Application of Machine Learning in Cyber Security of Cyber-Physical Power System

被引:0
|
作者
Peng, Sha [1 ]
Sun, Mingyang [1 ]
Zhang, Zhenyong [1 ,2 ]
Deng, Ruilong [1 ]
Cheng, Peng [1 ]
机构
[1] College of Control Science and Engineering, Zhejiang University, Hangzhou,310027, China
[2] College of Computer Science and Technology, Guizhou University, Guiyang,550025, China
基金
中国国家自然科学基金;
关键词
Embedded systems - Computing power - Cyber Physical System - Machine learning - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
With the deepening of informationization, the traditional power system has been transformed into a typical cyber-physical system (CPS). Considering the open cyber system environment, the security operation of the cyber-physical power system (CPPS) faces threats from various potential cyberattacks. In recent years, machine learning approaches have been developing rapidly and have been widely used in CPPS cyber security. On the one hand, the explosive growth of data in the CPPS and the improvement of hardware computing power create the right conditions for applying machine learning approaches. On the other hand, compared with the traditional model-based approaches, the data-based machine learning approaches has advantages in two aspects: modeling and real-time requirements. This paper summarizes the application of machine learning in CPPS cyber security from the perspectives of attack and defense, respectively. The perspective of attack mainly includes three aspects: topology inference, attacking resource optimization, and attack construction. The perspectives of defense mainly include three aspects: security protection, attack detection, and attack mitigation. Finally, the challenges and future research directions in the field of CPPS cyber security are proposed. © 2022 Automation of Electric Power Systems Press.
引用
收藏
页码:200 / 215
相关论文
共 50 条
  • [41] Mitigating Cyber Risks in Smart Cyber-Physical Power Systems Through Deep Learning and Hybrid Security Models
    Dayarathne, M. A. S. P.
    Jayathilaka, M. S. M.
    Bandara, R. M. V. A.
    Logeeshan, V.
    Kumarawadu, S.
    Wanigasekara, Chathura
    IEEE ACCESS, 2025, 13 : 37474 - 37492
  • [42] A Future Outlook for Cyber-Physical Power System
    Su, Zhuo
    Xu, Luo
    Xin, Shujun
    Li, Weijian
    Shi, Zhan
    Guo, Qinglai
    2017 IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2017,
  • [43] Explainable Unsupervised Machine Learning for Cyber-Physical Systems
    Wickramasinghe, Chathurika S.
    Amarasinghe, Kasun
    Marino, Daniel L.
    Rieger, Craig
    Manic, Milos
    IEEE ACCESS, 2021, 9 : 131824 - 131843
  • [44] Learning System Descriptions for Cyber-Physical Systems
    Diedrich, Alexander
    Moddemann, Lukas
    Niggemann, Oliver
    IFAC PAPERSONLINE, 2024, 58 (04): : 628 - 633
  • [45] Research on Security Estimation and Control of Cyber-Physical System
    Cai, Xiaobo
    Han, Ke
    Li, Yan
    Wang, Huihui
    Zhang, Jiajin
    Zhang, Yue
    2020 IEEE 39TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2020,
  • [46] A Review of Cyber-Physical Energy System Security Assessment
    Rasmussen, Theis B.
    Yang, Guangya
    Nielsen, Arne H.
    Dong, Zhaoyang
    2017 IEEE MANCHESTER POWERTECH, 2017,
  • [47] Cyber-physical system security for networked industrial processes
    Huang S.
    Zhou C.-J.
    Yang S.-H.
    Qin Y.-Q.
    International Journal of Automation and Computing, 2015, 12 (06) : 567 - 578
  • [48] Countermeasures to Enhance Cyber-Physical System Security and Safety
    Sabaliauskaite, Giedre
    Mathur, Aditya P.
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 13 - 18
  • [49] A Review of Cyber-Physical Security in the Generation System of the Grid
    Siu, Jun Yen
    Panda, Sanjib Kumar
    IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 1520 - 1525
  • [50] Cyber-physical System Security for Networked Industrial Processes
    Shuang Huang
    Chun-Jie Zhou
    Shuang-Hua Yang
    Yuan-Qing Qin
    International Journal of Automation and Computing, 2015, (06) : 567 - 578