张博, 刘绚, 于宗超, 王文博, 金倩倩, 李炜键. 基于人工智能的电力系统网络攻击检测研究综述[J]. 高电压技术, 2022, 48(11): 4413-4426. DOI: 10.13336/j.1003-6520.hve.20220300
引用本文: 张博, 刘绚, 于宗超, 王文博, 金倩倩, 李炜键. 基于人工智能的电力系统网络攻击检测研究综述[J]. 高电压技术, 2022, 48(11): 4413-4426. DOI: 10.13336/j.1003-6520.hve.20220300
ZHANG Bo, LIU Xuan, YU Zongchao, WANG Wenbo, JIN Qianqian, LI Weijian. Review on Artificial Intelligence-based Network Attack Detection in Power Systems[J]. High Voltage Engineering, 2022, 48(11): 4413-4426. DOI: 10.13336/j.1003-6520.hve.20220300
Citation: ZHANG Bo, LIU Xuan, YU Zongchao, WANG Wenbo, JIN Qianqian, LI Weijian. Review on Artificial Intelligence-based Network Attack Detection in Power Systems[J]. High Voltage Engineering, 2022, 48(11): 4413-4426. DOI: 10.13336/j.1003-6520.hve.20220300

基于人工智能的电力系统网络攻击检测研究综述

Review on Artificial Intelligence-based Network Attack Detection in Power Systems

  • 摘要: 随着电力系统中信息域与物理域的深度融合和新型电力系统建设的快速推进,网络攻击已对电力系统安全稳定运行构成巨大威胁,亟需发展电力系统网络攻击检测技术。人工智能技术在数据特征提取、复杂系统建模、非线性问题求解等方面的优势,使其成为了电力系统网络攻击检测的主流方法。论文首先概述了新型电力系统在结构复杂性、信息物理耦合、智能化程度3个方面的特征,并分析了新型电力系统在物理层、网络层和应用层可能遭受的网络安全威胁。然后从物理层终端设备、网络层流量、应用层报文和应用层业务系统4个方面对基于人工智能的网络攻击检测方法进行了详细综述。最后讨论了新型电力系统中攻击检测、攻击阻断、事后恢复3者之间的耦合关系和主动防御技术当前急需解决的问题,并对未来研究方向进行了展望。

     

    Abstract: With the deep integration of cyber domain and physical domain and the fast development of new power systems, cyber attacks pose a severe threat to the safe and reliable operation of power systems, thus it is essential to develop detection methods for cyber attacks. Artificial Intelligence (AI) is recognized as a popular method to detect cyber attacks because of its advantages in extracting data characteristic, modeling complex systems and solving nonlinear systems. This paper first investigates three characteristics of structure complicacy, cyber physical coupling and intelligence in new power systems, and reveals the possible cyber threats that new power systems might encounter in the physical, network and application layers. After that, the AI-based detection methods for cyber attacks in new power systems are reviewed from the perspectives of terminal devices of the physical layer, network layer traffic, packets and business systems in the application layer. Finally, the coupling relationships among attack detection, attack blocking and ex-post recovery are studied, some key technologies of active defense to cyber attacks are discussed, and the corresponding future work are also given.

     

/

返回文章
返回