CN113268729B - Smart grid attack positioning method based on convolutional neural network - Google Patents

Smart grid attack positioning method based on convolutional neural network Download PDF

Info

Publication number
CN113268729B
CN113268729B CN202110486649.9A CN202110486649A CN113268729B CN 113268729 B CN113268729 B CN 113268729B CN 202110486649 A CN202110486649 A CN 202110486649A CN 113268729 B CN113268729 B CN 113268729B
Authority
CN
China
Prior art keywords
data
representing
convolution
layer
measurement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110486649.9A
Other languages
Chinese (zh)
Other versions
CN113268729A (en
Inventor
吴争光
陆康迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qunzhi Future Artificial Intelligence Technology Research Institute Wuxi Co ltd
Original Assignee
Qunzhi Future Artificial Intelligence Technology Research Institute Wuxi Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qunzhi Future Artificial Intelligence Technology Research Institute Wuxi Co ltd filed Critical Qunzhi Future Artificial Intelligence Technology Research Institute Wuxi Co ltd
Priority to CN202110486649.9A priority Critical patent/CN113268729B/en
Publication of CN113268729A publication Critical patent/CN113268729A/en
Application granted granted Critical
Publication of CN113268729B publication Critical patent/CN113268729B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/243Classification techniques relating to the number of classes
    • G06F18/2431Multiple classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/048Activation functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • General Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Molecular Biology (AREA)
  • Computational Linguistics (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Water Supply & Treatment (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Public Health (AREA)
  • General Business, Economics & Management (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Image Analysis (AREA)

Abstract

The invention discloses a smart grid attack positioning method based on a convolutional neural network, which comprises the steps of firstly acquiring measurement data based on a nonlinear measurement equation of a smart grid under an alternating current model, transmitting the data to a bad data detection device for data preprocessing and removing bad data, and taking the preprocessed measurement data as a training sample; then, describing the attack positioning problem of the intelligent power grid as a multi-label classification problem, and extracting the intrinsic high-dimensional characteristics of the measured data under the communication model by adopting a convolutional neural network; finally, the trained convolutional neural network is used as a multi-label classifier, and the multi-label classifier is embedded into a bad data detection device to realize real-time online attack positioning. The invention can realize attack positioning of the intelligent power grid and has the following advantages which are not possessed by the prior art: the method and the device can acquire the nonlinear characteristics of the intelligent power grid more accurately, not only can detect the power grid attack, but also can acquire higher attack positioning accuracy and higher detection efficiency.

Description

Smart grid attack positioning method based on convolutional neural network
Technical Field
The invention particularly relates to a smart grid attack positioning method based on a convolutional neural network, and belongs to the technical field of power system attack positioning.
Background
With the progress of network communication technology, the reliability of the operation of the smart grid is remarkably enhanced, but due to the dependence on data communication, the smart grid is easy to suffer from various malignant network attacks, and especially the hidden network attacks can avoid the traditional bad data detection device, and error data is injected into the power grid system so as to destroy the normal and stable operation of the power grid. However, most methods only consider the detection of a hidden attack and do not consider the localization of the attack. Therefore, in order to timely remove the attack and ensure the stable and safe operation of the system, how to quickly and accurately locate the attack of the smart grid is becoming more and more important in academia and industry.
Currently, the main stream technology of the smart grid attack positioning method mainly comprises the following steps: (1) Based on traditional machine learning and deep learning, the intelligent power grid attack positioning under the direct current model obtains good detection effect, but the direct current model-based method has larger deviation when the actual power grid is applied in consideration of the fact that the actual power grid has complex nonlinear characteristics, so that the detection precision is greatly reduced; (2) The attack positioning method based on the Kalman filter bank depends on a power grid model, and has the defects of use on the premise of detecting attack, insufficient anti-interference capability and the like.
Compared with the traditional neural network, the convolutional neural network can extract the inherent nonlinear characteristics from the data, has been successfully applied to the classification problem of images and voices, but has few applications in the attack positioning problem of smart grid under an alternating current model. The smart grid attack localization problem can be essentially converted into a typical multi-tag classification problem. However, in the prior art, the problem of smart grid attack positioning under the alternating current model is rarely researched and developed from the perspective of multi-label classification.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a smart grid attack positioning method based on a convolutional neural network, which is simpler to implement without depending on model precision compared with positioning methods based on a grid model and the like.
The aim of the invention is realized by the following technical scheme: a smart grid attack positioning method based on a convolutional neural network comprises the following steps:
step 1: collecting network characteristic parameters of a smart grid, including a power grid topological structure, line parameters and power loads, and obtaining measurement data according to a nonlinear measurement equation of the smart grid, wherein the measurement data comprises a voltage phase angle and a voltage amplitude of a reference node, an injected active power and an injected reactive power of each node, and an active power and a reactive power of each branch, wherein the measurement data Z is normal o And measurement data Z subject to attack a The specific description is as follows:
Z o =h(x o )+ω (1)
Z a =Z+h(x a )-h(x o ) (2)
wherein h represents a nonlinear measurement equation, i.e., a functional relationship between system state and measurement truth, x o Representing the system state includes the true values of the voltage amplitude and voltage phase angle of all nodes of the system, x a Representing system state values under attack, x representing x o Or x a ,V k And theta k Respectively representing the voltage amplitude and the voltage phase angle of the node k, V m And theta m Respectively representing the voltage amplitude and the voltage phase angle of the node m, P k And Q k Respectively represent the injected active power and reactive power of the node k, P km And Q km Representing the active power and the reactive power of the line between the node k and the node M respectively, M representing the set of the node M, g km And b km Representing the conductance and susceptance, delta, between nodes k and m, respectively km =θ km Representing the phase angle difference between node k and node m, ω observe noise.
Step 2: data preprocessing, let d= [ Z ] o ,Z a ]The measurement data obtained in the step (1) are stored in D, then the data set D is transmitted to a smart grid bad data detection device, and the ith group of data D in the D is calculated according to the formula (4) i Residual R of (2) i I=1, 2, …, N represents the number of data groups, and the detection bad data threshold parameter λ is set and judged, if R i >Lambda, reject D i The method comprises the steps of carrying out a first treatment on the surface of the If R is i Less than or equal to lambda, D i Storing into a set T;
wherein,,representing the measured data D i And calculating the obtained system state estimated value.
Step 3: describing the smart grid attack positioning problem as a multi-label classification problem, and defining the characteristics (namely measurement data) of a training set asWhere j=1, 2, …, n represents the j-th measurement, n represents the feature number; define training set label (i.e. the category to which the measurement belongs) as +.>Wherein->A class of the j-th measurement representing the i-th group of data, if the j-th measurement is attacked, record +.>Otherwise, record->Defining the classification result of the multi-label classifier asWherein->Classification result of the j-th measurement representing the i-th group of data,/and/or>Or->If it isThen the j-th measurement representing the i-th set of data is attacked; if->Then the j-th measurement of the i-th set of data is not attacked;
step 4: the method comprises the following specific substeps of extracting intrinsic high-dimensional characteristics of measured data by adopting a Convolutional Neural Network (CNN), taking the CNN as a multi-label classifier:
(4.1) acquiring a layer 1 feature map based on the input data T according to formula (5):
c 1,u =ReLU(T*f 1,u +b 1,u ) (5)
wherein c 1,u A ith feature map representing layer 1 convolution, f 1,j A u-th convolution kernel representing a layer 1 convolution, b 1,u The u-th offset, representing the layer 1 convolution, represents the convolution operation, and ReLU represents the activation function, expressed specifically as:
(4.2) inputting implicit features generated by convolution in the (q-1) th convolution layer to the (q) th convolution layer according to a formula (7) to obtain a (q) th layer feature map;
c q,v =ReLU(c q-1,v *f q,v +b q,v ) (7)
wherein c q,v And c q-1,v Respectively represent the (th) and (th) -1 th convolution layers (v) th convolution kernels, f q,v A v-th convolution kernel representing a q-th layer convolution, b q,v A v-th offset representing a q-th layer convolution, q being an integer greater than 2;
(4.3) let q=q+1, repeat step (4.2) until q>q max Output the (q) max Feature mapping of convolutional layers, where q max Indicating the maximum number of convolution layers;
(4.4) inputting the q-th according to the formula (8) max Pooling is carried out on the feature mapping of the convolution layer;
wherein, maxpool β,γ Representing the use of beta x gamma region pairsAnd (5) taking the maximum value.
(4.5) mapping c the features extracted by the pooling layer according to equation (9) p Corresponding output characteristics are obtained through flattening layer operation;
c F =ReLU(w F *c p +b F ) (9)
wherein c F Feature map representing flattened layers, w F Representing weights of the flattened layers, b F Indicating the bias of the flattened layer.
(4.6) transmitting the output characteristics of the flattening layer as input characteristics to the fully connected layer according to the formula (10) to obtain a final classification result:
wherein w is D And b D Respectively representing the weight and bias of the fully connected layer, and sigmoid represents an activation function, which is specifically expressed as follows:
step 5: training CNN according to a small batch gradient descent method, taking a minimized cross entropy loss function as an optimization target, determining optimal learning parameters of CNN,
wherein s= { i 1 ,i 2 ,…,i E -representing a data set selected for each small lot, E representing the number of sets of data;
step 6: after the trained CNN is embedded into the intelligent power grid bad data detection device, real-time online attack positioning is realized, and extraction is performedAll the corresponding measurements are the attacked positions.
The invention has the following effective effects:
1. compared with attack positioning of the intelligent power grid based on a direct current model, the intelligent power grid attack positioning method based on the convolutional neural network can more accurately represent nonlinear characteristics of an actual intelligent power grid, and achieves higher attack positioning accuracy and higher detection efficiency.
2. Compared with a method based on a model, the smart grid attack positioning method based on the convolutional neural network is simpler and more efficient to implement, can detect whether the smart grid is attacked or not, can position the attack, and does not depend on the model.
Drawings
FIG. 1 is a block diagram of an IEEE-118 node power grid system in accordance with an embodiment of the present invention;
fig. 2 is a schematic diagram of functional modules of a smart grid attack positioning method;
fig. 3 is a CNN architecture diagram for smart grid attack localization under an ac model.
Detailed Description
The objects and effects of the present invention will become more apparent from the following description of the present invention when taken in conjunction with the accompanying drawings.
Example 1:
fig. 1 is a block diagram of an IEEE 118 node grid system. Taking the system as an example, the state estimation method provided by the invention is adopted for implementation;
FIG. 2 is a schematic diagram of a smart grid attack localization method based on convolutional neural networks;
fig. 3 is a CNN architecture diagram for smart grid attack localization under an ac model;
a smart grid attack positioning method based on a convolutional neural network comprises the following steps:
step 1: collecting network characteristic parameters of the intelligent power grid, including a power grid topological structure, line parameters and power loads, and obtaining measurement data according to a nonlinear measurement equation of the intelligent power grid, wherein the measurement data comprise voltage phase angles and voltage amplitude values of reference nodes, injected active power and reactive power of each node, and the parameters comprise the voltage phase angles and the voltage amplitude values of the reference nodesActive and reactive power of branch, wherein data Z is measured normally o And measurement data Z subject to attack a The specific description is as follows:
Z o =h(x o )+ω (1)
Z a =Z+h(x a )-h(x o ) (2)
wherein h represents a nonlinear measurement equation, i.e., a functional relationship between system state and measurement truth, x o Representing the system state includes the true values of the voltage amplitude and voltage phase angle of all nodes of the system, x a Representing system state values under attack, x representing x o Or x a ,V k And theta k Respectively representing the voltage amplitude and the voltage phase angle of the node k, V m And theta m Respectively representing the voltage amplitude and the voltage phase angle of the node m, P k And Q k Respectively represent the injected active power and reactive power of the node k, P km And Q km Representing the active power and the reactive power of the line between the node k and the node M respectively, M representing the set of the node M, g km And b km Representing the conductance and susceptance, delta, between nodes k and m, respectively km =θ km Representing the phase angle difference between node k and node m, ω observe noise.
Step 2: data preprocessing, let d= [ Z ] o ,Z a ]The measurement data obtained in the step (1) are stored in D, then the data set D is transmitted to a smart grid bad data detection device, and the ith group of data D in the D is calculated according to the formula (4) i Residual R of (2) i I=1, 2, …, N represents the number of data groups, and the detection bad data threshold parameter λ=10 is set and judged, if R i >Lambda, reject D i The method comprises the steps of carrying out a first treatment on the surface of the If R is i Less than or equal to lambda, D i Storing into a set T;
wherein,,representing the measured data D i And calculating the obtained state estimation value.
Step 3: describing the smart grid attack positioning problem as a multi-label classification problem, and defining the characteristics (namely measurement data) of a training set asWhere j=1, 2, …, n represents the j-th measurement, n represents the feature number; define training set label (i.e. the category to which the measurement belongs) as +.>Wherein->A class of the j-th measurement representing the i-th group of data, if the j-th measurement is attacked, record +.>Otherwise, record->Defining the classification result of the multi-label classifier asWherein->Classification result of the j-th measurement representing the i-th group of data,/and/or>Or->If it isThen the j-th measurement representing the i-th set of data is attacked; if->Then the j-th measurement of the i-th set of data is not attacked;
step 4: the method comprises the following specific substeps of extracting intrinsic high-dimensional characteristics of measured data by adopting a Convolutional Neural Network (CNN), taking the CNN as a multi-label classifier:
(4.1) acquiring a layer 1 feature map based on the input data T according to formula (5):
c 1,u =ReLU(T*f 1,u +b 1,u ) (5)
wherein c 1,u A ith feature map representing layer 1 convolution, f 1,j A u-th convolution kernel representing a layer 1 convolution, b 1,u The u-th offset, representing the layer 1 convolution, represents the convolution operation, and ReLU represents the activation function, expressed specifically as:
(4.2) inputting implicit features generated by convolution in the (q-1) th convolution layer to the (q) th convolution layer according to a formula (7) to obtain a (q) th layer feature map;
c q,v =ReLU(c q-1,v *f q,v +b q,v ) (7)
wherein c q,v And c q-1,v Respectively represent the (th) and (th) -1 th convolution layers (v) th convolution kernels, f q,v A v-th convolution kernel representing a q-th layer convolution, b q,v A v-th offset representing a q-th layer convolution, q being an integer greater than 2;
(4.3) let q=q+1, repeat step (4.2) until q>q max Output the (q) max Feature mapping of convolutional layers, where q max =5 represents the maximum number of convolution layers;
(4.4) inputting the characteristic mapping of the 5 th layer to carry out pooling operation according to the formula (8);
wherein, maxpool β,γ The use of the β×γ region is represented where β×γ=2×1, forAnd (5) taking the maximum value.
(4.5) mapping c the features extracted by the pooling layer according to equation (9) p Corresponding output characteristics are obtained through flattening layer operation;
c F =ReLU(w F *c p +b F ) (9)
wherein c F Feature map representing flattened layers, w F Representing weights of the flattened layers, b F Indicating the bias of the flattened layer.
(4.6) transmitting the output characteristics of the flattening layer as input characteristics to the fully connected layer according to the formula (10) to obtain a final classification result:
wherein w is D And b D Respectively representing the weight and bias of the fully connected layer, and sigmoid represents an activation function, which is specifically expressed as follows:
step 5: training CNN according to a small batch gradient descent method, taking a minimized cross entropy loss function as an optimization target, and determining optimal learning parameters of CNN;
wherein s= { i 1 ,i 2 ,…,i E Each time batch is selectedA data set is taken, and e=100 represents the number of groups of data;
step 6: after the trained CNN is embedded into the intelligent power grid bad data detection device, real-time online attack positioning is realized, and extraction is performedAll the corresponding measurements are the attacked positions.
Table 1 shows the comparison of the results of the attack detection rate and the attack positioning accuracy rate of the smart grid using the feedback neural network method and the method according to the embodiment of the invention. As can be seen from Table 1, the method of the present invention achieves higher attack detection rate and attack localization accuracy than the feedback neural network method. By analyzing the operation experimental result of the intelligent power grid by adopting the technology, the invention can find that: the method can obtain higher attack detection rate and attack positioning accuracy than the feedback neural network method, verifies that the method has higher accuracy for intelligent power grid attack positioning, and can better meet the requirements of power grid safety control and stable operation.
Table 1: attack detection rate and attack positioning accuracy rate comparison
Method Attack detection rate Attack location accuracy
Feedback neural network method 89% 73.3%
The positioning method of the invention 96% 91.4%
In summary, the effective effects of the invention are as follows: the invention can realize the positioning of the attack of the intelligent power grid and has the following advantages which are not possessed by the prior art: the method can detect the power grid attack, can perform attack positioning on the power grid on line in real time, has higher positioning accuracy and higher positioning efficiency, does not depend on a model, and ensures the safety control and stable operation of the power grid.

Claims (3)

1. The smart grid attack positioning method based on the convolutional neural network is characterized by comprising the following steps of:
step 1: collecting network characteristic parameters of the intelligent power grid;
step 2: preprocessing data;
step 3: describing the smart grid attack positioning problem as a multi-label classification problem;
step 4: extracting intrinsic high-dimensional characteristics of the measured data by adopting a Convolutional Neural Network (CNN), and taking the CNN as a multi-label classifier;
step 5: training CNN according to a small batch gradient descent method, taking a minimized cross entropy loss function as an optimization target, and determining optimal learning parameters of CNN;
step 6: after the trained CNN is embedded into the intelligent power grid bad data detection device, real-time online attack positioning is realized, and extraction is performedAll the corresponding measurements are the attacked positions;
step 1: network characteristic parameters of the intelligent power grid are collected, and the network characteristic parameters are specifically as follows:
the method comprises the steps of obtaining measurement data according to a nonlinear measurement equation of a smart grid, wherein the measurement data comprise voltage phase angles and voltage amplitudes of reference nodes, injected active power and reactive power of each node, and each branchActive and reactive power of (1), wherein the data Z is measured normally o And measurement data Z subject to attack a The specific description is as follows:
Z o =h(x o )+ω (1)
Z a =Z+h(x a )-h(x o ) (2)
wherein h represents a nonlinear measurement equation, i.e., a functional relationship between system state and measurement truth, x o Representing the system state includes the true values of the voltage amplitude and voltage phase angle of all nodes of the system, x a Representing system state values under attack, x representing x o Or x a ,V k And theta k Respectively representing the voltage amplitude and the voltage phase angle of the node k, V m And theta m Respectively representing the voltage amplitude and the voltage phase angle of the node m, P k And Q k Respectively represent the injected active power and reactive power of the node k, P km And Q km Representing the active power and the reactive power of the line between the node k and the node M respectively, M representing the set of the node M, g km And b km Representing the conductance and susceptance, delta, between nodes k and m, respectively km =θ km Representing the phase angle difference between node k and node m, ω observing noise;
the step 2 data preprocessing is specifically as follows, let d= [ Z o ,Z a ]The measurement data obtained in the step 1 are stored in D, the data set D is transmitted to a bad data detection device of the smart grid, and the ith group of data D in the D is calculated according to the formula (4) i Residual R of (2) i I=1, 2, …, N represents the number of data groups, and the detection bad data threshold parameter λ is set and judged, if R i >Lambda, reject D i The method comprises the steps of carrying out a first treatment on the surface of the If R is i Less than or equal to lambda, D i Storing into a set T;
wherein,,representing the measured data D i Calculating the obtained system state estimated value;
step 3 describes the smart grid attack positioning problem as a multi-label classification problem, and specifically includes defining training set characteristics, namely measurement data as T i =(T i 1 ,...,T i j ,...,T i n ) Where j=1, 2, …, n represents the j-th measurement, n represents the feature number; defining training set labels, i.e. measuring belonging categories asWherein->A class of the j-th measurement representing the i-th group of data, if the j-th measurement is attacked, record +.>Otherwise, record->Defining the result of the multi-label classifier classification as +.>Wherein->Classification result of the j-th measurement representing the i-th group of data,/and/or>Or alternativelyIf->Then the j-th measurement representing the i-th set of data is attacked; if->Then the j-th measurement of the i-th set of data is not attacked;
the step 4 adopts a Convolutional Neural Network (CNN) to extract the intrinsic high-dimensional characteristics of the measured data, and takes the CNN as a multi-label classifier, and the specific substeps are as follows:
(4.1) acquiring a layer 1 feature map based on the input data T according to formula (5):
c 1,u =ReLU(T*f 1,u +b 1,u ) (5)
wherein c 1,u A ith feature map representing layer 1 convolution, f 1,j A u-th convolution kernel representing a layer 1 convolution, b 1,u The u-th offset, representing the layer 1 convolution, represents the convolution operation, and ReLU represents the activation function, expressed specifically as:
(4.2) inputting implicit features generated by convolution in the (q-1) th convolution layer to the (q) th convolution layer according to a formula (7) to obtain a (q) th layer feature map;
c q,v =ReLU(c q-1,v *f q,v +b q,v ) (7)
wherein c q,v And c q-1,v Respectively represent the (th) and (th) -1 th convolution layers (v) th convolution kernels, f q,v A v-th convolution kernel representing a q-th layer convolution, b q,v A v-th offset representing a q-th layer convolution, q being an integer greater than 2;
(4.3) let q=q+1, repeat step (4.2) until q>q max Output the (q) max Feature mapping of convolutional layers, where q max Indicating the maximum number of convolution layers;
(4.4) inputting the q-th according to the formula (8) max Pooling is carried out on the feature mapping of the convolution layer;
wherein, maxpool β,γ Representing the use of beta x gamma region pairsTaking the maximum value;
(4.5) mapping c the features extracted by the pooling layer according to equation (9) p By flattening the layer operation, corresponding output features are obtained,
c F =ReLU(w F *c p +b F ) (9)
wherein c F Feature map representing flattened layers, w F Representing weights of the flattened layers, b F Indicating the offset of the flattened layer,
(4.6) transmitting the output characteristics of the flattening layer as input characteristics to the fully connected layer according to the formula (10) to obtain a final classification result:
wherein w is D And b D Respectively representing the weight and bias of the fully connected layer, and sigmoid represents an activation function, which is specifically expressed as follows:
2. the smart grid attack localization method based on convolutional neural network according to claim 1, wherein step 5 trains CNN according to a small batch gradient descent method, takes minimizing cross entropy loss function as an optimization target, determines an optimal learning parameter of CNN,
wherein s= { i 1 ,i 2 ,…,i E The data set selected for each small lot is denoted, and E denotes the number of sets of data.
3. The smart grid attack location method based on convolutional neural network according to claim 1, wherein the step 6 is implemented by embedding the trained CNN into a smart grid bad data detection device, and extractingAll the corresponding measurements are the attacked positions.
CN202110486649.9A 2021-05-01 2021-05-01 Smart grid attack positioning method based on convolutional neural network Active CN113268729B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110486649.9A CN113268729B (en) 2021-05-01 2021-05-01 Smart grid attack positioning method based on convolutional neural network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110486649.9A CN113268729B (en) 2021-05-01 2021-05-01 Smart grid attack positioning method based on convolutional neural network

Publications (2)

Publication Number Publication Date
CN113268729A CN113268729A (en) 2021-08-17
CN113268729B true CN113268729B (en) 2023-07-28

Family

ID=77229968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110486649.9A Active CN113268729B (en) 2021-05-01 2021-05-01 Smart grid attack positioning method based on convolutional neural network

Country Status (1)

Country Link
CN (1) CN113268729B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110826888A (en) * 2019-10-29 2020-02-21 西安交通大学 Data integrity attack detection method in power system dynamic state estimation
CN111092897A (en) * 2019-12-23 2020-05-01 深圳供电局有限公司 Active immune attack recognition method and charging device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9904893B2 (en) * 2013-04-02 2018-02-27 Patternex, Inc. Method and system for training a big data machine to defend
CN107016236B (en) * 2017-03-23 2021-04-20 新疆电力建设调试所 Power grid false data injection attack detection method based on nonlinear measurement equation
CN109165504B (en) * 2018-08-27 2021-05-07 广西大学 Power system false data attack identification method based on anti-generation network
CN110719275B (en) * 2019-09-30 2021-04-02 南方电网科学研究院有限责任公司 Method for detecting power terminal vulnerability attack based on message characteristics
CN111353153B (en) * 2020-03-04 2022-11-01 南京邮电大学 GEP-CNN-based power grid malicious data injection detection method
CN112565187B (en) * 2020-11-03 2023-05-09 特变电工新疆新能源股份有限公司 Power grid attack detection method, system, equipment and medium based on logistic regression

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110826888A (en) * 2019-10-29 2020-02-21 西安交通大学 Data integrity attack detection method in power system dynamic state estimation
CN111092897A (en) * 2019-12-23 2020-05-01 深圳供电局有限公司 Active immune attack recognition method and charging device

Also Published As

Publication number Publication date
CN113268729A (en) 2021-08-17

Similar Documents

Publication Publication Date Title
Chen et al. Graph convolutional network-based method for fault diagnosis using a hybrid of measurement and prior knowledge
CN109165504B (en) Power system false data attack identification method based on anti-generation network
CN110659693B (en) K-nearest neighbor classification-based power distribution network rapid topology identification method, system and medium
CN108108877A (en) A kind of transmission line of electricity damage to crops caused by thunder methods of risk assessment based on BP neural network
CN109145516B (en) Analog circuit fault identification method based on improved extreme learning machine
CN108435819B (en) Energy consumption abnormity detection method for aluminum profile extruder
CN108090628A (en) A kind of grain feelings security detection and analysis method based on PSO-LSSVM algorithms
CN112327104B (en) Fault detection and positioning method for power distribution network with distributed power supply
CN114638256B (en) Transformer fault detection method and system based on acoustic wave signals and attention network
CN113496440B (en) User abnormal electricity consumption detection method and system
Xu et al. Oversmoothing relief graph convolutional network-based fault diagnosis method with application to the rectifier of high-speed trains
CN111582406A (en) Power equipment state monitoring data clustering method and system
CN117151657A (en) Plastic packaging material management method and system
CN113514743B (en) Method for constructing GIS partial discharge pattern recognition system based on multidimensional features
CN113780432B (en) Intelligent detection method for operation and maintenance abnormity of network information system based on reinforcement learning
CN114330486A (en) Power system bad data identification method based on improved Wasserstein GAN
CN113268729B (en) Smart grid attack positioning method based on convolutional neural network
CN116258972A (en) Deep learning-based rock high-steep slope structural surface extraction method
CN116316629A (en) Data-driven optimal power flow calculation method considering topology feature learning
CN114692729A (en) New energy station bad data identification and correction method based on deep learning
CN114821187A (en) Image anomaly detection and positioning method and system based on discriminant learning
CN109506936B (en) Bearing fault degree identification method based on flow chart and non-naive Bayes inference
CN116340833B (en) Fault diagnosis method based on countermeasure migration network in improved field
CN114021433B (en) Construction method and application of dominant instability mode identification model of power system
CN118035952B (en) Table box identification method and system based on kirchhoff law regression model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant