Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A power system false data injection attack identification method based on generative adversarial network

A false data attack, power system technology, applied in the field of power system operation safety and maintenance, can solve problems such as difficulty in walking, the scale cannot meet the training conditions, and has little practical significance, achieving good industrial practicability and overcoming the effect of sample shortage.

Active Publication Date: 2019-01-08
GUANGXI UNIV
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The reason why the first type of methods cannot be well applied is that they usually need to be based on strong assumptions, such as: the state variables in the system follow a specific distribution, FDAA affects the state estimation of the power system by manipulating instrument measurements, etc.
Too strong assumptions often make these methods difficult to use in real work
The disadvantage of the second type of methods is that they rely on the huge training samples of FDAA exceptions, and the size of abnormal samples in reality is often not up to the training conditions of these methods
These two types of deficiencies make the methods in the existing literature rarely have practical significance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A power system false data injection attack identification method based on generative adversarial network
  • A power system false data injection attack identification method based on generative adversarial network
  • A power system false data injection attack identification method based on generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the technical solution of the present invention will be further described in detail below in combination with the specific implementation forms of the model.

[0061] A method for identifying false data attacks in a power system based on an adversarial generative network, comprising the following steps:

[0062] Step 1. Establish a linear state estimation model, take the state quantity of the power system as an uncertain set, and model it with the telemetry, Jacobian matrix and noise in the power system; by minimizing the noise, the estimated state quantity can be solved and the estimated state can be inversely deduced The estimated quantity corresponding to the quantity is measured; the difference between the estimated quantity measurement and the real quantity measurement is obtained to obtain the residual quantity measurement; the residual quantity measur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power system false data injection attack (FDIA) identification method based on a generative adversarial network. The method comprises the following steps of: 1, obtaining residual error measurement, estimating quantity and real quantity measurement by pre-processing based on state estimation, and reserving the residual error measurement and real quantity measurement as detected data of FDIA; 2, detecting and filtering bad data base on a two-norm threshold value for residual error measurement; 3, discriminating whether that FDIA exist or not by using a discriminant model based on the generative adversarial network; 4, generating positioning residual data by a generation model base on the generative adversarial network, detecting the positioning residual data by a two-norm threshold value to locate the problem data and filter the problem data. The invention simplifies the too strong hypothesis condition in the traditional method, the model training does not depend on the large-scale FDIA abnormal data sample, and the practical requirement of the industry for the detection of the measurement data containing FDIA is met.

Description

technical field [0001] The invention belongs to the technical field of power system operation safety maintenance, and in particular relates to a false data attack identification method of a power system based on an adversarial generation network. Background technique [0002] For a long time, the traditional power grid often pays the most attention to whether the power quality is up to standard and reliable, and whether the power equipment is safe and economical, which has caused the neglect of power system network security. However, nowadays, driven by demand-side reforms, the composition of the modern power market is much richer than that of the traditional power grid, and a large number of communication devices have been introduced accordingly. my country's power grid has also gradually transformed and upgraded from the traditional power grid to a nationwide Cyber-Physical Coupling Network. Under this background, the network security problem of power system becomes more a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06N3/04G06N3/08
CPCG06F21/55G06N3/084G06N3/048G06N3/045
Inventor 覃智君黄小歌
Owner GUANGXI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products