Font Size: a A A

Research On The Key Technology Of Power System Malicious Attack Detection

Posted on:2018-08-24Degree:MasterType:Thesis
Country:ChinaCandidate:L P ZhangFull Text:PDF
GTID:2348330536469543Subject:Electrical Engineering Power Information Technology
Abstract/Summary:PDF Full Text Request
With the extensive application of computer technology and communication technology in power system,the traditional dial measurement system was gradually upgraded to a digitized,automated and highly informative modern measurement system.The detection and monitoring of operator-dependent experience was replaced by an efficient automated data acquisition and inspection system that reduces the risk of man-made fault accidents in the power system and improves operational safety.However,the false data injection attacks(FDIAs)and the events using hacking technology attacks on power system have brought new threats to the security of the power system.In the context,this paper studies the direct attack power system based on the communication protocol,tested the traditional bad data detection methods on the FDIAs,proposes a novel method based on data relationship graph to detect and identify the FDIAs.The outputs of the thesis are listed as follows.The transmission function test and a series of attack tests aimed at breaking the forward isolation device into the production control area of the power system are carried out for the forward isolation device.In these test,the forward isolation passed the test and was working properly.But during the test,the potential vulnerabilities were found.This paper also researches the principle of the false data injection attacks,realizes the FDIAs on four-nodes power system simulation and proves that the traditional data detection methods based on residual could not effectively detec t the FDIAs.The data detection method based on data relationship graph is proposed at the end of paper.It compares two data relationship graph(normal and bad data or false data in)to detect and identify the bad data or false data.And its correctness was verified on four-nodes power system simulation.
Keywords/Search Tags:Power system, Isolation device, Bad data detection, Data relationship graph
PDF Full Text Request
Related items