Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting power grid false data injection attacks

A technology of injecting attacks and fake data, applied in electrical components, biological neural network models, instruments, etc., can solve problems such as threats to the stable operation of power grids, power outage losses, and impact on smart grids, achieving simple construction, fast convergence, and improved detection efficiency. Effect

Inactive Publication Date: 2020-04-17
STATE GRID ZHEJIANG ELECTRIC POWER CO LTD HANGZHOU POWER SUPPLY CO +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Malicious network attacks, such as false data injection attacks (false data injection attack, FDIA), etc., can tamper with the measurement data in SCADA, thereby affecting the results of smart grid state estimation, seriously threatening the stable operation of the power grid, and even causing large-scale power outage losses, such as Recent grid attacks in Ukraine and Venezuela

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting power grid false data injection attacks
  • Method for detecting power grid false data injection attacks
  • Method for detecting power grid false data injection attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical scheme of the present invention is described in detail below in conjunction with accompanying drawing:

[0035] The false data injection attack detection model proposed by the present invention is divided into two links of training and detection. The purpose of training is to determine the relevant parameters in the deep neural network to realize online detection of fake data injection attacks. Therefore, the two links are similar in process. The difference is that the unknown parameters in the deep neural network are determined first in the training link, and then the trained deep neural network is used for online detection in the detection link, that is, the presence / absence of false data injection is realized. Attacks on binary classification problems.

[0036] figure 1 It is a flow chart of the false data injection attack detection method proposed by the present invention. The power grid terminal uploads the collected operating state information to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

PropertyMeasurementUnit
Lengthaaaaaaaaaa
Login to View More

Abstract

The invention discloses a method for detecting power grid false data injection attacks. The method comprises the following steps of: calculating to obtain a system running state estimation value according to data acquired by a power grid terminal, extracting time-frequency characteristic data of each time period from the state estimation value by using wavelet transform, and inputting the time-frequency characteristic data into a deep neural network to classify whether false data injection attacks exist or not, and outputting a detection result. The method can be directly used for detecting the state estimation result of the power system, and the detection result can indicate whether the state estimation of the power system is affected by false data injection attacks or not.

Description

technical field [0001] The invention relates to a method for detecting whether there is a false data injection attack in a power grid. Background technique [0002] The core link of power system operation and control is state estimation, which calculates the actual operating state of the power grid through the power grid state information collected in the data acquisition and monitoring system (SCADA). [0003] Malicious network attacks, such as false data injection attacks (false data injection attack, FDIA), etc., can tamper with the measurement data in SCADA, thereby affecting the results of smart grid state estimation, seriously threatening the stable operation of the power grid, and even causing large-scale power outage losses, such as Recent grid attacks in Ukraine and Venezuela. How to detect whether there is a malicious attack on the power grid is a necessary prerequisite for timely taking protective measures to ensure the stable operation of the power grid. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06K9/62G06N3/04
CPCH04L63/1416H04L63/1466G06N3/045G06F18/24
Inventor 赵友国蒋正威陶涛张超王立建张静卢敏阙凌燕隋向阳逄春姜辰曹张洁杨帆黄铭郭抒然赵泓张若伊孙伟乐贾和东
Owner STATE GRID ZHEJIANG ELECTRIC POWER CO LTD HANGZHOU POWER SUPPLY CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products