Random subspace ensemble-based detection of false data injection attacks in automatic generation control systems

基于随机子空间集成的自动生成控制系统中虚假数据注入攻击检测

阅读:1

Abstract

Automatic Generation Control (AGC) systems in smart grids are increasingly vulnerable to cyber-attacks, particularly False Data Injection (FDI) attacks, due to their reliance on information and communication technologies. These vulnerabilities pose significant threats to the reliable operation of power systems. To address this challenge, this research paper introduces the machine learning (ML) based cyberattack detection technique designed to identify FDI attacks with the highest accuracy proficiently. The study involves a comprehensive analysis of three features: the original discrete signal feature, the cycle-to-cycle-based feature, and the sample-to-sample-based feature. These features are utilized for detecting FDI attacks and distinguishing them from normal load variations. The research meticulously collects data by simulating diverse FDI attacks, including step attacks, pulse attacks, random attacks, and normal load variation cases on an AGC power system. Four ML classifiers are selected and compared for the classification task. The simulation results reveal that the sample-to-sample-based feature proves highly effective in distinguishing FDI attacks compared to the original signal and cycle-to-cycle-based features. Notably, the results indicate that the random subspace ensemble (RaSE) classifier, utilizing sample-to-sample-based features, effectively identifies and classifies all normal and FDI attacks. This research provides valuable insights into the potential of ML techniques for enhancing FDI attack detection in the AGC of power systems. It provides a potential pathway for overcoming the limitations associated with traditional model-based FDI detection methods.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。