CN113904786B - False data injection attack identification method based on line topology analysis and tide characteristics - Google Patents

False data injection attack identification method based on line topology analysis and tide characteristics Download PDF

Info

Publication number
CN113904786B
CN113904786B CN202110729263.6A CN202110729263A CN113904786B CN 113904786 B CN113904786 B CN 113904786B CN 202110729263 A CN202110729263 A CN 202110729263A CN 113904786 B CN113904786 B CN 113904786B
Authority
CN
China
Prior art keywords
data
graph
line
node
power system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110729263.6A
Other languages
Chinese (zh)
Other versions
CN113904786A (en
Inventor
任洲洋
王文钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University
Original Assignee
Chongqing University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University filed Critical Chongqing University
Priority to CN202110729263.6A priority Critical patent/CN113904786B/en
Publication of CN113904786A publication Critical patent/CN113904786A/en
Application granted granted Critical
Publication of CN113904786B publication Critical patent/CN113904786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J3/00Circuit arrangements for ac mains or ac distribution networks
    • H02J3/04Circuit arrangements for ac mains or ac distribution networks for connecting networks of the same frequency but supplied from different sources
    • H02J3/06Controlling transfer of power between connected networks; Controlling sharing of load between connected networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J2203/00Indexing scheme relating to details of circuit arrangements for AC mains or AC distribution networks
    • H02J2203/10Power transmission or distribution systems management focussing at grid-level, e.g. load flow analysis, node profile computation, meshed network optimisation, active network management or spinning reserve management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Biophysics (AREA)
  • Molecular Biology (AREA)
  • Biomedical Technology (AREA)
  • Computational Linguistics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Power Engineering (AREA)
  • Supply And Distribution Of Alternating Current (AREA)

Abstract

The invention discloses a false data injection attack identification method based on line topology analysis and tide characteristics, which comprises the following steps: 1) Acquiring historical power flow data and an original topological structure of a power system; 2) Obtaining a power system conversion topological structure; 3) Injecting a plurality of attack data into the historical trend data to obtain trend sample data with false data; 4) Extracting a tide characteristic value of tide sample data, and marking whether attack data exist or not; 5) Based on the tidal current characteristic value of the tidal current sample data, establishing a graph convolution network model for judging whether the power system is attacked; 6) Acquiring current power flow data of the power system, and extracting a power flow characteristic value of the current power flow data; and inputting the current characteristic value of the current power flow data into the graph rolling network model, and judging whether the power system line is attacked or not and the position of the attacked line. The invention utilizes the graph attention mechanism neural network to realize the determination of the false data attack position.

Description

False data injection attack identification method based on line topology analysis and tide characteristics
Technical Field
The invention relates to the field of network information security of power systems, in particular to a false data injection attack identification method based on line topology analysis and tide characteristics.
Background
With the development of industry 4.0, more and more industries gradually realize the intellectualization of the industry by fusing more informatization technologies. The power system is the largest manual system in the world, is also an industrial system integrating information technology and automation technology earlier, and forms a power information physical system integrating real-time sensing, dynamic control and information decision. However, the construction of this system has a new impact on the vulnerability of the grid. In the information interaction process, an attacker destroys the network information security of the power system through means such as replay attack, false data injection attack (False Data Injection Attacks, FDIAs) and the like, so that a control center misuses the system to still normally operate, misleads the control center to make a wrong decision, and causes the primary equipment in the system to be out of operation or a key line to be disconnected to cause interactive linkage faults. Therefore, detecting and identifying the FDIAs in the power system is important to ensure safe and stable operation of the power system.
In the existing research method, system data under a single time section is generally considered, and FDIAs detection is carried out by combining spatial characteristics of the data. However, the false data constructed by an attacker generally accords with the operation rule of the power system, and efficient detection of FDIAs is difficult to achieve by only considering the spatial characteristics of the data under continuous time sections. When false data injection attacks are identified, the existing method is generally based on a traditional topological structure, namely a primary device is taken as a node, a transmission line is taken as an edge to form a topological structure of a power system, and an attacker can realize the attack of the false data by tampering line measurement data, so that the structure is difficult to realize the accurate positioning of the attack position.
Disclosure of Invention
The invention aims to provide a false data injection attack identification method based on line topology analysis and tide characteristics, which comprises the following steps:
1) And acquiring historical power flow data and an original topological structure of the power system.
2) And converting the original topological structure of the power system to obtain a conversion topological structure of the power system.
The steps for establishing the conversion topological structure diagram are as follows:
2.1 Establishing an adjacency matrix a for characterizing the original topology of the power system G The method comprises the following steps:
based on the concept of complex network theory and graph theory, for a topology structure diagram with N nodes and M edges, a node adjacency matrix A with N x N can be used G Representing a graph network structure in which element a in the matrix ij Represented as
A G =[a ij ] N×N
Figure GDA0004166163000000021
Wherein a is ij Representing node adjacency matrix A G Is a component of the group. v i 、v j Representing the ith and jth nodes of the graph network.
2.2 Extracting node adjacency matrix A G The number of adjacent nodes of each node in the array, and writing the adjacent nodes into a cell array A cell Is a kind of medium.
2.3 Determining adjacent lines of lines in a traditional topological graph of the power system and constructing a cell array E based on a line topological structure cell
2.4 Using the lines as nodes of the topological structure diagram, searching adjacent lines of each line, thereby establishing a line adjacent matrix A G ’。
2.5 According to the line adjacency matrix A) G And', establishing a power system conversion topological structure taking the lines as nodes and the connection relationship between the lines as edges.
3) And injecting a plurality of attack data into the historical trend data to obtain trend sample data with false data.
Attack data a is as follows:
a=Hc (2)
wherein c= [ c ] 1 ,c 2 ,...,c n ] T Is an arbitrary non-zero vector. c E R n×1 . n is the number of states. H is a jacobian matrix characterizing the topology of the power system. .
4) And extracting a tide characteristic value of the tide sample data, and labeling whether attack data exist on the tide characteristic value.
The tidal current characteristic value comprises an electrical betweenness and a tidal current offset coefficient index.
The electrical medium number B e (m, n) is as follows:
Figure GDA0004166163000000022
wherein L and G are respectively the collection of load nodes and power generation nodes in the power grid. W (W) i And W is j Representing the active power and node load values of the generator output, respectively. I ij (m, n) represents the electricity between the lines (m, n) after the unit current source is connected between the power source node i and the load node jFlow variation.
Tidal current offset coefficient index M i The following is shown:
Figure GDA0004166163000000023
wherein P is i0 And P j0 The initial active power of line i and line j are shown, respectively. L is the set of all transmission lines in the power grid. ΔP ji Is the amount of change in active power of line j due to line i opening.
The characteristic value of the tide is the preprocessed data. The preprocessing includes z-score normalization of the data. The normalized x' data is shown below:
Figure GDA0004166163000000031
wherein x is μ And x σ The sample mean and standard deviation, respectively. x represents the data before preprocessing.
5) And establishing a graph convolution network model for judging whether the power system is attacked or not based on the tidal current characteristic value of the tidal current sample data.
The step of establishing a graph roll-up network model for determining whether the power system is attacked includes:
5.1 Randomly dividing the tidal current characteristic values of the tidal current sample data into a test set and a training set.
5.2 A graph rolling network is built. The graph roll-up network model comprises an input layer, a plurality of hidden layers and an output layer.
5.3 Training the graph rolling network by using the training set to obtain the trained graph rolling network.
5.4 Testing the trained graph rolling network by using the test set, if the accuracy rate of the output result of the graph rolling network is greater than a preset threshold value, completing the establishment of a graph rolling network model, otherwise, re-acquiring the tidal current sample data and the tidal current characteristic value, and returning to the step 1).
The feature learning relationship between the feature values of any two layers of nodes of the graph-convolution network model is as follows:
Figure GDA0004166163000000032
where l represents the number of layers in which the node is located. s represents node v i Is defined, the number of adjacent nodes of (a).
Figure GDA0004166163000000033
Representing the eigenvalues of the ni-th node in the first layer. ni is the number of the neighbor node of node i. g% · ) Representing an activation function.
Figure GDA0004166163000000034
Is a network weight.
Figure GDA0004166163000000035
Is the eigenvalue of node i at layer l+1.
The output characteristics h' of the graph roll-up network model are as follows:
Figure GDA0004166163000000036
wherein alpha is ij For the attention factor, W is a shareable network parameter.
Acquisition of attention coefficient alpha ij The method comprises the following steps:
a) Recording M-dimensional characteristic input set of all line nodes in power system conversion topological structure as
Figure GDA0004166163000000037
The output feature set is +.>
Figure GDA0004166163000000038
b) Calculating the degree of interaction e between the line nodes ij The method comprises the following steps:
Figure GDA0004166163000000041
where W is a sharable parameter. [ · || · ]Representing stitching. Shared attention mechanism a # · ) For mapping the spliced features to the correlation coefficient e ij And finally, completing the learning of the correlation between the node i and the node j.
c) Mapping of splice characteristics by using nonlinear activation function leak ReLU single-layer feedforward neural network, and updating of interaction degree e ij The following are provided:
its parameter is weight vector
Figure GDA0004166163000000042
The calculation formula of the correlation coefficient can be expressed as
Figure GDA0004166163000000043
In the method, in the process of the invention,
Figure GDA0004166163000000044
representing the weight vector.
Figure GDA0004166163000000045
Representing the input.
d) Using softmax function to influence degree of interaction e ij Normalized to the attention coefficient alpha ij The method comprises the following steps:
Figure GDA0004166163000000046
the activation function of the graph roll-up network model is an ELUs function.
Figure GDA0004166163000000047
Representing the input.
ELUs function as follows:
Figure GDA0004166163000000048
wherein α is an adjustment parameter. x is input data. g (x) is output data.
6) And acquiring current power flow data of the power system, and extracting a power flow characteristic value of the current power flow data. And inputting the current tidal current characteristic value of the current tidal current data into the graph rolling network model, and judging whether the power system line is attacked or not.
The invention has the technical effects that the traditional topological structure is transformed without doubt, the graph neural network FDIAs identification method considering the branch power flow characteristics is provided by utilizing the graph attention mechanism neural network, the characteristic vector representing the power flow characteristics of each branch is calculated through the power flow value of the line, and the deep data characteristics are mined by utilizing the connection relation among the lines and the neural network on the topological structure, so that the determination of the false data attack position is realized. The invention determines the identification precision and accuracy of the method by comparing with other identification methods under different attack degrees.
Drawings
FIG. 1 is a flow chart of a method for identifying FDIAs of the neural network of the figure taking into consideration branch tidal current characteristics;
FIG. 2 is a diagram of IEEE39 standard system circuit connections after topology conversion;
fig. 3 is a graph roll-up network and loss function dropping process for the graph annotation mechanism.
Detailed Description
The present invention is further described below with reference to examples, but it should not be construed that the scope of the above subject matter of the present invention is limited to the following examples. Various substitutions and alterations are made according to the ordinary skill and familiar means of the art without departing from the technical spirit of the invention, and all such substitutions and alterations are intended to be included in the scope of the invention.
Example 1:
referring to fig. 1 to 3, a false data injection attack identification method based on line topology analysis and tide characteristics includes the following steps:
1) And acquiring historical power flow data and an original topological structure of the power system.
2) And converting the original topological structure of the power system to obtain a conversion topological structure of the power system.
The steps for establishing the conversion topological structure diagram are as follows:
2.1 Establishing an adjacency matrix a for characterizing the original topology of the power system G The method comprises the following steps:
based on the concept of complex network theory and graph theory, for a topology structure diagram with N nodes and M edges, a node adjacency matrix A with N x N can be used G Representing a graph network structure in which element a in the matrix ij Represented as
A G =[a ij ] N×N
Figure GDA0004166163000000051
Wherein a is ij Representing node adjacency matrix A G Is a component of the group. v i 、v j Representing the ith and jth nodes of the graph network.
2.2 Extracting node adjacency matrix A G The number of adjacent nodes of each node in the array, and writing the adjacent nodes into a cell array A cell Is a kind of medium.
2.3 Determining adjacent lines of lines in a traditional topological graph of the power system and constructing a cell array E based on a line topological structure cell
2.4 Using the lines as nodes of the topological structure diagram, searching adjacent lines of each line, thereby establishing a line adjacent matrix A G ’。
2.5 According to the line adjacency matrix A) G And', establishing a power system conversion topological structure taking the lines as nodes and the connection relationship between the lines as edges.
3) And injecting a plurality of attack data into the historical trend data to obtain trend sample data with false data.
Attack data a is as follows:
a=Hc (2)
wherein c= [ c ] 1 ,c 2 ,...,c n ] T Is an arbitrary non-zero vector. c E R n×1 . n is the number of states. H is a jacobian matrix characterizing the topology of the power system. .
4) And extracting a tide characteristic value of the tide sample data, and labeling whether attack data exist on the tide characteristic value.
The tidal current characteristic value comprises an electrical betweenness and a tidal current offset coefficient index.
The electrical medium number B e (m, n) is as follows:
Figure GDA0004166163000000061
wherein L and G are respectively the collection of load nodes and power generation nodes in the power grid. W (W) i And W is j Representing the active power and node load values of the generator output, respectively. I ij (m, n) represents the amount of current change between the lines (m, n) after the unit current source is connected between the power supply node i and the load node j.
Tidal current offset coefficient index M i The following is shown:
Figure GDA0004166163000000062
wherein P is i0 And P j0 The initial active power of line i and line j are shown, respectively. L is the set of all transmission lines in the power grid. ΔP ji Is the amount of change in active power of line j due to line i opening.
The characteristic value of the tide is the preprocessed data. The preprocessing includes z-score normalization of the data. The normalized x' data is shown below:
Figure GDA0004166163000000063
wherein x is μ And x σ The sample mean and standard deviation, respectively. x represents the data before preprocessing.
5) And establishing a graph convolution network model for judging whether the power system is attacked or not based on the tidal current characteristic value of the tidal current sample data.
The step of establishing a graph roll-up network model for determining whether the power system is attacked includes:
5.1 Randomly dividing the tidal current characteristic values of the tidal current sample data into a test set and a training set.
5.2 A graph rolling network is built. The graph roll-up network model comprises an input layer, a plurality of hidden layers and an output layer.
5.3 Training the graph rolling network by using the training set to obtain the trained graph rolling network.
5.4 Testing the trained graph rolling network by using the test set, if the accuracy rate of the output result of the graph rolling network is greater than a preset threshold value, completing the establishment of a graph rolling network model, otherwise, re-acquiring the tidal current sample data and the tidal current characteristic value, and returning to the step 1).
The feature learning relationship between the feature values of any two layers of nodes of the graph-convolution network model is as follows:
Figure GDA0004166163000000071
where l represents the number of layers in which the node is located. s represents node v i Is defined, the number of adjacent nodes of (a).
Figure GDA0004166163000000072
Representing the eigenvalues of the ni-th node in the first layer. ni is the number of the neighbor node of node i. g% · ) Representing an activation function. w is the network weight.
Figure GDA0004166163000000073
Is the eigenvalue of node i at layer l+1.
The output characteristics h' of the graph roll-up network model are as follows:
Figure GDA0004166163000000074
wherein alpha is ij For the attention factor, W is a shareable network parameter.
Acquisition of attention coefficient alpha ij The method comprises the following steps:
a) Recording M-dimensional characteristic input set of all line nodes in power system conversion topological structure as
Figure GDA0004166163000000075
The output feature set is +.>
Figure GDA0004166163000000076
b) Calculating the degree of interaction e between the line nodes ij The method comprises the following steps:
Figure GDA0004166163000000077
where W is a sharable parameter. [ · || · ]Representing stitching. Shared attention mechanism a # · ) For mapping the spliced features to the correlation coefficient e ij And finally, completing the learning of the correlation between the node i and the node j.
Figure GDA0004166163000000078
Representing the input.
c) Mapping of splice characteristics by using nonlinear activation function leak ReLU single-layer feedforward neural network, and updating of interaction degree e ij The following are provided:
its parameter is weight vector
Figure GDA0004166163000000079
The calculation formula of the correlation coefficient can be expressed as
Figure GDA00041661630000000710
In the method, in the process of the invention,
Figure GDA00041661630000000711
representing the weight vector.
d) Using softmax function to influence degree of interaction e ij Normalized to the attention coefficient alpha ij The method comprises the following steps:
Figure GDA00041661630000000712
the activation function of the graph roll-up network model is an ELUs function.
Figure GDA00041661630000000713
Representing the input.
ELUs function as follows:
Figure GDA00041661630000000714
wherein α is an adjustment parameter. x is input data. g (x) is output data.
6) And acquiring current power flow data of the power system, and extracting a power flow characteristic value of the current power flow data. And inputting the current tidal current characteristic value of the current tidal current data into the graph rolling network model, and judging whether the power system line is attacked or not.
Example 2:
a false data injection attack identification method based on line topology analysis and tide characteristics comprises the following steps:
1) And converting the traditional topological structure of the power system to obtain the topological structure among the lines of the power system.
2) And (3) utilizing branch power flow data of the power system, injecting attack data into the power flow data based on a false data construction method, calculating an electrical betterment and a power flow offset coefficient index as power flow characteristics of the line, and marking whether the attack exists on the data.
3) And selecting an appropriate attention mechanism activation function and a loss function, and constructing an attention mechanism-based graph neural network model.
4) And carrying out normalization processing on the line tide characteristics by using a z-score method to obtain a node characteristic data set with consistent dimensions. The normalized data set is divided into a training sample set and a test sample set.
5) The training sample set is used for parameter updating and optimizing of the graphic neural network, and the test set is used for verifying that the proposed method can accurately identify the attacked line and realize the identification of false data injection attack.
Example 3:
the main steps of the false data injection attack identification method based on line topology analysis and tide characteristics are as follows, referring to embodiment 2, wherein the main steps of establishing a conversion topology structure diagram are as follows:
1) Based on the concept of complex network theory and graph theory, for a topology structure diagram with N nodes and M edges, an adjacent matrix A of N can be used G Representing a graph network structure in which element a in the matrix ij Represented as
Figure GDA0004166163000000081
2) According to the adjacency matrix A G The number of adjacent nodes of each node can be known, and the number of 1 in the row of the adjacent matrix, i.e. the number of nodes adjacent to the node, can be taken as the value, so as to determine the elements in the cell array. In other words, a ij When=1, it means that the two nodes are connected. Using a cell array A cell And (3) representing.
3) Because the converted topological graph takes the lines as nodes and the connection relationship between the lines as edges, the lines in the traditional topological graph of the power system need to be numbered so as to find adjacent lines of the lines to form a corresponding cell array.
4) When a line is a node of a topology structure diagram, a neighboring line of each line is found. And according to the array formed by the line numbers, the adjacent matrix of the line connected with the head-to-tail node of the corresponding line, namely the branch.
5) Line topology based cell array E cell A corresponding line-based adjacency expression matrix A can be established G ’。
6) In a line adjacent matrix A G And drawing a topological graph structure of the electric power system by taking lines as nodes and the connection relationship between the lines as edges according to the' as a basis.
7) And (5) completing the construction of the topological structure conversion model diagram of the power system.
Example 4:
A false data injection attack identification method based on line topology analysis and power flow characteristics mainly includes the steps of referring to embodiment 2, according to power flow data of each branch in a power system, injecting attack amount into original power flow data according to a false data construction mode, and therefore a feature matrix of nodes of each branch is established. The establishment of the feature matrix considering the branch power flow mainly comprises the following two aspects:
1) Method for constructing false data
Given a known power system topology, an attacker injects an attack vector a into the measurement system, which satisfies
a=Hc (2)
Wherein c= [ c ] 1 ,c 2 ,...,c n ] T For arbitrary non-zero vectors, c.epsilon.R n×1 N is the number of states, the measurement value becomes z a After =z+a, the state estimation value is
Figure GDA0004166163000000091
Accordingly, the residual equation becomes
Figure GDA0004166163000000092
As can be seen from the formula (4), when FDIAs exist in the measurement data, the residual error is still kept within the allowed range of the threshold value, so that the detection and identification of the bad data module are bypassed, and the attack on the power system is successfully initiated.
2) Node characteristic value considering branch tidal current data
2.1 Electrical medium number)
The electric energy in the electric power system is output by the generator, is transmitted to the load node through the line for power consumption, and the transmission of the tide accords with kirchhoff law. In other words, the magnitude of the power flow is affected by the magnitude of the impedance of the branch, and in the power flow transmission process, a line with the minimum impedance value often flows. Therefore, under the condition of considering the power topological structure and the tide at the same time, the electric betweenness is taken as one of the characteristics of the line nodes, the distribution and consumption of the load, the coupling relation between the magnitude of the generated energy and the topological structure of the power system are reflected, and the use condition of the power supply and the load on each power transmission line is reflected. The calculation formula is as follows:
Figure GDA0004166163000000101
Wherein L and G are respectively a set of load nodes and power generation nodes in the power grid; w (W) i And W is j Respectively representing active power and node load values output by the generator; i ij (m, n) represents the amount of current change between the lines (m, n), i.e., the unit power change value, after the unit current source is connected between the power source node i and the load node j.
2.2 Tide offset coefficient index)
In considering the operating state of the power system, a factor that must be considered is the transmission and distribution of the power flow between the lines. According to the safety principle of the power system N-1, when a certain line in the system goes out of operation, the system realizes self-regulation through the redistribution of tide. If during self-regulation the tidal current distribution is unbalanced, for example, some lines are charged with relatively little tidal current and some lines are charged with too much tidal current, causing the lines to be taken out of service due to overload, thus creating a power system cascading failure. The tide offset coefficient index can be used for expressing the influence of the change of the tide in a certain line on the tide in the whole system and quantitatively analyzing the mutual influence among the lines in the system. The power flow offset coefficient index is thus used as one of the features reflecting the power flow in the power system. The calculation formula of the index is as follows:
Figure GDA0004166163000000102
P in the formula i0 And P j0 The initial active power of the line i and the line j is respectively represented, L is the set of all the transmission lines in the power grid, and DeltaP ji Is the amount of change in active power of line j due to line i opening.
Example 5:
a false data injection attack identification method based on line topology analysis and tide characteristics mainly includes the steps as shown in the embodiment 2, wherein a convolutional neural network function selection mode based on an attention mechanism is as follows:
1) Solution mode of graph convolution network
When the nodes in the graph perform convolution operation, the characteristic learning relationship between the node characteristic values of the two nerve unit layers is that
Figure GDA0004166163000000103
Wherein l represents the layer number of the node, s represents the node v i Is defined by the number of adjacent nodes of the (a),
Figure GDA0004166163000000104
and the characteristic value of the ni-th node in the first layer is represented, ni is the number of the neighbor node of the node i, and in the graph rolling network, the characteristic value of the node i in the first layer is only related to the adjacent node of the node i in the first layer. g% · ) And the representation activation function is used for carrying out nonlinear learning on the data characteristics, w is the network weight, and the data characteristics are continuously updated in the training process.
Input signals x, x epsilon R for matrix composed of node features in the graph n Is defined as F (x) =u T x, accordingly, inverse definition of fourier transform Is that
Figure GDA0004166163000000111
Wherein->
Figure GDA0004166163000000112
Representing the frequency domain signal result of the input signal after fourier transformation. Conversion signal->
Figure GDA0004166163000000113
The elements in (a) are the coordinates of the image signals in orthogonal space based on the eigenvectors of the Laplacian matrix, thereby completing the task of projecting the original input into the corresponding image. Thus, the input signal can be converted into
Figure GDA0004166163000000114
Which is exactly the inverse of the fourier transform. Therefore, the calculation formula of the graph convolution operation obtained by combining the calculation formula of the convolutional neural network and the spectrogram theory is as follows
Figure GDA0004166163000000115
Wherein the method comprises the steps of
Figure GDA0004166163000000116
For inputting signals, f l For the number of layers of the input signal>
Figure GDA0004166163000000117
Updated parameters for the convolutional network.
In the power information physical system, the importance degree of each branch circuit to the system is different based on the admittance matrix and the circuit connection condition of each branch circuit, namely the weight of the edges in the converted topological graph is different. In addition, each branch circuit is disconnected according to different operation requirements, and the training and testing stages of the traditional graph convolutional network need to use topological graphs with the same structure, and the calculation cost is increased along with the increase of the topological structure scale, so that the problem of dynamic graph cannot be solved. In order to solve the problems, a graph attention mechanism is introduced to learn the feature weights of adjacent nodes through a network, and the adjacent node features are weighted and summed to complete the convolution operation of the graph neural network.
2) Function selection method of graph attention mechanism
On the basis of the atlas convolutional neural network, the graph attention mechanism calculates the connection coefficient between the nodes according to the connection relation and the node characteristics of the adjacent nodes, and distributes different weights for the nodes, so that the connection coefficient is taken as the difference consideration of each node. For an N-line power system, the M-dimensional feature input set of all line nodes in the conversion topology is expressed as
Figure GDA0004166163000000118
Its output feature set is +.>
Figure GDA0004166163000000119
For a specific node i, calculating the adjacent nodes and the correlation coefficients thereof, namely the degree of interaction between the line nodes, one by one, wherein the formula is as follows
Figure GDA00041661630000001110
Enhanced representation and concatenation of original input features by linear transformation of sharable parameters W · || · ]Shared attention mechanism a # · ) Mapping the spliced features to a correlation coefficient e ij And finally, completing the learning of the correlation between the node i and the node j. In the graph attention mechanism, a nonlinear activation function LeakyReLU single-layer feedforward neural network with a negative half-axis slope of 0.2 is used for mapping the splicing characteristics, and the parameters are weight vectors
Figure GDA00041661630000001111
The calculation formula of the correlation coefficient can be expressed as
Figure GDA0004166163000000121
Because of the difference in the dimensions of the correlation coefficients, the correlation coefficients between the nodes calculated in the formula (4.5) are normalized by using a softmax function, so that the weights between the nodes can be better distributed, and the attention coefficient can be obtained.
Figure GDA0004166163000000122
And according to the attention coefficients among the normalized nodes, similar to a graph convolution network, carrying out weighted summation on the characteristics of each node to obtain the output characteristics h' of the nodes.
Figure GDA0004166163000000123
Wherein alpha is ij For normalized attention coefficients, W is a sharable network parameter.
The graph attention mechanism reflects the correlation degree among the line nodes by using the attention coefficient, and aggregates the characteristics of adjacent nodes, so that the dependence of the traditional graph rolling network on the topological structure is eliminated, and the graph rolling network is suitable for a system with continuously changed topology. For power systems, the topology has dynamic characteristics due to the opening and closing of circuit breakers and the difference in line capacity. When the FDIAs are identified, the method is more suitable for feature learning and judging whether the branch is attacked or not by using the graph annotation mechanism network.
3) Method for selecting activation function
The invention introduces a novel activation function: ELUs functions for mapping features in two layers of neural units in a graph attention mechanism, which make some improvements based on ReLU activation functions. The ReLU activation function uniformly treats negative values as 0 and carries out linear output on positive values, so that the output value of the function has no negative value, the result is larger than 0 when the output is subjected to mean value calculation, the lower layer is easy to bias, mean value deviation is generated, and the problem of non-convergence occurs when a deeper network is trained. ELUs effectively solve this problem by introducing a negative activation function, whose formula is as follows
Figure GDA0004166163000000124
Where α is an adjustment parameter that controls the position at which the negative portion of the ELUs activation function reaches saturation.
When the graph annotating force mechanism is used for training and learning the topological graph of the power system, the number of nodes is large, and the topological structure is changed due to the disconnection of the branches, so that ELUs with strong noise robustness are selected as an activation function, and the problem of non-convergence of training is avoided.
Example 6:
the main steps of the false data injection attack identification method based on line topology analysis and tide characteristics are as shown in the embodiment 2, wherein in order to keep the dimension of node characteristics consistent, data needs to be preprocessed, and the processing method is as follows:
common min-max normalization methods process data based on the difference between the maximum and minimum values in a sample. For the power system scene of the practical application of the invention, considering the influence of the broken line of the power transmission line on the topological structure (for example, the power is 0 when the line is out of operation), a small number of data points deviating from the average value of the sample can appear in the sample. Preprocessing data based on maximum or minimum values in conventional methods may be affected by deviating data. Therefore, the z-score standardization method considering the whole information of the sample is selected to preprocess the data, and the method selects the standard deviation and the mean value of the sample to process the original data, so that the influence of a small amount of deviation data on data normalization is effectively solved, the distribution characteristics of the original data are ensured, and the characteristic extraction is facilitated. The calculation formula is as follows
Figure GDA0004166163000000131
Wherein x is μ And x σ The sample mean and standard deviation, respectively.
Example 7:
a false data injection attack identification method based on line topology analysis and tide characteristics mainly comprises the following steps of embodiment 2, wherein the process of parameter adjustment and optimization of the method by using training data samples and test data samples is as follows:
and reading a line admittance matrix and historical operation load data of the power system, obtaining a node adjacency matrix, and constructing a conversion topological structure diagram taking lines as nodes and the connection relationship between the lines as edges.
Based on the historical coincidence data, using a cow method to calculate the power flow data in the line, and using a false data construction method to inject false data into the historical power flow, so as to construct a power flow sample with the false data. Based on the existing power flow data, calculating a node characteristic matrix considering power flow operation characteristics, and taking the node characteristic matrix as input of a graph attention mechanism neural network to judge an attacked line.
Preprocessing the node characteristic data with complete calculation according to a normalization formula, and dividing the node characteristic data into a test sample and a training sample. The training sample data is used for adjusting parameters of a convolutional network based on a graph attention mechanism, and a graph rolling network model with the final purpose of whether nodes are attacked or not is constructed. The test sample is used for verifying the effectiveness of the FDIAs identification method and judging a specific attacked line; if the FDIAs do not exist, the identification process is ended.
Example 8:
an experiment of a false data injection attack identification method based on line topology analysis and tide characteristics mainly comprises the following steps:
1) And converting the traditional topological structure of the power system to obtain the topological structure among the lines of the power system. The correlation between the standard example lines of the IEEE39 node is drawn by using the Pytorch deep learning framework, and 46 lines are total. It should be noted that in the running process of Python, the initial value of the number is 0, and therefore, the number in the figure takes a value of 0-45. The line number in the topological structure diagram is based on the result of PowerWorld tide simulation calculation, and the final topological structure conversion result is shown in fig. 2.
2) And (3) utilizing branch power flow data of the power system, injecting attack data into the power flow data based on a false data construction method, calculating an electrical betterment and a power flow offset coefficient index as power flow characteristics of the line, and marking whether the attack exists on the data. And accessing the IEEE39 node to a continuous time load in a week of a transformer substation in a certain area in China, processing according to load data of the IEEE39 node to obtain a per unit value of the load data, and taking the per unit value into an IEEE39 system to obtain tide data. The final node characteristic calculation results are shown in table 1.
Table 1 characteristic values of nodes
Line numbering Electric medium number Tidal current offset coefficient Line numbering Electric medium number Tidal current offset coefficient
1 1.075 22.43 24 0.986 26.41
2 0.320 -20.62 25 2.080 -4.92
3 1.780 -9.55 26 2.930 5.92
4 1.930 3.54 27 1.938 -0.02
5 0.984 0 28 1.330 -0.02
6 0.998 -69.67 29 1.256 -0.01
7 0.874 11.07 30 0.864 2.27
8 0.968 11.89 31 0.798 35.28
9 0.784 0.94 32 0.782 0.01
10 0.886 5.78 33 0.537 0
11 0.936 2.21 34 0.254 0
12 0.952 2.68 35 1.135 -0.01
13 1.273 -5.10 36 1.325 0.10
14 0.682 102.97 37 0.584 0
15 0.920 5.50 38 1.324 0
16 0.889 55.95 39 0.654 0
17 0.546 55.95 40 1.456 -13.40
18 1.180 -4.45 41 0.576 0
19 1.220 4.45 42 1.800 -3.39
20 0.687 0 43 0.236 0.05
21 1.260 47.71 44 1.246 -0.03
22 1.147 -30.03 45 0.998 0.01
23 1.330 5.01 46 0.847 0
As apparent from table 1, there is a certain relationship between the electrical betweenness of the lines and the degree between each node in the topology map, and the distribution state of the power flow of each node (i.e. each line) is reflected on the basis of fully considering the topology structure. For different line nodes, the partial index values have larger deviation and different index dimensions, so as to ensure the normal operation of the detection model, realize the identification of the attacked line, normalize each index in the node characteristic matrix according to a z-score normalization method, and perform subsequent calculation as the node matrix of the neural network based on the graph attention mechanism.
3) And selecting an appropriate attention mechanism activation function and a loss function, and constructing an attention mechanism-based graph neural network model. The invention selects ELUs as the activation function, selects cross entropy as the loss function, and determines the weight coefficient of each node in the conversion topological structure diagram by using the mapping of the LeakyReLU activation function and the activation function in the process of updating the attention mechanism. The convergence of the neural network is shown in FIG. 3, and the detection performance is shown in Table 2.
Table 2 example performance index results based on IEEE39 standard system
Figure GDA0004166163000000151
4) And carrying out normalization processing on the line tide characteristics by using a z-score method to obtain a node characteristic data set with consistent dimensions. The normalized data set is divided into a training sample set and a test sample set. Calculating the normalized result of each node characteristic in the table 1 according to the normalized equation of the z-score, and carrying out settlement in the graph annotation force mechanism convolutional network determined in the step 3).
5) The training sample set is used for parameter updating and optimizing of the graphic neural network, and the test set is used for verifying that the proposed method can accurately identify the attacked line and realize the identification of false data injection attack. The final results are shown in Table 3, with the amplitude perturbations being set to 0.005,0.05 and 0.1, respectively, at different amplitude perturbations sigma, as compared to other false data recognition methods.
TABLE 3 comparative analysis of identification results for different methods
Figure GDA0004166163000000152
From the data in table 3, the graph convolution network based on the traditional topological structure, the algorithm for fusing the convolution neural network and the bad data and the convolution network based on the circuit topological structure provided by the invention have no great difference in precision and recall rate. However, when the amplitude disturbance of the state value increases, the accuracy and precision of the first two methods are continuously reduced, while the detection precision and recall of the method provided by the invention are gradually increased within a small range, and the stable level is maintained. This is because the first two methods are both based on the original topology structure, and perform identification analysis on the state estimation value of the node, when the amplitude disturbance occurs in the system, the larger the disturbance amplitude is, the greater the possibility that the normal data is misjudged, resulting in a decrease in detection performance. The method provided by the invention considers the connection relation between the lines and the characteristics of tide data, and can more reflect the characteristics of the system when disturbance occurs in the system based on the lines.
Example 9:
referring to fig. 1, a false data injection attack identification method based on line topology analysis and tide characteristics mainly comprises the following steps:
1) And converting the traditional topological structure of the power system to obtain the topological structure among the lines of the power system.
The main steps for converting the traditional topological structure of the power system are as follows:
1.1 Based on the concept of complex network theory and graph theory, for a topology structure with N nodes and M edges, the graph network structure can be represented by an n×n adjacency matrix AG, where the elements aij in the matrix are represented as
Figure GDA0004166163000000161
1.2 The number of adjacent nodes per node is known from the adjacency matrix AG, and the number of 1's, i.e., the number of nodes adjacent to the node, in the row of the adjacency matrix determines the elements in the cell array. In other words, aij=1 indicates that two nodes are connected. Using a cell array Acell representation.
1.3 Because the converted topological graph takes the lines as nodes and the connection relationship between the lines as edges, the lines in the traditional topological graph of the power system need to be numbered so as to find the adjacent lines of the lines to form a corresponding cell array.
1.4 When a line is a node of the topology structure diagram, a neighboring line of each line is found. And according to the array formed by the line numbers, the adjacent matrix of the line connected with the head-to-tail node of the corresponding line, namely the branch.
1.5 A line topology based cell array Ecell can establish a corresponding line based adjacency expression matrix AG'.
1.6 Based on the line adjacent matrix AG', drawing a topology diagram structure of the power system with lines as nodes and the connection relationship between the lines as edges.
1.7 Completing the construction of the topological structure conversion model diagram of the power system.
2) And (3) utilizing branch power flow data of the power system, injecting attack data into the power flow data based on a false data construction method, calculating an electrical betterment and a power flow offset coefficient index as power flow characteristics of the line, and marking whether the attack exists on the data.
According to the power flow data of each branch in the power system, the attack quantity is injected into the original power flow data according to the construction mode of the false data, so that the characteristic matrix of each branch node is established. The establishment of the feature matrix considering the branch power flow mainly comprises the following two aspects:
2.1 Mode of constructing dummy data
Given a known power system topology, an attacker injects an attack vector a into the measurement system, which satisfies
a=Hc (2)
Wherein c= [ c ] 1 ,c 2 ,...,c n ] T For arbitrary non-zero vectors, c.epsilon.R n×1 N is the number of states, the measurement value becomes z a After =z+a, the state estimation value is
Figure GDA0004166163000000171
Accordingly, the residual equation becomes
Figure GDA0004166163000000172
As can be seen from the formula (4), when FDIAs exist in the measurement data, the residual error is still kept within the allowed range of the threshold value, so that the detection and identification of the bad data module are bypassed, and the attack on the power system is successfully initiated.
2.2 Taking into account node characteristic values of branch tidal current data
2.2.1 Electrical medium number)
The electric energy in the electric power system is output by the generator, is transmitted to the load node through the line for power consumption, and the transmission of the tide accords with kirchhoff law. In other words, the magnitude of the power flow is affected by the magnitude of the impedance of the branch, and in the power flow transmission process, a line with the minimum impedance value often flows. Therefore, under the condition of considering the power topological structure and the tide at the same time, the electric betweenness is taken as one of the characteristics of the line nodes, the distribution and consumption of the load, the coupling relation between the magnitude of the generated energy and the topological structure of the power system are reflected, and the use condition of the power supply and the load on each power transmission line is reflected. The calculation formula is as follows:
Figure GDA0004166163000000173
wherein L and G are respectively a set of load nodes and power generation nodes in the power grid; w (W) i And W is j Respectively representing active power and node load values output by the generator; i ij (m, n) represents the power node i and the load node After the unit current source is connected between j, the current variation between the lines (m, n), namely the unit power variation value.
2.2.2 Tide offset coefficient index)
In considering the operating state of the power system, a factor that must be considered is the transmission and distribution of the power flow between the lines. According to the safety principle of the power system N-1, when a certain line in the system goes out of operation, the system realizes self-regulation through the redistribution of tide. If during self-regulation the tidal current distribution is unbalanced, for example, some lines are charged with relatively little tidal current and some lines are charged with too much tidal current, causing the lines to be taken out of service due to overload, thus creating a power system cascading failure. The tide offset coefficient index can be used for expressing the influence of the change of the tide in a certain line on the tide in the whole system and quantitatively analyzing the mutual influence among the lines in the system. The power flow offset coefficient index is thus used as one of the features reflecting the power flow in the power system. The calculation formula of the index is as follows:
Figure GDA0004166163000000181
p in the formula i0 And P j0 The initial active power of the line i and the line j is respectively represented, L is the set of all the transmission lines in the power grid, and DeltaP ji Is the amount of change in active power of line j due to line i opening.
3) And selecting an appropriate attention mechanism activation function and a loss function, and constructing an attention mechanism-based graph neural network model.
The selection method of the graph attention mechanism activation function and the loss function is as follows:
3.1 Solution mode of graph convolution network
When the nodes in the graph perform convolution operation, the characteristic learning relationship between the node characteristic values of the two nerve unit layers is that
Figure GDA0004166163000000182
Wherein l represents the layer number of the node, s represents the node v i Is defined by the number of adjacent nodes of the (a),
Figure GDA0004166163000000183
and the characteristic value of the ni-th node in the first layer is represented, ni is the number of the neighbor node of the node i, and in the graph rolling network, the characteristic value of the node i in the first layer is only related to the adjacent node of the node i in the first layer. g% · ) And the representation activation function is used for carrying out nonlinear learning on the data characteristics, w is the network weight, and the data characteristics are continuously updated in the training process.
Input signals x, x epsilon R for matrix composed of node features in the graph n Is defined as F (x) =u T x, accordingly, the inverse of the Fourier transform is defined as
Figure GDA0004166163000000184
Wherein->
Figure GDA0004166163000000185
Representing the frequency domain signal result of the input signal after fourier transformation. Conversion signal->
Figure GDA0004166163000000186
The elements in (a) are the coordinates of the image signals in orthogonal space based on the eigenvectors of the Laplacian matrix, thereby completing the task of projecting the original input into the corresponding image. Thus, the input signal can be converted into
Figure GDA0004166163000000187
Which is exactly the inverse of the fourier transform. Therefore, the calculation formula of the graph convolution operation obtained by combining the calculation formula of the convolutional neural network and the spectrogram theory is as follows
Figure GDA0004166163000000188
Wherein the method comprises the steps of
Figure GDA0004166163000000189
For inputting signals, f l For the number of layers of the input signal>
Figure GDA00041661630000001810
Updated parameters for the convolutional network.
In the power information physical system, the importance degree of each branch circuit to the system is different based on the admittance matrix and the circuit connection condition of each branch circuit, namely the weight of the edges in the converted topological graph is different. In addition, each branch circuit is disconnected according to different operation requirements, and the training and testing stages of the traditional graph convolutional network need to use topological graphs with the same structure, and the calculation cost is increased along with the increase of the topological structure scale, so that the problem of dynamic graph cannot be solved. In order to solve the problems, a graph attention mechanism is introduced to learn the feature weights of adjacent nodes through a network, and the adjacent node features are weighted and summed to complete the convolution operation of the graph neural network.
3.2 Function selection method of graph annotation force mechanism
On the basis of the atlas convolutional neural network, the graph attention mechanism calculates the connection coefficient between the nodes according to the connection relation and the node characteristics of the adjacent nodes, and distributes different weights for the nodes, so that the connection coefficient is taken as the difference consideration of each node. For an N-line power system, the M-dimensional feature input set of all line nodes in the conversion topology is expressed as
Figure GDA0004166163000000191
Its output feature set is +.>
Figure GDA0004166163000000192
For a specific node i, calculating the adjacent nodes and the correlation coefficients thereof, namely the degree of interaction between the line nodes, one by one, wherein the formula is as follows
Figure GDA0004166163000000193
Through the cocoaLinear transformation of shared parameter W to enhance representation of original input features and concatenation · || · ]Shared attention mechanism a # · ) Mapping the spliced features to a correlation coefficient e ij And finally, completing the learning of the correlation between the node i and the node j. In the graph attention mechanism, a nonlinear activation function LeakyReLU single-layer feedforward neural network with a negative half-axis slope of 0.2 is used for mapping the splicing characteristics, and the parameters are weight vectors
Figure GDA0004166163000000194
The calculation formula of the correlation coefficient can be expressed as
Figure GDA0004166163000000195
Because of the difference in the dimensions of the correlation coefficients, the correlation coefficients between the nodes calculated in the formula (4.5) are normalized by using a softmax function, so that the weights between the nodes can be better distributed, and the attention coefficient can be obtained.
Figure GDA0004166163000000196
And according to the attention coefficients among the normalized nodes, similar to a graph convolution network, carrying out weighted summation on the characteristics of each node to obtain the output characteristics h' of the nodes.
Figure GDA0004166163000000197
Wherein alpha is ij For normalized attention coefficients, W is a sharable network parameter.
The graph attention mechanism reflects the correlation degree among the line nodes by using the attention coefficient, and aggregates the characteristics of adjacent nodes, so that the dependence of the traditional graph rolling network on the topological structure is eliminated, and the graph rolling network is suitable for a system with continuously changed topology. For power systems, the topology has dynamic characteristics due to the opening and closing of circuit breakers and the difference in line capacity. When the FDIAs are identified, the method is more suitable for feature learning and judging whether the branch is attacked or not by using the graph annotation mechanism network.
3.3 Method for selecting activation function
The invention introduces a novel activation function: ELUs functions for mapping features in two layers of neural units in a graph attention mechanism, which make some improvements based on ReLU activation functions. The ReLU activation function uniformly treats negative values as 0 and carries out linear output on positive values, so that the output value of the function has no negative value, the result is larger than 0 when the output is subjected to mean value calculation, the lower layer is easy to bias, mean value deviation is generated, and the problem of non-convergence occurs when a deeper network is trained. ELUs effectively solve this problem by introducing a negative activation function, whose formula is as follows
Figure GDA0004166163000000201
Where α is an adjustment parameter that controls the position at which the negative portion of the ELUs activation function reaches saturation.
When the graph annotating force mechanism is used for training and learning the topological graph of the power system, the number of nodes is large, and the topological structure is changed due to the disconnection of the branches, so that ELUs with strong noise robustness are selected as an activation function, and the problem of non-convergence of training is avoided.
4) And carrying out normalization processing on the line tide characteristics by using a z-score method to obtain a node characteristic data set with consistent dimensions. The normalized data set is divided into a training sample set and a test sample set.
Common min-max normalization methods process data based on the difference between the maximum and minimum values in a sample. For the power system scene of the practical application of the invention, considering the influence of the broken line of the power transmission line on the topological structure (for example, the power is 0 when the line is out of operation), a small number of data points deviating from the average value of the sample can appear in the sample. Preprocessing data based on maximum or minimum values in conventional methods may be affected by deviating data. Therefore, the z-score standardization method considering the whole information of the sample is selected to preprocess the data, and the method selects the standard deviation and the mean value of the sample to process the original data, so that the influence of a small amount of deviation data on data normalization is effectively solved, the distribution characteristics of the original data are ensured, and the characteristic extraction is facilitated. The calculation formula is as follows
Figure GDA0004166163000000202
Wherein x is μ And x σ The sample mean and standard deviation, respectively.
5) The training sample set is used for parameter updating and optimizing of the graphic neural network, and the test set is used for verifying that the proposed method can accurately identify the attacked line and realize the identification of false data injection attack.
The process of parameter adjustment and optimization of the proposed method using training data samples and test data samples is as follows:
5.1 Reading a line admittance matrix and historical operation load data of the power system, obtaining a node adjacency matrix, and constructing a conversion topology structure diagram taking lines as nodes and the connection relationship between the lines as edges.
5.2 Based on the historical coincidence data, using a bovine-derived method to calculate the power flow data in the line, and using a false data construction method to inject false data into the historical power flow, so as to construct a power flow sample with the false data. Based on the existing power flow data, calculating a node characteristic matrix considering power flow operation characteristics, and taking the node characteristic matrix as input of a graph attention mechanism neural network to judge an attacked line.
5.3 Preprocessing the node characteristic data with complete calculation according to a normalization formula, and dividing the node characteristic data into a test sample and a training sample. The training sample data is used for adjusting parameters of a convolutional network based on a graph attention mechanism, and a graph rolling network model with the final purpose of whether nodes are attacked or not is constructed. The test sample is used for verifying the effectiveness of the FDIAs identification method and judging a specific attacked line; if the FDIAs do not exist, the identification process is ended.

Claims (5)

1. A false data injection attack identification method based on line topology analysis and tide characteristics is characterized by comprising the following steps:
1) Acquiring historical power flow data and an original topological structure of a power system;
2) Converting an original topological structure of the power system to obtain a conversion topological structure of the power system;
the steps for establishing the power system conversion topology structure are as follows:
2.1 Establishing an adjacency matrix a for characterizing the original topology of the power system G The method comprises the following steps:
based on the concept of complex network theory and graph theory, for a topology structure diagram with N nodes and M edges, a node adjacency matrix A with N x M is used G Representing a graph network structure in which element a in the matrix ij Represented as
Figure FDA0004166162990000011
Wherein a is ij Representing node adjacency matrix A G Elements of (a) and (b); v i 、v j Representing the ith and jth nodes of the graph network;
2.2 Extracting node adjacency matrix A G The number of adjacent nodes of each node in the array, and writing the adjacent nodes into a cell array A cell In (a) and (b);
2.3 Determining adjacent lines of lines in a traditional topological graph of the power system and constructing a cell array E based on a line topological structure cell
2.4 Using the lines as nodes of the topological structure diagram, searching adjacent lines of each line, thereby establishing a line adjacent matrix A G ’;
2.5 According to the line adjacency matrix A) G ' establishing a power system conversion topological structure taking lines as nodes and the connection relationship between the lines as edges;
3) Injecting a plurality of attack data into the historical trend data to obtain trend sample data with false data;
4) Extracting a tide characteristic value of the tide sample data, and labeling whether attack data exist on the tide characteristic value;
5) Based on the tidal current characteristic value of the tidal current sample data, establishing a graph convolution network model for judging whether the power system is attacked;
the tide characteristic value comprises an electrical betweenness and a tide offset coefficient index;
the electrical medium number B e (m, n) is as follows:
Figure FDA0004166162990000012
wherein L and G are respectively a set of load nodes and power generation nodes in the power grid; w (W) i And W is j Respectively representing active power and node load values output by the generator; i ij (m, n) represents the amount of current change between the lines (m, n) after the unit current source is connected between the power source node i and the load node j;
tidal current offset coefficient index M i The following is shown:
Figure FDA0004166162990000021
wherein P is i'0 And P j'0 The initial active power of line i 'and line j', respectively; l' is a set of all power transmission lines in the power grid; ΔP j'i' The change amount of active power of the line j 'caused by disconnection of the line i';
The step of establishing a graph roll-up network model for determining whether the power system is attacked includes:
5.1 Randomly dividing the tide characteristic value of the tide sample data into a test set and a training set;
5.2 Building a graph rolling network; the graph rolling network model comprises an input layer, a plurality of hidden layers and an output layer;
5.3 Training the graph rolling network by using a training set to obtain a trained graph rolling network;
5.4 Testing the trained graph rolling network by using the test set, if the accuracy rate of the output result of the graph rolling network is greater than a preset threshold value, completing the establishment of a graph rolling network model, otherwise, re-acquiring the tidal current sample data and the tidal current characteristic value, and returning to the step 5.1);
the feature learning relationship between the feature values of any two layers of nodes of the graph-convolution network model is as follows:
Figure FDA0004166162990000022
wherein, l represents the layer number of the node; s represents node v i Is the number of adjacent nodes;
Figure FDA0004166162990000023
representing the characteristic value of the ni node in the first layer; ni is the number of the neighbor node of the node i; g () represents an activation function;
Figure FDA0004166162990000024
Is a network weight;
Figure FDA0004166162990000025
The characteristic value of the node i in the layer 1+1;
output features of the graph roll-up network model
Figure FDA0004166162990000026
The following is shown:
Figure FDA0004166162990000027
wherein a' ij For the attention factor, W is a sharable network parameter;
Figure FDA0004166162990000028
representing an input;
6) Acquiring current power flow data of the power system, and extracting a power flow characteristic value of the current power flow data; and inputting the current tidal current characteristic value of the current tidal current data into the graph rolling network model, and judging whether the power system line is attacked or not.
2. The false data injection attack identification method based on line topology analysis and tide characteristics according to claim 1, wherein attack data a is as follows:
a=Hc (6)
wherein c= [ c ] 1 ,c 2 ,...,c n ] T Is an arbitrary non-zero vector; c E R n×1 The method comprises the steps of carrying out a first treatment on the surface of the n is the number of states; h is a jacobian matrix characterizing the topology of the power system.
3. The false data injection attack identification method based on line topology analysis and power flow characteristics according to claim 1, wherein the power flow characteristic value is preprocessed data; the preprocessing includes z-score normalization of the data; the normalized x' data is shown below:
Figure FDA0004166162990000031
wherein x is μ And x σ Respectively sample mean and standard deviation; x represents the data before preprocessing.
4. The false data injection attack identification method based on line topology analysis and tide characteristics according to claim 1, wherein attention coefficient a 'is obtained' ij The method comprises the following steps:
1) Recording M-dimensional characteristic input set of all line nodes in power system conversion topological structure as
Figure FDA0004166162990000032
The output feature set is +.>
Figure FDA0004166162990000033
2) Calculating the degree of interaction e between the line nodes ij The method comprises the following steps:
Figure FDA0004166162990000034
wherein W is a sharable parameter; [. I. ]]Representing and splicing; the shared attention mechanism a ()' is used to map the stitched features to the correlation coefficient e ij The study of the correlation between the node i and the node j is completed;
Figure FDA0004166162990000035
representing an input; />
3) Mapping of splice characteristics by using nonlinear activation function LeakyReLU single-layer feedforward neural network, and updating of interaction degree e ij The following are provided:
its parameter is weight vector
Figure FDA0004166162990000036
The calculation formula of the correlation coefficient can be expressed as
Figure FDA0004166162990000037
In the method, in the process of the invention,
Figure FDA0004166162990000038
representing a weight vector;
4) Using softmax function to influence degree of interaction e ij Normalization is performed to obtain attention coefficient a' ij The method comprises the following steps:
Figure FDA0004166162990000039
in the method, in the process of the invention,
Figure FDA00041661629900000310
representing the input.
5. The false data injection attack identification method based on line topology analysis and power flow characteristics according to claim 1, wherein the activation function of the graph rolling network model is an ELus function;
ELUs function as follows:
Figure FDA0004166162990000041
wherein alpha is an adjustment parameter; x is input data; g (x) is output data.
CN202110729263.6A 2021-06-29 2021-06-29 False data injection attack identification method based on line topology analysis and tide characteristics Active CN113904786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110729263.6A CN113904786B (en) 2021-06-29 2021-06-29 False data injection attack identification method based on line topology analysis and tide characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110729263.6A CN113904786B (en) 2021-06-29 2021-06-29 False data injection attack identification method based on line topology analysis and tide characteristics

Publications (2)

Publication Number Publication Date
CN113904786A CN113904786A (en) 2022-01-07
CN113904786B true CN113904786B (en) 2023-05-30

Family

ID=79187535

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110729263.6A Active CN113904786B (en) 2021-06-29 2021-06-29 False data injection attack identification method based on line topology analysis and tide characteristics

Country Status (1)

Country Link
CN (1) CN113904786B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114050975B (en) * 2022-01-10 2022-04-19 苏州浪潮智能科技有限公司 Heterogeneous multi-node interconnection topology generation method and storage medium
CN114527651A (en) * 2022-01-21 2022-05-24 深圳市三旺通信股份有限公司 Attack detection method, system, device and storage medium for control system
CN114615042B (en) * 2022-03-08 2023-04-07 中国矿业大学 Attack defense method for power generator to maliciously attack power grid to gain profit
CN114865638A (en) * 2022-03-22 2022-08-05 武汉大学 Power grid low-voltage load shedding emergency control method based on deep graph reinforcement learning
CN114978586B (en) * 2022-04-12 2023-07-04 东北电力大学 Power grid attack detection method and system based on attack genes and electronic equipment
CN115144695B (en) * 2022-06-29 2023-09-19 国网北京市电力公司 Method, device, equipment and medium for searching fault line of low-current grounding system
CN116304621B (en) * 2023-03-01 2024-06-04 浙江大学 Smart grid false data injection attack positioning method based on frequency spectrum domain data driving

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234492A (en) * 2018-01-02 2018-06-29 国网四川省电力公司信息通信公司 Consider the power information physics concerted attack analysis method of load data falseness injection
CN110035090A (en) * 2019-05-10 2019-07-19 燕山大学 A kind of smart grid false data detection method for injection attack

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110929989B (en) * 2019-10-29 2023-04-18 重庆大学 N-1 safety checking method with uncertainty based on deep learning
AU2020103195A4 (en) * 2020-11-03 2021-01-14 East China University Of Science And Technology A Method for Detecting Vulnerability of Large-scale Power Grid Based On Complex Network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234492A (en) * 2018-01-02 2018-06-29 国网四川省电力公司信息通信公司 Consider the power information physics concerted attack analysis method of load data falseness injection
CN110035090A (en) * 2019-05-10 2019-07-19 燕山大学 A kind of smart grid false data detection method for injection attack

Also Published As

Publication number Publication date
CN113904786A (en) 2022-01-07

Similar Documents

Publication Publication Date Title
CN113904786B (en) False data injection attack identification method based on line topology analysis and tide characteristics
CN109635928B (en) Voltage sag reason identification method based on deep learning model fusion
Tonelli‐Neto et al. Fuzzy based methodologies comparison for high‐impedance fault diagnosis in radial distribution feeders
CN104809722A (en) Electrical device fault diagnosis method based on infrared thermography
CN110889111A (en) Power grid virtual data injection attack detection method based on deep belief network
CN109995031A (en) Probabilistic Load Flow deep learning calculation method based on physical model
Qu et al. Active and passive hybrid detection method for power CPS false data injection attacks with improved AKF and GRU‐CNN
Mola et al. ANFIS model based on fuzzy C‐mean, grid partitioning and subtractive clustering to detection of stator winding inter‐turn fault for PM synchronous motor
CN116527346A (en) Threat node perception method based on deep learning graph neural network theory
Ye et al. Single pole‐to‐ground fault location method for mmc‐hvdc system using wavelet decomposition and dbn
Eidiani A rapid state estimation method for calculating transmission capacity despite cyber security concerns
CN114415056A (en) Distributed power supply island fault detection method
CN114189047A (en) False data detection and correction method for active power distribution network state estimation
Chi et al. A fault diagnosis method of double-layer LSTM for 10 kV single-core cable based on multiple observable electrical quantities
CN115291039B (en) Single-phase earth fault line selection method for resonance earthing system
Lukomski et al. Power system topology verification using artificial neural networks: maximum utilization of measurement data
Yan et al. Application of random matrix model in multiple abnormal sources detection and location based on PMU monitoring data in distribution network
Zeng et al. Load component decomposition and online modelling based on small disturbance response characteristic matching
CN110391935B (en) Measurement degree evaluation method and system considering information physical coupling characteristics and information disturbance
CN114841266A (en) Voltage sag identification method based on triple prototype network under small sample
CN108133280A (en) A kind of icing flashover influence factor screening technique based on inclined mutual information method
CN114519294A (en) Power cable fault identification method based on wavelet singular entropy and BP neural network
Lu et al. Anomaly Recognition Method for Massive Data of Power Internet of Things Based on Bayesian Belief Network
Wang et al. Distribution System Anomaly Detection Based on AnoGAN Embedded with Cross-Stitch Units
You Safe Operation Management of Urban Smart Grid Based on Deep Learning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant