期刊文献+

基于Cyber-net与无监督学习的电网调度网络安全态势感知方法 被引量:3

Security Situational Awareness Method for Power Grid Dispatching Network Based on Cyber-net and Unsupervised Learning
下载PDF
导出
摘要 在电网运行过程中,如果调度网络受到攻击,容易出现安全漏洞,导致电网调度安全性降低,为此,提出基于Cyber-net与无监督学习的电网调度网络安全态势感知方法。构建电网调度网络隔离性安全检测模型,引入综合风险指标作为电网的三层评估指标,建立电网调度的可靠性指标计算体系;通过引入期望负荷削减参数,实现电网调度安全性频率特征监测;基于负荷削减平均持续风险指标评估,设置电网调度的安全允许条件;结合风险评估和负荷参数检测,采用Cyber-net构建电网控制模型;采用无监督学习的方法,通过接入和分散式调度,实现电网的安全态势感知。测试表明,该方法进行电网调度网络安全态势感知的准确性较高,能够提高并网控制的安全性。 In the power network operation,when the dispatching network is attacked,it is prone to have security holes and reduce the security of power grid dispatching.Therefore,a security situation awareness method based on Cyber-net and unsupervised learning is proposed.The isolation security detection model of power grid dispatching network is constructed,the comprehensive risk index is introduced as the three-tier evaluation index of power grid,and the reliability index calculation system of power grid dispatching is established.By introducing the expected load reduction parameter,the frequency characteristic monitoring of power grid dispatching security is realized.Based on the assessment of the average continuous risk index of load reduction,the safety allowable conditions for power grid dispatching are set.Combined with risk assessment and load parameter detection,Cyber-net is used to build the power grid control model.The unsupervised learning method is adopted to realize the security situation awareness of power grid through access and decentralized scheduling.The test shows that the method has high accuracy of network security situation awareness and can improve the security of grid connection control.
作者 张伟 纪巍 ZHANG Wei;JI Wei(State Grid East Inner Mongolia Electric Power Co.,Ltd.,Huhhot 010020,China)
出处 《微型电脑应用》 2023年第10期197-200,共4页 Microcomputer Applications
关键词 Cyber-net 无监督学习 电网调度 网络安全 Cyber-net unsupervised learning power grid dispatching network security
  • 相关文献

参考文献10

二级参考文献87

  • 1宋晓通,谭震宇.改进的重要抽样法在电力系统可靠性评估中的应用[J].电网技术,2005,29(13):56-59. 被引量:50
  • 2程代展,郭宇骞.切换系统进展[J].控制理论与应用,2005,22(6):954-960. 被引量:57
  • 3Abusalah L, Khokhar A, Guizani M. A survey of secure mobile Ad Hoc routing protocols [ J ]. IEEE Communications Surveys&Tutorials, 2008,10 (4) :78 - 93. 被引量:1
  • 4Brutch P, Ko C. Challenges in Intrusion Detection for Wireless Ad -hoc Networks[ J]. In: 2003 Symposium on Applications and the intemet Workshops (SAINT'03 Workshops),2003. 被引量:1
  • 5Varadharajan V, Shankaran R, Hitchens M. Security for cluster based Ad Hoc networks [ J ]. Computer Communication, 2004,27 (5) :488 -501. 被引量:1
  • 6Yongguang Zhang, Wenke Lee. Intrusion Detection in Wireless AdHoc Networks [C]//Proceedings of the 6thAnnual International Conference on Mobile Computing and Networking. Boston:Massa- chussetts ,2000:6 - 11. 被引量:1
  • 7Jun C, Xiaowei C. Intrusion Detection System Research Based on Data Mining for IPv6 [ C ] //J Information Technology and Applica- tions (IFITA), 2010 International Forum on. IEEE, 2010, 1 : 384 -388. 被引量:1
  • 8Yu Z. Study on intrusion IPv6 detection system on LINUX [ C ]// Computational Intelligence and Industrial Applications, 2009. PA- CIIA 2009. Asia - Pacific Conference on. IEEE, 2009, 2 : 5 - 8. 被引量:1
  • 9Jun C, Xiaowei C. Intrusion Detection System Research Based on Data Mining for IPv6 [ C ] JJ Information Technology and Applica- tions (IFITA), 2010 International Forum on. IEEE, 2010, 1: 384 - 388. 被引量:1
  • 10吴文传,宁辽逸,张伯明,孙宏斌.电力系统在线运行风险评估与决策[J].电力科学与技术学报,2009,24(2):28-34. 被引量:18

共引文献204

同被引文献21

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部