Abstract
Price tamping attacks may cause market turbulence, attack detection and defense strategy are needed to study. Firstly, demand response characteristics are analyzed in a User Energy System. A quantitative model is established to describe the load changes caused by price tampering attacks. Secondly, a space-based cumulative intrusion detection method is proposed to pick up the discrepancy under tampering attacks. To verify the practicability of the proposed method, intrusion detection experiments are tested in the Principal Information and Safety Laboratory. Then, comprehensively considering the purchase of electricity from the power grid, self-generation, and load shedding, a quantitative model of attack consequences is established based on the allocation coefficient. Thus, the intrusion detection algorithm is used as a defense resource, and a demand-side defense protection strategy is formed to find an optimal deployment method based on non-cooperative game theory. The defensive protection strategy takes the quantitative model of attack consequences as the solution target, and solves the Nash equilibrium solution under different attack modes. Finally, in the IEEE-33 node system simulations, the defense resource is deployed using intrusion detection strategy, and the defense decision is executed to show the effectiveness of the comprehensive protection strategies.
Highlights
The cyber-physical system integrates the computing system, the communication network, and the physical environment through computation, communication, and control (3C) technology
Zhao et al (2010) indicates that The modern power system is no longer the traditional power equipment network. It develops into a power cyber-physical system (CPS) with various typical features
The main content of this article has the following aspects: 1) A cumulative error detection strategy based on normal distribution is designed to detect the price tampering attack by MITM attackers; 2) Based on the minimum comprehensive cost, a quantitative model of attack consequences is established which considers three demand-side response methods of purchasing power from the external grid, self-generation, and load shedding comprehensively; 3) A demand-side defense protection strategy based on game theory is established
Summary
The cyber-physical system integrates the computing system, the communication network, and the physical environment through computation, communication, and control (3C) technology. The electricity consumed in an area consists of two parts-traditional power and local distributed new energy generation such as solar energy, wind energy, etc In this case, the regional electricity price can no longer be fixed to a certain value. As can be seen from Jie et al (2019), a Stackelberg game was used to model Man-In-The-Middle (MITM) attack mode They compared the financial loss and the effect of cyber security. It can be seen that the malicious bidding behavior realized by MITM attacks on electricity prices has gradually become a big problem It needs more attention and better solutions (Lin et al, 2013). Three demand-side response methods of purchasing power from the external grid, self-generation, and load shedding comprehensively; 3) A demand-side defense protection strategy based on game theory is established. The model uses the intrusion detection method to deploy defend resources, and sets the demandresponsive attack consequence quantitative model as the game target
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.