为智能电网中的高级网络攻击检测实施人工智能解决方案

IF 4.3 3区 工程技术 Q2 ENERGY & FUELS International Journal of Energy Research Pub Date : 2024-10-08 DOI:10.1155/2024/6969383
Lilia Tightiz, Rashid Nasimov, Morteza Azimi Nasab
{"title":"为智能电网中的高级网络攻击检测实施人工智能解决方案","authors":"Lilia Tightiz,&nbsp;Rashid Nasimov,&nbsp;Morteza Azimi Nasab","doi":"10.1155/2024/6969383","DOIUrl":null,"url":null,"abstract":"<div>\n <p>As the backbone of modern power systems, the smart grid is one of the most critical applications of the Internet of Things. The intelligent electricity system faces various types of unauthorized malicious access, that is, cyber-attacks. With the development and application of information and communication technologies in traditional power systems, the improvement of physical-cyber systems in the smart grid also increases. Nowadays, the deployment of defensive measures has surged in response to the growing number of attacks aimed at the smart grid. Therefore, in this paper, we investigate cyber-attack identification using artificial intelligence-based models and identify them by estimating the state vector of the electricity network. We accomplish simulations by extracting data from the five-bus IEEE network to test the effectiveness of the proposed algorithm. False data attack vectors are then injected into the healthy measurements. In this way, to check the detection power of the proposed algorithms, 2,000 measurement samples have been taken from the five-bus network, half of which are considered healthy data and the other half as manipulated data. After labeling healthy and false data, machine-learning algorithms such as decision trees and <i>k</i>-nearest neighbor (KNN) have been used to investigate and identify this type of attack. Comparative analysis of the two proposed algorithms against commonly used methods demonstrates significantly improved accuracy. Specifically, according to the best depth for the decision-tree algorithm and <i>k</i> for the KNN algorithm, it is drawn with <i>k</i> = 3 and the decision-tree algorithm with a depth of 9. According to the algorithms proposed in this article, the decision-tree algorithm with a depth of 9 in <i>p</i>-value of 0.45 and 0.64 and the nearest neighbor algorithm with <i>k</i> = 3 in <i>p</i> is equal to 0.72, 0.98, and 1 represent better accuracy. Also, the results indicate that the two proposed algorithms have performed much more favorably than other classification methods. Additionally, the detection accuracy increases with higher <i>p</i>-values for these two algorithms. This problem shows that the detectors can detect false data injection attacks that cause more severe disturbances in the system.</p>\n </div>","PeriodicalId":14051,"journal":{"name":"International Journal of Energy Research","volume":null,"pages":null},"PeriodicalIF":4.3000,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/6969383","citationCount":"0","resultStr":"{\"title\":\"Implementing AI Solutions for Advanced Cyber-Attack Detection in Smart Grid\",\"authors\":\"Lilia Tightiz,&nbsp;Rashid Nasimov,&nbsp;Morteza Azimi Nasab\",\"doi\":\"10.1155/2024/6969383\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n <p>As the backbone of modern power systems, the smart grid is one of the most critical applications of the Internet of Things. The intelligent electricity system faces various types of unauthorized malicious access, that is, cyber-attacks. With the development and application of information and communication technologies in traditional power systems, the improvement of physical-cyber systems in the smart grid also increases. Nowadays, the deployment of defensive measures has surged in response to the growing number of attacks aimed at the smart grid. Therefore, in this paper, we investigate cyber-attack identification using artificial intelligence-based models and identify them by estimating the state vector of the electricity network. We accomplish simulations by extracting data from the five-bus IEEE network to test the effectiveness of the proposed algorithm. False data attack vectors are then injected into the healthy measurements. In this way, to check the detection power of the proposed algorithms, 2,000 measurement samples have been taken from the five-bus network, half of which are considered healthy data and the other half as manipulated data. After labeling healthy and false data, machine-learning algorithms such as decision trees and <i>k</i>-nearest neighbor (KNN) have been used to investigate and identify this type of attack. Comparative analysis of the two proposed algorithms against commonly used methods demonstrates significantly improved accuracy. Specifically, according to the best depth for the decision-tree algorithm and <i>k</i> for the KNN algorithm, it is drawn with <i>k</i> = 3 and the decision-tree algorithm with a depth of 9. According to the algorithms proposed in this article, the decision-tree algorithm with a depth of 9 in <i>p</i>-value of 0.45 and 0.64 and the nearest neighbor algorithm with <i>k</i> = 3 in <i>p</i> is equal to 0.72, 0.98, and 1 represent better accuracy. Also, the results indicate that the two proposed algorithms have performed much more favorably than other classification methods. Additionally, the detection accuracy increases with higher <i>p</i>-values for these two algorithms. This problem shows that the detectors can detect false data injection attacks that cause more severe disturbances in the system.</p>\\n </div>\",\"PeriodicalId\":14051,\"journal\":{\"name\":\"International Journal of Energy Research\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.3000,\"publicationDate\":\"2024-10-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/6969383\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Energy Research\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1155/2024/6969383\",\"RegionNum\":3,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENERGY & FUELS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Energy Research","FirstCategoryId":"5","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1155/2024/6969383","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENERGY & FUELS","Score":null,"Total":0}
引用次数: 0

摘要

作为现代电力系统的支柱,智能电网是物联网最关键的应用之一。智能电力系统面临着各种未经授权的恶意访问,即网络攻击。随着信息通信技术在传统电力系统中的发展和应用,智能电网中物理-网络系统的完善程度也在不断提高。如今,针对智能电网的攻击日益增多,防御措施的部署也随之激增。因此,在本文中,我们使用基于人工智能的模型来研究网络攻击识别,并通过估计电网的状态向量来识别网络攻击。我们通过从五总线 IEEE 网络中提取数据来完成模拟,以测试所提算法的有效性。然后在健康测量中注入虚假数据攻击向量。通过这种方法,从五总线网络中提取了 2,000 个测量样本,其中一半被视为健康数据,另一半被视为篡改数据,以检验所提算法的检测能力。对健康数据和虚假数据进行标记后,使用决策树和 k-nearest neighbor (KNN) 等机器学习算法来研究和识别这类攻击。对这两种拟议算法与常用方法的比较分析表明,准确率有了显著提高。具体来说,根据决策树算法的最佳深度和 KNN 算法的 k 值,得出 k = 3 和决策树算法的深度为 9。根据本文提出的算法,深度为 9 的决策树算法的 p 值为 0.45 和 0.64,而 k = 3 的近邻算法的 p 值分别为 0.72、0.98 和 1,代表了更好的准确性。结果还表明,这两种拟议算法的性能比其他分类方法要好得多。此外,这两种算法的检测精度随着 p 值的增大而提高。这个问题表明,检测器可以检测到对系统造成更严重干扰的虚假数据注入攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Implementing AI Solutions for Advanced Cyber-Attack Detection in Smart Grid

As the backbone of modern power systems, the smart grid is one of the most critical applications of the Internet of Things. The intelligent electricity system faces various types of unauthorized malicious access, that is, cyber-attacks. With the development and application of information and communication technologies in traditional power systems, the improvement of physical-cyber systems in the smart grid also increases. Nowadays, the deployment of defensive measures has surged in response to the growing number of attacks aimed at the smart grid. Therefore, in this paper, we investigate cyber-attack identification using artificial intelligence-based models and identify them by estimating the state vector of the electricity network. We accomplish simulations by extracting data from the five-bus IEEE network to test the effectiveness of the proposed algorithm. False data attack vectors are then injected into the healthy measurements. In this way, to check the detection power of the proposed algorithms, 2,000 measurement samples have been taken from the five-bus network, half of which are considered healthy data and the other half as manipulated data. After labeling healthy and false data, machine-learning algorithms such as decision trees and k-nearest neighbor (KNN) have been used to investigate and identify this type of attack. Comparative analysis of the two proposed algorithms against commonly used methods demonstrates significantly improved accuracy. Specifically, according to the best depth for the decision-tree algorithm and k for the KNN algorithm, it is drawn with k = 3 and the decision-tree algorithm with a depth of 9. According to the algorithms proposed in this article, the decision-tree algorithm with a depth of 9 in p-value of 0.45 and 0.64 and the nearest neighbor algorithm with k = 3 in p is equal to 0.72, 0.98, and 1 represent better accuracy. Also, the results indicate that the two proposed algorithms have performed much more favorably than other classification methods. Additionally, the detection accuracy increases with higher p-values for these two algorithms. This problem shows that the detectors can detect false data injection attacks that cause more severe disturbances in the system.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Energy Research
International Journal of Energy Research 工程技术-核科学技术
CiteScore
9.80
自引率
8.70%
发文量
1170
审稿时长
3.1 months
期刊介绍: The International Journal of Energy Research (IJER) is dedicated to providing a multidisciplinary, unique platform for researchers, scientists, engineers, technology developers, planners, and policy makers to present their research results and findings in a compelling manner on novel energy systems and applications. IJER covers the entire spectrum of energy from production to conversion, conservation, management, systems, technologies, etc. We encourage papers submissions aiming at better efficiency, cost improvements, more effective resource use, improved design and analysis, reduced environmental impact, and hence leading to better sustainability. IJER is concerned with the development and exploitation of both advanced traditional and new energy sources, systems, technologies and applications. Interdisciplinary subjects in the area of novel energy systems and applications are also encouraged. High-quality research papers are solicited in, but are not limited to, the following areas with innovative and novel contents: -Biofuels and alternatives -Carbon capturing and storage technologies -Clean coal technologies -Energy conversion, conservation and management -Energy storage -Energy systems -Hybrid/combined/integrated energy systems for multi-generation -Hydrogen energy and fuel cells -Hydrogen production technologies -Micro- and nano-energy systems and technologies -Nuclear energy -Renewable energies (e.g. geothermal, solar, wind, hydro, tidal, wave, biomass) -Smart energy system
期刊最新文献
Thermal Analysis of MHD-Modified Hybrid Nanofluid Flow Inside Convergent/Divergent Channel With Heat Generation/Absorption and Viscous-Ohmic Dissipation Utilising Polyester and Steel Slag-Derived Metal/Carbon Composites as Catalysts in Biodiesel Production Pore Evolution Law and Gas Migration Characteristics of Acidified Anthracite in Liquid CO2-ECBM: An Experimental Study An Extension of Root Assessment Method (RAM) Under Spherical Fuzzy Framework for Optimal Selection of Electricity Production Technologies Toward Sustainability: A Case Study Metaheuristic Algorithm-Based Optimal Energy Operation Scheduling and Energy System Sizing Scheme for PV-ESS Integrated Systems in South Korea
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1