[go: up one dir, main page]

CN113704750A - Network attack detection method and device of distributed power generation system and terminal equipment - Google Patents

Network attack detection method and device of distributed power generation system and terminal equipment Download PDF

Info

Publication number
CN113704750A
CN113704750A CN202110994679.0A CN202110994679A CN113704750A CN 113704750 A CN113704750 A CN 113704750A CN 202110994679 A CN202110994679 A CN 202110994679A CN 113704750 A CN113704750 A CN 113704750A
Authority
CN
China
Prior art keywords
power generation
distributed
generation system
micro
increase rate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110994679.0A
Other languages
Chinese (zh)
Inventor
侯波涛
曾四鸣
左晓军
郗波
郭禹伶
常杰
刘惠颖
刘硕
王颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Hebei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Hebei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Electric Power Research Institute of State Grid Hebei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202110994679.0A priority Critical patent/CN113704750A/en
Publication of CN113704750A publication Critical patent/CN113704750A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Virology (AREA)
  • Supply And Distribution Of Alternating Current (AREA)

Abstract

本发明适用于电力系统技术领域,提供了一种分布式发电系统的网络攻击检测方法、装置及终端设备,该方法包括:获取分布式发电系统中各个分布式发电机的连接关系和运行参数;基于连接关系建立分布式发电系统的无向图模型;基于运行参数建立分布式发电系统的调度优化模型;基于调度优化模型和无向图模型确定各个分布式发电机的微增率;基于邻域守望机制根据微增率确定分布式发电系统的网络攻击检测结果。本发明提供的分布式发电系统的网络攻击检测方法能够基于邻域守望机制有效进行网络攻击的检测,充分保护分布式发电系统的信息安全,保障系统安全稳定运行。

Figure 202110994679

The present invention is applicable to the technical field of electric power systems, and provides a network attack detection method, device and terminal equipment for a distributed power generation system. The method includes: acquiring the connection relationship and operation parameters of each distributed generator in the distributed power generation system; The undirected graph model of the distributed generation system is established based on the connection relationship; the dispatching optimization model of the distributed generation system is established based on the operating parameters; the micro-increase rate of each distributed generator is determined based on the dispatching optimization model and the undirected graph model; based on the neighborhood The Overwatch mechanism determines the detection results of network attacks on the distributed power generation system according to the micro-increase rate. The network attack detection method of the distributed power generation system provided by the invention can effectively detect the network attack based on the neighborhood watch mechanism, fully protect the information security of the distributed power generation system, and ensure the safe and stable operation of the system.

Figure 202110994679

Description

分布式发电系统的网络攻击检测方法、装置及终端设备Network attack detection method, device and terminal equipment for distributed power generation system

技术领域technical field

本发明属于电力系统技术领域,尤其涉及一种分布式发电系统的网络攻击检测方法、装置及终端设备。The invention belongs to the technical field of power systems, and in particular relates to a network attack detection method, device and terminal equipment of a distributed power generation system.

背景技术Background technique

分布式发电系统由于具有高效、清洁、可持续发展的突出特点,因此是电力系统未来的重要发展趋势之一。分布式发电系统中单个分布式发电机的容量小,各个分布式发电机的地理位置分散,需要更适合分布式场景的分布式控制方法。然而分布式控制对通信的依赖性较高,容易成为网络攻击的标靶。Distributed power generation system is one of the important development trends of the power system in the future due to its outstanding characteristics of high efficiency, cleanliness and sustainable development. The capacity of a single distributed generator in a distributed power generation system is small, and the geographical locations of each distributed generator are scattered, which requires a distributed control method that is more suitable for distributed scenarios. However, distributed control is highly dependent on communication, which makes it easy to become the target of network attacks.

在分布式节点之间的局部通信过程中,各个节点对于系统的全局信息掌握不足,各发电主体的通信和交互安全性较低,难以实现对恶意数据和恶意节点的检测。In the process of local communication between distributed nodes, each node has insufficient grasp of the global information of the system, and the communication and interaction security of each power generation subject is low, making it difficult to detect malicious data and malicious nodes.

发明内容SUMMARY OF THE INVENTION

有鉴于此,本发明实施例提供了一种分布式发电系统的网络攻击检测方法、装置及终端设备,能够有效实现分布式发电系统中恶意数据和恶意节点的检测。In view of this, the embodiments of the present invention provide a network attack detection method, device and terminal device for a distributed power generation system, which can effectively realize the detection of malicious data and malicious nodes in the distributed power generation system.

本发明实施例的第一方面提供了一种分布式发电系统的网络攻击检测方法,包括:A first aspect of the embodiments of the present invention provides a network attack detection method for a distributed power generation system, including:

获取分布式发电系统中各个分布式发电机的连接关系,基于所述连接关系建立所述分布式发电系统的无向图模型;acquiring the connection relationship of each distributed generator in the distributed power generation system, and establishing an undirected graph model of the distributed power generation system based on the connection relationship;

获取分布式发电系统中各个分布式发电机的运行参数,基于所述运行参数建立所述分布式发电系统的调度优化模型;Obtaining operating parameters of each distributed generator in the distributed power generation system, and establishing a scheduling optimization model of the distributed power generation system based on the operating parameters;

基于所述调度优化模型和所述无向图模型确定所述分布式发电系统中各个分布式发电机的微增率;determining the micro-increase rate of each distributed generator in the distributed power generation system based on the scheduling optimization model and the undirected graph model;

基于邻域守望机制根据所述微增率确定所述分布式发电系统的网络攻击检测结果。A network attack detection result of the distributed power generation system is determined according to the micro-increase rate based on a neighborhood watch mechanism.

本发明实施例的第二方面提供了一种分布式发电系统的网络攻击检测装置,包括:A second aspect of the embodiments of the present invention provides a network attack detection device for a distributed power generation system, including:

无向图模型建立模块,用于获取分布式发电系统中各个分布式发电机的连接关系,基于所述连接关系建立所述分布式发电系统的无向图模型;an undirected graph model establishment module, used for acquiring the connection relationship of each distributed generator in the distributed power generation system, and establishing an undirected graph model of the distributed power generation system based on the connection relationship;

调度优化模型建立模块,用于获取分布式发电系统中各个分布式发电机的运行参数,基于所述运行参数建立所述分布式发电机的调度优化模型;a dispatching optimization model establishment module, used for acquiring the operating parameters of each distributed generator in the distributed power generation system, and establishing a dispatching optimization model of the distributed generator based on the operating parameters;

微增率计算模块,用于基于所述调度优化模型确定所述分布式发电系统中各个分布式发电机的微增率;a micro-increase rate calculation module, configured to determine the micro-increase rate of each distributed generator in the distributed power generation system based on the dispatch optimization model;

检测结果生成模块,用于基于邻域守望机制根据所述微增率确定所述分布式发电系统的网络攻击检测结果。A detection result generation module, configured to determine a network attack detection result of the distributed power generation system according to the micro-increase rate based on a neighborhood watch mechanism.

本发明实施例的第三方面提供了一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如上所述方法的步骤。A third aspect of the embodiments of the present invention provides a terminal device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, when the processor executes the computer program Implement the steps of the method as described above.

本发明实施例的第四方面提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时实现如上所述方法的步骤。A fourth aspect of the embodiments of the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, implements the steps of the above method.

本发明实施例的第五方面提供了一种计算机程序产品,当计算机程序产品在终端设备上运行时,使得电子设备执行上述第一方面中任一项所述方法的步骤。A fifth aspect of the embodiments of the present invention provides a computer program product, which, when the computer program product runs on a terminal device, causes the electronic device to perform the steps of the method in any one of the foregoing first aspects.

本发明实施例与现有技术相比存在的有益效果是:本发明实施例提供了一种分布式发电系统的网络攻击检测方法,包括获取分布式发电系统中各个分布式发电机的连接关系和运行参数;基于连接关系建立分布式发电系统的无向图模型;基于运行参数建立分布式发电系统的调度优化模型;基于调度优化模型和无向图模型确定各个分布式发电机的微增率;基于邻域守望机制根据微增率确定分布式发电系统的网络攻击检测结果。本发明实施例提供的分布式发电系统的网络攻击检测方法能够基于邻域守望机制有效进行网络攻击的检测,充分保护分布式发电系统的信息安全,保障系统安全稳定运行。Compared with the prior art, the embodiments of the present invention have the following beneficial effects: the embodiments of the present invention provide a network attack detection method for a distributed power generation system, which includes acquiring the connection relationship of each distributed generator in the distributed power generation system and the Operating parameters; establishing an undirected graph model of the distributed power generation system based on the connection relationship; establishing a dispatching optimization model of the distributed power generation system based on the operating parameters; determining the micro-increase rate of each distributed generator based on the dispatching optimization model and the undirected graph model; Based on the neighborhood watch mechanism, the network attack detection result of the distributed power generation system is determined according to the micro-increase rate. The network attack detection method of the distributed power generation system provided by the embodiment of the present invention can effectively detect the network attack based on the neighborhood watch mechanism, fully protect the information security of the distributed power generation system, and ensure the safe and stable operation of the system.

附图说明Description of drawings

为了更清楚地说明本发明实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to explain the technical solutions in the embodiments of the present invention more clearly, the following briefly introduces the accompanying drawings that need to be used in the description of the embodiments or the prior art. Obviously, the drawings in the following description are only for the present invention. In some embodiments, for those of ordinary skill in the art, other drawings can also be obtained according to these drawings without any creative effort.

图1是本发明实施例提供的分布式发电系统的网络攻击检测方法的应用场景示意图;1 is a schematic diagram of an application scenario of a network attack detection method for a distributed power generation system provided by an embodiment of the present invention;

图2是本发明实施例提供的分布式发电系统的网络攻击检测方法的实现流程示意图;FIG. 2 is a schematic flowchart of an implementation of a network attack detection method for a distributed power generation system provided by an embodiment of the present invention;

图3是本发明实施例提供的分布式发电系统的网络攻击检测方法的又一实现流程示意图;3 is a schematic flowchart of another implementation of a network attack detection method for a distributed power generation system provided by an embodiment of the present invention;

图4是本发明实施例提供的分布式发电系统的网络攻击检测装置的结构示意图;4 is a schematic structural diagram of a network attack detection device for a distributed power generation system provided by an embodiment of the present invention;

图5是本发明实施例提供的终端设备的结构示意图。FIG. 5 is a schematic structural diagram of a terminal device provided by an embodiment of the present invention.

具体实施方式Detailed ways

以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本发明实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本发明。在其它情况中,省略对众所周知的系统、装置、电路以及方法的详细说明,以免不必要的细节妨碍本发明的描述。In the following description, for the purpose of illustration rather than limitation, specific details such as specific system structures and technologies are set forth in order to provide a thorough understanding of the embodiments of the present invention. However, it will be apparent to those skilled in the art that the present invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

为了说明本发明的技术方案,下面通过具体实施例来进行说明。In order to illustrate the technical solutions of the present invention, the following specific embodiments are used for description.

在分布式发电系统的局部通信过程中,各个节点对系统的全局信息掌握不足,因此适用分布式经济调度(Distributed Economic Dispatch,DED)的方法进行调度。分布式经济调度中,各个发电主体是同等级的,主体间的通信和交互十分频繁。然而信息交互的主要途径,例如Zigbee、WLAN、LTE等通信方式的安全性能相对于集中控制下的专网专线安全性低,因此需要对分布式经济调度进行保护,对恶意数据和恶意节点进行检测。In the local communication process of the distributed power generation system, each node does not have enough grasp of the global information of the system, so the method of Distributed Economic Dispatch (DED) is applied to dispatch. In distributed economic dispatch, each power generation subject is at the same level, and the communication and interaction between subjects are very frequent. However, the main ways of information exchange, such as Zigbee, WLAN, LTE and other communication methods, have lower security performance than private networks under centralized control. Therefore, it is necessary to protect distributed economic scheduling and detect malicious data and malicious nodes. .

在本实施例中,分布式发电系统可以为分布式发电机聚合而成的虚拟电厂(VirtualPowerPlant,VPP)。In this embodiment, the distributed power generation system may be a virtual power plant (Virtual Power Plant, VPP) aggregated by distributed generators.

图1示出了本发明实施例提供的分布式发电系统的网络攻击检测方法的应用场景示意图。FIG. 1 shows a schematic diagram of an application scenario of a network attack detection method for a distributed power generation system provided by an embodiment of the present invention.

在一个具体的示例中,分布式发电系统包括五个分布式发电机。各个分布式发电机之间存在固有的物理连接和通信网络连接。其中通信发电机1至网络连接是非全连接形式,且其中的数据通路均为双向导通。In one specific example, the distributed power generation system includes five distributed generators. There are inherent physical connections and communication network connections between individual distributed generators. The connection between the communication generator 1 and the network is in the form of non-full connection, and the data paths therein are all bidirectional.

图2示出了本发明实施例提供的分布式发电系统的网络攻击检测方法的实现流程示意图。参见图2,本发明实施例提供的分布式发电系统的网络攻击检测方法可以包括步骤S101至S104。FIG. 2 shows a schematic flowchart of an implementation of a network attack detection method for a distributed power generation system provided by an embodiment of the present invention. Referring to FIG. 2 , the network attack detection method for the distributed power generation system provided by the embodiment of the present invention may include steps S101 to S104.

S101:获取分布式发电系统中各个分布式发电机的连接关系,基于连接关系建立分布式发电系统对应的无向图模型。S101: Obtain the connection relationship of each distributed generator in the distributed power generation system, and establish an undirected graph model corresponding to the distributed power generation system based on the connection relationship.

在一些实施例中,S101包括:In some embodiments, S101 includes:

根据连接关系建立分布式发电系统的节点集合和边集合。The node sets and edge sets of the distributed generation system are established according to the connection relationship.

基于节点集合和边集合,建立各个节点的邻居集。Based on the node set and the edge set, the neighbor set of each node is established.

基于邻居集建立分布式发电系统的有权邻接矩阵。A weighted adjacency matrix for distributed generation systems is established based on neighbor sets.

将节点集合、边集合和权邻接矩阵作为无向图模型。Model node sets, edge sets, and weight adjacency matrices as undirected graphs.

在图1示出的具体应用场景中,节点集合中包括5个分布式发电机节点,即v1、v2、v3、v4、v5。边集合包括分布式发电机之间的通信连接路径,即w1、w2、w3、w4、w5、w6。In the specific application scenario shown in FIG. 1 , the node set includes 5 distributed generator nodes, namely v1, v2, v3, v4, and v5. The set of edges includes communication connection paths between distributed generators, namely w1, w2, w3, w4, w5, w6.

具体的,无向图模型可以表示为一个三元集合:Specifically, an undirected graph model can be represented as a ternary set:

Figure BDA0003233472970000051
Figure BDA0003233472970000051

其中,G为无向图模型;v为节点集合,n为节点数量;w为边集合;A为权邻接矩阵。Among them, G is the undirected graph model; v is the node set, n is the number of nodes; w is the edge set; A is the weight adjacency matrix.

具体的,邻居集的定义式可以为:Specifically, the definition of the neighbor set can be:

Ni={vj∈v:(vi,vj)∈w}N i = {v j ∈ v: (vi , v j ) ∈w }

其中,Ni为第i个节点的邻居集,vi为第i个节点,vj为第j个节点,(vi,vj)为连接节点vi和节点vj的边,v为节点集合,w为边集合。Among them, N i is the neighbor set of the i-th node, vi is the i -th node, v j is the j-th node, (vi , v j ) is the edge connecting the node v i and the node v j , and v is the Node set, w is the edge set.

根据以上定义,在图1示出的具体应用场景中,节点v1的邻居集包括v2、v4、v5;节点v2的邻居集包括v1、v3;节点v3的邻居集包括v2、v4;节点v4的邻居集包括v1、v3、v5;节点v5的邻居集包括v1、v4。According to the above definition, in the specific application scenario shown in FIG. 1, the neighbor set of node v1 includes v2, v4, and v5; the neighbor set of node v2 includes v1 and v3; the neighbor set of node v3 includes v2 and v4; the neighbor set of node v4 includes v2 and v4. The neighbor set includes v1, v3, and v5; the neighbor set of node v5 includes v1 and v4.

在一些实施例中,权邻接矩阵A为双随机矩阵,权邻接矩阵中的元素满足:In some embodiments, the weight adjacency matrix A is a double random matrix, and the elements in the weight adjacency matrix satisfy:

Figure BDA0003233472970000052
Figure BDA0003233472970000052

其中,dij为权邻接矩阵中第i行第j列的元素,ni为权邻接矩阵的行数,nj为,为权邻接矩阵的列数,Ni为第i个节点的邻居集。上述双随机矩阵即为每个行、每个列中元素的和均为1的非负实数方阵。Among them, dij is the element of the ith row and jth column in the weight adjacency matrix, n i is the number of rows of the weight adjacency matrix, n j is the number of columns of the weight adjacency matrix, and N i is the neighbor set of the ith node. The above double random matrix is a non-negative real number square matrix in which the sum of the elements in each row and each column is 1.

S102:获取分布式发电机系统中各个分布式发电机的运行参数,基于运行参数建立分布式发电系统的调度优化模型。S102: Obtain the operation parameters of each distributed generator in the distributed generator system, and establish a scheduling optimization model of the distributed power generation system based on the operation parameters.

在一些实施例中,分布式发电系统的调度优化模型即为各个分布式发电机聚合得到的虚拟电厂的调度优化模型。In some embodiments, the scheduling optimization model of the distributed power generation system is the scheduling optimization model of the virtual power plant obtained by the aggregation of various distributed generators.

上述调度优化模型的优化目标为系统的总运行成本最小。The optimization objective of the above scheduling optimization model is to minimize the total operating cost of the system.

在一些实施例中,运行数据包括各个分布式发电机的历史发电成本。In some embodiments, the operational data includes historical generation costs for each distributed generator.

S102的具体实现方式包括:The specific implementation of S102 includes:

基于各个分布式发电机的历史发电成本建立各个分布式发电机的发电成本模型。The power generation cost model of each distributed generator is established based on the historical power generation cost of each distributed generator.

基于发电成本模型建立分布式发电系统的调度优化模型。Based on the generation cost model, the dispatch optimization model of the distributed generation system is established.

在一些实施例中,对任意一个分布式发电机主体,发电成本模型为:In some embodiments, for any distributed generator body, the power generation cost model is:

Figure BDA0003233472970000061
Figure BDA0003233472970000061

其中,

Figure BDA0003233472970000062
为第i个分布式发电机的有功出力,
Figure BDA0003233472970000063
为第i个分布式发电机的发电成本,ai、bi及ci均为发电成本函数的价格系数。in,
Figure BDA0003233472970000062
For the active power output of the i-th distributed generator,
Figure BDA0003233472970000063
is the power generation cost of the i-th distributed generator, a i , b i and c i are the price coefficients of the power generation cost function.

在一些实施例中,调度优化模型包括目标函数和约束方程。In some embodiments, the scheduling optimization model includes an objective function and constraint equations.

在一些实施例中,虚拟电厂调度优化模型的目标函数为:In some embodiments, the objective function of the virtual power plant scheduling optimization model is:

Figure BDA0003233472970000064
Figure BDA0003233472970000064

其中,Ctotal为分布式发电系统的发电总成本,v为分布式发电机个数,

Figure BDA0003233472970000065
为第i个分布式发电机的发电成本。Among them, C total is the total power generation cost of the distributed generation system, v is the number of distributed generators,
Figure BDA0003233472970000065
is the power generation cost of the i-th distributed generator.

在一些实施例中,虚拟电厂调度优化模型的约束方程为:In some embodiments, the constraint equation of the virtual power plant scheduling optimization model is:

Figure BDA0003233472970000066
Figure BDA0003233472970000066

其中,Pout为虚拟电厂的总输出,

Figure BDA0003233472970000067
为第i个分布式发电机的有功输出,Pload为虚拟电厂内的负荷消耗,Pdemand为虚拟电厂能量管理系统预设的虚拟电厂有功输出,
Figure BDA0003233472970000068
为第i个分布式发电机的出力下界,
Figure BDA0003233472970000069
为第i个分布式发电机的出力上界。Among them, P out is the total output of the virtual power plant,
Figure BDA0003233472970000067
is the active power output of the i-th distributed generator, P load is the load consumption in the virtual power plant, P demand is the virtual power plant active power output preset by the virtual power plant energy management system,
Figure BDA0003233472970000068
is the output lower bound of the i-th distributed generator,
Figure BDA0003233472970000069
is the upper bound for the output of the i-th distributed generator.

当分布式发电系统稳定运行时,有功功率输出能够满足能量管理系统对虚拟电厂的发电和经济调度的需求。When the distributed generation system runs stably, the active power output can meet the energy management system's demand for power generation and economic dispatch of virtual power plants.

S103:基于调度优化模型和无向图模型确定分布式发电系统的微增率。S103: Determine the micro-increase rate of the distributed power generation system based on the dispatch optimization model and the undirected graph model.

在一些实施例中,S103包括:In some embodiments, S103 includes:

根据各个分布式发电机的发电成本模型,定义各个分布式发电机的发电微增率(Incremental Rate,ICR)。According to the power generation cost model of each distributed generator, the incremental rate (Incremental Rate, ICR) of each distributed generator is defined.

在一些实施例中,发电微增率的计算公式为:In some embodiments, the calculation formula of the power generation micro-increase rate is:

Figure BDA0003233472970000071
Figure BDA0003233472970000071

其中,λi为第i个分布式发电机的微增率,

Figure BDA0003233472970000072
为第i个分布式发电机的发电成本,
Figure BDA0003233472970000073
为第i个分布式发电机的有功出力,ai和bi均为发电成本函数的价格系数。Among them, λ i is the micro-increase rate of the i-th distributed generator,
Figure BDA0003233472970000072
is the power generation cost of the i-th distributed generator,
Figure BDA0003233472970000073
is the active power output of the i-th distributed generator, a i and b i are the price coefficients of the power generation cost function.

在一些实施例中,本发明实施例提供的方法还包括:In some embodiments, the methods provided by the embodiments of the present invention further include:

基于一致性算法调整分布式发电系统,直至分布式发电系统处于稳定状态。上述一直性算法包括将各个分布式发电机与各自对应的邻居集进行微增率的同步迭代交互计算。Adjust the distributed power generation system based on the consensus algorithm until the distributed power generation system is in a stable state. The above-mentioned consistency algorithm includes performing a synchronous iterative interactive calculation of a slight increase rate between each distributed generator and its corresponding neighbor set.

在一些实施例中,经过一致性算法的微增率计算公式为:In some embodiments, the calculation formula of the slight increase rate through the consensus algorithm is:

λ[k+1]=Aλ[k]+εF(Pdemand-Pout)λ[k+1]=Aλ[k]+εF(P demand -P out )

其中,λ[k+1]为经过一致性算法迭代交互后的微增率;A为权邻接矩阵;λ[k]为迭代过程中的前一个微增率;ε为满足优化问题迭代收到可行解的收敛系数;F为第一个元素为1,其余元素为0的列向量,即f1=1;fi≠1=0;Pdemand为虚拟电厂能量管理系统预设的虚拟电厂有功输出;Pout为虚拟电厂的总输出。Among them, λ[k+1] is the micro-increase rate after the iterative interaction of the consensus algorithm; A is the weight adjacency matrix; λ[k] is the previous micro-increase rate in the iterative process; Convergence coefficient of feasible solution; F is a column vector whose first element is 1 and other elements are 0, that is, f 1 =1; f i≠1 =0; P demand is the virtual power plant active power preset by the virtual power plant energy management system output; P out is the total output of the virtual power plant.

具体的,对于第i个分布式发电机而言,经过一致性算法的微增率计算公式为:Specifically, for the i-th distributed generator, the calculation formula of the micro-increase rate after the consistency algorithm is:

Figure BDA0003233472970000074
Figure BDA0003233472970000074

其中,λi(k+1)为经过一致性算法迭代交互后第i个分布式发电机的微增率;Ni为第i个节点的邻居集为第i个节点的邻居集;dij为权邻接矩阵中第i行第j列的元素;λj(k)为迭代过程中第j个分布式发电机的上一次微增率;ε是满足优化问题迭代收敛到可行解的收敛系数;fi为列向量F中的第i个元素。Among them, λ i (k+1) is the micro-increase rate of the i-th distributed generator after the iterative interaction of the consensus algorithm; Ni is the neighbor set of the i -th node is the neighbor set of the i-th node; d ij is the element of the i-th row and j-th column in the weight adjacency matrix; λ j (k) is the last slight increase rate of the j-th distributed generator in the iterative process; ε is the convergence coefficient that satisfies the iterative convergence of the optimization problem to a feasible solution ; f i is the ith element in the column vector F.

判断以上迭代交互过程收敛的依据包括:The basis for judging the convergence of the above iterative interaction process includes:

Figure BDA0003233472970000081
Figure BDA0003233472970000081

其中,λ为微增率,

Figure BDA0003233472970000082
为迭代收敛过程的稳态微增率,Pdemand为虚拟电厂能量管理系统预设的虚拟电厂有功输出;Pout为虚拟电厂的总输出。Among them, λ is the slight increase rate,
Figure BDA0003233472970000082
is the steady-state micro-increase rate of the iterative convergence process, P demand is the virtual power plant active power output preset by the virtual power plant energy management system; P out is the total output of the virtual power plant.

当一致性算法迭代得到的微增率与预设的稳态微增率相等,虚拟电厂的总输出与预设的虚拟电厂有功输出相等时,判定迭代交互过程收敛,分布式发电系统实现了稳态运行。When the micro-increase rate obtained by the consensus algorithm iteratively is equal to the preset steady-state micro-increase rate, and the total output of the virtual power plant is equal to the preset active power output of the virtual power plant, it is determined that the iterative interaction process has converged, and the distributed power generation system has achieved stable performance. state operation.

具体的,迭代达到收敛时的稳态微增率计算公式为:Specifically, the formula for calculating the steady-state micro-increase rate when the iteration reaches convergence is:

Figure BDA0003233472970000083
Figure BDA0003233472970000083

其中,

Figure BDA0003233472970000084
为稳态微增率,λstable为一致性算法达到收敛时的平均微增率,
Figure BDA0003233472970000085
为第i个分布式发电机的出力下界,
Figure BDA0003233472970000086
为第i个分布式发电机的出力上界,ai和bi均为发电成本函数的价格系数。in,
Figure BDA0003233472970000084
is the steady-state micro-increase rate, λ stable is the average micro-increase rate when the consensus algorithm reaches convergence,
Figure BDA0003233472970000085
is the output lower bound of the i-th distributed generator,
Figure BDA0003233472970000086
is the output upper bound of the i-th distributed generator, a i and b i are the price coefficients of the power generation cost function.

迭代达到收敛时,各个分布式发电机在收敛时的微增率约束下进行发电,各个发电机的具体有功出力为:When the iteration reaches convergence, each distributed generator generates power under the constraint of the slight increase rate at the time of convergence, and the specific active power output of each generator is:

Figure BDA0003233472970000087
Figure BDA0003233472970000087

其中,为经过一致性算法迭代交互后第i个分布式发电机的有功出力,λi(k+1)为经过一致性算法迭代交互后第i个分布式发电机的微增率,

Figure BDA0003233472970000088
为第i个分布式发电机的有功出力为,
Figure BDA0003233472970000089
为第i个分布式发电机的出力下界,
Figure BDA00032334729700000810
为第i个分布式发电机的出力上界,ai和bi均为发电成本函数的价格系数。Among them, is the active power output of the ith distributed generator after the iterative interaction of the consensus algorithm, λ i (k+1) is the slight increase rate of the ith distributed generator after the iterative interaction of the consensus algorithm,
Figure BDA0003233472970000088
The active power output for the i-th distributed generator is,
Figure BDA0003233472970000089
is the output lower bound of the i-th distributed generator,
Figure BDA00032334729700000810
is the output upper bound of the i-th distributed generator, a i and b i are the price coefficients of the power generation cost function.

S104:基于邻域守望机制根据微增率确定分布式发电系统的网络攻击检测结果。S104: Determine the network attack detection result of the distributed power generation system according to the micro-increase rate based on the neighborhood watch mechanism.

邻域守望机制可以通过分布式主体即各个分布式发电机相互交换数据,并对交换的数据进行检查,生成分布式发电系统的网络攻击检测结果。The Neighborhood Watching mechanism can exchange data with each other through distributed entities, that is, various distributed generators, and check the exchanged data to generate the network attack detection results of the distributed power generation system.

在本实施例中,各个分布式发电机之间交换的数据为迭代过程中的微增率。In this embodiment, the data exchanged between the various distributed generators is the slight increase rate in the iterative process.

具体的,第i个分布式发电机在第k次广播过程中向其邻居集广播了自身的微增率,则邻居集中的各个分布式发电机根据上述第k次的微增率对第i个分布式发电机的第k+1次微增率的正常范围进行估算。若实际接收到的第k+1次微增率不符合上述正常范围,则判定分布式发电系统的通信网络遭到攻击,出现异常。Specifically, the i-th distributed generator broadcasts its own micro-increase rate to its neighbor set during the k-th broadcast process, then each distributed generator in the neighbor set broadcasts the i-th micro-increase rate according to the k-th micro-increase rate. The normal range of the k+1th micro-increase rate of each distributed generator is estimated. If the actually received k+1th micro-increase rate does not meet the above normal range, it is determined that the communication network of the distributed power generation system is attacked and an abnormality occurs.

在一些实施例中,若判定分布式发电机节点恢复正常,则恢复该分布式发电机节点。In some embodiments, if it is determined that the distributed generator node is back to normal, the distributed generator node is restored.

具体的,通过分布式置信的参数定义临接矩阵中的值,从而隔离或恢复恶意主体。Specifically, the values in the adjacency matrix are defined by the parameters of distributed confidence, so as to isolate or recover malicious subjects.

具体的,通过正常范围计算公式确定微增率的正常范围。Specifically, the normal range of the micro-increase rate is determined by the normal range calculation formula.

正常范围计算公式包括:The normal range calculation formula includes:

对于

Figure BDA0003233472970000091
如果j≠1,则for
Figure BDA0003233472970000091
If j≠1, then

Figure BDA0003233472970000092
Figure BDA0003233472970000092

如果j=1,则If j=1, then

Figure BDA0003233472970000093
Figure BDA0003233472970000093

其中,

Figure BDA0003233472970000094
为第j个分布式发电机的第k+1个微增率的上限值,
Figure BDA0003233472970000095
为第j个分布式发电机的第k+1个微增率的下限值,η为大于零的系数,
Figure BDA0003233472970000101
为第j个分布式发电机的邻居集,λq(k)为第j个分布式发电机的邻居集中第q个分布式发电机的第k个微增率,
Figure BDA0003233472970000102
为第j个分布式发电机的邻居集中第k次微增率的最大值,
Figure BDA0003233472970000103
为第j个分布式发电机的邻居集中第k次微增率的最小值,
Figure BDA0003233472970000104
为第j个分布式发电机的邻居集中第k次微增率最大的元素,
Figure BDA0003233472970000105
为第j个分布式发电机的邻居集中第k次微增率最小的元素,ε是满足优化问题迭代收敛到可行解的收敛系数,Pdemand为虚拟电厂能量管理系统预设的虚拟电厂有功输出;Pout为虚拟电厂的总输出。in,
Figure BDA0003233472970000094
is the upper limit of the k+1th micro-increase rate of the jth distributed generator,
Figure BDA0003233472970000095
is the lower limit of the k+1th micro-increase rate of the jth distributed generator, η is a coefficient greater than zero,
Figure BDA0003233472970000101
is the neighbor set of the jth distributed generator, λ q (k) is the kth micro-increase rate of the qth distributed generator in the neighbor set of the jth distributed generator,
Figure BDA0003233472970000102
is the maximum value of the kth micro-increase rate in the neighbor set of the jth distributed generator,
Figure BDA0003233472970000103
is the minimum value of the kth micro-increase rate in the neighbor set of the jth distributed generator,
Figure BDA0003233472970000104
is the element with the largest kth micro-increase rate in the neighbor set of the jth distributed generator,
Figure BDA0003233472970000105
is the element with the smallest kth micro-increase rate in the neighbor set of the jth distributed generator, ε is the convergence coefficient that satisfies the iterative convergence of the optimization problem to a feasible solution, and P demand is the virtual power plant active output preset by the virtual power plant energy management system ; P out is the total output of the virtual power plant.

具体的,specific,

Figure BDA0003233472970000106
Figure BDA0003233472970000106

Figure BDA0003233472970000107
Figure BDA0003233472970000107

在一些实施例中,在S104之后,分布式发电系统的网络攻击检测方法还包括:基于分布式置信机和微增率,判断是否需要断开异常的分布式发电机。In some embodiments, after S104, the method for detecting a network attack of the distributed power generation system further includes: judging whether the abnormal distributed power generator needs to be disconnected based on the distributed confidence machine and the micro-increase rate.

具体的,利用分布式信任度记录机制对可疑节点进行记录,在对接收到的数据进行判断,若接收到的微增率不在正常范围内,则证明该微增率存疑。Specifically, the suspicious node is recorded by the distributed trust degree recording mechanism, and the received data is judged. If the received micro-increase rate is not within the normal range, it proves that the micro-increase rate is suspicious.

具体的,分布式置信机的模型包括:Specifically, the model of the distributed confidence machine includes:

Figure BDA0003233472970000108
Figure BDA0003233472970000108

其中,Gj[k+1]为第j个分布式发电机的第k+1个置信度,Gj[k]为第j个发电机的第k个置信度,为,

Figure BDA0003233472970000109
为第j个分布式发电机的第k个微增率的上限值,
Figure BDA00032334729700001010
为第j个分布式发电机的第k个微增率的下限值,λj为第j个分布式发电机的微增率。Among them, G j [k+1] is the k+1 confidence of the j-th distributed generator, G j [k] is the k-th confidence of the j-th generator, and is,
Figure BDA0003233472970000109
is the upper limit of the kth micro-increase rate of the jth distributed generator,
Figure BDA00032334729700001010
is the lower limit of the k-th micro-increase rate of the j-th distributed generator, and λ j is the micro-increase rate of the j-th distributed generator.

利用分布式置信机的异常表现,可以判断受到网络攻击的恶意节点是否需要进行断开或重启操作。Using the abnormal performance of the distributed confidence machine, it can be judged whether the malicious node under network attack needs to be disconnected or restarted.

本发明实施例提供的分布式发电系统的网络攻击检测方法能够基于邻域守望机制有效进行网络攻击的检测,充分保护分布式发电系统的信息安全,保障系统安全稳定运行。在本实施例中,通过考虑隐私保护的互联电网潮流同步迭代计算方法,利用分布式信任度记录的机制实现对可疑数据的记录,通过分布式信任度机制的异常对攻击进行定位并隔离,可以有效地实现分布式发电系统的信息物理系统(CyberPhysicalSystem,CPS)网络攻击检测。The network attack detection method of the distributed power generation system provided by the embodiment of the present invention can effectively detect the network attack based on the neighborhood watch mechanism, fully protect the information security of the distributed power generation system, and ensure the safe and stable operation of the system. In this embodiment, through the iterative calculation method of interconnected power grid power flow synchronization considering privacy protection, using the distributed trust record mechanism to realize the recording of suspicious data, and locating and isolating the attack through the abnormality of the distributed trust mechanism, it is possible to Effectively realize cyber attack detection of Cyber Physical System (CPS) of distributed power generation system.

图3示出了本发明实施例提供的分布式发电系统的网络攻击检测方法中判断微增率是否符合正常范围的流程图。FIG. 3 shows a flowchart of judging whether the micro-increase rate conforms to the normal range in the network attack detection method of the distributed power generation system provided by the embodiment of the present invention.

参见图3,微增率的判断过程包括:Referring to Figure 3, the judging process of the micro-increase rate includes:

第i个分布式发电机向其邻居集中的分布式发电机广播其第k次微增率λi(k)。邻居集中的分布式发电机对以上数据进行接收和记录,并依据接收到的数据计算第i个分布式发电机第k+1次微增率λi(k+1)的上下界。邻居集在接收到第i个分布式发电机的第k+1次微增率后,检测该微增率是否处于上下界之间。通过循环以上过程,实现对网络攻击的检测。The i-th distributed generator broadcasts its k-th delta rate λ i (k) to the distributed generators in its neighbor set. The distributed generators in the neighbor set receive and record the above data, and calculate the upper and lower bounds of the k+1th micro-increase rate λ i (k+1) of the i-th distributed generator according to the received data. After receiving the k+1th micro-increase rate of the i-th distributed generator, the neighbor set detects whether the micro-increase rate is between the upper and lower bounds. By looping the above process, the detection of network attacks is realized.

应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。It should be understood that the size of the sequence numbers of the steps in the above embodiments does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.

图4示出了本发明实施例提供的分布式发电系统网络攻击检测装置的结构示意图。参见图4,本发明实施例提供的分布式发电系统网络攻击检测装置40可以包括无向图模型建立模型410、优化模型建立模块420、微增率计算模块430以及检测结果生成模块440。FIG. 4 shows a schematic structural diagram of a network attack detection apparatus for a distributed power generation system provided by an embodiment of the present invention. Referring to FIG. 4 , the distributed power generation system network attack detection apparatus 40 provided by the embodiment of the present invention may include an undirected graph model establishment model 410 , an optimization model establishment module 420 , a micro-increase rate calculation module 430 , and a detection result generation module 440 .

无向图模型建立模块410,用于获取分布式发电系统中各个分布式发电机的连接关系,基于连接关系建立分布式发电系统的无向图模型。The undirected graph model establishment module 410 is used to obtain the connection relationship of each distributed generator in the distributed power generation system, and establish an undirected graph model of the distributed power generation system based on the connection relationship.

调度优化模型建立模块420,用于获取分布式发电系统中各个分布式发电机的运行参数,基于运行参数建立分布式发电机的调度优化模型。The scheduling optimization model establishment module 420 is used for acquiring the operation parameters of each distributed generator in the distributed power generation system, and establishing a scheduling optimization model of the distributed generator based on the operation parameters.

微增率计算模块430,用于基于调度优化模型和无向图模型确定分布式发电系统中各个分布式发电机的微增率。The micro-increase rate calculation module 430 is configured to determine the micro-increase rate of each distributed generator in the distributed power generation system based on the scheduling optimization model and the undirected graph model.

检测结果生成模块440,用于基于邻域守望机制根据微增率确定分布式发电系统的网络攻击检测结果。The detection result generation module 440 is configured to determine the network attack detection result of the distributed power generation system according to the micro-increase rate based on the neighborhood watch mechanism.

本发明实施例提供的分布式发电系统的网络攻击检测装置能够基于邻域守望机制有效进行网络攻击的检测,充分保护分布式发电系统的信息安全,保障系统安全稳定运行。The network attack detection device of the distributed power generation system provided by the embodiment of the present invention can effectively detect network attacks based on the neighborhood watch mechanism, fully protect the information security of the distributed power generation system, and ensure the safe and stable operation of the system.

在一些实施例中,无向图模型建立模块410具体用于:In some embodiments, the undirected graph model building module 410 is specifically used to:

根据连接关系建立分布式发电系统的节点集合和边集合。基于节点集合和边集合,建立各个节点的邻居集。基于邻居集建立分布式发电系统的有权邻接矩阵。将节点集合、边集合以及权邻接矩阵作为无向图模型。The node sets and edge sets of the distributed generation system are established according to the connection relationship. Based on the node set and the edge set, the neighbor set of each node is established. A weighted adjacency matrix for distributed generation systems is established based on neighbor sets. The set of nodes, the set of edges, and the weight-adjacency matrix are modeled as undirected graphs.

在一些实施例中,运行数据包括各个分布式发电机的历史发电成本,优化模型建立模块420具体用于:In some embodiments, the operation data includes the historical power generation costs of each distributed generator, and the optimization model establishment module 420 is specifically used for:

基于各个分布式发电机的历史发电成本建立各个分布式发电机的发电成本模型。基于发电成本模型建立分布式发电系统的调度优化模型。The power generation cost model of each distributed generator is established based on the historical power generation cost of each distributed generator. Based on the generation cost model, the dispatch optimization model of the distributed generation system is established.

在一些实施例中,检测结果生成模块440可以包括:第一微增率获取单元、正常范围计算单元、第二微增率获取单元、判断单元。In some embodiments, the detection result generation module 440 may include: a first micro-increase rate acquisition unit, a normal range calculation unit, a second micro-increase rate acquisition unit, and a judgment unit.

第一微增率获取单元用于获取第一分布式发电机的第k个微增率;第一分布式发电机为分布式发电系统中的任一分布式发电机。The first micro-increase rate acquiring unit is configured to acquire the kth micro-increase rate of the first distributed generator; the first distributed generator is any distributed generator in the distributed power generation system.

正常范围计算单元,用于基于第k个微增率计算第一分布式发电机的第k+1个微增率的正常范围。The normal range calculation unit is configured to calculate the normal range of the k+1th micro-increase rate of the first distributed generator based on the k-th micro-increase rate.

第二微增率获取单元,用于获取第一分布式发电机的第k+1个微增率。The second micro-increase rate acquiring unit is configured to acquire the k+1th micro-increase rate of the first distributed generator.

判断单元用于判断第k+1个微增率是否属于正常范围;若第k+1个微增率不属于正常范围,则判定分布式发电系统的网络攻击检测结果异常。The judging unit is used to judge whether the k+1th micro-increase rate belongs to the normal range; if the k+1th micro-increase rate does not belong to the normal range, it is determined that the network attack detection result of the distributed power generation system is abnormal.

在一些实施例中,正常范围计算单元具体用于:In some embodiments, the normal range calculation unit is specifically used for:

基于第k个微增率和正常范围计算公式计算第一分布式发电机的第k+1个微增率的正常范围。The normal range of the k+1th micro-increase rate of the first distributed generator is calculated based on the k-th micro-increase rate and the normal range calculation formula.

正常范围计算公式包括:The normal range calculation formula includes:

对于

Figure BDA0003233472970000131
如果j≠1,则for
Figure BDA0003233472970000131
If j≠1, then

Figure BDA0003233472970000132
Figure BDA0003233472970000132

如果j=1,则If j=1, then

Figure BDA0003233472970000133
Figure BDA0003233472970000133

其中,

Figure BDA0003233472970000134
为第j个分布式发电机的第k+1个微增率的上限值,
Figure BDA0003233472970000135
为第j个分布式发电机的第k+1个微增率的下限值,η为大于零的系数,
Figure BDA0003233472970000136
为第j个分布式发电机的邻居集,λq(k)为第j个分布式发电机的邻居集中第q个分布式发电机的第k个微增率,
Figure BDA0003233472970000137
为第j个分布式发电机的邻居集中第k次微增率的最大值,
Figure BDA0003233472970000138
为第j个分布式发电机的邻居集中第k次微增率的最小值,
Figure BDA0003233472970000139
为第j个分布式发电机的邻居集中第k次微增率最大的元素,
Figure BDA00032334729700001310
为第j个分布式发电机的邻居集中第k次微增率最小的元素,ε是满足优化问题迭代收敛到可行解的收敛系数,Pdemand为虚拟电厂能量管理系统预设的虚拟电厂有功输出;Pout为虚拟电厂的总输出。in,
Figure BDA0003233472970000134
is the upper limit of the k+1th micro-increase rate of the jth distributed generator,
Figure BDA0003233472970000135
is the lower limit of the k+1th micro-increase rate of the jth distributed generator, η is a coefficient greater than zero,
Figure BDA0003233472970000136
is the neighbor set of the jth distributed generator, λ q (k) is the kth micro-increase rate of the qth distributed generator in the neighbor set of the jth distributed generator,
Figure BDA0003233472970000137
is the maximum value of the kth micro-increase rate in the neighbor set of the jth distributed generator,
Figure BDA0003233472970000138
is the minimum value of the kth micro-increase rate in the neighbor set of the jth distributed generator,
Figure BDA0003233472970000139
is the element with the largest kth micro-increase rate in the neighbor set of the jth distributed generator,
Figure BDA00032334729700001310
is the element with the smallest kth micro-increase rate in the neighbor set of the jth distributed generator, ε is the convergence coefficient that satisfies the iterative convergence of the optimization problem to a feasible solution, and P demand is the virtual power plant active output preset by the virtual power plant energy management system ; P out is the total output of the virtual power plant.

在一些实施例中,分布式发电系统的网络攻击检测装置40还包括调整模块,用于基于一致性算法调整分布式发电系统,直至分布式发电系统处于稳定运行状态。In some embodiments, the network attack detection apparatus 40 of the distributed power generation system further includes an adjustment module for adjusting the distributed power generation system based on the consensus algorithm until the distributed power generation system is in a stable operation state.

在一些实施例中,分布式发电系统的网络攻击检测装置还包括保护模块,用于基于分布式置信机和微增率,判断是否需要断开异常的分布式发电机。In some embodiments, the network attack detection apparatus of the distributed power generation system further includes a protection module, configured to judge whether the abnormal distributed power generator needs to be disconnected based on the distributed confidence machine and the micro-increase rate.

图5是本发明一实施例提供的终端设备的示意图。如图5所示,该实施例的终端设备50包括:处理器500、存储器510以及存储在所述存储器510中并可在所述处理器500上运行的计算机程序520,例如分布式发电系统的网络攻击检测程序。所述处理器50执行所述计算机程序520时实现上述各个分布式发电系统的网络攻击检测方法实施例中的步骤,例如图2所示的步骤S101至S104。或者,所述处理器500执行所述计算机程序520时实现上述各装置实施例中各模块/单元的功能,例如图4所示模块410至440的功能。FIG. 5 is a schematic diagram of a terminal device according to an embodiment of the present invention. As shown in FIG. 5 , the terminal device 50 of this embodiment includes: a processor 500, a memory 510, and a computer program 520 stored in the memory 510 and executable on the processor 500, such as a distributed power generation system Network attack detection program. When the processor 50 executes the computer program 520 , the steps in each of the above embodiments of the network attack detection method for the distributed power generation system are implemented, for example, steps S101 to S104 shown in FIG. 2 . Alternatively, when the processor 500 executes the computer program 520, the functions of the modules/units in each of the foregoing apparatus embodiments, such as the functions of the modules 410 to 440 shown in FIG. 4 , are implemented.

示例性的,所述计算机程序520可以被分割成一个或多个模块/单元,所述一个或者多个模块/单元被存储在所述存储器510中,并由所述处理器500执行,以完成本发明。所述一个或多个模块/单元可以是能够完成特定功能的一系列计算机程序指令段,该指令段用于描述所述计算机程序520在所述终端设备50中的执行过程。例如,所述计算机程序520可以被分割成无向图模型建立模型、优化模型建立模块、微增率计算模块以及检测结果生成模块。Exemplarily, the computer program 520 may be divided into one or more modules/units, and the one or more modules/units are stored in the memory 510 and executed by the processor 500 to complete. this invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, and the instruction segments are used to describe the execution process of the computer program 520 in the terminal device 50 . For example, the computer program 520 can be divided into an undirected graph model building model, an optimization model building module, a small increment rate calculation module, and a detection result generation module.

所述终端设备50可以是桌上型计算机、笔记本、掌上电脑及云端服务器等计算设备。所述终端设备可包括,但不仅限于,处理器500、存储器510。本领域技术人员可以理解,图5仅仅是终端设备50的示例,并不构成对终端设备50的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述终端设备还可以包括输入输出设备、网络接入设备、总线等。The terminal device 50 may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud server. The terminal device may include, but is not limited to, the processor 500 and the memory 510 . Those skilled in the art can understand that FIG. 5 is only an example of the terminal device 50, and does not constitute a limitation to the terminal device 50, and may include more or less components than the one shown, or combine some components, or different components For example, the terminal device may further include an input and output device, a network access device, a bus, and the like.

所称处理器500可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。The so-called processor 500 may be a central processing unit (Central Processing Unit, CPU), and may also be other general-purpose processors, digital signal processors (Digital Signal Processors, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), Off-the-shelf programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.

所述存储器510可以是所述终端设备50的内部存储单元,例如终端设备50的硬盘或内存。所述存储器510也可以是所述终端设备50的外部存储设备,例如所述终端设备50上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器510还可以既包括所述终端设备50的内部存储单元也包括外部存储设备。所述存储器510用于存储所述计算机程序以及所述终端设备所需的其他程序和数据。所述存储器510还可以用于暂时地存储已经输出或者将要输出的数据。The memory 510 may be an internal storage unit of the terminal device 50 , such as a hard disk or a memory of the terminal device 50 . The memory 510 may also be an external storage device of the terminal device 50, such as a plug-in hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) equipped on the terminal device 50. card, flash card (Flash Card) and so on. Further, the memory 510 may also include both an internal storage unit of the terminal device 50 and an external storage device. The memory 510 is used to store the computer program and other programs and data required by the terminal device. The memory 510 may also be used to temporarily store data that has been output or will be output.

所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。实施例中的各功能单元、模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中,上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。另外,各功能单元、模块的具体名称也只是为了便于相互区分,并不用于限制本申请的保护范围。上述系统中单元、模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and simplicity of description, only the division of the above-mentioned functional units and modules is used as an example. Module completion, that is, dividing the internal structure of the device into different functional units or modules to complete all or part of the functions described above. Each functional unit and module in the embodiment may be integrated in one processing unit, or each unit may exist physically alone, or two or more units may be integrated in one unit, and the above-mentioned integrated units may adopt hardware. It can also be realized in the form of software functional units. In addition, the specific names of the functional units and modules are only for the convenience of distinguishing from each other, and are not used to limit the protection scope of the present application. For the specific working processes of the units and modules in the above-mentioned system, reference may be made to the corresponding processes in the foregoing method embodiments, which will not be repeated here.

在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述或记载的部分,可以参见其它实施例的相关描述。In the foregoing embodiments, the description of each embodiment has its own emphasis. For parts that are not described or described in detail in a certain embodiment, reference may be made to the relevant descriptions of other embodiments.

本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。Those of ordinary skill in the art can realize that the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of the present invention.

在本发明所提供的实施例中,应该理解到,所揭露的装置/终端设备和方法,可以通过其它的方式实现。例如,以上所描述的装置/终端设备实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通讯连接可以是通过一些接口,装置或单元的间接耦合或通讯连接,可以是电性,机械或其它的形式。In the embodiments provided by the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other manners. For example, the apparatus/terminal device embodiments described above are only illustrative. For example, the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods, such as multiple units. Or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.

另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.

所述集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实现上述实施例方法中的全部或部分流程,也可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一计算机可读存储介质中,该计算机程序在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机程序包括计算机程序代码,所述计算机程序代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括电载波信号和电信信号。The integrated modules/units, if implemented in the form of software functional units and sold or used as independent products, may be stored in a computer-readable storage medium. Based on this understanding, the present invention can implement all or part of the processes in the methods of the above embodiments, and can also be completed by instructing relevant hardware through a computer program, and the computer program can be stored in a computer-readable storage medium. When the program is executed by the processor, the steps of the foregoing method embodiments can be implemented. Wherein, the computer program includes computer program code, and the computer program code may be in the form of source code, object code, executable file or some intermediate form, and the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory (ROM, Read-Only Memory) , Random Access Memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium, etc. It should be noted that the content contained in the computer-readable media may be appropriately increased or decreased according to the requirements of legislation and patent practice in the jurisdiction, for example, in some jurisdictions, according to legislation and patent practice, the computer-readable media Electric carrier signals and telecommunication signals are not included.

以上所述实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围,均应包含在本发明的保护范围之内。The above-mentioned embodiments are only used to illustrate the technical solutions of the present invention, but not to limit them; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: it is still possible to implement the foregoing implementations. The technical solutions described in the examples are modified, or some technical features thereof are equivalently replaced; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the embodiments of the present invention, and should be included in the within the protection scope of the present invention.

Claims (10)

1.一种分布式发电系统的网络攻击检测方法,其特征在于,包括:1. A network attack detection method for a distributed power generation system, characterized in that, comprising: 获取分布式发电系统中各个分布式发电机的连接关系,基于所述连接关系建立所述分布式发电系统的无向图模型;acquiring the connection relationship of each distributed generator in the distributed power generation system, and establishing an undirected graph model of the distributed power generation system based on the connection relationship; 获取所述分布式发电系统中各个分布式发电机的运行参数,基于所述运行参数建立所述分布式发电系统的调度优化模型;Obtaining operating parameters of each distributed generator in the distributed power generation system, and establishing a scheduling optimization model of the distributed power generation system based on the operating parameters; 基于所述调度优化模型和所述无向图模型,确定所述分布式发电系统中各个分布式发电机的微增率;based on the scheduling optimization model and the undirected graph model, determining the micro-increase rate of each distributed generator in the distributed power generation system; 基于邻域守望机制根据所述微增率确定所述分布式发电系统的网络攻击检测结果。A network attack detection result of the distributed power generation system is determined according to the micro-increase rate based on a neighborhood watch mechanism. 2.如权利要求1所述的分布式发电系统的网络攻击检测方法,其特征在于,所述基于所述连接关系建立所述分布式发电系统的无向图模型,包括:2 . The network attack detection method for a distributed power generation system according to claim 1 , wherein the establishing an undirected graph model of the distributed power generation system based on the connection relationship comprises: 2 . 根据所述连接关系建立所述分布式发电系统的节点集合和边集合;establishing a node set and an edge set of the distributed power generation system according to the connection relationship; 基于所述节点集合和所述边集合,建立各个节点的邻居集;Based on the node set and the edge set, establish a neighbor set of each node; 基于所述邻居集建立所述分布式发电系统的有权邻接矩阵;establishing a weighted adjacency matrix of the distributed power generation system based on the neighbor set; 将所述节点集合、所述边集合以及所述权邻接矩阵作为所述无向图模型。The node set, the edge set and the weight adjacency matrix are used as the undirected graph model. 3.如权利要求1所述的分布式发电系统的网络攻击检测方法,其特征在于,所述运行数据包括各个分布式发电机的历史发电成本;3. The method for detecting a network attack of a distributed power generation system according to claim 1, wherein the operation data comprises the historical power generation cost of each distributed power generator; 所述基于所述运行参数建立所述分布式发电系统的调度优化模型,包括:The establishment of the dispatch optimization model of the distributed power generation system based on the operating parameters includes: 基于所述各个分布式发电机的历史发电成本建立各个分布式发电机的发电成本模型;establishing a power generation cost model of each distributed generator based on the historical power generation cost of each distributed generator; 基于所述发电成本模型建立所述分布式发电系统的调度优化模型。A dispatch optimization model of the distributed power generation system is established based on the power generation cost model. 4.如权利要求1所述的分布式发电系统的网络攻击检测方法,其特征在于,所述基于邻域守望机制根据所述微增率确定分布式发电系统的网络攻击检测结果,包括:4. The network attack detection method of the distributed power generation system according to claim 1, wherein the determination of the network attack detection result of the distributed power generation system based on the neighborhood watch mechanism according to the micro-increase rate comprises: 获取第一分布式发电机的第k个微增率;所述第一分布式发电机为所述分布式发电系统中的任一分布式发电机;obtaining the kth micro-increase rate of the first distributed generator; the first distributed generator is any distributed generator in the distributed power generation system; 基于所述第k个微增率计算所述第一分布式发电机的第k+1个微增率的正常范围;calculating the normal range of the k+1th micro-increase rate of the first distributed generator based on the k-th micro-increase rate; 获取第一分布式发电机的第k+1个微增率;Obtain the k+1th micro-increase rate of the first distributed generator; 判断所述第k+1个微增率是否属于所述正常范围;Judging whether the k+1th micro-increase rate belongs to the normal range; 若所述第k+1个微增率不属于所述正常范围,则判定所述分布式发电系统的网络攻击检测结果异常。If the k+1th micro-increase rate does not belong to the normal range, it is determined that the network attack detection result of the distributed power generation system is abnormal. 5.如权利要求4所述的分布式发电系统的网络攻击检测方法,其特征在于,所述基于所述第k个微增率计算所述第一分布式发电机的第k+1个微增率的正常范围,包括:5 . The method for detecting network attacks of a distributed power generation system according to claim 4 , wherein the calculation of the k+1th microcomputer of the first distributed generator based on the kth microincrease rate is performed. 6 . The normal range for the rate of increase includes: 基于所述第k个微增率和正常范围计算公式计算所述第一分布式发电机的第k+1个微增率的正常范围;Calculate the normal range of the k+1th micro-increase rate of the first distributed generator based on the k-th micro-increase rate and the normal range calculation formula; 所述正常范围计算公式包括:The normal range calculation formula includes: 对于
Figure FDA0003233472960000021
如果j≠1,则
for
Figure FDA0003233472960000021
If j≠1, then
Figure FDA0003233472960000022
Figure FDA0003233472960000022
如果j=1,则If j=1, then
Figure FDA0003233472960000023
Figure FDA0003233472960000023
其中,
Figure FDA0003233472960000024
为第j个分布式发电机的第k+1个微增率的上限值,
Figure FDA0003233472960000025
为第j个分布式发电机的第k+1个微增率的下限值,η为大于零的系数,
Figure FDA0003233472960000026
为第j个分布式发电机的邻居集,λq(k)为第j个分布式发电机的邻居集中第q个分布式发电机的第k个微增率,
Figure FDA0003233472960000031
为第j个分布式发电机的邻居集中第k次微增率的最大值,
Figure FDA0003233472960000032
为第j个分布式发电机的邻居集中第k次微增率的最小值,
Figure FDA0003233472960000033
为第j个分布式发电机的邻居集中第k次微增率最大的元素,
Figure FDA0003233472960000034
为第j个分布式发电机的邻居集中第k次微增率最小的元素,ε是满足优化问题迭代收敛到可行解的收敛系数,Pdemand为虚拟电厂能量管理系统预设的虚拟电厂有功输出;Pout为虚拟电厂的总输出。
in,
Figure FDA0003233472960000024
is the upper limit of the k+1th micro-increase rate of the jth distributed generator,
Figure FDA0003233472960000025
is the lower limit of the k+1th micro-increase rate of the jth distributed generator, η is a coefficient greater than zero,
Figure FDA0003233472960000026
is the neighbor set of the jth distributed generator, λ q (k) is the kth micro-increase rate of the qth distributed generator in the neighbor set of the jth distributed generator,
Figure FDA0003233472960000031
is the maximum value of the kth micro-increase rate in the neighbor set of the jth distributed generator,
Figure FDA0003233472960000032
is the minimum value of the kth micro-increase rate in the neighbor set of the jth distributed generator,
Figure FDA0003233472960000033
is the element with the largest kth micro-increase rate in the neighbor set of the jth distributed generator,
Figure FDA0003233472960000034
is the element with the smallest kth micro-increase rate in the neighbor set of the jth distributed generator, ε is the convergence coefficient that satisfies the iterative convergence of the optimization problem to a feasible solution, and P demand is the virtual power plant active output preset by the virtual power plant energy management system ; P out is the total output of the virtual power plant.
6.如权利要求1-5任一项所述的分布式发电系统的网络攻击检测方法,其特征在于,所述基于邻域守望机制根据所述微增率确定分布式发电系统的网络攻击检测结果之前,所述方法还包括:6 . The network attack detection method for a distributed power generation system according to any one of claims 1 to 5 , wherein the neighborhood watch-based mechanism determines the network attack detection of the distributed power generation system according to the micro-increase rate. 7 . Before the result, the method further includes: 基于一致性算法调整所述分布式发电系统,直至所述分布式发电系统处于稳定运行状态。The distributed power generation system is adjusted based on a consensus algorithm until the distributed power generation system is in a stable operating state. 7.如权利要求1-5任一项所述的分布式发电系统的网络攻击检测方法,其特征在于,所述基于邻域守望机制根据所述微增率确定分布式发电系统的网络攻击检测结果之后,所述方法包括:7. The network attack detection method of a distributed power generation system according to any one of claims 1-5, wherein the network attack detection of the distributed power generation system is determined according to the micro-increase rate based on the neighborhood watch mechanism Following the results, the method includes: 基于分布式置信机和微增率,判断是否需要断开异常的分布式发电机。Based on the distributed confidence machine and the micro-increase rate, it is judged whether it is necessary to disconnect the abnormal distributed generator. 8.一种分布式发电系统的网络攻击检测装置,其特征在于,包括:8. A network attack detection device for a distributed power generation system, characterized in that, comprising: 无向图模型建立模块,用于获取分布式发电系统中各个分布式发电机的连接关系,基于所述连接关系建立所述分布式发电系统的无向图模型;an undirected graph model establishment module, used for acquiring the connection relationship of each distributed generator in the distributed power generation system, and establishing an undirected graph model of the distributed power generation system based on the connection relationship; 调度优化模型建立模块,用于获取分布式发电系统中各个分布式发电机的运行参数,基于所述运行参数建立所述分布式发电机的调度优化模型;a dispatching optimization model establishment module, used for acquiring the operating parameters of each distributed generator in the distributed power generation system, and establishing a dispatching optimization model of the distributed generator based on the operating parameters; 微增率计算模块,用于基于所述调度优化模型和所述无向图模型确定所述分布式发电系统中各个分布式发电机的微增率;a micro-increase rate calculation module, configured to determine the micro-increase rate of each distributed generator in the distributed power generation system based on the scheduling optimization model and the undirected graph model; 检测结果生成模块,用于基于邻域守望机制根据所述微增率确定所述分布式发电系统的网络攻击检测结果。A detection result generation module, configured to determine a network attack detection result of the distributed power generation system according to the micro-increase rate based on a neighborhood watch mechanism. 9.一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现如权利要求1至7任一项所述方法的步骤。9. A terminal device, comprising a memory, a processor and a computer program stored in the memory and running on the processor, characterized in that, when the processor executes the computer program, the implementation as claimed in the claims The steps of any one of 1 to 7 of the method. 10.一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至7任一项所述方法的步骤。10. A computer-readable storage medium storing a computer program, characterized in that, when the computer program is executed by a processor, the steps of the method according to any one of claims 1 to 7 are implemented .
CN202110994679.0A 2021-08-27 2021-08-27 Network attack detection method and device of distributed power generation system and terminal equipment Pending CN113704750A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110994679.0A CN113704750A (en) 2021-08-27 2021-08-27 Network attack detection method and device of distributed power generation system and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110994679.0A CN113704750A (en) 2021-08-27 2021-08-27 Network attack detection method and device of distributed power generation system and terminal equipment

Publications (1)

Publication Number Publication Date
CN113704750A true CN113704750A (en) 2021-11-26

Family

ID=78655851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110994679.0A Pending CN113704750A (en) 2021-08-27 2021-08-27 Network attack detection method and device of distributed power generation system and terminal equipment

Country Status (1)

Country Link
CN (1) CN113704750A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225305A (en) * 2022-04-12 2022-10-21 上海大学 Attack detection and recovery method for distributed economic dispatch of microgrid under network attack

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105826944A (en) * 2016-03-18 2016-08-03 上海电机学院 A power prediction method and system for a microgrid group
CN109474017A (en) * 2018-12-24 2019-03-15 武汉大学 A real-time distributed economic dispatch method for distribution network
CN110048415A (en) * 2019-05-06 2019-07-23 南京邮电大学 A kind of real-time distributed economic load dispatching method suitable for grid type micro-capacitance sensor
CN110265991A (en) * 2019-05-07 2019-09-20 上海电力学院 A distributed coordinated control method for DC microgrid
CN112598211A (en) * 2020-10-30 2021-04-02 天津大学 Consistency-based distributed power grid economic dispatching injection attack mitigation method
CN113190782A (en) * 2020-01-14 2021-07-30 华北电力大学(保定) Microgrid distributed economic dispatching method based on consistency algorithm
CN113241794A (en) * 2021-05-28 2021-08-10 合肥工业大学 Island micro-grid self-adaptive control method based on multiple intelligent agents

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105826944A (en) * 2016-03-18 2016-08-03 上海电机学院 A power prediction method and system for a microgrid group
CN109474017A (en) * 2018-12-24 2019-03-15 武汉大学 A real-time distributed economic dispatch method for distribution network
CN110048415A (en) * 2019-05-06 2019-07-23 南京邮电大学 A kind of real-time distributed economic load dispatching method suitable for grid type micro-capacitance sensor
CN110265991A (en) * 2019-05-07 2019-09-20 上海电力学院 A distributed coordinated control method for DC microgrid
CN113190782A (en) * 2020-01-14 2021-07-30 华北电力大学(保定) Microgrid distributed economic dispatching method based on consistency algorithm
CN112598211A (en) * 2020-10-30 2021-04-02 天津大学 Consistency-based distributed power grid economic dispatching injection attack mitigation method
CN113241794A (en) * 2021-05-28 2021-08-10 合肥工业大学 Island micro-grid self-adaptive control method based on multiple intelligent agents

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
PEIKAI LI; YUN LIU; HUANHAI XIN; XICHEN JIANG: "A Robust Distributed Economic Dispatch Strategy of Virtual Power Plant Under Cyber-Attacks", 《IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS》, pages 1 - 10 *
YUN LIU UNIVERSITY OF CENTRAL FLORIDA, ORLANDO, FL, USA, DEPARTMENT OF ELECTRICAL ENGINEERING, ZHEJIANG UNIVERSITY, HANGZHOU, CHIN: "An Attack-Resilient Cooperative Control Strategy of Multiple Distributed Generators in Distribution Networks", 《 IEEE TRANSACTIONS ON SMART GRID 》, pages 2923 *
王蕊: "智能电网中经济调度问题的分布式算法研究", 《中国博士学位论文全文数据库工程科技Ⅱ辑》, pages 1 - 130 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115225305A (en) * 2022-04-12 2022-10-21 上海大学 Attack detection and recovery method for distributed economic dispatch of microgrid under network attack
CN115225305B (en) * 2022-04-12 2024-04-19 上海大学 Attack detection and recovery method for distributed economic dispatch of microgrids under cyber attacks

Similar Documents

Publication Publication Date Title
Huang et al. Cyber-constrained optimal power flow model for smart grid resilience enhancement
US10139800B2 (en) Decentralized optimal dispatch of photovoltaic inverters in power distribution systems
WO2024103232A1 (en) Power distribution network simulation method, system and device, and computer-readable storage medium
CN113807705B (en) Digital twin operation driven power distribution network planning method, device and terminal
Nasiruzzaman et al. Transient stability assessment of smart power system using complex networks framework
CN113489011A (en) Power system transient stability evaluation method and device, electronic equipment and storage medium
Wen et al. Optimal phasor data compression unit installation for wide-area measurement systems—An integer linear programming approach
CN112198375A (en) Phase identification method, device, equipment and storage medium for single-phase user
CN115986813A (en) A Distribution Network Fault Restoration Method Considering Dynamic Partitioning of Islands
Zhang et al. A robust consensus-based economic dispatch strategy under DoS attack
CN109066650B (en) Power system vulnerability assessment method and terminal equipment
CN111834996B (en) Power grid line loss calculation method and device
Yang et al. Resilient consensus-based AC optimal power flow against data integrity attacks using PLC
CN113704750A (en) Network attack detection method and device of distributed power generation system and terminal equipment
CN116599989A (en) Micro-inverter self-organizing network method, device, terminal and storage medium
CN110768294B (en) Random scheduling method and device for distributed power supply
Gao et al. Robustness assessment of the cyber‐physical system against cascading failure in a virtual power plant based on complex network theory
CN109587145B (en) A method, device and device for false data intrusion detection in power network
Shchetinin et al. Decomposed algorithm for risk-constrained AC OPF with corrective control by series FACTS devices
CN113821316A (en) Abnormal process detection method and device, storage medium and electronic equipment
Fathnia et al. Detection of anomalies in smart meter data: A density-based approach
CN117910516A (en) A network attack resilience detection and recovery method and system based on deep Jacobi
Cvijić et al. Optimal clustering for efficient computations of contingency effects in large regional power systems
CN110839256A (en) Cellular network data anomaly detection method
Kuraganti et al. A distributed hierarchy based framework for validating edge devices performing state estimation in a power system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211126

RJ01 Rejection of invention patent application after publication