CN114978775B - Moving target defense method based on flexible switching of standby lines - Google Patents
Moving target defense method based on flexible switching of standby lines Download PDFInfo
- Publication number
- CN114978775B CN114978775B CN202210902074.9A CN202210902074A CN114978775B CN 114978775 B CN114978775 B CN 114978775B CN 202210902074 A CN202210902074 A CN 202210902074A CN 114978775 B CN114978775 B CN 114978775B
- Authority
- CN
- China
- Prior art keywords
- transmission line
- matrix
- power
- node
- attack
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000007123 defense Effects 0.000 title claims abstract description 46
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000002347 injection Methods 0.000 claims abstract description 85
- 239000007924 injection Substances 0.000 claims abstract description 85
- 230000005540 biological transmission Effects 0.000 claims description 136
- 239000011159 matrix material Substances 0.000 claims description 112
- 238000005259 measurement Methods 0.000 claims description 64
- 239000013598 vector Substances 0.000 claims description 62
- 238000004364 calculation method Methods 0.000 claims description 40
- 238000005457 optimization Methods 0.000 claims description 32
- 238000010248 power generation Methods 0.000 claims description 26
- 230000008859 change Effects 0.000 claims description 23
- 238000001514 detection method Methods 0.000 claims description 23
- 238000004422 calculation algorithm Methods 0.000 claims description 20
- 230000002159 abnormal effect Effects 0.000 claims description 14
- 102000002274 Matrix Metalloproteinases Human genes 0.000 claims description 11
- 108010000684 Matrix Metalloproteinases Proteins 0.000 claims description 11
- 238000003491 array Methods 0.000 claims description 11
- 230000000694 effects Effects 0.000 claims description 11
- 230000002441 reversible effect Effects 0.000 claims description 9
- 238000000342 Monte Carlo simulation Methods 0.000 claims description 8
- 108010074506 Transfer Factor Proteins 0.000 claims description 5
- 239000000243 solution Substances 0.000 claims description 5
- 238000001914 filtration Methods 0.000 claims description 4
- 230000007246 mechanism Effects 0.000 claims description 4
- 238000009795 derivation Methods 0.000 claims description 3
- 230000000977 initiatory effect Effects 0.000 claims description 3
- 230000008569 process Effects 0.000 claims description 3
- 238000012360 testing method Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 241001131927 Placea Species 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 150000001875 compounds Chemical class 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J3/00—Circuit arrangements for ac mains or ac distribution networks
- H02J3/001—Methods to deal with contingencies, e.g. abnormalities, faults or failures
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J3/00—Circuit arrangements for ac mains or ac distribution networks
- H02J3/007—Arrangements for selectively connecting the load or loads to one or several among a plurality of power lines or power sources
- H02J3/0073—Arrangements for selectively connecting the load or loads to one or several among a plurality of power lines or power sources for providing alternative feeding paths between load and source when the main path fails, e.g. transformers, busbars
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H02—GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
- H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
- H02J2203/00—Indexing scheme relating to details of circuit arrangements for AC mains or AC distribution networks
- H02J2203/20—Simulating, e g planning, reliability check, modelling or computer assisted design [CAD]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Supply And Distribution Of Alternating Current (AREA)
Abstract
The invention belongs to the field of power system safety, and particularly relates to a moving target defense method based on flexible switching of a standby circuit, wherein the standby circuit configured for guaranteeing power supply reliability of a power system is considered, and the method comprises the following steps: establishing a direct current state estimation model; establishing a moving target defense model based on flexible switching of a standby line; a moving target defense strategy against spurious data injection attacks is proposed. The invention provides a new idea for ensuring the safe and stable operation of the power system.
Description
Technical Field
The invention relates to the field of power system safety, in particular to a moving target defense method based on flexible switching of a standby line.
Background
The state estimation is applied to the power system, and reliable power system operation data is obtained by filtering uncertainty in an original measurement value, so that guarantee is provided for safe and stable operation of the power system. However, state estimation faces a threat, and a false data injection attack is a typical network attack mode, and the purpose of destroying the correctness and integrity of the power grid information is achieved by tampering the measurement data of the real-time measurement system, so that a state estimation program obtains an incorrect state estimation result according to the incorrect amount of measurement. In order to guarantee the safe and stable operation of the power system, an effective defense method is needed, a static protection means can easily give enough time to attackers to avoid or crack the protection mechanisms, the safety of data can not be ensured for a long time, the moving target defense strategy has a prevention function, and the implementation of the moving target defense strategy can carry out active defense when the attack does not occur or does not cause serious influence, so that the purposes of protecting the integrity of measured data and the accuracy of state estimation are achieved.
Disclosure of Invention
The invention provides a moving target defense method based on flexible switching of a standby line, and provides a new idea for protecting safe and stable operation of a power system.
In order to solve the technical problem, the invention provides a moving target defense method based on flexible switching of a standby line, which comprises the following steps:
step 1: the method for establishing the power system moving target defense model specifically comprises the following steps:
1-1) establishing a direct current state estimation model of the power system;
1-2) establishing a moving target defense model based on flexible switching of a standby line;
1-3) providing an optimization algorithm for flexibly configuring a standby line according to threats faced by a power system;
step 2: the method for establishing the moving target defense process based on the flexible switching of the standby line specifically comprises the following steps:
2-1) generating original data of the power system;
2-2) carrying out direct current state estimation on the original data to obtain correct parameters;
2-3) launching a false data injection attack aiming at the direct current state estimation result;
2-4) detecting false data injection attacks by switching a standby line to enable a bad data detector to detect false data injection attacks;
and 3, step 3: analyzing the influence of the flexible switching of the standby line on the operation of the power system specifically comprises:
3-1) analyzing the influence of a moving target defense strategy on the operation of the power system and the injection attack of the false data by taking the minimized system power generation cost and the attack space quantity as targets;
3-2) analyzing the influence of a moving target defense strategy on the operation of the power system and the false data injection attack by taking the minimized system power generation cost as a target;
further, the step 1 specifically comprises:
step 1-1) establishing a direct current state estimation model of the power system, which comprises the following specific steps:
state estimation of power systems by filtering uncertainty in raw measurements to obtain reliable power system operating data,
the DC state estimation is obtained based on a DC power flow calculation model, and a DC power flow equation is as follows:
wherein,active power is injected into the node and the node,is the active current of the power transmission line,is the phase angle of the voltage at the node,is the susceptance parameter of the power transmission line,representation and nodeConnected nodes;
in all nodes, a reference node is set, the voltage angle value of which is 0, and the voltage angle values of the rest nodes are taken as state variables and expressed as state variables;
Assuming that all nodes are deployed with sensors and one sensor is deployed in the positive direction of each line, the sensors deployed on the nodes measureActive injection power of each node, and the sensors arranged on the line measurePositive active of strip lineCurrent then the number of measured values isA plurality of the components, wherein,since the power flow equation is linear, it is expressed as:
wherein,representing the measured values of node active injected power and transmission line active current,a measurement matrix is represented that represents the measurement matrix,inIn order to count the number of the measured values,the number of the nodes after the balance nodes are removed;
measuring matrixRelated to the topological structure of the power grid and the parameters of the transmission line, the linear structural form is as follows:
wherein the matrixKnown as transmission line node connection array, matrixDiagonal matrix, called transmission line susceptance valueTransferring factor arrays, matrices, to transmission line nodesIs a reversible symmetric susceptance matrix.
Power transmission line node connection arrayOf (2) element(s)Representation matrixIn positionElement of (2), transmission lineIndicating the line connection nodeThen matrixEach element of (2)Write as:
transmission line susceptance value diagonal matrixOnly diagonal elements have values, whose diagonal elementsSusceptance value of negative valueI.e. connecting nodesTransmission line ofExcept for the diagonal elements, the other elements are all 0;
matrix arrayTransferring factor arrays, matrices, to transmission line nodesIs a reversible symmetrical susceptance matrix, and according to a DC power flow equation,
wherein,representing a positive active current column vector of the power transmission line;representing the column vector of the active injection power of the node;representing a node voltage phase angle column vector;
the measured values comprise node active injected powerAnd the active current of the transmission lineIt can be expressed as:
the state variables for the DC state estimation are voltage phase angles:
a weighted minimum variance optimization problem needs to be solved for DC state estimation:
wherein,a column vector of measurement values is represented,representing the state estimation result, matrixIs a diagonal matrix whose diagonal elements are the inverse of the variance of the measured noise,
wherein,respectively correspond to the measurementThe magnitude of the signal is measured by the sensor,inverse of the noise variance of (2),
The bad data detector is used for identifying data in the state estimation procedure, judging whether abnormal data is mixed into the original data or not, and the residual calculation formula is as follows:
the mechanism of the bad data detector is shown as follows:
wherein the threshold valueWith confidence ofIs determined by hypothesis testing, i.e.,Standard deviation of measurement error;
step 1-2) establishing a moving target defense model based on flexible switching of a standby line, which comprises the following steps:
the transmission line parameters can be changed by putting into a standby line, under the condition, the working mode of the transmission line is changed from the working of a single transmission line to the working mode of two parallel circuits, the reactance parameters of the transmission line are halved, and the susceptance parameters are doubled, namely:
To transmission line node connection arrayAnd transmission line susceptance value diagonal matrixRewriting to analyze the measurement matrix more deeplyThe changes that occur before and after the drop of a spare line are first constructed as a vector of the following three bases:at the position ofIs 1, and the elements in the remaining positions are 0;at a position thereofIs 1, and the elements in the remaining positions are 0;at a position thereofIs 1, positionIs-1 and the remaining positions are 0, then,from these three vectors are rewritten as:
after the spare line has been put into operation,the matrix is not changed and the matrix is not changed,the matrix becomesWhich is represented as:
transmission line node transfer factor arrayAnd a reversibly symmetrical susceptance matrixAmount of change ofAndcan also be expressed, namely:
wherein,from the derivation, the matrixIn the first placeThe rows containing non-0-elements, the matrixIn the first placeA column contains non-zero elements;
the relation of the measurement matrix before and after the standby line is put into is as follows:
for an attacker, switching information of the standby line cannot be obtained, and only information of a power grid topological structure before the standby line is put into use is known, so that the attacker can only construct the standby lineThe attack vector of (a) may have an effect on the state estimation result,is the amount of change in the state estimation result; but the measurement matrix has become after the spare line is put into useAccording to the residual calculation formula, the residual calculation result at this time is:
in the measuring matrixMiddle and row vector dimensionGreater than the column vector dimensionIt can be shown that, in the case of the test,the residual error result is not 0 after the parameters of the power transmission line are changed by putting a spare line;
in the measurement matrix, each column of elements represents a measurement value associated with a node if the attacker followsDesigned attack vectorCan be measured by a measuring matrixThe column vector space being linearly expressed, i.e.Then the FDI attack is effective, assuming that the column vector of the measurement matrix corresponding to a node is an attack space, usingAnd representing the intersection of the two, the column space dimension of the two is the representation of the attack space:
whereinAndrespectively a measurement matrix before and after the standby circuit is put into,is composed ofAndthe intersection items in the column vector space have the smaller value after the spare line is put into the defense, and the better defense effect on the FDI attack is achieved.
Step 1-3) according to the threat faced by the power system, an optimization algorithm for flexibly configuring the standby line is provided, which specifically comprises the following steps:
based on a direct current optimal power flow algorithm, an optimization algorithm which aims at minimizing the number of attack spaces and the system power generation cost is designed, and the mathematical expression of the optimization algorithm is as follows:
wherein,the decision variables respectively represent the phase angle of a voltage vector, the standby circuit input switch parameters and the active output of the generator, wherein 1 represents the input standby circuit, and 0 represents the non-input standby circuit; the first in the constraint indicates that the node injects active power balance,the active power output of the generator is provided,in order to be the load of the node,a reversible symmetric susceptance matrix; the second equation is the generator output limit,respectively representing the maximum value and the minimum value of the output of the generator, the third formula is the branch power flow limit,respectively representing the maximum value and the minimum value of the branch power flow; the fourth expression indicates whether or not a spare line is put into use,for the number of transmission lines, the calculation mode of susceptance parameter becomes(ii) a Objective functionTo minimize the amount of attack spaceAnd system power generation cost,Indicating the node number containing the generator,the punishment coefficients are respectively the punishment coefficients of the two; the cost of each generator is calculated as shown in the following formulaRepresents the cost factor:
the first three formulas in the constraint conditions are the constraint conditions of the direct current optimal power flow and respectively represent the balance of active power injected into the node, the output limit of the generator and the branch power flow limit, the fourth formula represents whether the standby line is put in,for the number of transmission lines, the calculation mode of susceptance parameter becomesAnd aiming at the result obtained by optimization, estimating the detection rate of the false data injection attack by the bad data detector by adopting a Monte Carlo method, which comprises the following steps: (1) constructing an attack vector by a method for generating random numbers, wherein the attacked nodes and the tampering degree are random; (2) launching a total number N of false data injection attacks; (3) detecting a state estimation result by adopting a bad data detector based on a result obtained by optimization; (4) estimating the detection rate of the bad data detector to the false data injection attack, wherein the detection rate is the ratio of the number of times of detecting abnormal data to the total number of times:
the detection rate is used as an index for evaluating the performance of the proposed moving target defense strategy in resisting the false data injection attack.
Further, the step (2) is specifically as follows:
step 2-1) generating original data of the power system, which comprises the following steps: performing original load flow calculation to obtain power grid topological structure information, power transmission line information and original load flow data, wherein the data to be obtained are as follows:
wherein,in order to be the information of the node,as the information on the power transmission line,is a variable of the state of the system,for transmission line reactance parameters, measured valuesIncluding node active injected powerAnd the active current of the transmission line。
Step 2-2) carrying out direct current state estimation on the original data to obtain correct parameters, which are as follows:
first based on the obtained topology informationI.e. node informationInformation on transmission lineAnd transmission line parameter informationI.e. reactance parameter construction measuring matrix,
Wherein,is a reversible symmetrical susceptance matrix,a factor array is transferred for the transmission line node,the array is connected with the power transmission line nodes,is a diagonal array of the susceptance values of the transmission line.
And then carrying out state estimation to obtain an optimal estimation value:
wherein,as a result of the estimation of the state of the system,in order to measure the matrix of the measurements,is a diagonal matrix whose diagonal elements are the inverse of the variance of the measured noise,representing a column vector of measurement values.
And identifying bad data of the obtained state estimation result, namely detecting the bad data by a bad data detector, and judging whether abnormal data is mixed.
Step 2-3) initiates a false data injection attack aiming at the direct current state estimation result, which comprises the following steps
wherein,in order to measure the matrix of the measurements,for the amount of change in the state estimation result,is an attack vector;
and secondly, superposing the designed attack vector to the measurement, namely:
wherein,is the original measurement value of the system,in order to be a vector of attacks,measuring values after the false data injection attack is suffered;
further, the state estimation result becomes:
wherein,as a result of the estimation of the original state of the system,in order for the state estimation result to change by an amount,the result is estimated for the state after being subjected to a spurious data injection attack.
Thirdly, a bad data detector is used for detection, and a residual error calculation formula is as follows:
wherein,for the residual calculation after being subjected to a spurious data injection attack,in order to avoid the residual error calculation result of the false data injection attack, the attack vector designed by the method can escape the detection of the bad data detector and can not be identified as abnormal according to the residual error calculation result.
Step 2-4) the bad data detector detects the false data injection attack by switching the standby line, which comprises the following specific steps:
assuming that the working mode of the power transmission line of the original power grid is the working mode of a single power transmission line, the parameters of the power transmission line are changed by putting a standby line, in this case, the power transmission line is changed into two working modes which are connected in parallel, the reactance parameters of the power transmission line are halved, and the susceptance parameters are doubled, namely:
wherein,is the susceptance parameter of the power transmission line,the changed transmission line susceptance parameter.
After the transmission line parameters of the system are changed, load flow calculation is carried out again to obtain data, then state estimation is carried out, and at the moment, the measurement matrix is used forBecome into:
Wherein the matrixFor altered, reversibly symmetrical susceptance matrices, matricesFor changed transmission line node transfer factor arrays, matricesFor diagonal arrays, matrices, of altered transmission line susceptance valuesAnd connecting the array for the transmission line nodes.
And (3) launching a false data injection attack aiming at the changed power system, and then executing a bad data identification function by using a bad data detector, wherein a residual calculation formula is as follows:
wherein,for the result of the residual calculation after the parameter of the transmission line is changed,to measure values after being subject to a spurious data injection attack,in order to change the measurement matrix after the change,the result is estimated for the state after being subjected to a spurious data injection attack.
The bad data detector can detect abnormal data.
Further, the step (3) specifically comprises: 3-1) analyzing the influence of a moving target defense strategy on the operation of the power system and the injection attack of the false data by taking the minimization of the power generation cost of the system and the number of attack spaces as targets: the minimum system power generation cost and the attack space quantity are used as the objective function of the optimization algorithm, for an attacker, the attack surface is reduced, the attack cost is increased, and the attacker is more difficult to initiate false data injection attack; for defenders, the power generation cost of the system is reduced, the economical efficiency of system operation is improved, in the aspect of resisting false data injection attacks, a higher detection rate is obtained based on a Monte Carlo method, and the method has a good defense effect on the false data injection attacks. 3-2) analyzing the influence of a moving target defense strategy on the operation of the power system and the false data injection attack with the aim of minimizing the power generation cost of the system: the minimum system power generation cost is used as a target function of an optimization algorithm, for defenders, the system power generation cost is greatly reduced, the economy of system operation is greatly improved, in the aspect of resisting false data injection attacks, the detection rate obtained based on the Monte Carlo method is reduced, but most of false data injection attacks can still be detected, and the method has a good defense effect on the false data injection attacks; for an attacker, the attack surface is reduced, the attack cost is increased, and the attack is more difficult to launch a false data injection attack and still has a multiplication opportunity.
Compared with the prior art, the invention has the following advantages:
in order to effectively defend false data injection attacks aiming at the power system, the invention implements a moving target defense strategy by using the standby circuit equipped in the power grid, namely, under the condition of not influencing the normal operation of the power system, the change of the circuit parameters of the power system is completed by flexibly switching the standby circuit of the power transmission line, thereby increasing the uncertainty of the system, reducing the attack surface, increasing the attack cost, achieving the aim of defending the false data injection attacks and ensuring the safe and stable operation of the power system.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
Fig. 1 is a MTD policy flow diagram for FDIA;
FIG. 2 is a diagram illustrating the effect of a spurious data injection attack on a state estimation result;
FIG. 3 is a diagram illustrating a residual error detection result after a spare line is put into operation;
fig. 4 is a schematic diagram of an optimally configured spare circuit.
Detailed Description
The technical solutions provided by the present invention will be described in detail with reference to specific examples, and it should be understood that the following detailed description is only illustrative of the present invention and is not intended to limit the scope of the present invention.
Example 1: a moving target defense method based on flexible switching of a standby line comprises the following steps:
step 1: establishing a power system moving target defense model, which specifically comprises the following steps:
1-1) establishing a direct current state estimation model of the power system;
1-2) establishing a moving target defense model based on flexible switching of a standby line;
1-3) providing an optimization algorithm for flexibly configuring a standby line according to threats faced by a power system;
step 2: the method for establishing the moving target defense process based on the flexible switching of the standby line specifically comprises the following steps:
2-1) generating original data of the power system;
2-2) carrying out direct current state estimation on the original data to obtain correct parameters;
2-3) launching a false data injection attack aiming at the direct current state estimation result;
2-4) detecting false data injection attacks by switching a standby line to enable a bad data detector to detect false data injection attacks;
and step 3: analyzing the influence of the flexible switching of the standby line on the operation of the power system specifically comprises:
3-1) analyzing the influence of a moving target defense strategy on the operation of the power system and the injection attack of the false data by taking the minimized system power generation cost and the attack space quantity as targets;
3-2) analyzing the influence of a moving target defense strategy on the operation of the power system and the false data injection attack by taking the minimized system power generation cost as a target;
further, the step 1 specifically comprises:
step 1-1) establishing a direct current state estimation model of the power system, which comprises the following specific steps:
state estimation of power systems by filtering uncertainty in raw measurements to obtain reliable power system operating data,
the DC state estimation is obtained based on a DC power flow calculation model, and a DC power flow equation is as follows:
wherein,active power is injected into the node and the node,is the active current of the power transmission line,is the phase angle of the voltage at the node,is the susceptance parameter of the power transmission line,representation and nodeConnected nodes;
in all nodes, a reference node is set, the voltage angle value of which is 0, and the voltage angle values of the rest nodes are taken as state variables and expressed as state variables;
Assuming that all nodes are deployed with sensors and one sensor is deployed in the positive direction of each line, the sensors deployed on the nodes measureActive injection power of each node, measured by sensors arranged on the linePositive active current of a line, the number of measured values then beingA plurality of the components, wherein,since the power flow equation is linear, it is expressed as:
wherein,representing the measured values of node active injected power and transmission line active current,a measurement matrix is represented that is a matrix of measurements,inIn order to be able to count the number of measured values,the number of the nodes is the number of the nodes after the balance nodes are removed;
measuring matrixRelated to the topological structure of the power grid and the parameters of the transmission line, the linear structural form is as follows:
wherein, the matrixKnown as transmission line node connection array, matrixDiagonal matrix, called transmission line susceptance valueTransferring factor arrays, matrices, to transmission line nodesIs a reversible symmetric susceptance matrix.
Power transmission line node connection arrayOf (2) element(s)Representation matrixIn positionElement of (2), transmission lineIndicating the line connection nodeThen matrixEach element of (1)Write as:
transmission line susceptance value diagonal matrixOnly the diagonal elements have values, the diagonal elements of whichSusceptance value of negative valueI.e. connecting nodesTransmission line ofExcept for the diagonal elements, the other elements of the susceptance value of (1) are all 0;
matrix arrayTransferring factor arrays, matrices, to transmission line nodesIs a reversible symmetrical susceptance matrix, and according to a DC power flow equation,
wherein,representing a positive active current column vector of the power transmission line;representing the column vector of the active injection power of the node;representing a node voltage phase angle column vector;
the measured values comprise node active injected powerAnd the active current of the transmission lineIt can be expressed as:
the state variables of the DC state estimation are the voltage phase angles:
a weighted minimum variance optimization problem needs to be solved for DC state estimation:
wherein,a column vector representing the measurement values is represented,representing the state estimation results, matrixIs a diagonal matrix whose diagonal elements are the inverse of the variance of the measured noise,
wherein,respectively correspond to the measured values and the measured values,of the noise variance of (2),
The bad data detector is used for identifying data in a state estimation procedure, judging whether abnormal data is mixed into original data or not, and the residual error calculation formula is as follows:
the mechanism of the bad data detector is shown as follows:
wherein the threshold valueWith confidence ofIs determined by hypothesis testing, i.e.,Standard deviation of measurement error;
step 1-2) establishing a moving target defense model based on flexible switching of a standby line, which comprises the following specific steps:
the transmission line parameters can be changed by putting into a standby line, under the condition, the working mode of the transmission line is changed from the working of a single transmission line into the working mode of two parallel transmission lines, the reactance parameters of the transmission line are halved, and the susceptance parameters are doubled, namely:
To transmission line node connection arrayAnd transmission line susceptance value diagonal matrixRewriting to analyze the measurement matrix more deeplyThe changes that occur before and after the drop of a spare line are first constructed as a vector of the following three bases:at a position thereofIs 1, and the elements in the remaining positions are 0;at a position thereofIs 1, and the elements in the remaining positions are 0;at a position thereofIs 1, positionIs-1 and the elements in the remaining positions are 0, then,from these three vectors are rewritten as:
after the spare line has been put into operation,the matrix is not changed and the matrix is not changed,the matrix becomesWhich is represented as:
transmission line node transfer factor arrayAnd a reversibly symmetrical susceptance matrixAmount of change ofAndcan also be expressed, namely:
wherein,from the derivation, the matrixIn the first placeThe rows containing non-0-elements, the matrixIn the first placeA column contains non-zero elements;
the relation of the measurement matrix before and after the standby line is put into is as follows:
for an attacker, switching information of the standby line cannot be obtained, and only information of a power grid topological structure before the standby line is put into use is known, so that the attacker can only construct the standby lineThe attack vector of (a) may have an effect on the state estimation result,is the amount of change in the state estimation result; but the measurement matrix has become after the spare line is put into useAccording to the residual calculation formula, the residual calculation result at this time is:
in the measuring matrixMiddle and row vector dimensionGreater than the column vector dimensionIt can be shown that, in the case of the test,the residual error result is not 0 after the parameters of the power transmission line are changed by putting a spare line;
in the measurement matrix, each column of elements represents a measurement value associated with a node if the attacker followsDesigned attack vectorCan be measured by a measuring matrixThe column vector space being linearly expressed, i.e.Then the FDI attack is effective, assuming that the column vector of the measurement matrix corresponding to a node is an attack space, usingAnd representing the intersection of the two, the column space dimension of the two is the representation of the attack space:
whereinAndrespectively a measurement matrix before and after the standby circuit is put into,is composed ofAndthe intersecting terms in the column vector space. For defenders, the smaller this value after putting into a spare line, the better the defending effect against FDI attacks.
In an IEEE5 node test system, the change condition of an attack space after 1, 2, 3, 4 and 5 power transmission standby lines are input is traversed in a traversing mode, and the total number of traversal isThen, using the monte carlo method, observing the influence of different attack space reduction quantities on FDIA, and estimating the detection rate of the bad data detector on FDIA after putting into a spare line, with the results shown in table 1:
as can be seen from the results, the detection rate of the bad data detector for FDIA gradually increases as the attack space decreases.
Step 1-3) according to the threat faced by the power system, an optimization algorithm for flexibly configuring the standby line is provided, which specifically comprises the following steps:
based on a direct current optimal power flow algorithm, an optimization algorithm which aims at minimizing the number of attack spaces and the system power generation cost is designed, and the mathematical expression of the optimization algorithm is as follows:
wherein,the decision variables respectively represent the phase angle of a voltage vector, the standby circuit input switch parameters and the active output of the generator, wherein 1 represents the input standby circuit, and 0 represents the non-input standby circuit; aboutThe first in the beam condition indicates that the node injects active power balance,the active power output of the generator is provided,in order to be the load of the node,a reversibly symmetric susceptance matrix; the second equation is the generator output limit,respectively representing the maximum and minimum values of the output of the generator, the third formula is branch power flow limit,respectively representing the maximum value and the minimum value of the branch power flow; the fourth expression indicates whether or not a spare line is put in,for the number of transmission lines, the calculation mode of susceptance parameter becomes(ii) a Objective functionTo minimize the amount of attack spaceAnd system power generation cost,Indicating the node number containing the generator,the punishment coefficients are respectively the punishment coefficients of the two; the cost of each generator is calculated as followsRepresenting the cost factor:
the first three formulas in the constraint conditions are the constraint conditions of the direct current optimal power flow and respectively represent the balance of active power injected into the node, the output limit of the generator and the branch power flow limit, the fourth formula represents whether the standby line is put in,for the number of transmission lines, the calculation mode of susceptance parameter becomesAnd aiming at the result obtained by optimization, estimating the detection rate of the false data injection attack by the bad data detector by adopting a Monte Carlo method, which comprises the following steps: (1) constructing an attack vector by a method for generating random numbers, wherein the attacked nodes and the tampering degree are random; (2) total number of initiations isFalse data injection attacks; (3) detecting a state estimation result by adopting a bad data detector based on a result obtained by optimization; (4) estimating the detection rate of the bad data detector to the false data injection attack, wherein the detection rate is the ratio of the times of detecting abnormal data to the total times:
the detection rate is used as an index for evaluating the performance of the proposed moving target defense strategy in resisting the false data injection attack.
Further, step 2 specifically comprises:
step 2-1) generating original data of the power system, which comprises the following specific steps: performing original load flow calculation to obtain power grid topological structure information, power transmission line information and original load flow data, wherein the data to be obtained are as follows:
wherein,in order to be the information of the node,as the information on the power transmission line,is a variable of the state of the system,for transmission line reactance parameters, measured valuesIncluding node active injected powerAnd the active current of the transmission line。
Step 2-2) carrying out direct current state estimation on the original data to obtain correct parameters, which are as follows:
first based on the obtained topology informationI.e. node informationInformation on transmission lineAnd transmission line parameter informationI.e. reactance parameter construction measuring matrix,
Wherein, the matrixBeing a reversibly symmetrical susceptance matrix, matrixTransferring factor arrays, matrices, to transmission line nodesFor connecting arrays, matrices, to transmission line nodesIs a diagonal array of the susceptance values of the transmission line.
And then carrying out state estimation to obtain an optimal estimation value:
wherein,as a result of the estimation of the state of the system,in order to measure the matrix of the measurements,is a diagonal square matrix, the diagonal elements of which are the inverse of the variance of the measurement noise,representing a column vector of measurement values.
And identifying bad data of the obtained state estimation result, namely detecting the bad data by a bad data detector, and judging whether abnormal data is mixed.
Step 2-3) initiates a false data injection attack aiming at the direct current state estimation result, which comprises the following steps
wherein,in order to measure the matrix of the measurements,in order for the state estimation result to change by an amount,is an attack vector;
and secondly, superposing the designed attack vector to the measurement, namely:
wherein,is the original measured value of the system,for attacking toThe amount of the compound (A) is,measuring values after the false data injection attack;
further, the state estimation result becomes:
wherein,as a result of the estimation of the original state of the system,for the amount of change in the state estimation result,the result is estimated for the state after being subjected to a spurious data injection attack.
Thirdly, a bad data detector is used for detection, and a residual error calculation formula is as follows:
wherein,for the residual calculation after being subjected to a spurious data injection attack,in order to avoid the residual error calculation result of the false data injection attack, the attack vector designed by the method can escape the detection of the bad data detector and can not be identified as abnormal according to the residual error calculation result.
Step 2-4) the bad data detector detects the false data injection attack by switching the standby line, which comprises the following specific steps:
assuming that the working mode of the power transmission line of the original power grid is the working mode of a single power transmission line, the parameters of the power transmission line are changed by putting a standby line, in this case, the power transmission line is changed into two working modes which are connected in parallel, the reactance parameters of the power transmission line are halved, and the susceptance parameters are doubled, namely:
wherein,is a parameter of the susceptance of the power transmission line,the changed susceptance parameter of the power transmission line.
After the transmission line parameters of the system change, load flow calculation is carried out again to obtain data, then state estimation is carried out, and at the moment, the measurement matrixBecome into:
And (3) launching a false data injection attack aiming at the changed power system, and then executing a bad data identification function by using a bad data detector, wherein a residual calculation formula is as follows:
wherein,for transmission line parameter changesThe result of the post-calculation of the residual error,to measure values after being subject to a spurious data injection attack,in order to change the measurement matrix after the change,the result is estimated for the state after being subjected to a spurious data injection attack.
The bad data detector can detect abnormal data.
In the IEEE5 node test system, the phase angle of node No. 1 is tampered with by designing an attack vector, and the validity of the FDIA attack is proved in fig. 2. Next, only one spare line is put into operation each time, the influence on the FDIA after the spare lines of 6 power transmission lines are put into operation is observed, the case where no spare line is put into operation is set as serial number 1, and the rest six cases are sequentially sorted from 2 to 7, and the result is shown in fig. 3. The example can prove that the method can effectively defend against false data injection attacks.
Further, step 3 specifically comprises:
3-1) analyzing the influence of a moving target defense strategy on the operation of the power system and the injection attack of the false data by taking the minimization of the power generation cost of the system and the number of attack spaces as targets:
in an IEEE5 node test system, a penalty coefficient is set to(i.e., the inverse of the cost of power generation without the introduction of a backup line) andsince the generation cost desired by the defender can be reduced, the penalty factor is multipliedAfter thatThe cost of generating electricity for the system of (a) will be less than 1, and since the attack space is an integer, there can be an ideal expectation for the optimization result, i.e. an integer plus a decimal, and the smaller this value the better. The optimization results are shown in table 2:
wherein the optimization result of the parameters of the standby switch isIn 6 spare lines, 1 represents that a spare line corresponding to a power transmission line is put in, and 0 represents that the spare line is not put in, that is, the best effect can be achieved by putting in the 2 nd, 3 rd and 4 th lines, and a schematic diagram of an optimization result is shown in fig. 4.
The minimum system power generation cost and the attack space quantity are used as the objective function of the optimization algorithm, for an attacker, the attack surface is reduced, the attack cost is increased, and the attack of initiating the false data injection attack is more difficult; for defenders, the power generation cost of the system is reduced, the economical efficiency of system operation is improved, in the aspect of resisting false data injection attacks, a higher detection rate is obtained based on a Monte Carlo method, and the method has a good defense effect on the false data injection attacks. 3-2) analyzing the influence of a moving target defense strategy on the operation of the power system and the false data injection attack with the aim of minimizing the power generation cost of the system:
in an IEEE30 node system, a penalty coefficient is set to(i.e., the inverse of the cost of generating electricity without the introduction of a backup line) andthus, the optimization objective becomes to minimize only the system power generation cost. The optimization results are shown in table 3.
Wherein the spare line switch parameter
In order to optimize the configuration result of the obtained spare lines, 1 indicates that the spare line of the corresponding power transmission line is put into use, and 0 indicates that the spare line is not put into use, in the 41 spare lines.
The minimum system power generation cost is taken as a target function of an optimization algorithm, for a defender, the system power generation cost is greatly reduced, the economical efficiency of system operation is greatly improved, in the aspect of resisting false data injection attacks, the detection rate obtained based on the Monte Carlo method is reduced, but most of the false data injection attacks can be detected, and the method has a good defense effect on the false data injection attacks; for an attacker, the attack surface is reduced, the attack cost is increased, and the attacker has difficulty in launching a false data injection attack and still has a feasible opportunity.
Claims (1)
1. A moving target defense method based on flexible switching of a standby line is characterized by comprising the following steps:
step 1: establishing a power system moving target defense model, which specifically comprises the following steps:
1-1) establishing a direct current state estimation model of the power system;
1-2) establishing a moving target defense model based on flexible switching of a standby line;
1-3) providing an optimization algorithm for flexibly configuring a standby line according to threats faced by a power system;
and 2, step: establishing a moving target defense process based on flexible switching of a standby line, which specifically comprises the following steps:
2-1) generating original data of the power system;
2-2) carrying out direct current state estimation on the original data to obtain correct parameters;
2-3) launching a false data injection attack aiming at the direct current state estimation result;
2-4) detecting false data injection attacks by switching a standby line to enable a bad data detector to detect false data injection attacks;
and step 3: analyzing the influence of the flexible switching of the standby line on the operation of the power system specifically comprises:
3-1) analyzing the influence of a moving target defense strategy on the operation of the power system and the injection attack of the false data by taking the minimized system power generation cost and the attack space quantity as targets;
3-2) analyzing the influence of a moving target defense strategy on the operation of the power system and the false data injection attack by taking the minimized system power generation cost as a target;
step 1-1) establishing a direct current state estimation model of the power system, which comprises the following specific steps:
state estimation of an electrical power system by filtering uncertainty in raw measurements to obtain reliable electrical power system operating data,
the direct current state estimation is obtained based on a direct current load flow calculation model, and a direct current load flow equation is as follows:
wherein,active power is injected into the node and the node,is the active current of the power transmission line,is the phase angle of the voltage at the node,is the susceptance parameter of the power transmission line,representation and nodeConnected nodes;
in all nodes, a reference node is set, the voltage angle value of which is 0, and the voltage angle values of the rest nodes are taken as state variables and expressed as state variables;
Assuming that all nodes are deployed with sensors and one sensor is deployed in the positive direction of each line, the sensors deployed on the nodes measureActive injection power of each node, and the sensors arranged on the line measureThe positive active current of a line, the number of measured values then beingA plurality of the components, wherein,since the power flow equation is linear, it is expressed as:
wherein,representing the measured values of node active injected power and transmission line active current,a measurement matrix is represented that represents the measurement matrix,in (1)In order to be able to count the number of measured values,the number of the nodes is the number of the nodes after the balance nodes are removed;
measuring matrixRelated to the topological structure of the power grid and the parameters of the transmission line, the linear structural form is as follows:
wherein, the matrixKnown as transmission line node connection array, matrixDiagonal matrix, called transmission line susceptance valueTransferring factor arrays, matrices, to transmission line nodesA reversible symmetric susceptance matrix;
power transmission line node connection arrayOf (2) element(s)Representation matrixIn positionElement of (2), transmission lineIndicating the line connection nodeAndthen matrixEach element of (1)Write as:
transmission line susceptance value diagonal matrixOnly diagonal elements have values, whose diagonal elementsSusceptance value of negative valueI.e. connecting nodesTransmission line ofExcept for the diagonal elements, the other elements are all 0;
matrix ofTransferring factor arrays, matrices, to transmission line nodesIs a reversible symmetrical susceptance matrix, and according to a direct current power flow equation,
wherein,representing a positive active current column vector of the power transmission line;representing the column vector of the active injection power of the node;representing a node voltage phase angle column vector;
the measured values comprise node active injected powerAnd the active current of the transmission lineWhich is represented as:
the state variables of the dc state estimation are voltage phase angles:
for dc state estimation, a weighted minimum variance optimization problem needs to be solved:
wherein,a column vector representing the measurement values is represented,representing the state estimation result, matrixIs a diagonal matrix whose diagonal elements are the inverse of the variance of the measured noise,
wherein,respectively correspond to the measured valuesThe inverse of the variance of the noise of (c),,
the bad data detector is used for identifying data in the state estimation procedure, judging whether abnormal data is mixed into the original data or not, and the residual calculation formula is as follows:
the mechanism of the bad data detector is shown as follows:
wherein the threshold valueWith confidence ofIs tested to determine that,in accordance with the degree of freedom ofThe distribution of the number of the card is as follows,,for the standard deviation of the measurement error,is the confidence level;
step 1-2) establishing a moving target defense model based on flexible switching of a standby line, which comprises the following specific steps:
the parameters of the transmission line are changed by putting into a standby line, under the condition, the working mode of the transmission line is changed from the working of a single transmission line into the working mode of two parallel transmission lines, the reactance parameters of the transmission line are halved, and the susceptance parameters are doubled:
To transmission line node connection arrayAnd transmission line susceptance value diagonal matrixRewriting to analyze the measurement matrix more deeplyThe changes that occur before and after the drop of a spare line are first constructed as a vector of the following three bases:at a position thereofIs 1, and the elements in the remaining positions are 0;at a position thereofIs 1, and the elements in the remaining positions are 0At the position ofIs 1, positionIs-1 and the remaining positions are 0, then,from these three vectors are rewritten as:
after the spare line has been put into operation,the matrix is not changed and the matrix is not changed,the matrix becomesWhich is represented as:
transmission line node transfer factor arrayAnd a reversibly symmetrical susceptance matrixAmount of change ofAndcan also be expressed:
wherein,from the derivation, the matrixIn the first placeThe rows contain non-0-elements, the matrixIn the first placeColumns contain non-zero elements;
the relation of the measurement matrix before and after the standby line is put into is as follows:
construct outThe attack vector of (a) can have an effect on the state estimation result,is the amount of change in the state estimation result; but the measurement matrix has become after the spare line is put into useAccording to the residual calculation formula, the residual calculation result at this time is:
in the measuring matrixMiddle and row vector dimensionGreater than the column vector dimension,The residual error is not a unit array, namely, the residual error result obtained by calculation after the parameters of the power transmission line are changed by putting a spare line is not 0;
in the measurement matrix, each column of elements represents a measurement value associated with a node if the attacker followsDesigned attack vectorFrom a measuring matrixThe spatial linear expression of the column vector is,then the dummy data injection attack is effective, assuming that the column vector of the measurement matrix corresponding to a node is an attack space, usingAnd representing the intersection of the two, the column space dimension of the two is the representation of the attack space:
whereinAndrespectively the measurement matrixes before and after the standby circuit is put into use,is composed ofAndan intersection term on a column vector space;
the step 1-3) provides an optimization algorithm for flexibly configuring the standby line according to the threats faced by the power system, and the optimization algorithm specifically comprises the following steps:
based on a direct current optimal power flow algorithm, an optimization algorithm which aims at minimizing the number of attack spaces and the system power generation cost is designed, and the mathematical expression of the optimization algorithm is as follows:
wherein,the decision variables respectively represent the phase angle of a voltage vector, the standby circuit input switch parameters and the active output of the generator, wherein 1 represents the input standby circuit, and 0 represents the non-input standby circuit; the first in the constraints indicates that the nodes inject active power balance,the active power output of the generator is provided,in order to be the load of the node,a reversibly symmetric susceptance matrix; the second equation is the generator output limit,respectively representing the maximum and minimum values of the output of the generator, the third formula is branch power flow limit,in order to be a branch flow,respectively representing the maximum value and the minimum value of the branch power flow; the fourth expression indicates whether or not a spare line is put in,for the number of transmission lines, the calculation mode of susceptance parameter becomes(ii) a Objective functionTo minimize the amount of attack spaceAnd system power generation cost,The representation includes a generatorThe node number of (a) is set,the punishment coefficients of the two are respectively; the cost of each generator is calculated as followsRepresents the cost factor:
and aiming at the result obtained by optimization, estimating the detection rate of the bad data detector to the false data injection attack by adopting a Monte Carlo method, which comprises the following steps: (1) constructing an attack vector by a method for generating random numbers, wherein the attacked nodes and the tampering degree are random; (2) total number of initiations isFalse data injection attacks; (3) detecting a state estimation result by adopting a bad data detector based on a result obtained by optimization; (4) estimating the detection rate of the bad data detector to the false data injection attack, wherein the detection rate is the ratio of the number of times of detecting abnormal data to the total number of times:
the detection rate is used as an index for evaluating the defense performance of the provided moving target in resisting false data injection attack;
step 2-1) generating original data of the power system, which comprises the following specific steps: performing original load flow calculation to obtain power grid topological structure information, power transmission line information and original load flow data, wherein the data to be obtained is as follows:
wherein,in order to be the information of the node,indicating the number of nodes other than the balancing node,the number of the transmission lines is shown,as the information on the power transmission line,is a variable of the state of the system,for transmission line reactance parameters, measured valuesIncluding node active injected powerAnd the active current of the transmission line;
Step 2-2) carrying out direct current state estimation on the original data to obtain correct parameters, which are as follows:
first based on the obtained topology informationNode informationAnd the transmissionInformation of electric lineAnd transmission line parameter informationConstructing a measurement matrix,
Wherein,is a reversible symmetrical susceptance matrix,a factor array is transferred for the transmission line node,the array is connected with the power transmission line nodes,the power transmission line susceptance value is a diagonal array;
and then carrying out state estimation to obtain an optimal estimation value:
wherein,as a result of the estimation of the state of the system,in order to measure the matrix of the measurements,is a diagonal matrix whose diagonal elements are the inverse of the variance of the measured noise,representing a column vector of measurement values;
identifying bad data of the obtained state estimation result, detecting the bad data by using a bad data detector, and judging whether abnormal data is mixed;
step 2-3) initiates a false data injection attack aiming at the direct current state estimation result, which comprises the following steps
wherein,in order to measure the matrix of the measurements,in order for the state estimation result to change by an amount,is an attack vector;
and secondly, superposing the designed attack vector to the measurement:
wherein,is the original measured value of the system,in order to be a vector of attacks,measuring values after the false data injection attack;
further, the state estimation result becomes:
wherein,as a result of the estimation of the original state of the system,for the amount of change in the state estimation result,estimating a result for a state subjected to a spurious data injection attack;
thirdly, detecting by using a bad data detector, wherein a residual error calculation formula is as follows:
wherein,for the residual calculation after being subjected to a spurious data injection attack,calculating a result for a residual not suffering from a spurious data injection attack;
step 2-4) the bad data detector detects the false data injection attack by switching the standby line, which comprises the following steps:
assuming that the working mode of the power transmission line of the original power grid is the working mode of a single power transmission line, the parameters of the power transmission line are changed by putting a standby line, in this case, the power transmission line is changed into two working modes which are connected in parallel, the reactance parameters of the power transmission line are halved, and the susceptance parameters of the power transmission line are doubled:
wherein,is the susceptance parameter of the power transmission line,the changed susceptance parameter of the power transmission line is obtained;
after the transmission line parameters of the system change, load flow calculation is carried out again to obtain data, then state estimation is carried out, and at the moment, the measurement matrixBecome into:
Wherein,for the altered reversibly symmetrical susceptance matrix,for the changed transmission line node transfer factor array,for the changed diagonal array of the susceptance values of the transmission line,connecting arrays for the transmission line nodes;
and (3) launching a false data injection attack aiming at the changed power system, and then executing a bad data identification function by using a bad data detector, wherein a residual calculation formula is as follows:
wherein,for the residual calculation result after the transmission line parameter is changed,to measure values after being subject to a spurious data injection attack,in order to change the measurement matrix after the change,for state estimation results after being subject to a spurious data injection attack,
the bad data detector can detect abnormal data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210902074.9A CN114978775B (en) | 2022-07-29 | 2022-07-29 | Moving target defense method based on flexible switching of standby lines |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210902074.9A CN114978775B (en) | 2022-07-29 | 2022-07-29 | Moving target defense method based on flexible switching of standby lines |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114978775A CN114978775A (en) | 2022-08-30 |
CN114978775B true CN114978775B (en) | 2022-11-18 |
Family
ID=82969787
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210902074.9A Active CN114978775B (en) | 2022-07-29 | 2022-07-29 | Moving target defense method based on flexible switching of standby lines |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114978775B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115694904A (en) * | 2022-09-28 | 2023-02-03 | 东南大学 | Moving target defense method and device based on reinforcement learning and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112636323A (en) * | 2020-09-29 | 2021-04-09 | 中国南方电网有限责任公司超高压输电公司 | Method for optimizing defense strategy of alternating current-direct current system facing cooperative attack |
CN114124546A (en) * | 2021-11-25 | 2022-03-01 | 广东电网有限责任公司 | Hidden type moving target defense strategy generation method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107819785B (en) * | 2017-11-28 | 2020-02-18 | 东南大学 | Double-layer defense method for false data injection attack of power system |
-
2022
- 2022-07-29 CN CN202210902074.9A patent/CN114978775B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112636323A (en) * | 2020-09-29 | 2021-04-09 | 中国南方电网有限责任公司超高压输电公司 | Method for optimizing defense strategy of alternating current-direct current system facing cooperative attack |
CN114124546A (en) * | 2021-11-25 | 2022-03-01 | 广东电网有限责任公司 | Hidden type moving target defense strategy generation method and device |
Non-Patent Citations (2)
Title |
---|
《Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid》;Zhenyong Zhang等;《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》;20190715;正文第1-16页 * |
输电网虚假数据攻击研究综述;王先培等;《电网技术》;20161130(第11期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114978775A (en) | 2022-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kim et al. | On topology attack of a smart grid: Undetectable attacks and countermeasures | |
Kang et al. | False data injection attacks on contingency analysis: Attack strategies and impact assessment | |
Rahman et al. | A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids | |
CN114978775B (en) | Moving target defense method based on flexible switching of standby lines | |
CN111723366A (en) | Error data injection attack robust detection method based on state estimation deviation | |
Salehghaffari et al. | Resilient power grid state estimation under false data injection attacks | |
Youssef et al. | False data injection attacks against state estimation in smart grids: Challenges and opportunities | |
Lukicheva et al. | Cyberattack detection in intelligent grids using non-linear filtering | |
Kumar et al. | Efficient detection of false data injection attacks on AC state estimation in smart grids | |
Nayak et al. | Modelling false data injection attacks against non-linear state estimation in ac power systems | |
CN116915513B (en) | False data injection attack detection method and device | |
CN117494190A (en) | Distributed invisible FDIA detection method for power distribution network considering attack preference and data privacy | |
CN112737107A (en) | Power distribution network PMU configuration method considering observability and FDIA defensive property | |
CN111726323B (en) | PMU (phasor measurement unit) deployment-based error data injection attack defense method in smart power grid | |
Yang et al. | Towards optimal pmu placement against data integrity attacks in smart grid | |
CN114928500B (en) | Attack detection method and device for data injection enabled power grid network parameters | |
Kumari et al. | Euclidean detector based cyber attack detection in automatic generation control | |
Rashed et al. | State estimation in the presence of cyber attacks using distributed partition technique | |
Wang et al. | UIO-based cyber attack detection and mitagation scheme for load frequency control system | |
Rahman et al. | Imperfect nonlinear false data injection attack against largest normalized residual test | |
Wang et al. | Data framing attacks against nonlinear state estimation in smart grid | |
Khazaei | Detection of cyber-physical attacks aiming at multi transmission line congestions using dynamic state-estimation | |
Zhang et al. | Performance Analysis of Chi-square Detection for False Data Injection Attack | |
Alayande et al. | Modelling and Countermeasures of False Data Injection Attacks Against State Estimation in Power Systems | |
CN108596361B (en) | Selection method for practical measurement protection scheme of power system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |