Temporal false data injection attack and detection on cyber-physical power system based on deep reinforcement learning

IF 2.4 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC
IET Smart Grid Pub Date : 2023-11-14 DOI:10.1049/stg2.12141
Wei Fu, Yunqi Yan, Ying Chen, Zhisheng Wang, Danlong Zhu, Longxing Jin
{"title":"Temporal false data injection attack and detection on cyber-physical power system based on deep reinforcement learning","authors":"Wei Fu,&nbsp;Yunqi Yan,&nbsp;Ying Chen,&nbsp;Zhisheng Wang,&nbsp;Danlong Zhu,&nbsp;Longxing Jin","doi":"10.1049/stg2.12141","DOIUrl":null,"url":null,"abstract":"<p>False data injection (FDI) attacks are serious threats to a cyber-physical power system (CPPS), which may be launched by a malicious software or virus accessing only the measurements from one substation. This study proposes a novel attack method named the temporal FDI (TFDI) attack. Namely, the virus makes decisions based on temporal observations of the CPPS, and the attack is driven by a deep Q network (DQN) algorithm. As DQN takes vectors of continuous variables as input states, the proposed method is free of the state space explosion problem, which helps the virus to learn the optimal attack strategy efficiently. Moreover, for adopting time-series measurements as quasi-dynamic observations, long short-term memory cells are employed as a layer of the Q network. The TFDI attack enables the virus to discern trends of load variations and enhance the attack’s effectiveness. Meanwhile, a countermeasure is also presented to detect the proposed FDI attack. Binary classifiers are trained for each bus to detect suspicious local measurements according to their deviations from system-state manifolds. When suspicious measurements are spotted frequently, the corresponding bus is believed to be under FDI attacks. Test cases validate the efficacy of the proposed FDI attack method as well as its countermeasure.</p>","PeriodicalId":36490,"journal":{"name":"IET Smart Grid","volume":null,"pages":null},"PeriodicalIF":2.4000,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/stg2.12141","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Smart Grid","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/stg2.12141","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

False data injection (FDI) attacks are serious threats to a cyber-physical power system (CPPS), which may be launched by a malicious software or virus accessing only the measurements from one substation. This study proposes a novel attack method named the temporal FDI (TFDI) attack. Namely, the virus makes decisions based on temporal observations of the CPPS, and the attack is driven by a deep Q network (DQN) algorithm. As DQN takes vectors of continuous variables as input states, the proposed method is free of the state space explosion problem, which helps the virus to learn the optimal attack strategy efficiently. Moreover, for adopting time-series measurements as quasi-dynamic observations, long short-term memory cells are employed as a layer of the Q network. The TFDI attack enables the virus to discern trends of load variations and enhance the attack’s effectiveness. Meanwhile, a countermeasure is also presented to detect the proposed FDI attack. Binary classifiers are trained for each bus to detect suspicious local measurements according to their deviations from system-state manifolds. When suspicious measurements are spotted frequently, the corresponding bus is believed to be under FDI attacks. Test cases validate the efficacy of the proposed FDI attack method as well as its countermeasure.

Abstract Image

基于深度强化学习的网络物理电力系统时态错误数据注入攻击与检测
虚假数据注入(FDI)攻击是对网络物理电力系统(CPPS)的严重威胁,恶意软件或病毒可能只访问一个变电站的测量数据。本研究提出了一种新的攻击方法,名为时态 FDI(TFDI)攻击。也就是说,病毒根据对 CPPS 的时间观测做出决策,攻击由深度 Q 网络(DQN)算法驱动。由于 DQN 将连续变量向量作为输入状态,因此所提出的方法不存在状态空间爆炸问题,有助于病毒高效地学习最优攻击策略。此外,为了将时间序列测量结果作为准动态观测数据,采用了长短期记忆单元作为 Q 网络层。TFDI 攻击能让病毒辨别负载变化的趋势,增强攻击的有效性。同时,还提出了一种检测拟议 FDI 攻击的对策。针对每条总线训练二进制分类器,根据其与系统状态流形的偏差来检测可疑的本地测量值。如果经常发现可疑测量值,则认为相应总线受到了 FDI 攻击。测试案例验证了所提出的 FDI 攻击方法及其对策的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Smart Grid
IET Smart Grid Computer Science-Computer Networks and Communications
CiteScore
6.70
自引率
4.30%
发文量
41
审稿时长
29 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信