Interpretable Detection Method for False Data Injection Attack on Power Grid Based on Multi-head Graph Attention Network and Time Convolution Network Model

被引:0
作者
Su X. [1 ]
Deng C. [1 ]
Li F. [2 ]
Fu Y. [1 ]
Xiao S. [1 ]
机构
[1] School of Electrical Engineering, Shanghai University of Electric Power, Shanghai
[2] College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai
来源
Dianli Xitong Zidonghua/Automation of Electric Power Systems | 2024年 / 48卷 / 02期
基金
中国国家自然科学基金;
关键词
attention mechanism; false data injection attack; graph attention; interpretability; power grid; time convolution;
D O I
10.7500/AEPS20230410006
中图分类号
学科分类号
摘要
In the background of new power systems, fast and effective detection of false data injection attack (FDIA) is crucial for the safe operation of power grids. However, the existing deep learning methods do not fully explore the spatiotemporal feature information in measurement data of power grids, which affects the detection performance of models. Meanwhile, the“black box” attribute of deep neural networks reduces the interpretability of the detection model, leading to the lack of credibility in detection results. To solve the above problems, an interpretable FDIA detection method is proposed based on multi-head graph attention network and time convolution network (MGAT-TCN) model. First, considering the spatial correlation between power grid topology connection and measurement data, a spatial topology aware attention mechanism is introduced to establish the multi-head graph attention network (MGAT) to extract spatial features of measurement data. Next, the time convolution network (TCN) is used to extract the temporal features of the measurement data in parallel. Finally, the proposed MGAT-TCN model is simulated and validated on the IEEE 14-bus system and IEEE 39-bus system. The results indicate that the proposed model has higher detection accuracy and efficiency compared to the existing detection models, and the visualization of attention weights through topological heat maps can achieve interpretability of the model in spatial dimensions. © 2024 Automation of Electric Power Systems Press. All rights reserved.
引用
收藏
页码:118 / 127
页数:9
相关论文
共 25 条
  • [1] TANG Yi, WANG Qi, Ni Ming, Et al., Analysis of cyber-attacks in cyber physical power system [J], Automation of Electric Power Systems, 40, 6, pp. 148-151, (2016)
  • [2] Co-estimation of state and FDI attacks and attack compensation control for multi-area load frequency control systems under FDI and DoS attacks[J], IEEE Transactions on Smart Grid, 13, 3, pp. 2357-2368, (2022)
  • [3] CHEN Fan, SHI Jie, LIU Haitao, Et al., Reliability evaluation of power generation and transmission system considering load redistribution attack and defense of vulnerable line [J], Automation of Electric Power Systems, 46, 2, pp. 65-72, (2022)
  • [4] GAO S B,, HE Z L,, WEI X G,, Et al., Bilevel model for protection-branch measurements-based topology attack against DC and AC state estimations[J], IEEE Systems Journal, 16, 4, pp. 5369-5379, (2022)
  • [5] MUKHERJEE D., Data-driven false data injection attack:a low-rank approach[J], IEEE Transactions on Smart Grid, 13, 3, pp. 2479-2482, (2022)
  • [6] PENG Sha, SUN Mingyang, ZHANG Zhenyong, Et al., Applications of machine learning in cyber security of cyber-physical power system [J], Automation of Electric Power Systems, 46, 9, pp. 200-215, (2022)
  • [7] VARJANI A Y., A graph theory-based approach to detect false data injection attacks in power system AC state estimation [J], IEEE Transactions on Industrial Informatics, 17, 4, pp. 2465-2475, (2021)
  • [8] HATZIADONIU C J., Cyber-attack detection using principal component analysis and noisy clustering algorithms: a collaborative machine learning-based framework [J], IEEE Transactions on Smart Grid, 13, 6, pp. 4848-4861, (2022)
  • [9] HUANG Dongmei, HE Li'ang, SUN Jinzhong, Et al., Distribution detection method for a false data attack in a power grid based on edge computing[J], Power System Protection and Control, 49, 13, pp. 1-9, (2021)
  • [10] Bing CHEN, TANG Yongwang, False data injection attacks detecting based on Transformer encoder in smart grid[J], Computer Applications and Software, 39, 7, pp. 336-342, (2022)