433 research outputs found
A Deep Learning based Detection Method for Combined Integrity-Availability Cyber Attacks in Power System
As one of the largest and most complex systems on earth, power grid (PG)
operation and control have stepped forward as a compound analysis on both
physical and cyber layers which makes it vulnerable to assaults from economic
and security considerations. A new type of attack, namely as combined data
Integrity-Availability attack, has been recently proposed, where the attackers
can simultaneously manipulate and blind some measurements on SCADA system to
mislead the control operation and keep stealthy. Compared with traditional
FDIAs, this combined attack can further complicate and vitiate the model-based
detection mechanism. To detect such attack, this paper proposes a novel random
denoising LSTM-AE (LSTMRDAE) framework, where the spatial-temporal correlations
of measurements can be explicitly captured and the unavailable data is
countered by the random dropout layer. The proposed algorithm is evaluated and
the performance is verified on a standard IEEE 118-bus system under various
unseen attack attempts
Graphical Convolution Network Based Semi-Supervised Methods for Detecting PMU Data Manipulation Attacks
With the integration of information and communications technologies (ICTs) into the power grid, electricity infrastructures are gradually transformed towards smart grid and power systems become more open to and accessible from outside networks. With ubiquitous sensors, computers and communication networks, modern power systems have become complicated cyber-physical systems. The cyber security issues and the impact of potential attacks on the smart grid have become an important issue. Among these attacks, false data injection attack (FDIA) becomes a growing concern because of its varied types and impacts. Several detection algorithms have been developed in the last few years, which were model-based, trajectory prediction-based or learning-based methods.
Phasor measurement units (PMUs) and supervisory control and data acquisition (SCADA) system work together to monitor the power system operation. The unsecured devices could offer opportunities to adversaries to compromise the system. In the literature review part of this thesis, the main methods are compared considering computing accuracy and complexity. Most work about PMUs ignored the reality that the number of PMUs installed in a power system is limited to realize observability because of high installing cost. Therefore, based on observable truth of PMU and the topology structure of power system, the graph convolution network (GCN) is proposed in this thesis. The main idea is using selected features to define violated PMU, and GCN is used to classify susceptible violated nodes and normal nodes. The basic detection method is introduced at first. And then the calculation process of neural network and Fourier transform are described with more details about graph convolution network. Later, the proposed detection mechanism and algorithm are introduced. Finally, the simulation results are given and analyzed
- …