{"title":"A Deep Learning Based Cyber Attack Detection Scheme in DC Microgrid Systems","authors":"Koduru Sriranga Suprabhath;Machina Venkata Siva Prasad;Sreedhar Madichetty;Sukumar Mishra","doi":"10.24295/CPSSTPEA.2023.00012","DOIUrl":null,"url":null,"abstract":"In this article, a dual deep neural network (DDNN) based cyber-attack detection and correction method for direct current microgrids (DCMG) are proposed. DCMG are prone to cyber-attacks through their sensors and communication links. The injection of false data packets in the cyber layer can disrupt the control objectives, leading to voltage instability and load sharing patterns. Therefore, detection and correction of malicious data is essential for the DC microgrid stability. In this article, a DDNN is designed with prediction and correction networks. The prediction network composed with one input layer, two hidden layers and one output layer. This network predicts the converter's duty by considering the input features as DC bus voltage and the reference voltage. The correction network also composed with one input layer, two hidden layers and one output layer. This network provides the duty corresponding to the attack by considering the input features as DC bus voltage, battery voltage and reference voltage. The output from the prediction and correction network are implanted to detect and correct the false data injection (FDI) attacks. However, for the training purpose, the data is collected by performing the various attack scenarios who is able to inject the false data and disrupt the stable operation of the system. The data is then used to train a neural network to detect a larger set of FDI attacks. The proposed scheme's effectiveness is verified by conducting the real-time experiments for various attack scenarios and its results are explored.","PeriodicalId":100339,"journal":{"name":"CPSS Transactions on Power Electronics and Applications","volume":"8 2","pages":"119-127"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/7873541/10177876/10108917.pdf","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"CPSS Transactions on Power Electronics and Applications","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10108917/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this article, a dual deep neural network (DDNN) based cyber-attack detection and correction method for direct current microgrids (DCMG) are proposed. DCMG are prone to cyber-attacks through their sensors and communication links. The injection of false data packets in the cyber layer can disrupt the control objectives, leading to voltage instability and load sharing patterns. Therefore, detection and correction of malicious data is essential for the DC microgrid stability. In this article, a DDNN is designed with prediction and correction networks. The prediction network composed with one input layer, two hidden layers and one output layer. This network predicts the converter's duty by considering the input features as DC bus voltage and the reference voltage. The correction network also composed with one input layer, two hidden layers and one output layer. This network provides the duty corresponding to the attack by considering the input features as DC bus voltage, battery voltage and reference voltage. The output from the prediction and correction network are implanted to detect and correct the false data injection (FDI) attacks. However, for the training purpose, the data is collected by performing the various attack scenarios who is able to inject the false data and disrupt the stable operation of the system. The data is then used to train a neural network to detect a larger set of FDI attacks. The proposed scheme's effectiveness is verified by conducting the real-time experiments for various attack scenarios and its results are explored.