Font Size: a A A

Research On Vulnerability Assessment Method Of Cyber Physical Power System

Posted on:2020-11-25Degree:MasterType:Thesis
Country:ChinaCandidate:D SongFull Text:PDF
GTID:2392330578470014Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the continuous development and application of information and communication technology and intelligent control equipment in power system,the traditional power system has gradually evolved into a new form,that is,the cyber-physical power system(CPPS),which is achieved from deep coupleing between information space and power system.However,the security faced by CPPS are becoming more and more serious,especially all the network security risks initially isolated in the information space.These risks may transfer their hazards to the power system and even cause power system disturbances.CPPS vulnerability assessment is conducive to mining the weak links of the system,thus we can carry out some security defense measures,it has very important guiding significances for ensuring safe and stable operation of power system and designing CPPS architecture in the future.Firstly,the dynamic vulnerability assessment of CPPS considering component function failure is studied in the thesis.Analyzeing the interaction mechanism between information space and power system,and exploreing the transmission process and formation mechanism of CPPS cross-space cascading failures.On this basis,as for the functional characteristics of different components,the effects of single component failure such as information components,communication components and electric components on the operation of CPPS are analyzed and quantified.Furthermore,considering the scenario of components synchronization function failure,evaluateng the dynamic vulnerability of multiple components synchronization function failure quantitatively;secondly,based on the risk analysis graph strategy,the most hazardous component combinations for CPPS multi-node cooperative attack is identified from the attacker's perspective;thirdly,considering the dynamic attack-defense game process between attacker and defender,exploreing the security defense strategy and defense resource allocation algorithm of CPPS,and then,the CPPS vulnerability assessment process considering defense resource allocation is studied.Finally,based on the IEEE-9 bus system,a local CPPS model is built,a local CPPS model is built,and specific example analysises are adopted considering different attack scenarios.
Keywords/Search Tags:Cyber Physical Power System, Vulnerability Assessment, Component Function Failure, Collaborative Attack, Security Defense
PDF Full Text Request
Related items