Detecting Cyber Attacks in Smart Grids with Massive Unlabeled Sensing Data

Hanyu Zeng, Zhen Wei Ng, Pengfei Zhou, Xin Lou, David K. Y. Yau, M. Winslett
{"title":"Detecting Cyber Attacks in Smart Grids with Massive Unlabeled Sensing Data","authors":"Hanyu Zeng, Zhen Wei Ng, Pengfei Zhou, Xin Lou, David K. Y. Yau, M. Winslett","doi":"10.1109/SmartGridComm52983.2022.9961017","DOIUrl":null,"url":null,"abstract":"Modern power grids are undergoing significant changes driven by information and communication technologies (ICTs), and evolving into smart grids with higher efficiency and lower operation cost. Using ICTs, however, comes with an inevitable side effect that makes the power system more vulnerable to cyber attacks. In this paper, we propose a self-supervised learning-based framework to detect and identify various types of cyber attacks. Different from existing approaches, the proposed framework does not rely on large amounts of well-curated labeled data but makes use of the massive unlabeled data in the wild which are easily accessible. Specifically, the proposed framework adopts the BERT model from the natural language processing domain and learns generalizable and effective representations from the unlabeled sensing data, which capture the distinctive patterns of different attacks. Using the learned representations, together with a very small amount of labeled data, we can train a task-specific classifier to detect various types of cyber attacks. Experiment results in a 3-area power grid system with 37 buses demonstrate the superior performance of our framework over existing approaches, especially when a very limited amount of labeled data are available. We believe such a framework can be easily adopted to detect a variety of cyber attacks in other power grid scenarios.","PeriodicalId":252202,"journal":{"name":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SmartGridComm52983.2022.9961017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Modern power grids are undergoing significant changes driven by information and communication technologies (ICTs), and evolving into smart grids with higher efficiency and lower operation cost. Using ICTs, however, comes with an inevitable side effect that makes the power system more vulnerable to cyber attacks. In this paper, we propose a self-supervised learning-based framework to detect and identify various types of cyber attacks. Different from existing approaches, the proposed framework does not rely on large amounts of well-curated labeled data but makes use of the massive unlabeled data in the wild which are easily accessible. Specifically, the proposed framework adopts the BERT model from the natural language processing domain and learns generalizable and effective representations from the unlabeled sensing data, which capture the distinctive patterns of different attacks. Using the learned representations, together with a very small amount of labeled data, we can train a task-specific classifier to detect various types of cyber attacks. Experiment results in a 3-area power grid system with 37 buses demonstrate the superior performance of our framework over existing approaches, especially when a very limited amount of labeled data are available. We believe such a framework can be easily adopted to detect a variety of cyber attacks in other power grid scenarios.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用大量未标记传感数据检测智能电网中的网络攻击
在信息通信技术的推动下,现代电网正经历着重大变革,向效率更高、运行成本更低的智能电网发展。然而,使用信息通信技术(ict)也带来了不可避免的副作用,即电力系统更容易受到网络攻击。在本文中,我们提出了一个基于自监督学习的框架来检测和识别各种类型的网络攻击。与现有的方法不同,该框架不依赖于大量精心策划的标记数据,而是利用了大量易于访问的未标记数据。具体而言,该框架采用自然语言处理领域的BERT模型,并从未标记的感知数据中学习可推广的有效表示,从而捕获不同攻击的独特模式。使用学习到的表征,加上非常少量的标记数据,我们可以训练一个特定于任务的分类器来检测各种类型的网络攻击。在具有37个总线的3区电网系统中的实验结果表明,我们的框架优于现有方法,特别是在可用的标记数据数量非常有限的情况下。我们相信,这种框架可以很容易地用于检测其他电网场景中的各种网络攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Scheduling Electric Vehicle Fleets as a Virtual Battery under Uncertainty using Quantile Forecasts Graph Neural Network Based Prediction of Data Traffic in Cyber-Physical Smart Power Grids A Digital Twin Integrated Cyber-physical Systems for Community Energy Trading Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems Smart Home/Office Energy Management based on Individual Data Analysis through IoT Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1