practice, due to the huge scale and dynamic operation of the power grid, an attacker is difficult to completely and accurately master all information of the power grid, only local area information can be obtained, and on the other hand, relevant measurement tampering on a local area can be performed by considering attack cost.
Based on the analysis, based on the power grid topological structure, a false data injection attack area is constructed, and an attack power node set gamma' ═ i is constructed on the assumption that state estimation values of at most k power nodes can only be changed1,i2,…,ikAnd the set consists of power nodes in the attack area, and elements in the set are the power nodes, such as: i.e. ikIs the kth power node in the attack area. When constructing a false data injection attack area, the following principle is required by combining the operation characteristics of a power grid: active and reactive measurement of the generator is not tampered, and because a power plant control room is directly communicated with a power system control center, the abnormality such as mutation of measurement and the like is easy to detect, so that false data injection attack failure is caused; when the active and passive measurements of the branch associated with the zero injection node (i.e. the power node with the injection power of 0) are tampered, the zero injection node is ensured to be still after the tampering. It should be noted that the tamper level of the load measurement,generally 50-150% of the actual value of the load.
Referring to fig. 2, the specific construction process of the attack area is as follows:
11) let m equal to 1; m is the number of the attacked power node, and m is more than or equal to 1 and less than or equal to k;
12) a certain power node i in the selected set ΓmAs the center of the attack area;
13) determining with node imNode set within a centric regionAnd set of tributariesNode setIncludes a node imAnd nodes, sets of branches connected theretoIncludes a and node imAll the branches connected;
14) judgment and node imWhether a zero injection node exists in the connected nodes or not is judged, if yes, a zero injection node set P is formed, the step 15) is carried out, and if not, the step 16) is carried out;
15) aiming at each zero injection node in the zero injection node set P, selecting any non-zero injection node connected with the zero injection node, and adding the selected non-zero injection node into the setAdding the zero injection node and the selected non-zero injection node connected with the zero injection node into the branch set
16) Node set at this timeHas been completed and assembledIncluding a collectionAnd node imAll the connected branches and the branches between the zero injection node and the selected non-zero injection node connected with the zero injection node are made to be m +1, if m is less than or equal to k, the step 12 is returned, and if m is more than k, the step 17 is carried out);
17) the final attack area a is determined as follows:
and if the multi-node attack area is A, then:
node set S in multi-node attack area AnodeComprises the following steps:
branch set S in multi-node attack area AbranchComprises the following steps:
and step two, based on the attack area established in the step one, carrying out attack cost evaluation, comparing the attack costs of different attack areas, and finding out the weak point of the power grid which is easy to be attacked by injecting the false data.
Based on the single-node attack area established in the first step, carrying out attack cost evaluation:
assuming that the state quantity x of the power node i is to be tampered withiTo a specified value of x'iTaking the power node i as a center, forming an attack area A according to the method in the step oneiIts corresponding node setAnd set of tributariesThe number of elements (c) is calculated as follows:
where card () represents the number of elements in the solution set, NiRepresenting a set of nodesNumber of electric power nodes in, BiRepresenting sets of branchesThe number of branches in (1);
let ud1As a collection of nodesNumber of injected power measurements (load active or load reactive power measurements), ω, at the d1 th node in the networkb1Is a set of branchesThe number of power measurements (branch active or branch reactive power measurements) on the b1 th branch,set region AiThe number of nodes of the medium generator is gammai(if the generator node is a non-measurement point, then γ is considered asi0), the number of zero injection nodes is ηi(if the zero injection node is a non-measurement point, then η is considered to bei0), attack cost H in case of single node attackiAnd (4) evaluating, wherein the calculation formula is as follows:
in the formula: d1 denotes a setThe serial number of the middle node ranges from 1 to Ni(ii) a b1 denotes a collectionBranch serial number in the range of 1-Bi。
Establishing an attack area during multi-node attack based on the first step, and evaluating attack cost:
when attacking m (m ≧ 2) nodes, assume that the set of attacking nodes is Γ' ═ i1,i2,…,imForming an attack area MA by the method in the step one, wherein the corresponding node set is MSnodeAnd MSbranchThe number of the collection elements is as follows:
N=card(MSnode) (8)
B=card(MSbranch) (9)
in the formula: n represents a node set MS in a multi-node attack area MAnodeB represents a branch set MS in a multi-node attack area MAbranchThe number of branches in the tree;
the attack cost evaluation in the multi-node attack has three conditions, specifically as follows:
31) if no connecting branch exists between every two nodes in the attack node set gamma', the attack cost calculation formula in the multi-node attack is consistent with that in the single-node attack, and the calculation formula is as follows:
in the formula: γ and η are respectively the number of generator nodes in the multi-node attack area MA (if a generator node is an unmeasured point, γ is regarded as 0) and the number of zero injection nodes (if a zero injection node is an unmeasured point, η is regarded as 0); d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; b2 denotes a set MSbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injection power measurements on the d2 th node; omegab2As a set MSbranchThe number of power measurements on the b2 th branch; h31The cost of the dummy data injection attack in the case of step 31) in the case of a multi-node attack.
32) If two nodes i and j with connected branches exist in the attack node set gamma', and the aim of false data injection attack for the two nodes is to increase the voltage phase angle of the state quantity by c respectivelyiAnd cj(ciAnd cjIs real, can be positive or negative), if ci=cjThen θ'i-θ′j=θi-θj+ci-cj=θi-θj(θ′iAnd θ'jVoltage phase angle values, theta, for nodes i and j, respectively, after a dummy data injection attackiAnd thetajVoltage phase angle values for nodes i and j, respectively, before the dummy data injection attack).
According to the power system network equation under the polar coordinate system, the active power and the reactive power on the branch between the node i and the node j are respectively expressed as follows:
pij=Vi 2gij-ViVj[Gijcos(θi-θj)+Bijsin(θi-θj)] (11)
qij=-Vi 2bij-ViVj[Gijsin(θi-θj)-Bijcos(θi-θj)] (12)
in the formula: p is a radical ofij、qijThe active power and the reactive power of a branch between a node i and a node j are respectively; gijAnd bijThe ground conductance and the ground admittance of the branch between the node i and the node j are respectively; vi、VjThe voltage amplitudes of the power node i and the power node j are respectively; gijAnd BijRespectively, the branch admittance and the branch susceptance between the node i and the node j.
Active power p on a branch between a node i and a node j with connected branches in a multi-node attack area MA can be known by combining branch active power and reactive power equationsij、pjiAnd reactive power qij、qjiMeasurement does not change before and after attack, pjiIs the active power between branch j and branch i; q. q.sjiIs the reactive power between branch j and branch i.
At this time, the attack cost calculation formula during multi-node attack is as follows:
in the formula: γ and η are respectively the number of generator nodes in the multi-node attack area MA (if a generator node is an unmeasured point, γ is regarded as 0) and the number of zero injection nodes (if a zero injection node is an unmeasured point, η is regarded as 0); d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; h32Step 32) for a multi-node attack, i.e. when there are connected branches and the state quantity voltage phase angle is increased by the same amount, the cost of the multi-node attack (total number of measurements to be tampered with).
33) If two nodes i and j with connected branches exist in the attack node set gamma', and the aim of false data injection attack for the two nodes is to increase the voltage phase angle of the state quantity by c respectivelyiAnd cj(ciAnd cjIs made ofNumber, can be positive or negative), if ci≠cjFrom the branch active power and reactive power equations (11-12) in 52), the active power p on the branch between the node i and the node j having the connected branches in the multi-node attack area MA can be knownij、pjiAnd reactive power qij、qjiThe measurements will change before and after the attack. At this time, the attack cost calculation formula when multi-node attack is carried out is as follows:
in the formula: γ and η are respectively the number of generator nodes in the multi-node attack area MA (if a generator node is an unmeasured point, γ is regarded as 0) and the number of zero injection nodes (if a zero injection node is an unmeasured point, η is regarded as 0); d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; b2 denotes a set MSbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchThe number of power measurements on the b2 th branch; h33The cost of the dummy data injection attack in the case of step 33) in the case of a multi-node attack.
And integrating the attack cost evaluation under single-node attack and multi-node attack, establishing a unified false data injection attack cost evaluation method, and evaluating the attack cost of different attack areas to find out the weak point of the power grid which is easy to be attacked by false data injection, thereby providing reference for the active security defense of the power grid side.
The unified false data injection attack cost evaluation method comprises the following steps:
H=Hnode+Hbranch-2(γ'+η') (15)
Hnodeand HbranchThe method specifically comprises the following steps:
in the formula: hnodeIndicating the total number of injected power measurements; hbranchRepresenting the total branch power measurement; γ 'and η' respectively represent the number of generator nodes (γ 'is 0 if the generator nodes are non-measurement points) and the number of zero injection nodes (η' is 0 if the zero injection nodes are non-measurement points) in the attack region a in step one; n is a radical ofNRepresenting a step in a Multi-node attack area A-the set SnodeNumber of nodes in, NN=card(Snode) (ii) a B represents the step in the multi-node attack area A-the set SbranchNumber of branches in, BB=card(Sbranch) (ii) a d3 denotes step one said set SnodeThe serial number of the middle node ranges from 1 to NN(ii) a b2 denotes step one said set SbranchBranch serial number in the range of 1-BB;υd3Set S for step onenodeThe number of injected power measurements at the d3 th node; omegab3Set S for step onebranchThe number of power measurements on the b3 th branch; zetab3Step to be included for false data injection attacks-the set SbranchThe number of power measurements on the b3 th branch; h is the cost of false data injection attack; c. Ci=cjThe state quantity voltage phase angle increment of the node i and the node j is equal; c. Ci≠cjThe state quantity voltage phase angle increment quantity of the node i and the node j is not equal.
Attack areas under different power grid resources are formed in the first step, and attack cost needed to be paid when the areas are attacked is evaluated according to a false data injection attack cost evaluation method. The attack cost evaluation results are ranked from low to high and are compared with a set value, the weak points which are lower than the set value and are easy to be attacked by false data injection are judged as the weak points of the power grid, and the weak points can be used as references of active security defense of the power grid side, so that the targeted defense of the power grid for network attack threats is realized.
Example 2:
a spurious data injection attack cost evaluation system, comprising:
the false data injection attack region construction module is used for constructing false data injection single-node and multi-node attack regions;
the single-node attack cost evaluation module is used for evaluating the cost of the single-node attack area;
the multi-node attack cost evaluation module is used for evaluating the cost of a multi-node attack area;
and the weak point determining module is used for comparing the attack cost evaluation results and finding out the weak points of the power grid which are easy to be attacked by false data injection.
The false data injection attack region construction module comprises:
a single-node attack area determination unit for determining each attacked node imSingle node attack zone formed for centerComprises the following steps:
a multi-node attack area determination unit, configured to determine that the multi-node attack area a is:node set S in multi-node attack area AnodeComprises the following steps:branch set S in multi-node attack area AbranchComprises the following steps:
wherein m is the number of the attacked power node, k is the number of the power nodes,to a node imA set of nodes within the region that is central,to a node imSet of branches, set of nodes within a centered areaIncludes a node imAnd nodes, sets of branches connected theretoIncludes a and node imAll the branches connected; i.e. imBelongs to a power node set of gamma ═ i as the center of an attack area1,i2,…,ikThe mth power node in (1).
In specific implementation, the construction of the false data and the injection of the false data into single-node and multi-node attack areas comprises the following specific construction processes:
11) let m equal to 1; m is the number of the attacked power node, and m is more than or equal to 1 and less than or equal to k;
12) a certain power node i in the selected set ΓmAs the center of the attack area;
13) determining with node imNode set within a centric regionAnd set of tributariesNode setIncludes a node imAnd nodes, sets of branches connected theretoIncludes a and node imAll the branches connected;
14) judgment and node imWhether a zero injection node exists in the connected nodes or not is judged, if yes, a zero injection node set P is formed, the step 15) is carried out, and if not, the step 16) is carried out;
15) aiming at each zero injection node in the zero injection node set P, selecting any non-zero injection node connected with the zero injection node, and adding the selected non-zero injection node into the setAdding the zero injection node and the selected non-zero injection node connected with the zero injection node into the branch set
16) Node set at this timeHas been completed and assembledIncluding a collectionAnd node imAll the connected branches and the branches between the zero injection node and the selected non-zero injection node connected with the zero injection node are made to be m +1, if m is less than or equal to k, the step 12 is returned, and if m is more than k, the step 17 is carried out);
17) the final attack area a is determined as follows:
and if the multi-node attack area is A, then:
node set S in multi-node attack area AnodeComprises the following steps:
branch set S in multi-node attack area AbranchComprises the following steps:
the single-node attack cost evaluation module is specifically used for evaluating the attack cost H of a single node under attack by adopting the following calculation formulaiAnd (4) evaluating, wherein the calculation formula is as follows:
in the formula: upsilon isd1Is a single node attack area A taking a power node i as a centeriNode setNumber of injected power measurements, ω, at the d1 th nodeb1Is a single node attack area A taking a power node i as a centeriBranch collectionNumber of power measurements, γ, on branch b1iAttacking region A for a Single nodeiNumber of nodes of medium generator, etaiFor zero number of injection nodes, d1 represents the setThe serial number of the middle node ranges from 1 to Ni(ii) a b1 denotes a collectionBranch serial number in the range of 1-Bi,card () represents the number of elements in the solution set, NiRepresenting a set of nodesNumber of electric power nodes in, BiRepresenting sets of branchesThe number of branches in (1).
The multi-node attack cost evaluation module specifically comprises:
a first evaluation unit, configured to, if there is no connected branch between every two nodes in the attack node set Γ', evaluate the attack cost H during multi-node attack31The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 represents the node set MS corresponding to the attack area MAnodeThe serial number of the middle node ranges from 1 to N; b2 represents the branch set MS corresponding to the attack area MAbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchThe number of power measurements on the b2 th branch;
a second evaluation unit for, if there are two nodes i and j with connected branches in the attack node set Γ', and the goal of the spurious data injection attack for these two nodes is to increase the state quantity voltage phase angle by c respectivelyiAnd cjIf c isi=cjThen θ'i-θ′j=θi-θj+ci-cj=θi-θj,θ′iAnd θ'jVoltage phase angle values, theta, for nodes i and j, respectively, after a dummy data injection attackiAnd thetajInjecting voltage phase angle values of the nodes i and j before attack for the dummy data respectively; attack cost H during multi-node attack at the moment32The calculation formula is as follows:
in the formula: γ and η are respectively the number of generator nodes in the multi-node attack area MA (if a generator node is an unmeasured point, γ is regarded as 0) and the number of zero injection nodes (if a zero injection node is an unmeasured point, η is regarded as 0); d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node;
a third evaluation unit for, if there are two nodes i and j with connected branches in the attack node set Γ', and the goal of the spurious data injection attack for these two nodes is to increase the state quantity voltage phase angle by c respectivelyiAnd cjIf c isi≠cjAt this time, the attack cost H of the multi-node attack is carried out33The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; b2 denotes a set MSbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchNumber of power measurements on the b-th 2 th branch.
In specific implementation, the attack cost evaluation in the multi-node attack specifically comprises the following steps:
when attacking m (m ≧ 2) nodes, assume that the set of attacking nodes is Γ' ═ i1,i2,…,imForming an attack area MA by the method in the step one, wherein the corresponding node set is MSnodeAnd MSbranchThe number of the collection elements is as follows:
N=card(MSnode) (8)
B=card(MSbranch) (9)
in the formula: n represents a node set MS in a multi-node attack area MAnodeB represents a branch set MS in a multi-node attack area MAbranchThe number of branches in the tree;
the attack cost evaluation in the multi-node attack has three conditions, specifically as follows:
31) if no connecting branch exists between every two nodes in the attack node set gamma', the attack cost calculation formula in the multi-node attack is consistent with that in the single-node attack, and the calculation formula is as follows:
in the formula: γ and η are respectively the number of generator nodes in the multi-node attack area MA (if a generator node is an unmeasured point, γ is regarded as 0) and the number of zero injection nodes (if a zero injection node is an unmeasured point, η is regarded as 0); d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; b2 denotes a set MSbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchThe number of power measurements on the b2 th branch; h31The cost of the false data injection attack (the total amount of the measurement to be tampered) in the case of the multi-node attack in step 31).
32) If two nodes i and j with connected branches exist in the attack node set gamma', and the aim of false data injection attack for the two nodes is to increase the voltage phase angle of the state quantity by c respectivelyiAnd cj(ciAnd cjIs real, can be positive or negative), if ci=cjThen θ'i-θ′j=θi-θj+ci-cj=θi-θj(θ′iAnd θ'jVoltage phase angle values, theta, for nodes i and j, respectively, after a dummy data injection attackiAnd thetajVoltage phase angle values for nodes i and j, respectively, before the dummy data injection attack).
According to the power system network equation under the polar coordinate system, the active power and the reactive power on the branch between the node i and the node j are respectively expressed as follows:
pij=Vi 2gij-ViVj[Gijcos(θi-θj)+Bijsin(θi-θj)] (11)
qij=-Vi 2bij-ViVj[Gijsin(θi-θj)-Bijcos(θi-θj)] (12)
in the formula: p is a radical ofij、qijThe active power and the reactive power of a branch between a node i and a node j are respectively; gijAnd bijThe ground conductance and the ground admittance of the branch between the node i and the node j are respectively; vi、VjThe voltage amplitudes of the power node i and the power node j are respectively; gijAnd BijRespectively, the branch admittance and the branch susceptance between the node i and the node j.
Active power p on a branch between a node i and a node j with connected branches in a multi-node attack area MA can be known by combining branch active power and reactive power equationsij、pjiAnd reactive power qij、qjiMeasurement does not change before and after attack, pjiIs the active power between branch j and branch i; q. q.sjiIs the reactive power between branch j and branch i.
At this time, the attack cost calculation formula during multi-node attack is as follows:
in the formula: γ and η are respectively the number of generator nodes in the multi-node attack area MA (if a generator node is an unmeasured point, γ is regarded as 0) and the number of zero injection nodes (if a zero injection node is an unmeasured point, η is regarded as 0); d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; h32Step 32) for a multi-node attack, i.e. when there are connected branches and the state quantity voltage phase angle is increased the same.
33) If two nodes i and j with connected branches exist in the attack node set gamma', and the aim of false data injection attack for the two nodes is to increase the voltage phase angle of the state quantity by c respectivelyiAnd cj(ciAnd cjIs real, can be positive or negative), if ci≠cjFrom the branch active power and reactive power equations (11-12) in 52), the active power p on the branch between the node i and the node j having the connected branches in the multi-node attack area MA can be knownij、pjiAnd reactive power qij、qjiThe measurements will change before and after the attack. At this time, the attack cost calculation formula when multi-node attack is carried out is as follows:
in the formula: γ and η are respectively the number of generator nodes in the multi-node attack area MA (if a generator node is an unmeasured point, γ is regarded as 0) and the number of zero injection nodes (if a zero injection node is an unmeasured point, η is regarded as 0); d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; b2 denotes a set MSbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchThe number of power measurements on the b2 th branch; h33The cost of the dummy data injection attack in the case of step 33) in the case of a multi-node attack.
The weak point determining module is specifically used for sequencing attack cost evaluation results of different attack areas from low to high, comparing the results with a set value, and judging that the weak points are vulnerable to false data injection attacks when the results are lower than the set value.
After attack cost evaluation is carried out on different attack areas, the evaluation results are ranked from low to high and are compared with a set value, the weak points which are lower than the set value are judged to be weak points which are easy to be attacked by false data injection, and the weak points can be used as references of active security defense of a power grid side, so that targeted defense of the power grid for network attack threats is realized.
The invention provides a false data injection attack cost evaluation method and a false data injection attack cost evaluation system, which are used for constructing a false data injection attack region based on a power grid topological structure, considering the connection characteristics and the attack purpose among nodes in the attack region, realizing the attack cost evaluation during single-node attack and multi-node attack, providing weak points of the power grid which are easy to be attacked by false data injection from the attack cost perspective, and carrying out power grid side active defense facing the threat of false data injection attack on the weak points in a targeted manner.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.
Claims (5)
1. A false data injection attack cost evaluation method is characterized by comprising the following steps:
constructing false data injection single-node and multi-node attack areas based on a power grid topological structure;
respectively evaluating the attack cost corresponding to the single-node attack area and the multi-node attack area;
comparing the attack costs of different attack areas, and finding out the weak point of the power grid which is easy to be attacked by false data injection;
the construction of the false data injection area of the single node and the multi-node attack area comprises the following steps:
determining with each attacked node imSingle node attack zone formed for centerComprises the following steps:
wherein m is the number of the attacked power node, k is the number of the power nodes,to a node imA set of nodes within the region that is central,to a node imSet of branches, set of nodes within a centered areaIncludes a node imAnd nodes, branches, connected theretoCollectionIncludes a and node imAll the branches connected; i.e. imBelongs to a power node set of gamma ═ i as the center of an attack area1,i2,…,ikThe mth power node in (1);
evaluating the attack cost corresponding to the single-node attack area, which comprises the following specific steps:
attack cost H for single node attackiAnd (4) evaluating, wherein the calculation formula is as follows:
in the formula: upsilon isd1Is a single node attack area A taking a power node i as a centeriNode setNumber of injected power measurements, ω, at the d1 th nodeb1Is a single node attack area A taking a power node i as a centeriBranch collectionNumber of power measurements, γ, on branch b1iAttacking region A for a Single nodeiNumber of nodes of medium generator, etaiFor zero number of injection nodes, d1 represents the setThe serial number of the middle node ranges from 1 to Ni(ii) a b1 denotes a collectionBranch serial number in the range of 1-Bi,card () represents the number of elements in the solution set, NiRepresenting a set of nodesNumber of electric power nodes in, BiRepresenting sets of branchesThe number of branches in (1);
the method for evaluating the attack cost corresponding to the multi-section attack area specifically comprises the following steps:
if no connecting branch exists between every two nodes in the attack node set gamma', the attack cost H is reached when the nodes are attacked31The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 represents the node set MS corresponding to the attack area MAnodeThe serial number of the middle node ranges from 1 to N; b2 represents the branch set MS corresponding to the attack area MAbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchThe number of power measurements on the b2 th branch;
if two nodes i and j with connected branches exist in the attack node set gamma', and the aim of false data injection attack for the two nodes is to increase the voltage phase angle of the state quantity by c respectivelyiAnd cjIf c isi=cjThen thetai′-θj′=θi-θj+ci-cj=θi-θj,θi' and thetaj' Voltage phase Angle values, θ, for nodes i and j, respectively, after a dummy data injection attackiAnd thetajInjecting voltage phase angle values of the nodes i and j before attack for the dummy data respectively; at this time muchAttack cost H in node attack32The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node;
if two nodes i and j with connected branches exist in the attack node set gamma', and the aim of false data injection attack for the two nodes is to increase the voltage phase angle of the state quantity by c respectivelyiAnd cjIf c isi≠cjAt this time, the attack cost H of the multi-node attack is carried out33The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; b2 denotes a set MSbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchThe number of power measurements on the b2 th branch;
when m is attacked to more than or equal to 2 nodes, the attack node set is gamma' ═ i1,i2,…,imAnd the node set corresponding to the multi-node attack area MA is MSnodeAnd MSbranchThe number of the collection elements is as follows:
N=card(MSnode)
B=card(MSbranch)
in the formula: n represents a node set MS in a multi-node attack area MAnodeB represents a branch set MS in a multi-node attack area MAbranchThe number of branches in (1).
2. The method according to claim 1, wherein the evaluation method of the cost of the dummy data injection attack is characterized in that the node i is used as the nodemThe node set and the branch set in the region which is the center are obtained by the following steps:
1) let m equal to 1;
3) Judgment and node imWhether a zero injection node exists in the connected nodes;
if the zero injection node exists, forming a zero injection node set P, and aiming at each zero injection node in the zero injection node set P, selecting any non-zero injection node connected with the zero injection node, and adding the non-zero injection node into the setAdding the zero injection node and the selected non-zero injection node connected with the zero injection node into the branch setIf not, the node set is describedHas been completed and assembledIncluding a collectionAnd node imAll the connected branches and the branches between the zero injection node and the selected non-zero injection node connected with the zero injection node are made to be m +1, if m is less than or equal to k, the step 2 is returned, and if m is more than k, a final node set is obtainedAnd set of tributaries
3. The method according to claim 1, wherein the comparing of the attack costs of different attack regions to find the weak point of the power grid vulnerable to the false data injection attack specifically comprises:
and sequencing the attack cost evaluation results of different attack areas from low to high, comparing the evaluation results with a set value, and judging that the evaluation results are lower than the set value as a weak point of the power grid which is easy to be attacked by injecting false data.
4. A system for evaluating a cost of a dummy data injection attack, comprising:
the false data injection attack region construction module is used for constructing false data injection single-node and multi-node attack regions;
the single-node attack cost evaluation module is used for evaluating the cost of the single-node attack area;
the multi-node attack cost evaluation module is used for evaluating the cost of a multi-node attack area;
the weak point determining module is used for comparing the attack cost evaluation results and finding out the weak points of the power grid which are easy to be attacked by false data injection;
the false data injection attack region construction module comprises:
a single-node attack area determination unit for determining each attacked node imSingle node attack zone formed for centerComprises the following steps:
a multi-node attack area determination unit, configured to determine that the multi-node attack area a is:node set S in multi-node attack area AnodeComprises the following steps:branch set S in multi-node attack area AbranchComprises the following steps:
wherein m is the number of the attacked power node, k is the number of the power nodes,to a node imA set of nodes within the region that is central,to a node imSet of branches, set of nodes within a centered areaIncludes a node imAnd nodes, sets of branches connected theretoIncludes a and node imAll the branches connected; i.e. imBelongs to a power node set of gamma ═ i as the center of an attack area1,i2,…,ikThe mth power node in (1);
the single-node attack cost evaluation moduleBlock, in particular for attacking cost H of a single node attack using the following calculation formulaiAnd (4) evaluating, wherein the calculation formula is as follows:
in the formula: upsilon isd1Is a single node attack area A taking a power node i as a centeriNode setNumber of injected power measurements, ω, at the d1 th nodeb1Is a single node attack area A taking a power node i as a centeriBranch collectionNumber of power measurements, γ, on branch b1iAttacking region A for a Single nodeiNumber of nodes of medium generator, etaiFor zero number of injection nodes, d1 represents the setThe serial number of the middle node ranges from 1 to Ni(ii) a b1 denotes a collectionBranch serial number in the range of 1-Bi,card () represents the number of elements in the solution set, NiRepresenting a set of nodesNumber of electric power nodes in, BiRepresenting sets of branchesBranch ofCounting;
the multi-node attack cost evaluation module specifically comprises:
a first evaluation unit, configured to, if there is no connected branch between every two nodes in the attack node set Γ', evaluate the attack cost H during multi-node attack31The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 represents the node set MS corresponding to the attack area MAnodeThe serial number of the middle node ranges from 1 to N; b2 represents the branch set MS corresponding to the attack area MAbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchThe number of power measurements on the b2 th branch;
a second evaluation unit for, if there are two nodes i and j with connected branches in the attack node set Γ', and the goal of the spurious data injection attack for these two nodes is to increase the state quantity voltage phase angle by c respectivelyiAnd cjIf c isi=cjThen θ'i-θ′j=θi-θj+ci-cj=θi-θj,θ′iAnd θ'jVoltage phase angle values, theta, for nodes i and j, respectively, after a dummy data injection attackiAnd thetajInjecting voltage phase angle values of the nodes i and j before attack for the dummy data respectively; attack cost H during multi-node attack at the moment32The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes in the multi-node attack area MA (if the generator nodes are non-measuring points)γ is considered to be 0) and the number of zero injection nodes (η is considered to be 0 if the zero injection node is an unmeasured point); d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node;
a third evaluation unit for, if there are two nodes i and j with connected branches in the attack node set Γ', and the goal of the spurious data injection attack for these two nodes is to increase the state quantity voltage phase angle by c respectivelyiAnd cjIf c isi≠cjAt this time, the attack cost H of the multi-node attack is carried out33The calculation formula is as follows:
in the formula: gamma and eta are respectively the number of generator nodes and the number of zero injection nodes in the multi-node attack area MA; d2 denotes a set MSnodeThe serial number of the middle node ranges from 1 to N; b2 denotes a set MSbranchThe serial number of the branch circuit ranges from 1 to B; upsilon isd2As a set MSnodeThe number of injected power measurements at the d2 th node; omegab2As a set MSbranchNumber of power measurements on the b-th 2 th branch.
5. The system according to claim 4, wherein the vulnerability determination module is specifically configured to rank the attack cost assessment results of different attack regions from low to high, and compare the results with the set value, and the vulnerability that is lower than the set value is determined to be a vulnerability of the power grid vulnerable to the injection of the dummy data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910597262.3A CN110311915B (en) | 2019-07-04 | 2019-07-04 | False data injection attack cost evaluation method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910597262.3A CN110311915B (en) | 2019-07-04 | 2019-07-04 | False data injection attack cost evaluation method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110311915A CN110311915A (en) | 2019-10-08 |
CN110311915B true CN110311915B (en) | 2021-09-28 |
Family
ID=68079655
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910597262.3A Active CN110311915B (en) | 2019-07-04 | 2019-07-04 | False data injection attack cost evaluation method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110311915B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111431561B (en) * | 2020-03-10 | 2021-09-28 | 国电南瑞科技股份有限公司 | Power system expected fault set generation method and device considering network attack |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105321050A (en) * | 2015-11-24 | 2016-02-10 | 西安交通大学 | Method for measuring false data injection attack damage to dynamic micro-grid division in smart power grid |
CN105429133A (en) * | 2015-12-07 | 2016-03-23 | 国网智能电网研究院 | Information network attack-oriented vulnerability node evaluation method for power grid |
CN105896529A (en) * | 2016-04-26 | 2016-08-24 | 武汉大学 | Data recovery method for false data injection attack in smart grid |
CN107016236A (en) * | 2017-03-23 | 2017-08-04 | 新疆电力建设调试所 | Power network false data detection method for injection attack based on non-linear measurement equation |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101000193B1 (en) * | 2009-01-22 | 2010-12-10 | 성균관대학교산학협력단 | Routing Path Selection Method For Improving the Detection Power of Statistical Filtering And a Sensor Node for Implementing the Same |
-
2019
- 2019-07-04 CN CN201910597262.3A patent/CN110311915B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105321050A (en) * | 2015-11-24 | 2016-02-10 | 西安交通大学 | Method for measuring false data injection attack damage to dynamic micro-grid division in smart power grid |
CN105429133A (en) * | 2015-12-07 | 2016-03-23 | 国网智能电网研究院 | Information network attack-oriented vulnerability node evaluation method for power grid |
CN105896529A (en) * | 2016-04-26 | 2016-08-24 | 武汉大学 | Data recovery method for false data injection attack in smart grid |
CN107016236A (en) * | 2017-03-23 | 2017-08-04 | 新疆电力建设调试所 | Power network false data detection method for injection attack based on non-linear measurement equation |
Non-Patent Citations (2)
Title |
---|
False Data Injection Attacks Against Nonlinear;Md. Ashfaqur Rahman等;《IEEE》;20130725;1-5 * |
电力系统局部区域假数据注入攻击研究;代明明;《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》;20161115;6-55 * |
Also Published As
Publication number | Publication date |
---|---|
CN110311915A (en) | 2019-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ustun et al. | Artificial intelligence based intrusion detection system for IEC 61850 sampled values under symmetric and asymmetric faults | |
CN112633649A (en) | Power grid multi-attribute important node evaluation and planning method | |
CN110942109A (en) | PMU false data injection attack prevention method based on machine learning | |
CN104901971B (en) | The method and apparatus that safety analysis is carried out to network behavior | |
CN108200030A (en) | Detection method, system, device and the computer readable storage medium of malicious traffic stream | |
CN107241226A (en) | Fuzz testing method based on industry control proprietary protocol | |
CN110135166A (en) | A kind of detection method and system for the attack of service logic loophole | |
CN107819790A (en) | The recognition methods of attack message and device | |
CN103914383A (en) | Fuzz testing system on basis of multi-swarm collaboration evolution genetic algorithm | |
CN110311915B (en) | False data injection attack cost evaluation method and system | |
An et al. | Toward data integrity attacks against distributed dynamic state estimation in smart grid | |
CN106899595A (en) | Imperfect information Network Security Analysis Method and device based on intensified learning | |
Bi et al. | Impact assessment and defense for smart grids with FDIA against AMI | |
CN106375344A (en) | Intelligent grid load integrity attack detection method for cloud storage | |
CN110826888B (en) | Data integrity attack detection method in power system dynamic state estimation | |
CN116980162A (en) | Cloud audit data detection method, device, equipment, medium and program product | |
CN110365625B (en) | Internet of things security detection method and device and storage medium | |
CN117494190A (en) | Distributed invisible FDIA detection method for power distribution network considering attack preference and data privacy | |
CN118041571A (en) | Decision method for two-safety fusion network security measures of power monitoring system | |
CN116545764B (en) | Abnormal data detection method, system and equipment of industrial Internet | |
CN108509796A (en) | A kind of detection method and server of risk | |
CN110855654A (en) | Vulnerability risk quantitative management method and system based on flow mutual access relation | |
Sun et al. | False data injection attacks with local topology information against linear state estimation | |
CN112884165B (en) | Full-flow service migration method and system for federal machine learning | |
CN114726622A (en) | Back door attack influence evaluation method and system for power system data driving algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |