Distributed Unsupervised Detection for Robust Power System False Data Attacks via Flexible Dynamic Time Warping Strategy

IF 9.9 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Industrial Informatics Pub Date : 2024-09-23 DOI:10.1109/TII.2024.3452202
Zequn Wu;Huaguang Zhang;Lin Jiang;Xiaoyv Li
{"title":"Distributed Unsupervised Detection for Robust Power System False Data Attacks via Flexible Dynamic Time Warping Strategy","authors":"Zequn Wu;Huaguang Zhang;Lin Jiang;Xiaoyv Li","doi":"10.1109/TII.2024.3452202","DOIUrl":null,"url":null,"abstract":"This article studies the modeling method of false data injection attacks (FDIAs) considering topological changes and relevant countermeasures. A novel robust FDIA model is built, which incorporates network and measurement uncertainties into the attack subnet and can be applied to attack scenarios during topological changes. To tackle such FDIAs, a flexible dynamic time warping strategy-based distributed unsupervised detection mechanism is developed. Furthermore, an enhanced recognition model via hierarchical agglomerative clustering and local outlier factor techniques is proposed to facilitate operators to distinguish FDIAs. Compared with related works, the proposed model is more applicable to topological change scenarios and the detection framework can effectively discern such FDIAs in a distributed fashion. Simulation results demonstrate the stealthiness of the proposed FDIA model during and related to topological changes and the effectiveness of the distributed unsupervised detection method in tackling such attacks.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"21 1","pages":"277-286"},"PeriodicalIF":9.9000,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10687348/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This article studies the modeling method of false data injection attacks (FDIAs) considering topological changes and relevant countermeasures. A novel robust FDIA model is built, which incorporates network and measurement uncertainties into the attack subnet and can be applied to attack scenarios during topological changes. To tackle such FDIAs, a flexible dynamic time warping strategy-based distributed unsupervised detection mechanism is developed. Furthermore, an enhanced recognition model via hierarchical agglomerative clustering and local outlier factor techniques is proposed to facilitate operators to distinguish FDIAs. Compared with related works, the proposed model is more applicable to topological change scenarios and the detection framework can effectively discern such FDIAs in a distributed fashion. Simulation results demonstrate the stealthiness of the proposed FDIA model during and related to topological changes and the effectiveness of the distributed unsupervised detection method in tackling such attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通过灵活的动态时间扭曲策略,分布式无监督检测鲁棒性电力系统虚假数据攻击
本文研究了考虑拓扑变化的虚假数据注入攻击建模方法及相应对策。建立了一种新的鲁棒FDIA模型,该模型将网络和测量不确定性纳入攻击子网,可用于拓扑变化时的攻击场景。为了解决这类干扰,提出了一种基于灵活动态时间规整策略的分布式无监督检测机制。在此基础上,提出了一种基于层次聚类和局部离群因子技术的增强识别模型,以方便操作人员识别外商直接投资。与相关工作相比,该模型更适用于拓扑变化场景,检测框架能够以分布式的方式有效识别拓扑变化场景。仿真结果证明了所提出的FDIA模型在拓扑变化过程中的隐蔽性以及与拓扑变化相关的隐蔽性,以及分布式无监督检测方法在处理此类攻击方面的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Industrial Informatics
IEEE Transactions on Industrial Informatics 工程技术-工程:工业
CiteScore
24.10
自引率
8.90%
发文量
1202
审稿时长
5.1 months
期刊介绍: The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.
期刊最新文献
Predicting Cement Strength as Probability Density: Resolving Partial Observability and Sample Scarcity for Industrial Quality Control Semantically Guided Counterfactual Model for Multiclass Anomaly Detection Predicting Response Parameters of Ice-Covered Overhead Transmission Lines With Physics-Augmented Machine Learning DSFormer: Dual-Stream Transformers With Exogenous Variables for Electricity Price Forecasting Adaptive Platoon Tracking Control for Vehicles With Irregular Constraints: A Novel Disturbance Rejection Method
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1