Temporal false data injection attack and detection on cyber-physical power system based on deep reinforcement learning

IF 2.4 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC IET Smart Grid Pub Date : 2023-11-14 DOI:10.1049/stg2.12141
Wei Fu, Yunqi Yan, Ying Chen, Zhisheng Wang, Danlong Zhu, Longxing Jin
{"title":"Temporal false data injection attack and detection on cyber-physical power system based on deep reinforcement learning","authors":"Wei Fu,&nbsp;Yunqi Yan,&nbsp;Ying Chen,&nbsp;Zhisheng Wang,&nbsp;Danlong Zhu,&nbsp;Longxing Jin","doi":"10.1049/stg2.12141","DOIUrl":null,"url":null,"abstract":"<p>False data injection (FDI) attacks are serious threats to a cyber-physical power system (CPPS), which may be launched by a malicious software or virus accessing only the measurements from one substation. This study proposes a novel attack method named the temporal FDI (TFDI) attack. Namely, the virus makes decisions based on temporal observations of the CPPS, and the attack is driven by a deep Q network (DQN) algorithm. As DQN takes vectors of continuous variables as input states, the proposed method is free of the state space explosion problem, which helps the virus to learn the optimal attack strategy efficiently. Moreover, for adopting time-series measurements as quasi-dynamic observations, long short-term memory cells are employed as a layer of the Q network. The TFDI attack enables the virus to discern trends of load variations and enhance the attack’s effectiveness. Meanwhile, a countermeasure is also presented to detect the proposed FDI attack. Binary classifiers are trained for each bus to detect suspicious local measurements according to their deviations from system-state manifolds. When suspicious measurements are spotted frequently, the corresponding bus is believed to be under FDI attacks. Test cases validate the efficacy of the proposed FDI attack method as well as its countermeasure.</p>","PeriodicalId":36490,"journal":{"name":"IET Smart Grid","volume":null,"pages":null},"PeriodicalIF":2.4000,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/stg2.12141","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Smart Grid","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/stg2.12141","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

False data injection (FDI) attacks are serious threats to a cyber-physical power system (CPPS), which may be launched by a malicious software or virus accessing only the measurements from one substation. This study proposes a novel attack method named the temporal FDI (TFDI) attack. Namely, the virus makes decisions based on temporal observations of the CPPS, and the attack is driven by a deep Q network (DQN) algorithm. As DQN takes vectors of continuous variables as input states, the proposed method is free of the state space explosion problem, which helps the virus to learn the optimal attack strategy efficiently. Moreover, for adopting time-series measurements as quasi-dynamic observations, long short-term memory cells are employed as a layer of the Q network. The TFDI attack enables the virus to discern trends of load variations and enhance the attack’s effectiveness. Meanwhile, a countermeasure is also presented to detect the proposed FDI attack. Binary classifiers are trained for each bus to detect suspicious local measurements according to their deviations from system-state manifolds. When suspicious measurements are spotted frequently, the corresponding bus is believed to be under FDI attacks. Test cases validate the efficacy of the proposed FDI attack method as well as its countermeasure.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于深度强化学习的网络物理电力系统时态错误数据注入攻击与检测
虚假数据注入(FDI)攻击是对网络物理电力系统(CPPS)的严重威胁,恶意软件或病毒可能只访问一个变电站的测量数据。本研究提出了一种新的攻击方法,名为时态 FDI(TFDI)攻击。也就是说,病毒根据对 CPPS 的时间观测做出决策,攻击由深度 Q 网络(DQN)算法驱动。由于 DQN 将连续变量向量作为输入状态,因此所提出的方法不存在状态空间爆炸问题,有助于病毒高效地学习最优攻击策略。此外,为了将时间序列测量结果作为准动态观测数据,采用了长短期记忆单元作为 Q 网络层。TFDI 攻击能让病毒辨别负载变化的趋势,增强攻击的有效性。同时,还提出了一种检测拟议 FDI 攻击的对策。针对每条总线训练二进制分类器,根据其与系统状态流形的偏差来检测可疑的本地测量值。如果经常发现可疑测量值,则认为相应总线受到了 FDI 攻击。测试案例验证了所提出的 FDI 攻击方法及其对策的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IET Smart Grid
IET Smart Grid Computer Science-Computer Networks and Communications
CiteScore
6.70
自引率
4.30%
发文量
41
审稿时长
29 weeks
期刊最新文献
Multi‐objective interval planning for 5G base station virtual power plants considering the consumption of photovoltaic and communication flexibility Probabilistic assessment of short‐term voltage stability under load and wind uncertainty Review on reliability assessment of energy storage systems Coordinated recovery of interdependent power and water distribution systems Incentivising peers in local transactive energy markets: A case study for consumers, prosumers and prosumagers
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1