CN111413565A - Intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack - Google Patents

Intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack Download PDF

Info

Publication number
CN111413565A
CN111413565A CN202010301121.5A CN202010301121A CN111413565A CN 111413565 A CN111413565 A CN 111413565A CN 202010301121 A CN202010301121 A CN 202010301121A CN 111413565 A CN111413565 A CN 111413565A
Authority
CN
China
Prior art keywords
neuron
value
fault
pulse
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010301121.5A
Other languages
Chinese (zh)
Other versions
CN111413565B (en
Inventor
王涛
刘伟
陈孝天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xihua University
Original Assignee
Xihua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xihua University filed Critical Xihua University
Priority to CN202010301121.5A priority Critical patent/CN111413565B/en
Publication of CN111413565A publication Critical patent/CN111413565A/en
Application granted granted Critical
Publication of CN111413565B publication Critical patent/CN111413565B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/06Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
    • G06N3/061Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using biological neurons, e.g. biological neurons connected to an integrated circuit

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Neurology (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • Molecular Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Testing And Monitoring For Control Systems (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)

Abstract

The invention discloses an intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack. Secondly, the invention establishes a measuring tampering attack recognition model based on the memory pulse neurolemma system, and effectively solves the problem of malfunction diagnosis caused by measuring tampering attack. Finally, the invention establishes a fault diagnosis model capable of comprehensively utilizing telemetering and teletraffic by utilizing the memory backtracking thought of a memory pulse neurolemma system, thereby not only changing the defect that the prior model cannot be established by utilizing the teletraffic based on a production rule, but also determining the fault type under the condition of diagnosing a fault element.

Description

Intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack
Technical Field
The invention belongs to the technical field of intelligent power grid fault diagnosis, and particularly relates to a design of an intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack.
Background
The false data injection attack is an important network attack means for a smart grid, and means that an attacker successfully injects false data into a data acquisition and monitoring System (SCADA) or a Wide Area Measurement System (WAMS) by using bad data detection loopholes based on residual errors in power transmission network state estimation, so that illegal purposes of modifying smart grid measurement values and state variables, controlling the operation state of the smart grid or obtaining economic benefits and the like are achieved. With the deep penetration of information communication technology in modern smart power grids, the exchange of the trend of a physical power grid and the information flow of an information grid is increasingly frequent, and modern smart power grids have been developed into power information physical fusion systems formed by fusing the physical power grid and the information grid. Because the information system has inevitable defects, bugs, faults and other conditions, a plurality of entrances can initiate network attacks, and the false data injection attacks can damage the safe and stable operation of the smart grid. The fault diagnosis is one of core contents of intelligent power grid safety control, and plays a key role in safe and stable operation of a power grid. Dummy data injection attack
As an important new network attack mode, false injection attack has an important influence on security control of a smart grid, and thus has received much attention. However, at present, the existing research almost only focuses on analyzing the influence of the false data injection attack on the safe and stable operation of the power system before the fault event, and the exploration of the influence of the false data injection attack on the fault diagnosis and recovery of the power system after the fault event is not involved. Although the existing research works on continuously trying to improve the identification and the defense of false data injection attacks in three defense lines of a power grid, according to practical engineering experience, absolutely strong and reliable defense capability cannot be guaranteed. Therefore, the smart grid fault diagnosis method considering the false data injection attack needs to be researched urgently, and has important practical significance for social economy and national security. The false data injection attack has various forms in the fault diagnosis system, and can be divided into two types according to the attack position: fraudulent data attacks and measurement tampering attacks, the attack location is shown in fig. 1.
As can be seen from fig. 1, the fraudulent attack occurs after the state estimation, and mainly acts on the network layer and the system layer, including: (1) injecting fraudulent data into the network layer by using system bugs to disguise the network layer, so that the accuracy of the data transmitted to the system layer cannot be guaranteed, and thus, the indirect attack of the power grid dispatching automation system is realized (see a position d in fig. 1); (2) injecting fraudulent data at the system level directly attacks the grid dispatching automation system (see position e in fig. 1). Therefore, fraudulent data attack influences authenticity and accuracy of fault information of the relay protection device by indirectly or directly attacking a power grid dispatching automation system of a power grid, and further prevents accurate and rapid diagnosis of fault equipment. The measurement tampering attack can act on a device layer and a network layer before state estimation, and malicious tampering on data collected by a measurement device such as an RTU (remote terminal unit, see position a in FIG. 1), a PMU (phasor measurement unit, see position b in FIG. 1) or network layer data (see position c in FIG. 1) is realized by breaking through a state estimator of a smart grid by using a bug of the smart grid. In the attack mode, the tampered data can directly act on the RTU, the PMU or the relay protection device, so that the acquired data is wrong, a fault system cannot make an effective fault decision timely and accurately, and the subsequent fault diagnosis and recovery are affected catastrophically, thereby causing great economic loss and adverse social influence. Therefore, the method for diagnosing the fault under the condition of measuring the tampering attack behavior has important significance.
Until now, a variety of excellent diagnostic methods have emerged in the field of grid fault diagnosis, such as expert systems, artificial neural networks, Bayesian networks, petri networks, optimization algorithms, and pulse neuromembrane systems. These methods all perform well when the grid is not involved in a measurement tamper attack. However, when the fault event involves a metrology tampering attack, the diagnostic correctness of the above method will be greatly reduced (often with severe misdiagnosis). Therefore, a new fault diagnosis method capable of coping with the measurement tampering attack is urgently sought.
Among the above methods, the pulse Neural membrane System (SNPS) has attracted much attention due to its powerful information processing and computing capabilities, knowledge expression and reasoning capabilities, and has been recently used to search for a brand new fault information processing mechanism and fault diagnosis method based on a membrane computing framework, and has become a research hotspot in the field of current membrane computing and biological computing. The SNPS is inspired by a mechanism that biological neurons/human brains store, transmit and exchange information in a pulse (Spike) form, and provides a special neural membrane system which is a brand-new bionic distributed intelligent parallel computing model. However, up to now, the existing SNPS fault diagnosis model is built based on a generative rule by using discrete remote semaphore. The modeling concepts described above do not take advantage of telemetry information that is continuous in the time dimension and cannot determine the type of failure of a failed component. In addition, when the measuring tampering attack is taken into consideration, the relay protection device is mistakenly operated or refused due to the tampered telemetering amount, namely, the accuracy of the telemetering amount cannot be guaranteed, and the error rate is in direct proportion to the degree of the attack. Therefore, the traditional modeling method only using the telemetric information cannot adapt to the practical problems facing the field of grid fault diagnosis in the network attack background.
In summary, the current fault diagnosis method for the smart grid has the following problems:
(1) the fault diagnosis method does not consider the influence caused by measuring the tampering attack, and the existing fault diagnosis method can cause serious misdiagnosis when the tampering attack behavior is measured.
(2) Existing fault diagnosis models based on production rules, such as: the petri net model and the SNPS model cannot comprehensively utilize telemeasurement and telesignaling to realize fault diagnosis, so that decision-making risks exist, the telesignaling subjected to tampering can cause misoperation or refusal of a relay protection device, namely the accuracy of the telesignaling cannot be guaranteed, and the fault type of a fault element cannot be judged.
Disclosure of Invention
The invention aims to solve the problems of the existing intelligent power grid fault diagnosis method and provides an intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack.
The technical scheme of the invention is as follows: a smart power grid fault diagnosis method capable of identifying measurement tampering attack comprises the following steps:
and S1, aiming at the elements which have faults in the smart grid and have completed the breaker on-off detection, determining suspected fault elements by adopting an electric quantity clustering detection method.
S2, respectively establishing a measurement tampering attack recognition model based on a memory pulse neurolemma system for each suspected fault element, solving through a TRMA algorithm, judging whether each suspected fault element suffers measurement tampering attack, if so, entering step S3, and otherwise, entering step S4.
And S3, judging that the action of the relay protection device at the moment is a false action caused by measuring the tampering attack telemeasurement, and finishing the fault diagnosis of the smart power grid.
S4, aiming at each suspected fault element which is not subjected to the measurement tampering attack, respectively establishing a fault diagnosis model based on a memory pulse neural membrane system according to the topological structure and the protection pattern of the power grid, solving through an FDMA algorithm to obtain a fault diagnosis result of the suspected fault element, and finishing the fault diagnosis of the intelligent power grid.
Further, step S1 includes the following substeps:
and S11, acquiring voltage values of each bus, each generator and each transformer in 0.1S, 0.2S and 0.5S in the intelligent power grid when a relay in the intelligent power grid acts or a breaker trips.
S12, performing cluster analysis on the normalized voltage value and the normalized voltage value of the smart grid in the normal operation state, wherein the normalization formula is as follows:
Figure BDA0002454026180000031
wherein x' represents the normalized voltage value, x represents the voltage value to be normalized, and xmaxAnd xminRespectively the maximum value and the minimum value in the voltage values to be normalized.
And S13, taking the element farthest from the cluster center as a suspected fault element.
Further, step S2 includes the following substeps:
s21, respectively establishing a tamper attack detection model pi based on a memory pulse neurolemma system for each suspected fault elementT
And S22, carrying out normalization processing on the SCADA telemetering measurement and the RTU telemetering measurement of the suspected fault element at the moment of the fault to obtain a real-time fault voltage normalization value of the SCADA voltage and the RTU voltage within a sampling time range.
S23, respectively splitting the real-time fault voltage normalized values of the SCADA voltage and the RTU voltage in the sampling time range into S sampling time points, and inputting the SCADA real-time fault voltage normalized values of the sampling time points into a measuring and tampering attack identification model piTIn the perception neuron, the RTU real-time fault voltage normalization value of each sampling time point is input into a measurement tampering attack recognition model piTIn the memory neurons of (1).
S24, identifying pi through TRMA algorithm for measuring and tampering attack of each suspected fault elementTSolving to obtain various measurement tampering attack identification models piTAnd outputs the pulse value of the neuron.
S25, sequentially judging pi of each measured tampering attack recognition modelTIf the pulse value of any output neuron is lower than the detection threshold value, the suspected faulty element is determined to be attacked by measurement tampering, and the step S3 is entered, otherwise, the suspected faulty element is determined not to be attacked by measurement tampering, and the step S4 is entered.
Further, the measured tampering attack recognition model Π of each suspected fault element through the TRMA algorithm in step S24TThe specific method for solving is as follows:
a1, setting the inference step number g to be 0.
A2, performing ignition calculation for each storage neuron meeting the ignition condition, and updating according to the following formulag+1And vg+1
Figure BDA0002454026180000041
Figure BDA0002454026180000042
A3 for each one satisfying ignition conditionsCalculating the firing calculation of the neuron and updating theta according to the following formulag+1And τg+1
Figure BDA0002454026180000043
Figure BDA0002454026180000044
A4, adding 1 to the inference step number g.
A5, judging whether the operation condition theta is metg≠01Org≠02If yes, returning to the step A2, otherwise, ending the TRMA algorithm, and outputting the measured tampering attack recognition model IITAnd outputs the pulse value of the neuron.
The meaning of the vector, matrix and operator involved in the TRMA algorithm is as follows:
θ=(θ12,...,θp)Trepresenting a vector of pulse values of a storage neuron, where θiThe pulse value of the ith storage neuron is [0,1 ]]The real number above, i 1,2, p, p denotes the number of storage neurons; tamper-evident model pi in measurementTIn the case where 1. ltoreq. i. ltoreq.s, θiFor the SCADA real-time fault voltage normalization value, when (s +1) is less than or equal to i and less than or equal to (s + s c), thetaiAnd the normalized value is the RTU real-time fault voltage, c is the total number of the memory events, and s is the total number of the sampling time points. ═ e (1,2,...,q)TRepresenting a vector of calculated neuron pulse values, whereinjCalculating the impulse value of the neuron for the jth, and taking the value as [0,1 ]]The real number above, j 1,2,.., q, represents the number of computational neurons. τ ═ t (τ)12,...,τp)TRepresenting a vector of storage neuron tag values, where τiThe tag value for the ith storage neuron is set to [0, c]The above integer; tamper-evident model pi in measurementTIn (1) i.ltoreq (s + s c), τ isiAll are 0. V ═ v (v)12,...,νq)TRepresenting a computed neuron tag valueVector, where vjCalculating the label value of the neuron for the jth, and taking the value as [0, c]The above integer. D1=(dij)p×qIs a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the dis-computing neuron, if the storage neuron is sigmaiTo dis computational neuron sigmajPresence of directional synaptic connection, then d ij1, otherwise dij=0。D2=(dij)p×qIs a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the max computation neuron, if the storage neuron is sigmaiCalculating neuron sigma by maxjPresence of directional synaptic connection, then d ij1, otherwise dij=0。D3=(dij)p×qIs a matrix of p × q order, which represents the directional synaptic connection relationship from the storage neuron to the min computation neuron, if the storage neuron is sigmaiCalculating neuron sigma by minjPresence of directional synaptic connection, then d ij1, otherwise dij=0。D4=(dij)p×qIs a matrix of p × q order, which represents the directional synaptic connection relationship from the storage neuron to the rel computation neuron, if the storage neuron is sigmaiTo rel computing neuron sigmajPresence of directional synaptic connection, then d ij1, otherwise dij=0。E=(eji)q×pIs a q × order matrix representing the directional synaptic connection relationship from the computing neuron to the storage neuron, if the computing neuron is sigmajTo the storage neuron σiExistence of synaptic connection, then e ji1, otherwise eji0.Δ represents dis calculation, and DTΔθ=(d1,d2,...,dq) Wherein d isj=|d1j×θ1-d2j×θ2…-dpj×θpL. Denotes max calculation, and DT·θ=(d1,d2,...,dq) Wherein d isj=max(d1j×θ1,d2j×θ2,...,dpj×θp)。
Figure BDA0002454026180000051
Represents min calculation, and
Figure BDA0002454026180000052
wherein d isj=min(d1j×θ1,d2j×θ2...,dpj×θp)。
Figure BDA0002454026180000053
Represents rel calculation, and
Figure BDA0002454026180000054
wherein
Figure BDA0002454026180000055
θmaxRepresents the pulse value of the neuron, θ, located before the rel-computing neuron and after the max-computing neurondisRepresenting the pulse value of the neuron before the rel computing neuron and after the dis computing neuron, wherein rho is a memory resolution coefficient, and the model pi is identified in the measurement and tampering attack recognitionTThe median value is 1.
Figure BDA0002454026180000056
Represents a tag-fetching calculation, an
Figure BDA0002454026180000057
Wherein
Figure BDA00024540261800000513
Figure BDA00024540261800000514
For tag-taking operations, if and only if
Figure BDA00024540261800000512
All internal non-0 elements being the same, dj=d1j×τ1Otherwise dj=0;
Figure BDA00024540261800000511
Wherein
Figure BDA00024540261800000515
If and only if
Figure BDA00024540261800000516
All internal non-0 elements being identical, ei=e1i×ν1Else, ei=0。
Figure BDA0002454026180000058
Represents a summation calculation, an
Figure BDA0002454026180000059
Wherein
Figure BDA00024540261800000510
The superscript T denotes the transpose of the vector sum matrix and the subscript g denotes the number of inference steps.
Further, step S4 includes the following substeps:
s41, respectively establishing a fault diagnosis model pi based on a memory pulse neurolemma system according to the topological structure and the protection pattern of the power grid aiming at each suspected fault element which is not subjected to the measurement tampering attackF(ii) a Fault diagnosis model piFII comprises a positive sequence voltage fault diagnosis modelFPNegative sequence voltage fault diagnosis model IIFNZero sequence voltage fault diagnosis model IIFZII model for diagnosing sum remote signaling quantity faultFB
S42, respectively carrying out normalization processing on the SCADA telemetering value of the suspected fault element and the historical telemetering values of different types of faults of the element to obtain a SCADA real-time fault voltage normalization value and a SCADA historical fault voltage normalization value.
S43, dividing the SCADA real-time fault voltage normalization value and the SCADA historical fault voltage normalization value into S sampling time points respectively, and inputting the SCADA real-time fault voltage normalization value of each sampling time point into the positive sequence voltage fault diagnosis model pi respectivelyFPNegative sequence voltage fault diagnosis model IIFNII model for diagnosing fault of sum zero sequence voltageFZIn the sensory neuron, a remote semaphore pulse value related to the element is input to a remote semaphoreVolume fault diagnosis model piFBIn the perception neuron, the normalized values of the SCADA historical fault voltage at each sampling time point are respectively input into a positive sequence voltage fault diagnosis model IIFPNegative sequence voltage fault diagnosis model IIFNII model for diagnosing fault of sum zero sequence voltageFZIn the memory neuron, a history fault remote communication quantity related to the element is inputted as a pulse value to a remote communication quantity fault diagnosis model IIFBIn the memory neurons of (1).
S44, carrying out fault diagnosis model pi on each suspected fault element through FDMA algorithmFSolving to obtain various fault diagnosis models piFThe pulse value and the memory tag value of the neuron are output.
S45, calculating each fault diagnosis model piFThe average value f of the pulse values corresponding to the memory tag valuezAnd f iszThe basic fault event represented by the memory label value corresponding to the maximum value is used as the fault diagnosis result of the suspected fault element, and the pulse value mean value f corresponding to the memory label valuezThe calculation formula of (2) is as follows:
Figure BDA0002454026180000061
wherein z represents the memory tag value of the output neuron, and the value is [0, c ]]The whole number of (a) to (b),
Figure BDA0002454026180000062
II representing positive sequence voltage fault diagnosis modelFPThe corresponding pulse value when the memory label value of the middle output neuron is z,
Figure BDA0002454026180000063
negative sequence voltage fault diagnosis model IIFNThe corresponding pulse value when the memory label value of the middle output neuron is z,
Figure BDA0002454026180000064
zero sequence voltage fault diagnosis model IIFZThe corresponding pulse value when the memory label value of the middle output neuron is z,
Figure BDA0002454026180000065
II model for representing remote signalling quantity fault diagnosisFBThe corresponding pulse value when the memory tag value of the middle output neuron is 1,
Figure BDA0002454026180000071
II model for representing remote signalling quantity fault diagnosisFBAnd when the memory tag value of the middle output neuron is 2, the corresponding pulse value is obtained.
Further, the fault diagnosis model pi for each suspected fault element through FDMA algorithm in step S44FThe specific method for solving is as follows:
b1, setting the inference step number g as 0.
B2, performing ignition calculation on each storage neuron meeting the ignition condition, and updating according to the following formulag+1And vg+1
Figure BDA0002454026180000072
Figure BDA0002454026180000073
B3, performing ignition calculation on each calculation neuron meeting the ignition condition, and updating theta according to the following formulag+1And τg+1
Figure BDA0002454026180000074
Figure BDA0002454026180000075
B4, adding 1 to the inference step number g.
B5, judging whether the operation condition theta is metg≠01Org≠02If yes, returning to the step A2, otherwise, ending the FDMA algorithm, and outputting to obtain each fault diagnosis model IIFPulse value sum of intermediate output neuronsThe tag value is recalled.
The vector, matrix and operator involved in the FDMA algorithm have the following meanings:
θ=(θ12,...,θp)Trepresenting a vector of pulse values of a storage neuron, where θiThe pulse value of the ith storage neuron is [0,1 ]]The real number above, i 1,2, p, p denotes the number of storage neurons; II model for fault diagnosisFIn the case where 1. ltoreq. i. ltoreq.s, θiFor the SCADA real-time fault voltage normalization value, when (s +1) is less than or equal to i and less than or equal to (s + s c), thetaiThe method comprises the steps of obtaining SCADA historical fault voltage normalization values of different fault types, obtaining c the total number of memory events, and obtaining s the total number of sampling time points. ═ e (1,2,...,q)TRepresenting a vector of calculated neuron pulse values, whereinjCalculating the impulse value of the neuron for the jth, and taking the value as [0,1 ]]The real number above, j 1,2,.., q, represents the number of computational neurons. τ ═ t (τ)12,...,τp)TRepresenting a vector of storage neuron tag values, where τiThe tag value for the ith storage neuron is set to [0, c]The above integer; II model for fault diagnosisFIn the case where 1. ltoreq. i.ltoreq.s, τiAll are 0, and when (s +1) ≦ i ≦ (s + s × c), τ isiTo remember the basic failure event type. V ═ v (v)12,...,νq)TRepresenting a vector of computed neuron tag values, where vjCalculating the label value of the neuron for the jth, and taking the value as [0, c]The above integer. D1=(dij)p×qIs a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the dis-computing neuron, if the storage neuron is sigmaiTo dis computational neuron sigmajPresence of directional synaptic connection, then dij1, otherwise dij=0。D2=(dij)p×qIs a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the max computation neuron, if the storage neuron is sigmaiCalculating neuron sigma by maxjPresence of directional synaptic connection, then dij1, otherwise dij=0。D3=(dij)p×qIs a matrix of p × q order, which represents the directional synaptic connection relationship from the storage neuron to the min computation neuron, if the storage neuron is sigmaiCalculating neuron sigma by minjPresence of directional synaptic connection, then dij1, otherwise dij=0。D4=(dij)p×qIs a matrix of p × q order, which represents the directional synaptic connection relationship from the storage neuron to the rel computation neuron, if the storage neuron is sigmaiTo rel computing neuron sigmajPresence of directional synaptic connection, then dij1, otherwise dij=0。E=(eji)q×pIs a q × order matrix representing the directional synaptic connection relationship from the computing neuron to the storage neuron, if the computing neuron is sigmajTo the storage neuron σiExistence of synaptic connection, then eji1, otherwise eji0.Δ represents dis calculation, and DTΔθ=(d1,d2,...,dq) Wherein d isj=|d1j×θ1-d2j×θ2…-dpj×θpL. Denotes max calculation, and DT·θ=(d1,d2,...,dq) Wherein d isj=max(d1j×θ1,d2j×θ2,...,dpj×θp)。
Figure BDA0002454026180000081
Represents min calculation, and
Figure BDA0002454026180000082
wherein d isj=min(d1j×θ1,d2j×θ2...,dpj×θp)。
Figure BDA0002454026180000083
Represents rel calculation, and
Figure BDA0002454026180000084
wherein
Figure BDA0002454026180000085
θmaxRepresents the pulse value of the neuron, θ, located before the rel-computing neuron and after the max-computing neurondisRepresenting the pulse value of the neuron before the rel calculating neuron and after the dis calculating neuron, wherein rho is a memory resolution coefficient and is in a fault diagnosis pi modelFThe median value is 0.5.
Figure BDA0002454026180000086
Represents a tag-fetching calculation, an
Figure BDA0002454026180000087
Wherein
Figure BDA00024540261800000812
Figure BDA00024540261800000813
For tag-taking operations, if and only if
Figure BDA00024540261800000814
All internal non-0 elements being the same, dj=d1j×τ1Otherwise dj=0;
Figure BDA0002454026180000088
Wherein
Figure BDA00024540261800000815
If and only if
Figure BDA00024540261800000816
All internal non-0 elements being identical, ei=e1i×ν1Else, ei=0。
Figure BDA0002454026180000089
Represents a summation calculation, an
Figure BDA00024540261800000810
Wherein
Figure BDA00024540261800000811
The superscript T denotes the transpose of the vector sum matrix and the subscript g denotes the number of inference steps.
The invention has the beneficial effects that:
(1) the method determines the suspected fault element by using an electric quantity clustering detection method, thereby reducing the diagnosis range.
(2) The invention establishes a tamper attack detection model based on the memory pulse neurolemma system, and effectively solves the problem of fault diagnosis misoperation caused by tamper attack detection.
(3) The invention establishes a fault diagnosis model capable of comprehensively utilizing telemetering and teletraffic by utilizing the memory backtracking idea of a memory pulse neurolemma system, not only overcomes the defect that the prior model cannot be established by utilizing the teletraffic based on a production rule, but also can determine the fault type under the condition of diagnosing a fault element.
Drawings
Fig. 1 is a schematic view illustrating an attack position of a false data injection attack in a fault diagnosis system according to the background art of the present invention.
Fig. 2 is a flowchart of a smart grid fault diagnosis method capable of identifying a measurement tampering attack according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of a sensing neuron and a simplified representation thereof according to an embodiment of the present invention.
FIG. 4 is a schematic diagram of a memory neuron and a simplified representation thereof according to an embodiment of the present invention.
Fig. 5 is a schematic diagram of a transmission neuron and a simplified representation thereof according to an embodiment of the present invention.
Fig. 6 is a schematic diagram illustrating a dis computing neuron and a simplified representation thereof according to an embodiment of the present invention.
Fig. 7 is a schematic diagram of a max computing neuron and a simplified representation thereof according to an embodiment of the present invention.
Fig. 8 is a schematic diagram of a min computation neuron and a simplified representation thereof according to an embodiment of the present invention.
FIG. 9 is a schematic diagram of a rel computing neuron and its simplified form according to an embodiment of the present invention.
Fig. 10 is a schematic diagram of a measured tampering attack recognition model based on a memory pulse neurolemma system according to an embodiment of the present invention.
Fig. 11 is a schematic diagram of a fault diagnosis model based on a memory impulse neural membrane system according to an embodiment of the present invention.
Fig. 12 is a schematic diagram illustrating a clustering result of suspected fault areas according to an embodiment of the present invention.
Fig. 13 is a schematic diagram of a pulse value curve of a sensing neuron and a memory neuron in the tamper attack recognition model measured by the line L1213 according to an embodiment of the present invention.
Fig. 14 is a schematic diagram illustrating pulse values of output neurons in the line L1213 measured tampering attack recognition model according to an embodiment of the present invention.
Fig. 15 is a schematic diagram illustrating a detection result of a tamper attack in device measurement according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It is to be understood that the embodiments shown and described in the drawings are merely exemplary and are intended to illustrate the principles and spirit of the invention, not to limit the scope of the invention.
The embodiment of the invention provides an intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack, which comprises the following steps of S1-S4 as shown in FIG. 2:
and S1, aiming at the elements which have faults in the smart grid and have completed the breaker on-off detection, determining suspected fault elements by adopting an electric quantity clustering detection method.
The step S1 includes the following substeps S11-S13:
and S11, acquiring voltage values of each bus, each generator and each transformer in 0.1S, 0.2S and 0.5S in the intelligent power grid when a relay in the intelligent power grid acts or a breaker trips.
S12, performing cluster analysis on the normalized voltage value and the normalized voltage value of the smart grid in the normal operation state, wherein the normalization formula is as follows:
Figure BDA0002454026180000101
wherein x' represents the normalized voltage value, x represents the voltage value to be normalized, and xmaxAnd xminRespectively the maximum value and the minimum value in the voltage values to be normalized.
And S13, taking the element farthest from the cluster center as a suspected fault element.
S2, respectively establishing a measurement tampering attack recognition model based on a memory pulse neurolemma system for each suspected fault element, solving through a TRMA algorithm, judging whether each suspected fault element suffers measurement tampering attack, if so, entering step S3, and otherwise, entering step S4.
The step S2 includes the following substeps S21-S25:
s21, respectively establishing a tamper attack detection model pi based on a memory pulse neurolemma system for each suspected fault elementT
In the embodiment of the invention, a measuring, tampering, attacking and identifying model II based on a memory pulse neurolemma systemTThe method specifically comprises the following steps:
ΠT=(O,σ1,...,σm,syn,in,out)
where O ═ { a } represents a set of nerve pulses, a represents a nerve pulse, σ represents a set of nerve pulses, and1,...,σmidentifying model Π for measuring tampering attacksTM neurons of (1), σi=(θiii,ri),i=1,2,...,m,θiThe pulse value of the ith neuron is represented by [0,1 ]]The real number of (c); lambda [ alpha ]iExpressing the ignition threshold value of the ith neuron, wherein the value of the ignition threshold value is any real number; tau isiThe memory tag value of the ith neuron is [0, c ]]C is the total number of memory events; specifically, when no tag value exists in a neuron, the tag value is 0; r isiIndicating the firing rule of the ith neuron, in the form of E/a(θ,τ)→a(β,τ)Wherein E ═ an,θ≥λiIs the ignition conditionDenotes the condition if and only if the neuron σiReceiving at least n pulses and the neuron pulse value satisfies theta ≧ lambdaiThe firing rule can only be executed, at which time the neuron σiA pulse with potential value theta is consumed, a new pulse with potential value β is generated and transmitted backwards, and at the same time, the label value tau of the neuroniIs consumed and passes a new tag value tau backwardiOtherwise, the neuron does not execute ignition calculation, syn {1, 2.. multidot.m } × {1, 2.. multidot.m } represents directed synapse connection relation between neurons, and when i is more than or equal to 1 and less than or equal to m, the condition is satisfied
Figure BDA0002454026180000102
in and out respectively represent a measured tampering attack recognition model piTA set of input neurons and a set of output neurons.
In the embodiment of the invention, a tampering attack identification model II is measuredTTamper attack identification model pi including positive sequence voltage measurementTPNegative sequence voltage measurement tampering attack identification model IITNTampering attack recognition model pi with zero sequence voltage measurementTZ
In the embodiment of the invention, a tampering attack identification model II is measuredTIncludes a storage neuron for sensing or storing the pulse value and the memory event tag value from the environment and a computation neuron for computing the pulse value and the memory event tag value.
The storage neurons include sensing neurons, memory neurons and transmission neurons, as shown in fig. 3 to 5, which are respectively represented by circles, triangles and diamonds, pulse values generated after all types of storage neurons are ignited satisfy β ═ θ, and specific functions are respectively described as follows:
(1) the sensing neurons are used to acquire the detection information (such as teletraffic and telemeasurement) from the environment, convert it into real-time basic event features, and transmit them backward in the form of neural impulse values, as shown in fig. 3. The perception neuron is unable to store the memory event signature, i.e., it does not contain an event tag. Therefore, the pulse value θ represents the real-time basic event characteristic value of the current event, and the memory tag value is 0.II for measuring tampering attack recognition model provided by the embodiment of the inventionTThe pulse values theta of the perception neurons represent fault voltage normalization values of corresponding sampling time points in the power grid SCADA system; the memory tags of the sensory neurons are all 0.
(2) The memory neurons are used for storing the memory basic event features and the corresponding memory tag values, as shown in fig. 4. Tamper-evident model pi in measurementTEach memory neuron corresponds to a real-time basic fault event characteristic, so that the pulse value theta of each memory neuron corresponds to a characteristic value when the real-time basic fault event occurs, namely a fault voltage normalization value corresponding to a sampling time point in an RTU under the current fault condition; the memory tag cannot be determined, and is therefore collectively denoted as 0.
(3) The transmission neuron is used to transmit the impulse value and the memory tag value transmitted from its pre-synaptic neuron to its post-synaptic neuron, as shown in fig. 5. Specifically, if the transmission neuron is not present as a post-synaptic neuron, it is an output neuron responsible for outputting the pulse value and the memory tag value into the environment.
The quantity relation of the various storage neurons meets the following requirements: if the number of storage neurons in a memory pulse neurolemma system is p, wherein the number of sensing neurons is s, and the number of memory events is c, the number of memory neurons is s × c, and the number of output neurons is p-s-s × c.
The calculating neurons comprise dis calculating neurons, max calculating neurons, min calculating neurons and rel calculating neurons, 4 types of calculating neurons have the same functions, namely pulse values and memory tag values are transmitted to the postsynaptic transmission neurons according to the ignition rules, and the functions of different calculating neurons are described as follows:
(1) as shown in FIG. 6, the tampering attack recognition model pi is measuredTAnd the dis calculating neuron is used for acquiring the matching degree between the current SCADA real-time basic fault feature and the RTU real-time basic fault feature by calculating the difference degree of pulse values of the sensing neuron and the memory neuron.
(2) As shown in fig. 7, the max calculating neuron is used to logically or the impulse value transmitted by its pre-synaptic neuron, i.e. the maximum impulse value of its pre-synaptic neuron is taken as the impulse value of the current max calculating neuron to participate in the subsequent calculation.
(3) As shown in fig. 8, the min computation neuron is configured to perform a logical and computation on the impulse values transmitted by its pre-synaptic neurons, that is, to take the minimum impulse value of its pre-synaptic neuron as the impulse value of the current min computation neuron to participate in the subsequent computation.
(4) As shown in fig. 9, the rel computation neuron is configured to perform global matching calculation on the impulse values transmitted by its pre-synaptic neurons, i.e. find the global matching degree of the transmission neuron with the smallest number in its pre-synaptic neurons. Theta in FIG. 9minRepresents the pulse value of the neuron before rel and after minmaxRepresents the pulse value of the neuron, θ, located before the rel-computing neuron and after the max-computing neurondisRepresenting the pulse value of the neuron before the rel computing neuron and after the dis computing neuron, wherein rho is a memory resolution coefficient, and the model pi is identified in the measurement and tampering attack recognitionTThe median value is 1.
In FIGS. 6 to 9
Figure BDA0002454026180000122
In order to obtain the tag value, the specific operation mode is as follows:
Figure BDA0002454026180000121
where k represents the total number of neurons performing the tag-fetching operation, τiThe memory tag value of the ith neuron that performs the tag operation.
Respectively establishing a measuring tampering attack recognition model pi by using the neuronsTStoring RTU telemetering data into Memory neuron, sending SCADA telemetering data into sensing neuron, outputting output neuron pulse value of Memory pulse neural membrane System (MSNPS) by Memory backtracking mechanism, judging whether initial RTU telemetering value is consistent with SCADA telemetering value, and finally completing measurementTamper attack identification. Establishing a II model for measuring, tampering, attacking and identifying based on a memory pulse neurolemma system according to the definition of various neuronsT(MSNPS-TRM) as shown in FIG. 10.
II model for measuring and identifying tamperingT=(O,σ1,...,σmSyn, in, out), the sensing neuron pulse value is a fault voltage normalization value within a sampling time range in the SCADA. The method specifically comprises the following steps: dividing a fault voltage normalization value of a suspected fault element in a target power grid SCADA within a certain sampling time range into s sampling time points, and sending the fault voltage normalization value of each sampling time point to s corresponding sensing neurons as pulse values of the sampling time points; at this time, the perception neuron does not contain the value of the memory tag, i.e., τi0 (1. ltoreq. i. ltoreq. s). The pulse value of the memory neuron is a failure voltage normalization value in a sampling time range in an RTU, and the acquisition mode of the pulse value of the memory neuron is the same as that of the pulse value of the sensing neuron, but the source of the pulse value is different. At this time, measuring the tampering identification model IITThe number of memory events stored by the internal memory neuron is 0(c ═ 0), and the corresponding memory tag value is 0, i.e., τi0(s + 1. ltoreq. i.ltoreq.2s). Tamper attack identification model pi for positive sequence voltage measurementTPNegative sequence voltage measurement tampering attack identification model IITNTampering attack recognition model pi with zero sequence voltage measurementTZAnd respectively selecting the positive sequence, negative sequence and zero sequence voltage normalization values as pulse values of the sensing neuron and the memory neuron.
And S22, carrying out normalization processing on the SCADA telemetering measurement and the RTU telemetering measurement of the suspected fault element at the moment of the fault to obtain a real-time fault voltage normalization value of the SCADA voltage and the RTU voltage within a sampling time range.
S23, respectively splitting the real-time fault voltage normalized values of the SCADA voltage and the RTU voltage in the sampling time range into S sampling time points, and inputting the SCADA real-time fault voltage normalized values of the sampling time points into a measuring and tampering attack identification model piTIn the perception neuron, the RTU real-time fault voltage normalization value of each sampling time point is input into a measurement tampering attack recognition model piTIn the memory neurons of (1).
S24, identifying pi through TRMA algorithm for measuring and tampering attack of each suspected fault elementTSolving to obtain various measurement tampering attack identification models piTAnd outputs the pulse value of the neuron.
Measuring tampering attack recognition model pi of each suspected fault element through TRMA algorithmTThe specific method for solving is as follows:
a1, setting the inference step number g to be 0.
A2, performing ignition calculation for each storage neuron meeting the ignition condition, and updating according to the following formulag+1And vg+1
Figure BDA0002454026180000131
Figure BDA0002454026180000132
A3, performing ignition calculation for each calculation neuron meeting the ignition condition, and updating theta according to the following formulag+1And τg+1
Figure BDA0002454026180000141
Figure BDA0002454026180000142
A4, adding 1 to the inference step number g.
A5, judging whether the operation condition theta is metg≠01Org≠02If yes, returning to the step A2, otherwise, ending the TRMA algorithm, and outputting the measured tampering attack recognition model IITAnd outputs the pulse value of the neuron.
The meaning of the vector, matrix and operator involved in the TRMA algorithm is as follows:
θ=(θ12,...,θp)Trepresenting a vector of pulse values of a storage neuron, where θiIs the ithStoring the pulse value of the neuron as [0,1 ]]The real number above, i 1,2, p, p denotes the number of storage neurons; tamper-evident model pi in measurementTIn the case where 1. ltoreq. i. ltoreq.s, θiFor the SCADA real-time fault voltage normalization value, when (s +1) is less than or equal to i and less than or equal to (s + s c), thetaiAnd the normalized value is the RTU real-time fault voltage, c is the total number of the memory events, and s is the total number of the sampling time points.
=(1,2,...,q)TRepresenting a vector of calculated neuron pulse values, whereinjCalculating the impulse value of the neuron for the jth, and taking the value as [0,1 ]]The real number above, j 1,2,.., q, represents the number of computational neurons.
τ=(τ12,...,τp)TRepresenting a vector of storage neuron tag values, where τiThe tag value for the ith storage neuron is set to [0, c]The above integer; tamper-evident model pi in measurementTIn (1) i.ltoreq (s + s c), τ isiAll are 0.
ν=(ν12,...,νq)TRepresenting a vector of computed neuron tag values, where vjCalculating the label value of the neuron for the jth, and taking the value as [0, c]The above integer.
D1=(dij)p×qIs a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the dis-computing neuron, if the storage neuron is sigmaiTo dis computational neuron sigmajPresence of directional synaptic connection, then d ij1, otherwise dij=0。
D2=(dij)p×qIs a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the max computation neuron, if the storage neuron is sigmaiCalculating neuron sigma by maxjPresence of directional synaptic connection, then d ij1, otherwise dij=0。
D3=(dij)p×qIs a matrix of order p × q, which represents the directed synaptic connection relationship from the storage neuron to the min computation neuron, if anyStore neuron sigmaiCalculating neuron sigma by minjPresence of directional synaptic connection, then d ij1, otherwise dij=0。
D4=(dij)p×qIs a matrix of p × q order, which represents the directional synaptic connection relationship from the storage neuron to the rel computation neuron, if the storage neuron is sigmaiTo rel computing neuron sigmajPresence of directional synaptic connection, then d ij1, otherwise dij=0。
E=(eji)q×pIs a q × order matrix representing the directional synaptic connection relationship from the computing neuron to the storage neuron, if the computing neuron is sigmajTo the storage neuron σiExistence of synaptic connection, then e ji1, otherwise eji=0。
Δ represents dis calculation, and DTΔθ=(d1,d2,...,dq) Wherein d isj=|d1j×θ1-d2j×θ2...-dpj×θp|。
Denotes max calculation, and DT·θ=(d1,d2,...,dq) Wherein d isj=max(d1j×θ1,d2j×θ2,...,dpj×θp)。
Figure BDA0002454026180000151
Represents min calculation, and
Figure BDA0002454026180000152
wherein d isj=min(d1j×θ1,d2j×θ2...,dpj×θp)。
Figure BDA0002454026180000153
Represents rel calculation, and
Figure BDA0002454026180000154
wherein
Figure BDA0002454026180000155
Figure BDA0002454026180000156
θmaxRepresents the pulse value of the neuron, θ, located before the rel-computing neuron and after the max-computing neurondisRepresenting the pulse value of the neuron before the rel computing neuron and after the dis computing neuron, wherein rho is a memory resolution coefficient, and the model pi is identified in the measurement and tampering attack recognitionTThe median value is 1. Specially, equivalent measurement tampering attack recognition model IITWhen there is only one memory event tag, i.e. there are only s sensing neurons and s memory neurons,
Figure BDA0002454026180000157
Figure BDA0002454026180000158
represents a tag-fetching calculation, an
Figure BDA0002454026180000159
Wherein
Figure BDA00024540261800001514
Figure BDA00024540261800001515
For tag-taking operations, if and only if
Figure BDA00024540261800001516
All internal non-0 elements being the same, dj=d1j×τ1Otherwise dj=0;
Figure BDA00024540261800001510
Wherein
Figure BDA00024540261800001518
If and only if
Figure BDA00024540261800001517
All internal non-0 elements being identical, ei=e1i×ν1Else, ei=0。
Figure BDA00024540261800001511
Represents a summation calculation, an
Figure BDA00024540261800001512
Wherein
Figure BDA00024540261800001513
The superscript T denotes the transpose of the vector sum matrix and the subscript g denotes the number of inference steps.
S25, sequentially judging pi of each measured tampering attack recognition modelTIf the pulse value of any output neuron is lower than the detection threshold (in the embodiment of the present invention, the detection threshold is 0.8), if so, it is determined that the suspected faulty element is under the tamper attack, and the process goes to step S3, otherwise, it is determined that the suspected faulty element is not under the tamper attack, and the process goes to step S4.
And S3, judging that the action of the relay protection device at the moment is a false action caused by measuring the tampering attack telemeasurement, and finishing the fault diagnosis of the smart power grid.
S4, aiming at each suspected fault element which is not subjected to the measurement tampering attack, respectively establishing a fault diagnosis model based on a memory pulse neural membrane system according to the topological structure and the protection pattern of the power grid, solving through an FDMA algorithm to obtain a fault diagnosis result of the suspected fault element, and finishing the fault diagnosis of the intelligent power grid.
The step S4 includes the following substeps S41-S45:
s41, respectively establishing a fault diagnosis model pi based on a memory pulse neurolemma system according to the topological structure and the protection pattern of the power grid aiming at each suspected fault element which is not subjected to the measurement tampering attackF
Wherein, the fault diagnosis model IIFII comprises a positive sequence voltage fault diagnosis modelFPNegative sequence ofVoltage fault diagnosis model piFNZero sequence voltage fault diagnosis model IIFZII model for diagnosing sum remote signaling quantity faultFB
In the embodiment of the invention, a fault diagnosis model II based on a memory pulse neurolemma systemFThe method specifically comprises the following steps:
ΠF=(O,σ1,...,σm,syn,in,out)
where O ═ { a } represents a set of nerve pulses, a represents a nerve pulse, σ represents a set of nerve pulses, and1,...,σmmodel pi for fault diagnosisFM neurons of (1), σi=(θiii,ri),i=1,2,...,m,θiThe pulse value of the ith neuron is represented by [0,1 ]]The real number of (c); lambda [ alpha ]iExpressing the ignition threshold value of the ith neuron, wherein the value of the ignition threshold value is any real number; tau isiThe memory tag value of the ith neuron is [0, c ]]C is the total number of memory events; specifically, when no tag value exists in a neuron, the tag value is 0; r isiIndicating the firing rule of the ith neuron, in the form of E/a(θ,τ)→a(β,τ)Wherein E ═ an,θ≥λiIs the firing condition, meaning if and only if the neuron σiReceiving at least n pulses and the neuron pulse value satisfies theta ≧ lambdaiThe firing rule can only be executed, at which time the neuron σiA pulse with potential value theta is consumed, a new pulse with potential value β is generated and transmitted backwards, and at the same time, the label value tau of the neuroniIs consumed and passes a new tag value tau backwardiOtherwise, the neuron does not execute ignition calculation, syn {1, 2.. multidot.m } × {1, 2.. multidot.m } represents directed synapse connection relation between neurons, and when i is more than or equal to 1 and less than or equal to m, the condition is satisfied
Figure BDA0002454026180000161
in and out respectively represent fault diagnosis models IIFA set of input neurons and a set of output neurons.
Fault diagnosis model piFThe neurons in (A) includeA storage neuron for sensing or storing the pulse value and the memory event tag value from the environment and a computation neuron for computing the pulse value and the memory event tag value.
The storage neurons include sensing neurons, memory neurons and transmission neurons, as shown in fig. 3 to 5, which are respectively represented by circles, triangles and diamonds, pulse values generated after all types of storage neurons are ignited satisfy β ═ θ, and specific functions are respectively described as follows:
(1) the sensing neurons are used to acquire the detection information (such as teletraffic and telemeasurement) from the environment, convert it into real-time basic event features, and transmit them backward in the form of neural impulse values, as shown in fig. 3. The perception neuron is unable to store the memory event signature, i.e., it does not contain an event tag. Therefore, the pulse value θ represents the real-time basic event characteristic value of the current event, and the memory tag value is 0. II for fault diagnosis model provided by the embodiment of the inventionFThe pulse values theta of the perception neurons represent fault voltage normalization values of corresponding sampling time points in the power grid SCADA system; the memory tags of the sensory neurons are all 0.
(2) The memory neurons are used for storing the memory basic event features and the corresponding memory tag values, as shown in fig. 4. II model for fault diagnosisFEach memory neuron corresponds to a memory basic failure event characteristic. Therefore, the pulse value theta corresponds to a characteristic value when the memory basic fault event occurs, namely a voltage normalization value of a sampling time point corresponding to the fault type in the SCADA system under the historical fault condition; its memory tag value corresponds to the memory base failure event type. Specifically, in the embodiment of the present invention, according to the historical fault types, it is determined that the number of the memory basic fault event types is 11 (c is 11), and the determination is: no Fault (No Fault), A-phase short-circuit Fault (A), B-phase short-circuit Fault (B), C-phase short-circuit Fault (C), AB-phase short-circuit Fault (AB), AC-phase short-circuit Fault (AC), BC-phase short-circuit Fault (BC), AB-phase ground short-circuit Fault (AB-G), AC-phase ground short-circuit Fault (AC-G), BC-phase ground short-circuit Fault (BC-G) and ABC-phase short-circuit Fault (ABC), and the memory label values thereof are sequentially represented by 1 to 11.
(3) The transmission neuron is used to transmit the impulse value and the memory tag value transmitted from its pre-synaptic neuron to its post-synaptic neuron, as shown in fig. 5. Specifically, if the transmission neuron is not present as a post-synaptic neuron, it is an output neuron responsible for outputting the pulse value and the memory tag value into the environment.
The quantity relation of the various storage neurons meets the following requirements: if the number of storage neurons in a memory pulse neurolemma system is p, wherein the number of sensing neurons is s, and the number of memory events is c, the number of memory neurons is s × c, and the number of output neurons is p-s-s × c.
The calculating neurons comprise dis calculating neurons, max calculating neurons, min calculating neurons and rel calculating neurons, 4 types of calculating neurons have the same functions, namely pulse values and memory tag values are transmitted to the postsynaptic transmission neurons according to the ignition rules, and the functions of different calculating neurons are described as follows:
(1) as shown in fig. 6, in the fault diagnosis model ΠFAnd the dis calculating neuron is used for acquiring the matching degree between the current real-time basic fault feature and the historical fault feature by calculating the difference degree of pulse values of the sensing neuron and the memory neuron.
(2) As shown in fig. 7, the max calculating neuron is used to logically or the impulse value transmitted by its pre-synaptic neuron, i.e. the maximum impulse value of its pre-synaptic neuron is taken as the impulse value of the current max calculating neuron to participate in the subsequent calculation.
(3) As shown in fig. 8, the min computation neuron is configured to perform a logical and computation on the impulse values transmitted by its pre-synaptic neurons, that is, to take the minimum impulse value of its pre-synaptic neuron as the impulse value of the current min computation neuron to participate in the subsequent computation.
(4) As shown in fig. 9, the rel computation neuron is configured to perform global matching calculation on the impulse values transmitted by its pre-synaptic neurons, i.e. find the global matching degree of the transmission neuron with the smallest number in its pre-synaptic neurons. Theta in FIG. 9minRepresents the pulse value of the neuron before rel and after minmaxRepresenting the max-computing nerve that precedes the rel-computing neuronPulse value of neuron after neuron, thetadisRepresenting the pulse value of the neuron before the rel computing neuron and after the dis computing neuron, wherein rho is a memory resolution coefficient, and the model pi is identified in the measurement and tampering attack recognitionTThe median value is 1.
In FIGS. 6 to 9
Figure BDA0002454026180000182
In order to obtain the tag value, the specific operation mode is as follows:
Figure BDA0002454026180000181
where k represents the total number of neurons performing the tag-fetching operation, τiThe memory tag value of the ith neuron that performs the tag operation.
Establishing fault diagnosis model pi by using the neurons respectivelyFEstablishing a fault diagnosis model pi based on a memory pulse neurolemma system according to a memory backtracking mechanism of MSNPS by utilizing the matching degree of SCADA fault telemetering data and remote signaling data under the condition of historical faults when the faults occurF(MSNPS-FDM), the faulty element and type identification is done as shown in fig. 11.
Complete fault diagnosis model piF=(O,σ1,...,σmSyn, in, out) needs to be diagnosed by a positive sequence voltage fault model piFPNegative sequence voltage fault diagnosis model IIFNZero sequence voltage fault diagnosis model IIFZII model for diagnosing sum remote signaling quantity faultFBAnd the four submodels are formed. Particularly, when the suspected fault element is determined to be attacked by measurement tampering, the reliability of the fault remote signaling quantity is not high, so that the remote signaling quantity fault diagnosis model IIFBAnd does not participate in subsequent calculations. It should be noted here that the remote traffic fault diagnosis model ΠFBThe impulse value of the sensory neuron represents remote signaling information corresponding to a suspected fault element (the protection device acts, the value of the impulse value is 1, and otherwise, the value of the impulse value is 0); the pulse value of the neuron is the remote information of the element under the historical fault condition (the protection device acts, the value of the protection device takes 1, otherwise takes 0), so the number of basic events is memorizedThe number is 2(c is 2), and the memory tag pulse values of no failure and failure are indicated by 1 and 2, respectively. In telemetering measuring model IIFP、ΠFNIIFZIn the method, a fault voltage normalization value of a suspected fault element in the SCADA within a certain sampling time range and a fault voltage normalization value of the element under the historical fault condition are divided into s sampling time points, and the fault voltage normalization value of each sampling time point is respectively sent to corresponding s sensing neurons and memory neurons to serve as pulse values of the sensing neurons and the memory neurons. Wherein the memory tag value of a memory neuron is related to the historical failure type of the stored telemetry measurement of that neuron.
S42, respectively carrying out normalization processing on the SCADA telemetering value of the suspected fault element and the historical telemetering values of different types of faults of the element to obtain a SCADA real-time fault voltage normalization value and a SCADA historical fault voltage normalization value.
S43, dividing the SCADA real-time fault voltage normalization value and the SCADA historical fault voltage normalization value into S sampling time points respectively, and inputting the SCADA real-time fault voltage normalization value of each sampling time point into the positive sequence voltage fault diagnosis model pi respectivelyFPNegative sequence voltage fault diagnosis model IIFNII model for diagnosing fault of sum zero sequence voltageFZIn the sensing neuron, a remote traffic pulse value related to the element is input into a remote traffic fault diagnosis model piFBPi (if the protection device acts, the corresponding pulse value is 1, otherwise 0) in the perception neuronFBThe tag value of the sensory neuron is 0. Respectively inputting the SCADA historical fault voltage normalization values of all sampling time points into a positive sequence voltage fault diagnosis model IIFPNegative sequence voltage fault diagnosis model IIFNII model for diagnosing fault of sum zero sequence voltageFZThe memory label value is the corresponding basic fault event type (1-11), and the historical fault remote communication quantity related to the element is input into a remote communication quantity fault diagnosis model pi as a pulse valueFBIf the protection device acts, the corresponding pulse value is 1, otherwise, 0 is taken, and at the moment, the memory tag value is the historical fault occurrence state corresponding to the element (if the fault occurs, the tag value is 1, otherwise, 0 is taken)
S44, carrying out fault diagnosis model pi on each suspected fault element through FDMA algorithmFSolving to obtain various fault diagnosis models piFThe pulse value and the memory tag value of the neuron are output.
Fault diagnosis model pi for each suspected fault element through FDMA algorithmFThe specific method for solving is as follows:
b1, setting the inference step number g as 0.
B2, performing ignition calculation on each storage neuron meeting the ignition condition, and updating according to the following formulag+1And vg+1
Figure BDA0002454026180000191
Figure BDA0002454026180000192
B3, performing ignition calculation on each calculation neuron meeting the ignition condition, and updating theta according to the following formulag+1And τg+1
Figure BDA0002454026180000193
Figure BDA0002454026180000194
B4, adding 1 to the inference step number g.
B5, judging whether the operation condition theta is metg≠01Org≠02If yes, returning to the step A2, otherwise, ending the FDMA algorithm, and outputting to obtain each fault diagnosis model IIFThe pulse value and the memory tag value of the neuron are output.
The vector, matrix and operator involved in the FDMA algorithm have the following meanings:
θ=(θ12,...,θp)Trepresenting a vector of pulse values of a storage neuron, where θiThe pulse value of the ith storage neuron is [0,1 ]]The real number above, i 1,2, p, p denotes the number of storage neurons; II model for fault diagnosisFIn the case where 1. ltoreq. i. ltoreq.s, θiFor the SCADA real-time fault voltage normalization value, when (s +1) is less than or equal to i and less than or equal to (s + s c), thetaiThe method comprises the steps of obtaining SCADA historical fault voltage normalization values of different fault types, obtaining c the total number of memory events, and obtaining s the total number of sampling time points.
=(1,2,...,q)TRepresenting a vector of calculated neuron pulse values, whereinjCalculating the impulse value of the neuron for the jth, and taking the value as [0,1 ]]The real number above, j 1,2,.., q, represents the number of computational neurons.
τ=(τ12,...,τp)TRepresenting a vector of storage neuron tag values, where τiThe tag value for the ith storage neuron is set to [0, c]The above integer; II model for fault diagnosisFIn the case where 1. ltoreq. i.ltoreq.s, τiAll are 0, and when (s +1) ≦ i ≦ (s + s × c), τ isiTo remember the basic failure event type.
ν=(ν12,...,νq)TRepresenting a vector of computed neuron tag values, where vjCalculating the label value of the neuron for the jth, and taking the value as [0, c]The above integer.
D1=(dij)p×qIs a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the dis-computing neuron, if the storage neuron is sigmaiTo dis computational neuron sigmajPresence of directional synaptic connection, then d ij1, otherwise dij=0。
D2=(dij)p×qIs a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the max computation neuron, if the storage neuron is sigmaiCalculating neuron sigma by maxjPresence of directional synaptic connection, then d ij1, otherwise dij=0。
D3=(dij)p×qIs of order p × qMatrix representing the directional synaptic connection relationship from the storage neuron to the min computation neuron, if the storage neuron is sigmaiCalculating neuron sigma by minjPresence of directional synaptic connection, then d ij1, otherwise dij=0。
D4=(dij)p×qIs a matrix of p × q order, which represents the directional synaptic connection relationship from the storage neuron to the rel computation neuron, if the storage neuron is sigmaiTo rel computing neuron sigmajPresence of directional synaptic connection, then d ij1, otherwise dij=0。
E=(eji)q×pIs a q × order matrix representing the directional synaptic connection relationship from the computing neuron to the storage neuron, if the computing neuron is sigmajTo the storage neuron σiExistence of synaptic connection, then e ji1, otherwise eji=0。
Δ represents dis calculation, and DTΔθ=(d1,d2,...,dq) Wherein d isj=|d1j×θ1-d2j×θ2…-dpj×θp|。
Denotes max calculation, and DT·θ=(d1,d2,...,dq) Wherein d isj=max(d1j×θ1,d2j×θ2,...,dpj×θp)。
Figure BDA0002454026180000211
Represents min calculation, and
Figure BDA00024540261800002121
wherein d isj=min(d1j×θ1,d2j×θ2...,dpj×θp)。
Figure BDA0002454026180000212
Represents rel calculation, and
Figure BDA0002454026180000213
wherein
Figure BDA0002454026180000214
Figure BDA0002454026180000215
θmaxRepresents the pulse value of the neuron, θ, located before the rel-computing neuron and after the max-computing neurondisRepresenting the pulse value of the neuron before the rel calculating neuron and after the dis calculating neuron, wherein rho is a memory resolution coefficient and is in a fault diagnosis pi modelFThe median value is 0.5. Specially, when the fault diagnosis model IIFWhen there is only one memory event tag, i.e. there are only s sensing neurons and s memory neurons,
Figure BDA0002454026180000216
Figure BDA0002454026180000217
represents a tag-fetching calculation, an
Figure BDA0002454026180000218
Wherein
Figure BDA00024540261800002122
Figure BDA00024540261800002123
For tag-taking operations, if and only if
Figure BDA0002454026180000219
All internal non-0 elements being the same, dj=d1j×τ1Otherwise dj=0;
Figure BDA00024540261800002110
Wherein
Figure BDA00024540261800002111
If and only if
Figure BDA00024540261800002112
All internal non-0 elements being identical, ei=e1i×ν1Else, ei=0。
Figure BDA00024540261800002113
Represents a summation calculation, an
Figure BDA00024540261800002114
Wherein
Figure BDA00024540261800002115
The superscript T denotes the transpose of the vector sum matrix and the subscript g denotes the number of inference steps.
S45, calculating each fault diagnosis model piFThe average value f of the pulse values corresponding to the memory tag valuezAnd f iszThe basic fault event represented by the memory label value corresponding to the maximum value is used as the fault diagnosis result of the suspected fault element, and the pulse value mean value f corresponding to the memory label valuezThe calculation formula of (2) is as follows:
Figure BDA00024540261800002116
wherein z represents the memory tag value of the output neuron, and the value is [0, c ]]The whole number of (a) to (b),
Figure BDA00024540261800002117
II representing positive sequence voltage fault diagnosis modelFPThe corresponding pulse value when the memory label value of the middle output neuron is z,
Figure BDA00024540261800002118
negative sequence voltage fault diagnosis model IIFNThe corresponding pulse value when the memory label value of the middle output neuron is z,
Figure BDA00024540261800002119
zero sequence voltage fault diagnosis model IIFZThe corresponding pulse value when the memory label value of the middle output neuron is z,
Figure BDA00024540261800002120
II model for representing remote signalling quantity fault diagnosisFBThe corresponding pulse value when the memory tag value of the middle output neuron is 1,
Figure BDA0002454026180000221
II model for representing remote signalling quantity fault diagnosisFBAnd when the memory tag value of the middle output neuron is 2, the corresponding pulse value is obtained.
In the following, the IEEE-14 node standard bus system is taken as a diagnosis target, and experimental example 1 is taken as an example, and a detailed diagnosis process of the present invention is given to facilitate detailed understanding.
Experimental example 1 the preset fault scenarios are shown in table 1:
TABLE 1
Figure BDA0002454026180000222
Firstly, when a fault occurs, the fault occurrence time is taken as a reference time (0s), and the telemetering quantity voltage amplitude values of 0.1s, 0.2s and 0.5s are taken respectively for normalization processing. Then, an FCM algorithm is used for cluster analysis to obtain a clustering result of the suspected fault area, as shown in fig. 12, where B12 is farthest from other elements, and is determined as the suspected fault area. Therefore, the bus B12 and the elements connected with the bus B12 are judged to be suspected fault elements, and a measuring tampering attack identification model II needs to be established for the suspected fault elements respectivelyTNamely, it should be respectively applied to B12, L1206 and L1213 to establish a tamper attack identification model ΠTTake line L1213 as an example, obtain the pulse value curve of the sensing neuron and the memory neuron in the model, as shown in fig. 13.
As can be seen from FIG. 13, since the device L1213 in Experimental example 1 is not subjected to the tampering attack, the sensing neuron pulse value and the memory neuron pulse value are substantially matched, and then L1213 tamper attack recognition model II is performedTTRMA algorithm to obtain a modelThe pulse values of the neurons are output as shown in fig. 14.
As can be seen from fig. 14, in the positive sequence (square), negative sequence (circular) and zero sequence (triangle) component measurement tampering attack recognition model of L1213, the output pulse values are all greater than the detection threshold 0.8, so there is no attack behavior at this time, and thus it is determined that L1213 is not attacked.
Finally, a line L1213 fault diagnosis model pi is establishedFAnd executing the FDMA algorithm to obtain the memory tag value of the model output neuron and the corresponding pulse value thereof, as shown in Table 2.
TABLE 2
Figure BDA0002454026180000223
Figure BDA0002454026180000231
As can be seen from table 2, when the label value is 2, the pulse values of the output neurons of the positive sequence component diagnosis model, the negative sequence component diagnosis model and the zero sequence component diagnosis model of L1213 all exceed 0.95, and in addition, the fault diagnosis model ΠFWhen the tag value is 2, f20.979, which is significantly larger than other label values, and therefore the fault event corresponding to the label value 2 is determined as the result of the fault diagnosis, that is, the single-phase ground fault occurs on the line L1213, and the fault reliability is 0.979.
The advantageous effects of the present invention are further illustrated by the following experimental example 2:
experimental example 2 the preset fault scenarios are shown in table 3:
TABLE 3
Figure BDA0002454026180000232
Fig. 15 shows the result of the fault diagnosis method shown in the embodiment of the present invention, which first detects a tamper attack, the abscissa in fig. 15 is the neuron number, and the ordinate is the pulse value size, it is obvious that when the neuron number is greater than 1600 in fig. 15(a), the pulse value (portion indicated by triangle) output by the zero sequence diagnosis model is significantly lower than the detection threshold 0.8, and also the pulse value (portion indicated by circle) output by the negative sequence diagnosis model is partially lower than 0.8, according to the detection determination method of the embodiment of the present invention, it is considered that the tamper attack occurs at this time, the element L0102 is attacked by the tamper attack, while in fig. 15(B), the pulse values of the positive sequence diagnosis model (portion indicated by square), the negative sequence diagnosis model (portion indicated by circle) and the zero sequence diagnosis model (portion indicated by triangle) output neurons are almost distributed over 0.96 and much larger than the detection threshold 0.8, according to the attack identification method of the embodiment of the present invention, the element B1 is not attacked by the measurement attack, which is consistent with the preset fault, in this case, in this situation, the SCADA system does not detect the fault diagnosis method, and this situation is shown in this false diagnosis scenario 4.
TABLE 4
Figure BDA0002454026180000233
In table 4, M at the upper left corner of the faulty element indicates that the element has fault diagnosis, and it can be seen that in the case of experimental example 2, since other conventional fault diagnosis methods do not have the capability of identifying the tamper attack, when the tamper attack occurs, misdiagnosis of L0102 elements occurs in these methods, but the method of the present invention establishes an effective tamper attack identification model, and can effectively identify the attacked behavior of the L0102 element in experimental example 2, in addition, the experimental example 2 also has the remote traffic error information related to the bus B2, at this time, the conventional method based on remote traffic may have fault diagnosis for the B2 element, but the method of the present invention does not have fault diagnosis for the B2, because the present invention comprehensively utilizes the remote traffic and the remote traffic information to implement fault diagnosis, which can reduce the diagnosis risk based on single fault information.
TABLE 5
Figure BDA0002454026180000241
Table 5 shows the comparison of the modeling performance of each method, and it can be seen that the method of the present invention comprehensively utilizes the fault telemetry and telemetry, which can obtain richer diagnosis results than other methods. The fault diagnosis method does not need the complicated and huge learning and training process of the ANN method, so that the timeliness is better; the method does not need a modeling mode based on the production rule similar to FPNS, tFRSNPS and IFSNP, so that the fault remote measurement and remote signaling quantity can be effectively and comprehensively utilized, the diagnosis result is richer, and the specific fault type can be diagnosed.
It will be appreciated by those of ordinary skill in the art that the embodiments described herein are intended to assist the reader in understanding the principles of the invention and are to be construed as being without limitation to such specifically recited embodiments and examples. Those skilled in the art can make various other specific changes and combinations based on the teachings of the present invention without departing from the spirit of the invention, and these changes and combinations are within the scope of the invention.

Claims (10)

1. The smart grid fault diagnosis method capable of identifying and measuring the tampering attack is characterized by comprising the following steps of:
s1, aiming at elements which have faults in the smart grid and have completed the breaker on-off detection, determining suspected fault elements by adopting an electric quantity clustering detection method;
s2, respectively establishing a measuring tampering attack recognition model based on a memory pulse neurolemma system for each suspected fault element, solving the model through a TRMA algorithm, judging whether each suspected fault element suffers measuring tampering attack, if so, entering a step S3, and if not, entering a step S4;
s3, judging that the action of the relay protection device at the moment is a false action caused by measuring tampering attack telemeasurement, and finishing fault diagnosis of the smart power grid;
s4, aiming at each suspected fault element which is not subjected to the measurement tampering attack, respectively establishing a fault diagnosis model based on a memory pulse neural membrane system according to the topological structure and the protection pattern of the power grid, solving through an FDMA algorithm to obtain a fault diagnosis result of the suspected fault element, and finishing the fault diagnosis of the intelligent power grid.
2. The smart grid fault diagnosis method according to claim 1, wherein the step S1 includes the following sub-steps:
s11, when a relay in the intelligent power grid acts or a breaker trips, acquiring voltage values in each bus, generator and transformer in 0.1S, 0.2S and 0.5S in the intelligent power grid;
s12, performing cluster analysis on the normalized voltage value and the normalized voltage value of the smart grid in the normal operation state, wherein the normalization formula is as follows:
Figure FDA0002454026170000011
wherein x' represents the normalized voltage value, x represents the voltage value to be normalized, and xmaxAnd xminRespectively a maximum value and a minimum value in the voltage values to be normalized;
and S13, taking the element farthest from the cluster center as a suspected fault element.
3. The smart grid fault diagnosis method according to claim 1, wherein the step S2 includes the following sub-steps:
s21, respectively establishing a tamper attack detection model pi based on a memory pulse neurolemma system for each suspected fault elementT
S22, carrying out normalization processing on SCADA remote measurement and RTU remote measurement of the suspected fault element at the moment of fault to obtain a real-time fault voltage normalization value of SCADA voltage and RTU voltage within a sampling time range;
s23, real-time fault electricity of the SCADA voltage and the RTU voltage in a sampling time rangeRespectively splitting the voltage normalization value into s sampling time points, and inputting the SCADA real-time fault voltage normalization value of each sampling time point into a measuring tampering attack identification model piTIn the perception neuron, the RTU real-time fault voltage normalization value of each sampling time point is input into a measurement tampering attack recognition model piTIn the memory neurons of (a);
s24, identifying pi through TRMA algorithm for measuring and tampering attack of each suspected fault elementTSolving to obtain various measurement tampering attack identification models piTThe pulse value of the neuron is output;
s25, sequentially judging pi of each measured tampering attack recognition modelTIf the pulse value of any output neuron is lower than the detection threshold value, the suspected faulty element is determined to be attacked by measurement tampering, and the step S3 is entered, otherwise, the suspected faulty element is determined not to be attacked by measurement tampering, and the step S4 is entered.
4. The smart grid fault diagnosis method according to claim 3, wherein the measured tampering attack recognition model Π based on the memory pulse neurolemma system established in step S21TThe method specifically comprises the following steps:
ΠT=(O,σ1,...,σm,syn,in,out)
where O ═ { a } represents a set of nerve pulses, a represents a nerve pulse, σ represents a set of nerve pulses, and1,...,σmidentifying model Π for measuring tampering attacksTM neurons of (1), σi=(θiii,ri),i=1,2,...,m,θiThe pulse value of the ith neuron is represented by [0,1 ]]The real number of (c); lambda [ alpha ]iExpressing the ignition threshold value of the ith neuron, wherein the value of the ignition threshold value is any real number; tau isiThe memory tag value of the ith neuron is [0, c ]]C is the total number of memory events; r isiIndicating the firing rule of the ith neuron, in the form of E/a(θ,τ)→a(β,τ)Wherein E ═ an,θ≥λiIs the ignition condition, meaning if and only if godChannel element sigmaiReceiving at least n pulses and the neuron pulse value satisfies theta ≧ lambdaiThe firing rule can only be executed, at which time the neuron σiA pulse with potential value theta is consumed, a new pulse with potential value β is generated and transmitted backwards, and at the same time, the label value tau of the neuroniIs consumed and passes a new tag value tau backwardiOtherwise, the neuron does not execute ignition calculation, syn {1, 2.. multidot.m } × {1, 2.. multidot.m } represents directed synaptic connection relation between neurons, and in and out represent respectively a measuring and tampering attack recognition model piTA set of input neurons and a set of output neurons.
5. The smart grid fault diagnosis method according to claim 4, wherein the measured tampering attack recognition model ΠTTamper attack identification model pi including positive sequence voltage measurementTPNegative sequence voltage measurement tampering attack identification model IITNTampering attack recognition model pi with zero sequence voltage measurementTZ
II (II) of measurement tampering attack recognition modelTThe neurons in (1) comprise storage neurons for sensing or storing the pulse values and the memory event tag values from the environment and computation neurons for computing the pulse values and the memory event tag values;
the storage neurons comprise perception neurons, memory neurons and transmission neurons; the perception neuron is used for acquiring detection information from the environment, converting the detection information into real-time basic event characteristics and transmitting the real-time basic event characteristics backwards in the form of nerve pulse values; the memory neuron is used for storing memory basic event characteristics and corresponding memory tag values; the transmission neuron is used for transmitting a pulse value and a memory tag value transmitted by the pre-synaptic neuron to the post-synaptic neuron;
the calculating neurons comprise dis calculating neurons, max calculating neurons, min calculating neurons and rel calculating neurons; the dis calculation neuron is used for acquiring the matching degree between the current SCADA real-time basic fault characteristics and the RTU real-time basic fault characteristics by calculating the difference degree of pulse values of the perception neuron and the memory neuron; the max calculating neuron is used for carrying out logic OR calculation on the impulse value transmitted by the pre-synaptic neuron, namely taking the maximum impulse value of the pre-synaptic neuron as the impulse value of the current max calculating neuron to participate in subsequent calculation; the min calculation neuron is used for carrying out logic AND calculation on the pulse value transmitted by the pre-synaptic neuron, namely taking the minimum pulse value of the pre-synaptic neuron as the pulse value of the current min calculation neuron to participate in subsequent calculation; the rel computing neuron is used for carrying out global matching degree computation on pulse values transmitted by the pre-synaptic neurons, namely finding out the matching degree of the transmission neuron with the minimum number in the pre-synaptic neurons in the global state.
6. The smart grid fault diagnosis method according to claim 5, wherein in the step S24, the measured tampering attack recognition model II for each suspected fault element through the TRMA algorithm is adoptedTThe specific method for solving is as follows:
a1, setting the inference step number g to be 0;
a2, performing ignition calculation for each storage neuron meeting the ignition condition, and updating according to the following formulag+1And vg+1
Figure FDA0002454026170000031
Figure FDA0002454026170000032
A3, performing ignition calculation for each calculation neuron meeting the ignition condition, and updating theta according to the following formulag+1And τg+1
Figure FDA0002454026170000033
Figure FDA0002454026170000034
A4, adding 1 to the inference step number g;
a5, judging whether the operation condition theta is metg≠01Org≠02If yes, returning to the step A2, otherwise, ending the TRMA algorithm, and outputting the measured tampering attack recognition model IITThe pulse value of the neuron is output;
the meaning of the vector, the matrix and the operator involved in the TRMA algorithm is as follows:
θ=(θ12,...,θp)Trepresenting a vector of pulse values of a storage neuron, where θiThe pulse value of the ith storage neuron is [0,1 ]]The real number above, i 1,2, p, p denotes the number of storage neurons; tampering attack identification model II in the measurementTIn the case where 1. ltoreq. i. ltoreq.s, θiFor the SCADA real-time fault voltage normalization value, when (s +1) is less than or equal to i and less than or equal to (s + s c), thetaiThe normalized value is the RTU real-time fault voltage, c is the total number of memory events, and s is the total number of sampling time points;
=(1,2,...,q)Trepresenting a vector of calculated neuron pulse values, whereinjCalculating the impulse value of the neuron for the jth, and taking the value as [0,1 ]]The real number above, j 1,2,.., q, q represents the number of computational neurons;
τ=(τ12,...,τp)Trepresenting a vector of storage neuron tag values, where τiThe tag value for the ith storage neuron is set to [0, c]The above integer; tampering attack identification model II in the measurementTIn (1) i.ltoreq (s + s c), τ isiAll are 0;
ν=(ν12,...,νq)Trepresenting a vector of computed neuron tag values, where vjCalculating the label value of the neuron for the jth, and taking the value as [0, c]The above integer;
D1=(dij)p×qis a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the dis-computing neuron, if the storage neuron is sigmaiTo dis computational neuron sigmajPresence of directional synaptic connection, then dij1, otherwise dij=0;
D2=(dij)p×qIs a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the max computation neuron, if the storage neuron is sigmaiCalculating neuron sigma by maxjPresence of directional synaptic connection, then dij1, otherwise dij=0;
D3=(dij)p×qIs a matrix of p × q order, which represents the directional synaptic connection relationship from the storage neuron to the min computation neuron, if the storage neuron is sigmaiCalculating neuron sigma by minjPresence of directional synaptic connection, then dij1, otherwise dij=0;
D4=(dij)p×qIs a matrix of p × q order, which represents the directional synaptic connection relationship from the storage neuron to the rel computation neuron, if the storage neuron is sigmaiTo rel computing neuron sigmajPresence of directional synaptic connection, then dij1, otherwise dij=0;
E=(eji)q×pIs a q × order matrix representing the directional synaptic connection relationship from the computing neuron to the storage neuron, if the computing neuron is sigmajTo the storage neuron σiExistence of synaptic connection, then eji1, otherwise eji=0;
Δ represents dis calculation, and DTΔθ=(d1,d2,...,dq) Wherein d isj=|d1j×θ1-d2j×θ2...-dpj×θp|;
Denotes max calculation, and DT·θ=(d1,d2,...,dq) Wherein d isj=max(d1j×θ1,d2j×θ2,...,dpj×θp);
Figure FDA0002454026170000041
Represents min calculation, and
Figure FDA0002454026170000042
wherein d isj=min(d1j×θ1,d2j×θ2...,dpj×θp);
Figure FDA0002454026170000043
Represents rel calculation, and
Figure FDA0002454026170000044
wherein
Figure FDA0002454026170000045
Figure FDA0002454026170000051
θmaxRepresents the pulse value of the neuron, θ, located before the rel-computing neuron and after the max-computing neurondisRepresenting the pulse value of the neuron before the rel computing neuron and after the dis computing neuron, wherein rho is a memory resolution coefficient, and the model II is identified in the measurement tampering attack recognition modelTThe median value is 1;
Figure FDA0002454026170000052
represents a tag-fetching calculation, an
Figure FDA0002454026170000053
Wherein
Figure FDA0002454026170000054
Figure FDA0002454026170000055
For tag-taking operations, if and only if
Figure FDA0002454026170000056
All internal non-0 elements being the same, dj=d1j×τ1Otherwise dj=0;
Figure FDA0002454026170000057
Wherein
Figure FDA0002454026170000058
If and only if
Figure FDA0002454026170000059
All internal non-0 elements being identical, ei=e1i×ν1Else, ei=0;
Figure FDA00024540261700000510
Represents a summation calculation, an
Figure FDA00024540261700000511
Wherein
Figure FDA00024540261700000512
The superscript T denotes the transpose of the vector sum matrix and the subscript g denotes the number of inference steps.
7. The smart grid fault diagnosis method according to claim 1, wherein the step S4 includes the following sub-steps:
s41, respectively establishing a fault diagnosis model pi based on a memory pulse neurolemma system according to the topological structure and the protection pattern of the power grid aiming at each suspected fault element which is not subjected to the measurement tampering attackF(ii) a II fault diagnosis modelFII comprises a positive sequence voltage fault diagnosis modelFPNegative sequence voltage fault diagnosis model IIFNZero sequence voltage fault diagnosis model IIFZII model for diagnosing sum remote signaling quantity faultFB
S42, respectively carrying out normalization processing on the SCADA telemetering value of the suspected fault element and the historical telemetering values of different types of faults of the element to obtain an SCADA real-time fault voltage normalization value and an SCADA historical fault voltage normalization value;
s43, dividing the SCADA real-time fault voltage normalization value and the SCADA historical fault voltage normalization value into S sampling time points respectively, and inputting the SCADA real-time fault voltage normalization value of each sampling time point into the positive sequence voltage fault diagnosis model pi respectivelyFPNegative sequence voltage fault diagnosis model IIFNII model for diagnosing fault of sum zero sequence voltageFZIn the sensing neuron, a remote traffic pulse value related to the element is input into a remote traffic fault diagnosis model piFBIn the perception neuron, the normalized values of the SCADA historical fault voltage at each sampling time point are respectively input into a positive sequence voltage fault diagnosis model IIFPNegative sequence voltage fault diagnosis model IIFNII model for diagnosing fault of sum zero sequence voltageFZIn the memory neuron, a history fault remote communication quantity related to the element is inputted as a pulse value to a remote communication quantity fault diagnosis model IIFBIn the memory neurons of (a);
s44, carrying out fault diagnosis model pi on each suspected fault element through FDMA algorithmFSolving to obtain various fault diagnosis models piFThe pulse value and the memory tag value of the neuron are output;
s45, calculating each fault diagnosis model piFThe average value f of the pulse values corresponding to the memory tag valuezAnd f iszThe basic fault event represented by the memory label value corresponding to the maximum value is used as the fault diagnosis result of the suspected fault element, and the pulse value mean value f corresponding to the memory label valuezThe calculation formula of (2) is as follows:
Figure FDA0002454026170000061
wherein z represents the memory tag value of the output neuron, and the value is [0, c ]]The whole number of (a) to (b),
Figure FDA0002454026170000062
indicating positive sequence electricityPressure fault diagnosis model piFPThe corresponding pulse value when the memory label value of the middle output neuron is z,
Figure FDA0002454026170000063
negative sequence voltage fault diagnosis model IIFNThe corresponding pulse value when the memory label value of the middle output neuron is z,
Figure FDA0002454026170000064
zero sequence voltage fault diagnosis model IIFZThe corresponding pulse value when the memory label value of the middle output neuron is z,
Figure FDA0002454026170000065
II model for representing remote signalling quantity fault diagnosisFBThe corresponding pulse value when the memory tag value of the middle output neuron is 1,
Figure FDA0002454026170000066
II model for representing remote signalling quantity fault diagnosisFBAnd when the memory tag value of the middle output neuron is 2, the corresponding pulse value is obtained.
8. The smart grid fault diagnosis method according to claim 7, wherein the fault diagnosis model Π based on the memory pulse neurolemma system established in step S41FThe method specifically comprises the following steps:
ΠF=(O,σ1,...,σm,syn,in,out)
where O ═ { a } represents a set of nerve pulses, a represents a nerve pulse, σ represents a set of nerve pulses, and1,...,σmmodel pi for fault diagnosisFM neurons of (1), σi=(θiii,ri),i=1,2,...,m,θiThe pulse value of the ith neuron is represented by [0,1 ]]The real number of (c); lambda [ alpha ]iExpressing the ignition threshold value of the ith neuron, wherein the value of the ignition threshold value is any real number; tau isiThe memory tag value of the ith neuron is [0, c ]]C is an integer ofThe total number of the memory events; r isiIndicating the firing rule of the ith neuron, in the form of E/a(θ,τ)→a(β,τ)Wherein E ═ an,θ≥λiIs the firing condition, meaning if and only if the neuron σiReceiving at least n pulses and the neuron pulse value satisfies theta ≧ lambdaiThe firing rule can only be executed, at which time the neuron σiA pulse with potential value theta is consumed, a new pulse with potential value β is generated and transmitted backwards, and at the same time, the label value tau of the neuroniIs consumed and passes a new tag value tau backwardiOtherwise, the neuron does not execute ignition calculation, syn {1, 2.. multidot.m } × {1, 2.. multidot.m } represents directed synaptic connection relation between neurons, and in and out represent fault diagnosis models Π and Π respectivelyFA set of input neurons and a set of output neurons.
9. The smart grid fault diagnosis method according to claim 8, wherein the fault diagnosis model Π isFThe neurons in (1) comprise storage neurons for sensing or storing the pulse values and the memory event tag values from the environment and computation neurons for computing the pulse values and the memory event tag values;
the storage neurons comprise perception neurons, memory neurons and transmission neurons; the perception neuron is used for acquiring detection information from the environment, converting the detection information into real-time basic event characteristics and transmitting the real-time basic event characteristics backwards in the form of nerve pulse values; the memory neuron is used for storing memory basic event characteristics and corresponding memory tag values; the transmission neuron is used for transmitting a pulse value and a memory tag value transmitted by the pre-synaptic neuron to the post-synaptic neuron;
the calculating neurons comprise dis calculating neurons, max calculating neurons, min calculating neurons and rel calculating neurons; the dis calculation neuron is used for acquiring the matching degree between the current real-time basic fault feature and the historical fault feature by calculating the difference degree of pulse values of the perception neuron and the memory neuron; the max calculating neuron is used for carrying out logic OR calculation on the impulse value transmitted by the pre-synaptic neuron, namely taking the maximum impulse value of the pre-synaptic neuron as the impulse value of the current max calculating neuron to participate in subsequent calculation; the min calculation neuron is used for carrying out logic AND calculation on the pulse value transmitted by the pre-synaptic neuron, namely taking the minimum pulse value of the pre-synaptic neuron as the pulse value of the current min calculation neuron to participate in subsequent calculation; the rel computing neuron is used for carrying out global matching degree computation on pulse values transmitted by the pre-synaptic neurons, namely finding out the matching degree of the transmission neuron with the minimum number in the pre-synaptic neurons in the global state.
10. The smart grid fault diagnosis method according to claim 9, wherein the fault diagnosis model Π for each suspected fault element in step S44 is implemented through FDMA algorithmFThe specific method for solving is as follows:
b1, setting the inference step number g to be 0;
b2, performing ignition calculation on each storage neuron meeting the ignition condition, and updating according to the following formulag+1And vg+1
Figure FDA0002454026170000071
Figure FDA0002454026170000072
B3, performing ignition calculation on each calculation neuron meeting the ignition condition, and updating theta according to the following formulag+1And τg+1
Figure FDA0002454026170000073
Figure FDA0002454026170000074
B4, adding 1 to the inference step number g;
b5, judging whether the operation condition theta is metg≠01Org≠02If yes, returning to the step A2, otherwise, ending the FDMA algorithm, and outputting to obtain each fault diagnosis model IIFThe pulse value and the memory tag value of the neuron are output;
the vector, matrix and operator involved in the FDMA algorithm have the following meanings:
θ=(θ12,...,θp)Trepresenting a vector of pulse values of a storage neuron, where θiThe pulse value of the ith storage neuron is [0,1 ]]The real number above, i 1,2, p, p denotes the number of storage neurons; II in the fault diagnosis modelFIn the case where 1. ltoreq. i. ltoreq.s, θiFor the SCADA real-time fault voltage normalization value, when (s +1) is less than or equal to i and less than or equal to (s + s c), thetaiThe method comprises the steps that the historical fault voltage normalization values of SCADA of different fault types are obtained, c is the total number of memory events, and s is the total number of sampling time points;
=(1,2,...,q)Trepresenting a vector of calculated neuron pulse values, whereinjCalculating the impulse value of the neuron for the jth, and taking the value as [0,1 ]]The real number above, j 1,2,.., q, q represents the number of computational neurons;
τ=(τ12,...,τp)Trepresenting a vector of storage neuron tag values, where τiThe tag value for the ith storage neuron is set to [0, c]The above integer; II in the fault diagnosis modelFIn the case where 1. ltoreq. i.ltoreq.s, τiAll are 0, and when (s +1) ≦ i ≦ (s + s × c), τ isiTo remember the basic fault event type;
ν=(ν12,...,νq)Trepresenting a vector of computed neuron tag values, where vjCalculating the label value of the neuron for the jth, and taking the value as [0, c]The above integer;
D1=(dij)p×qis a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the dis-computing neuron, if the storage neuron is sigmaiTo dis meterCalculating neuron sigmajPresence of directional synaptic connection, then dij1, otherwise dij=0;
D2=(dij)p×qIs a p × q-order matrix representing the directional synaptic connection relationship from the storage neuron to the max computation neuron, if the storage neuron is sigmaiCalculating neuron sigma by maxjPresence of directional synaptic connection, then dij1, otherwise dij=0;
D3=(dij)p×qIs a matrix of p × q order, which represents the directional synaptic connection relationship from the storage neuron to the min computation neuron, if the storage neuron is sigmaiCalculating neuron sigma by minjPresence of directional synaptic connection, then dij1, otherwise dij=0;
D4=(dij)p×qIs a matrix of p × q order, which represents the directional synaptic connection relationship from the storage neuron to the rel computation neuron, if the storage neuron is sigmaiTo rel computing neuron sigmajPresence of directional synaptic connection, then dij1, otherwise dij=0;
E=(eji)q×pIs a q × order matrix representing the directional synaptic connection relationship from the computing neuron to the storage neuron, if the computing neuron is sigmajTo the storage neuron σiExistence of synaptic connection, then eji1, otherwise eji=0;
Δ represents dis calculation, and DTΔθ=(d1,d2,...,dq) Wherein d isj=|d1j×θ1-d2j×θ2...-dpj×θp|;
Denotes max calculation, and DT·θ=(d1,d2,...,dq) Wherein d isj=max(d1j×θ1,d2j×θ2,...,dpj×θp);
Figure FDA0002454026170000091
Represents min calculation, and
Figure FDA0002454026170000092
wherein d isj=min(d1j×θ1,d2j×θ2...,dpj×θp);
Figure FDA0002454026170000093
Represents rel calculation, and
Figure FDA0002454026170000094
wherein
Figure FDA0002454026170000095
Figure FDA0002454026170000096
θmaxRepresents the pulse value of the neuron, θ, located before the rel-computing neuron and after the max-computing neurondisRepresenting the pulse value of the neuron before the rel computing neuron and after the dis computing neuron, wherein rho is a memory resolution coefficient, and pi is a fault diagnosis modelFThe median value is 0.5;
Figure FDA0002454026170000097
represents a tag-fetching calculation, an
Figure FDA0002454026170000098
It is composed of
Figure FDA0002454026170000099
Figure FDA00024540261700000910
For tag-taking operations, if and only if
Figure FDA00024540261700000911
Each internal non-0 element is the sameWhen d is greater thanj=d1j×τ1Otherwise dj=0;
Figure FDA00024540261700000912
Wherein
Figure FDA00024540261700000913
If and only if
Figure FDA00024540261700000914
All internal non-0 elements being identical, ei=e1i×ν1Else, ei=0;
Figure FDA00024540261700000915
Represents a summation calculation, an
Figure FDA00024540261700000916
Wherein
Figure FDA00024540261700000917
The superscript T denotes the transpose of the vector sum matrix and the subscript g denotes the number of inference steps.
CN202010301121.5A 2020-04-16 2020-04-16 Intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack Active CN111413565B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010301121.5A CN111413565B (en) 2020-04-16 2020-04-16 Intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010301121.5A CN111413565B (en) 2020-04-16 2020-04-16 Intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack

Publications (2)

Publication Number Publication Date
CN111413565A true CN111413565A (en) 2020-07-14
CN111413565B CN111413565B (en) 2020-10-23

Family

ID=71489883

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010301121.5A Active CN111413565B (en) 2020-04-16 2020-04-16 Intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack

Country Status (1)

Country Link
CN (1) CN111413565B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112345858A (en) * 2020-11-03 2021-02-09 西华大学 Power grid fault diagnosis method for measuring false faults caused by tampering attack
CN112710914A (en) * 2020-12-16 2021-04-27 西华大学 Intelligent substation fault diagnosis method considering control center fault information tampering
CN112926752A (en) * 2021-01-26 2021-06-08 西华大学 Intelligent power transmission network fault line detection and fault recovery method considering energy storage system
CN113011731A (en) * 2021-03-16 2021-06-22 西华大学 Small-sized independent power system reliability evaluation method based on OSNPS system
CN113159113A (en) * 2021-03-09 2021-07-23 西华大学 Smart power grid fault diagnosis method capable of repairing remote measurement under information malicious tampering
CN113609912A (en) * 2021-07-08 2021-11-05 西华大学 Power transmission network fault diagnosis method based on multi-source information fusion

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102522743A (en) * 2011-11-08 2012-06-27 西安交通大学 Method for defending false-data injection attack in direct-current state estimation of electrical power system
CN103323045A (en) * 2012-03-23 2013-09-25 英飞凌科技奥地利有限公司 Method to detect tampering of data
CN103336222A (en) * 2013-06-06 2013-10-02 西南交通大学 Power system fault diagnosis method based on fuzzy reasoning pulse neurolemma system
CN105429133A (en) * 2015-12-07 2016-03-23 国网智能电网研究院 Information network attack-oriented vulnerability node evaluation method for power grid
CN106483425A (en) * 2016-09-27 2017-03-08 西华大学 The method for diagnosing faults of pulse nerve membranous system based on Triangular Fuzzy Number and device
CN107819785A (en) * 2017-11-28 2018-03-20 东南大学 A kind of double-deck defence method towards power system false data injection attacks
CN108199891A (en) * 2018-01-12 2018-06-22 东北大学 A kind of cps network attack discrimination methods based on artificial neural network multi-angle comprehensive decision
CN109508536A (en) * 2017-09-15 2019-03-22 华为技术有限公司 A kind of detection method and device alterring program stream attack
US20190113549A1 (en) * 2017-10-13 2019-04-18 Nec Laboratories America, Inc. Detection of false data injection attacks in power systems using multiplex invariant networks and domain knowledge
CN110166483A (en) * 2019-06-04 2019-08-23 南方电网科学研究院有限责任公司 Discrimination method, device and the equipment of a kind of electric network fault and network attack
CN110224889A (en) * 2019-06-11 2019-09-10 深圳供电局有限公司 A kind of ammeter business monitoring method based on service logic consistency
EP3557473A1 (en) * 2018-04-20 2019-10-23 Arm Ltd Dynamic response of power delivery network for attestation and identification

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102522743A (en) * 2011-11-08 2012-06-27 西安交通大学 Method for defending false-data injection attack in direct-current state estimation of electrical power system
CN103323045A (en) * 2012-03-23 2013-09-25 英飞凌科技奥地利有限公司 Method to detect tampering of data
CN103336222A (en) * 2013-06-06 2013-10-02 西南交通大学 Power system fault diagnosis method based on fuzzy reasoning pulse neurolemma system
CN105429133A (en) * 2015-12-07 2016-03-23 国网智能电网研究院 Information network attack-oriented vulnerability node evaluation method for power grid
CN106483425A (en) * 2016-09-27 2017-03-08 西华大学 The method for diagnosing faults of pulse nerve membranous system based on Triangular Fuzzy Number and device
CN109508536A (en) * 2017-09-15 2019-03-22 华为技术有限公司 A kind of detection method and device alterring program stream attack
US20190113549A1 (en) * 2017-10-13 2019-04-18 Nec Laboratories America, Inc. Detection of false data injection attacks in power systems using multiplex invariant networks and domain knowledge
CN107819785A (en) * 2017-11-28 2018-03-20 东南大学 A kind of double-deck defence method towards power system false data injection attacks
CN108199891A (en) * 2018-01-12 2018-06-22 东北大学 A kind of cps network attack discrimination methods based on artificial neural network multi-angle comprehensive decision
EP3557473A1 (en) * 2018-04-20 2019-10-23 Arm Ltd Dynamic response of power delivery network for attestation and identification
CN110166483A (en) * 2019-06-04 2019-08-23 南方电网科学研究院有限责任公司 Discrimination method, device and the equipment of a kind of electric network fault and network attack
CN110224889A (en) * 2019-06-11 2019-09-10 深圳供电局有限公司 A kind of ammeter business monitoring method based on service logic consistency

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
RUFAI KAZEEM IDOWU ET.AL: "The Prospects of Using Spiking Neural P System for Intrusion Detection", 《INTERNATIONAL JOURNAL OF INFORMATION & NETWORK SECURITY》 *
WEI LIU ET.AL: "A Fault Diagnosis Method for Power Transmission Networks Based on Spiking Neural P Systems with Self-Updating Rules considering Biological Apoptosis Mechanism", 《HINDAWI》 *
赵丽莉 等: "基于非线性状态估计的虚假数据注入攻击代价分析", 《电力系统保护与控制》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112345858A (en) * 2020-11-03 2021-02-09 西华大学 Power grid fault diagnosis method for measuring false faults caused by tampering attack
CN112345858B (en) * 2020-11-03 2021-06-01 西华大学 Power grid fault diagnosis method for measuring false faults caused by tampering attack
CN112710914A (en) * 2020-12-16 2021-04-27 西华大学 Intelligent substation fault diagnosis method considering control center fault information tampering
CN112926752A (en) * 2021-01-26 2021-06-08 西华大学 Intelligent power transmission network fault line detection and fault recovery method considering energy storage system
CN112926752B (en) * 2021-01-26 2022-07-01 西华大学 Intelligent power transmission network fault line detection and fault recovery method considering energy storage system
CN113159113A (en) * 2021-03-09 2021-07-23 西华大学 Smart power grid fault diagnosis method capable of repairing remote measurement under information malicious tampering
CN113159113B (en) * 2021-03-09 2022-07-01 西华大学 Smart power grid fault diagnosis method capable of repairing remote measurement under information malicious tampering
CN113011731A (en) * 2021-03-16 2021-06-22 西华大学 Small-sized independent power system reliability evaluation method based on OSNPS system
CN113609912A (en) * 2021-07-08 2021-11-05 西华大学 Power transmission network fault diagnosis method based on multi-source information fusion

Also Published As

Publication number Publication date
CN111413565B (en) 2020-10-23

Similar Documents

Publication Publication Date Title
CN111413565B (en) Intelligent power grid fault diagnosis method capable of identifying and measuring tampering attack
Xue et al. Detection of false data injection attacks in smart grid utilizing ELM-based OCON framework
Zhang et al. Data-based line trip fault prediction in power systems using LSTM networks and SVM
Wang et al. A novel fault diagnosis method of smart grids based on memory spiking neural P systems considering measurement tampering attacks
CN113206842B (en) Distributed safety state reconstruction method based on double-layer dynamic switching observer
CN111027058A (en) Method for detecting data attack in power system, computer equipment and storage medium
CN112345858B (en) Power grid fault diagnosis method for measuring false faults caused by tampering attack
Johansson et al. Detection of vessel anomalies-a Bayesian network approach
CN109633369B (en) Power grid fault diagnosis method based on multi-dimensional data similarity matching
CN112710914B (en) Intelligent substation fault diagnosis method considering control center fault information tampering
An et al. A data-driven method for transient stability margin prediction based on security region
CN116205265A (en) Power grid fault diagnosis method and device based on deep neural network
CN112926023B (en) Power transmission network fault diagnosis method based on P system considering meteorological factors
CN115378699A (en) Power grid state topology collaborative false data attack defense method
CN113256096B (en) Power grid fault diagnosis method considering false data injection attack
CN112926752B (en) Intelligent power transmission network fault line detection and fault recovery method considering energy storage system
CN114189047A (en) False data detection and correction method for active power distribution network state estimation
Wei et al. Intrusive detection systems design based on BP neural network
Xu et al. Study of fault diagnosis based on probabilistic neural network for turbine generator unit
Ullah et al. Measurable challenges in smart grid cybersecurity enhancement: A brief review
Deng et al. Fault diagnosis technology based on the fusion of neural network and fuzzy Logic
Yuanyuan et al. Artificial intelligence and learning techniques in intelligent fault diagnosis
Haobo et al. A Fault Diagnosis Method of Power Networks Including Information Attacks
Yu et al. Fault diagnosis of power systems using fuzzy reasoning spiking neural P systems with interval-valued fuzzy numbers
CN114113896B (en) Modularized multi-level converter type high-voltage direct-current transmission fault diagnosis method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant