作为一种特殊的网络攻击形式,负荷重分配LR(load redistribution)攻击受到了越来越多的关注,同时可控串联补偿器TCSC(thyristor controlled series compensation)在实际电网中得到了广泛的应用。为此,研究了LR攻击和TCSC接入对电力系统...作为一种特殊的网络攻击形式,负荷重分配LR(load redistribution)攻击受到了越来越多的关注,同时可控串联补偿器TCSC(thyristor controlled series compensation)在实际电网中得到了广泛的应用。为此,研究了LR攻击和TCSC接入对电力系统运行可靠性的影响。分析了LR攻击的作用原理,建立了考虑LR攻击和TCSC接入的系统负荷削减双层优化模型;提出了基于非序贯蒙特卡洛模拟的考虑LR攻击和TCSC接入的可靠性评估算法,并定义了反映LR攻击严重程度的评价指标。以IEEE RTS79修改系统为例进行了算例分析,算例结果验证了提出的负荷削减模型和可靠性评估算法的正确性。展开更多
A nearest-neighbor-based detector against load redistribution attacks is presented.The detector is designed to scale from small-scale to very large-scale systems while guaranteeing consistent detection performance.Ext...A nearest-neighbor-based detector against load redistribution attacks is presented.The detector is designed to scale from small-scale to very large-scale systems while guaranteeing consistent detection performance.Extensive testing is performed on a realistic large-scale system to evaluate the perfor-mance of the proposed detector against a wide range of attacks,from simple random noise attacks to sophisticated load redistribution attacks.The detection capability is analyzed against different attack parameters to evaluate its sensitivity.A statistical test that leverages the proposed detector is introduced to identify which loads are likely to have been maliciously modified,thus,localizing the attack subgraph.This test is based on ascribing to each load a risk measure(probability of being attacked)and then computing the best posterior likelihood that minimizes log-loss.展开更多
基金the National Science Foundation(No.CNS-1449080,No.OAC-1934766)the Power System Engineering Research Center(PSERC)under projects S-72 and S-87。
文摘A nearest-neighbor-based detector against load redistribution attacks is presented.The detector is designed to scale from small-scale to very large-scale systems while guaranteeing consistent detection performance.Extensive testing is performed on a realistic large-scale system to evaluate the perfor-mance of the proposed detector against a wide range of attacks,from simple random noise attacks to sophisticated load redistribution attacks.The detection capability is analyzed against different attack parameters to evaluate its sensitivity.A statistical test that leverages the proposed detector is introduced to identify which loads are likely to have been maliciously modified,thus,localizing the attack subgraph.This test is based on ascribing to each load a risk measure(probability of being attacked)and then computing the best posterior likelihood that minimizes log-loss.