Method for identifying false data injection attacks in power grid based on improved CNN-LSTM

被引:0
作者
Cao, Jie [1 ]
Wang, Qiming [1 ,3 ]
Qu, Zhaoyang [1 ]
Chen, Chin-Ling [2 ,4 ]
Dong, Yunchang [5 ]
机构
[1] Northeast Elect Power Univ, Sch Comp Sci, Jilin 132012, Jilin, Peoples R China
[2] Changchun Sci Tech Univ, Sch Informat Engn, Changchun 130600, Peoples R China
[3] City Univ Macau, Fac Data Sci, Macau, Peoples R China
[4] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[5] State Grid Jilin Elect Power Res Inst, Changchu 130012, Peoples R China
基金
中国国家自然科学基金;
关键词
Power cyber-physical systems; False data injection; Attack identification; Feature extraction; Deep learning; CYBER-PHYSICAL SYSTEMS; STATE ESTIMATION; DIMENSIONALITY; NETWORKS; KPCA; PCA;
D O I
10.1007/s00202-025-02974-3
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In contemporary power systems, the interaction between informational and physical dimensions significantly increases vulnerability to network attacks, particularly false data injection attacks (FDIAs). These attacks are characterized by their stealth and potential for severe disruption, posing a threat to the stability and security of power grid operations. The complexity and high dimensionality of operational data in power systems further exacerbate computational challenges, leading to reduced accuracy in traditional attack detection models. To address these issues, this paper introduces an improved CNN-LSTM approach for FDIA detection in power grids. It incorporates an attention mechanism in the autoencoder structure for refined feature extraction and utilizes a sparrow search algorithm for optimizing model parameters. Evaluational results show over 95% accuracy rate, demonstrating the effectiveness of the proposed method in diverse power grid scenarios.
引用
收藏
页数:26
相关论文
共 51 条
  • [1] False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure
    Ahmed, Mohiuddin
    Pathan, Al-Sakib Khan
    [J]. COMPLEX ADAPTIVE SYSTEMS MODELING, 2020, 8 (01)
  • [2] An optimal sizing framework for autonomous photovoltaic/hydrokinetic/hydrogen energy system considering cost, reliability and forced outage rate using horse herd optimization
    Alanazi, Abdulaziz
    Alanazi, Mohana
    Nowdeh, Saber Arabi
    Abdelaziz, Almoataz Y.
    El-Shahat, Adel
    [J]. ENERGY REPORTS, 2022, 8 : 7154 - 7175
  • [3] Baldi P., 2012, P ICML WORKSHOP UNSU, P37, DOI DOI 10.1561/2200000006
  • [4] Autoencoders and their applications in machine learning: a survey
    Berahmand, Kamal
    Daneshfar, Fatemeh
    Salehi, Elaheh Sadat
    Li, Yuefeng
    Xu, Yue
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (02)
  • [5] A comparison of PCA, KPCA and ICA for dimensionality reduction in support vector machine
    Cao, LJ
    Chua, KS
    Chong, WK
    Lee, HP
    Gu, QM
    [J]. NEUROCOMPUTING, 2003, 55 (1-2) : 321 - 336
  • [6] Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
    Das, Mohammad Ashrafuzzaman
    Das, Saikat
    Chakhchoukh, Yacine
    Shiva, Sajjan
    Sheldon, Frederick T.
    [J]. COMPUTERS & SECURITY, 2020, 97 (97)
  • [7] A Survey on State Estimation Techniques and Challenges in Smart Distribution Systems
    Dehghanpour, Kaveh
    Wang, Zhaoyu
    Wang, Jianhui
    Yuan, Yuxuan
    Bu, Fankun
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (02) : 2312 - 2322
  • [8] Drayer E, 2018, IEEE GLOB CONF SIG, P890, DOI 10.1109/GlobalSIP.2018.8646454
  • [9] FUSION OF COGNITIVE WIRELESS NETWORKS AND EDGE COMPUTING
    Gai, Keke
    Xu, Kai
    Lu, Zhihui
    Qiu, Meikang
    Zhu, Liehuang
    [J]. IEEE WIRELESS COMMUNICATIONS, 2019, 26 (03) : 69 - 75
  • [10] Security and Privacy in Cyber-Physical Systems: A Survey of Surveys
    Giraldo, Jairo
    Sarkar, Esha
    Cardenas, Alvaro A.
    Maniatakos, Michail
    Kantarcioglu, Murat
    [J]. IEEE DESIGN & TEST, 2017, 34 (04) : 7 - 17