Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for identifying false data attacks in power systems based on adversarial generative networks

A false data attack, power system technology, applied in biological neural network models, neural learning methods, platform integrity maintenance, etc.

Active Publication Date: 2021-05-07
GUANGXI UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The reason why the first type of methods cannot be well applied is that they usually need to be based on strong assumptions, such as: the state variables in the system follow a specific distribution, FDAA affects the state estimation of the power system by manipulating instrument measurements, etc.
Too strong assumptions often make these methods difficult to use in real work
The disadvantage of the second type of methods is that they rely on the huge training samples of FDAA exceptions, and the size of abnormal samples in reality is often not up to the training conditions of these methods
These two types of deficiencies make the methods in the existing literature rarely have practical significance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for identifying false data attacks in power systems based on adversarial generative networks
  • A method for identifying false data attacks in power systems based on adversarial generative networks
  • A method for identifying false data attacks in power systems based on adversarial generative networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the technical solution of the present invention will be further described in detail below in combination with the specific implementation forms of the model.

[0061] A method for identifying false data attacks in a power system based on an adversarial generative network, comprising the following steps:

[0062] Step 1. Establish a linear state estimation model, take the state quantity of the power system as an uncertain set, and model it with the telemetry, Jacobian matrix and noise in the power system; by minimizing the noise, the estimated state quantity can be solved and the estimated state can be inversely deduced The estimated quantity corresponding to the quantity is measured; the difference between the estimated quantity measurement and the real quantity measurement is obtained to obtain the residual quantity measurement; the residual quantity measur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power system false data attack (False Data Injection Attack, FDIA) identification method based on an adversarial generation network. Quantity measurement, reserved as the detected data of FDIA; Step 2, based on the two-norm threshold detection and filtering of bad data for the residual measurement; Step 3, use the discriminant model based on the confrontation generation network to discriminate whether the FDAA exists; 4. Use the generative model based on the confrontation generation network to generate positioning residual data, and perform two-norm threshold detection on the positioning residual data to locate and filter out the problem data. The invention simplifies the overly strong assumptions in the traditional method, the model training does not depend on large-scale FDAA abnormal data samples, and meets the practical requirements of the industry for the detection of FDAA-containing measurement data.

Description

technical field [0001] The invention belongs to the technical field of power system operation safety maintenance, and in particular relates to a false data attack identification method of a power system based on an adversarial generation network. Background technique [0002] For a long time, the traditional power grid often pays the most attention to whether the power quality is up to standard and reliable, and whether the power equipment is safe and economical, which has caused the neglect of power system network security. However, nowadays, driven by demand-side reforms, the composition of the modern power market is much richer than that of the traditional power grid, and a large number of communication devices have been introduced accordingly. my country's power grid has also gradually transformed and upgraded from the traditional power grid to a nationwide Cyber-Physical Coupling Network. Under this background, the network security problem of power system becomes more a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06N3/04G06N3/08
CPCG06F21/55G06N3/084G06N3/048G06N3/045
Inventor 覃智君黄小歌
Owner GUANGXI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products