{"title":"Implementing AI Solutions for Advanced Cyber-Attack Detection in Smart Grid","authors":"Lilia Tightiz, Rashid Nasimov, Morteza Azimi Nasab","doi":"10.1155/2024/6969383","DOIUrl":null,"url":null,"abstract":"<div>\n <p>As the backbone of modern power systems, the smart grid is one of the most critical applications of the Internet of Things. The intelligent electricity system faces various types of unauthorized malicious access, that is, cyber-attacks. With the development and application of information and communication technologies in traditional power systems, the improvement of physical-cyber systems in the smart grid also increases. Nowadays, the deployment of defensive measures has surged in response to the growing number of attacks aimed at the smart grid. Therefore, in this paper, we investigate cyber-attack identification using artificial intelligence-based models and identify them by estimating the state vector of the electricity network. We accomplish simulations by extracting data from the five-bus IEEE network to test the effectiveness of the proposed algorithm. False data attack vectors are then injected into the healthy measurements. In this way, to check the detection power of the proposed algorithms, 2,000 measurement samples have been taken from the five-bus network, half of which are considered healthy data and the other half as manipulated data. After labeling healthy and false data, machine-learning algorithms such as decision trees and <i>k</i>-nearest neighbor (KNN) have been used to investigate and identify this type of attack. Comparative analysis of the two proposed algorithms against commonly used methods demonstrates significantly improved accuracy. Specifically, according to the best depth for the decision-tree algorithm and <i>k</i> for the KNN algorithm, it is drawn with <i>k</i> = 3 and the decision-tree algorithm with a depth of 9. According to the algorithms proposed in this article, the decision-tree algorithm with a depth of 9 in <i>p</i>-value of 0.45 and 0.64 and the nearest neighbor algorithm with <i>k</i> = 3 in <i>p</i> is equal to 0.72, 0.98, and 1 represent better accuracy. Also, the results indicate that the two proposed algorithms have performed much more favorably than other classification methods. Additionally, the detection accuracy increases with higher <i>p</i>-values for these two algorithms. This problem shows that the detectors can detect false data injection attacks that cause more severe disturbances in the system.</p>\n </div>","PeriodicalId":14051,"journal":{"name":"International Journal of Energy Research","volume":null,"pages":null},"PeriodicalIF":4.3000,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/6969383","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Energy Research","FirstCategoryId":"5","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1155/2024/6969383","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENERGY & FUELS","Score":null,"Total":0}
引用次数: 0
Abstract
As the backbone of modern power systems, the smart grid is one of the most critical applications of the Internet of Things. The intelligent electricity system faces various types of unauthorized malicious access, that is, cyber-attacks. With the development and application of information and communication technologies in traditional power systems, the improvement of physical-cyber systems in the smart grid also increases. Nowadays, the deployment of defensive measures has surged in response to the growing number of attacks aimed at the smart grid. Therefore, in this paper, we investigate cyber-attack identification using artificial intelligence-based models and identify them by estimating the state vector of the electricity network. We accomplish simulations by extracting data from the five-bus IEEE network to test the effectiveness of the proposed algorithm. False data attack vectors are then injected into the healthy measurements. In this way, to check the detection power of the proposed algorithms, 2,000 measurement samples have been taken from the five-bus network, half of which are considered healthy data and the other half as manipulated data. After labeling healthy and false data, machine-learning algorithms such as decision trees and k-nearest neighbor (KNN) have been used to investigate and identify this type of attack. Comparative analysis of the two proposed algorithms against commonly used methods demonstrates significantly improved accuracy. Specifically, according to the best depth for the decision-tree algorithm and k for the KNN algorithm, it is drawn with k = 3 and the decision-tree algorithm with a depth of 9. According to the algorithms proposed in this article, the decision-tree algorithm with a depth of 9 in p-value of 0.45 and 0.64 and the nearest neighbor algorithm with k = 3 in p is equal to 0.72, 0.98, and 1 represent better accuracy. Also, the results indicate that the two proposed algorithms have performed much more favorably than other classification methods. Additionally, the detection accuracy increases with higher p-values for these two algorithms. This problem shows that the detectors can detect false data injection attacks that cause more severe disturbances in the system.
期刊介绍:
The International Journal of Energy Research (IJER) is dedicated to providing a multidisciplinary, unique platform for researchers, scientists, engineers, technology developers, planners, and policy makers to present their research results and findings in a compelling manner on novel energy systems and applications. IJER covers the entire spectrum of energy from production to conversion, conservation, management, systems, technologies, etc. We encourage papers submissions aiming at better efficiency, cost improvements, more effective resource use, improved design and analysis, reduced environmental impact, and hence leading to better sustainability.
IJER is concerned with the development and exploitation of both advanced traditional and new energy sources, systems, technologies and applications. Interdisciplinary subjects in the area of novel energy systems and applications are also encouraged. High-quality research papers are solicited in, but are not limited to, the following areas with innovative and novel contents:
-Biofuels and alternatives
-Carbon capturing and storage technologies
-Clean coal technologies
-Energy conversion, conservation and management
-Energy storage
-Energy systems
-Hybrid/combined/integrated energy systems for multi-generation
-Hydrogen energy and fuel cells
-Hydrogen production technologies
-Micro- and nano-energy systems and technologies
-Nuclear energy
-Renewable energies (e.g. geothermal, solar, wind, hydro, tidal, wave, biomass)
-Smart energy system