Deep learning-based framework for real-time transient stability prediction under stealthy data integrity attacks

被引:12
作者
Kesici, Mert [1 ]
Mohammadpourfard, Mostafa [1 ]
Aygul, Kemal [1 ]
Genc, Istemihan [1 ]
机构
[1] Istanbul Tech Univ, Dept Elect Engn, Istanbul, Turkiye
基金
欧盟地平线“2020”;
关键词
Transient stability prediction; Cyber-security; False data injection; Wide area measurements; Deep learning; POWER-SYSTEM;
D O I
10.1016/j.epsr.2023.109424
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber-attacks can degrade the performance of online transient stability prediction (TSP) and assessment functions offered for power systems. This paper proposes a cyber-resilient real-time TSP framework created by considering both perspectives, of the attacker, and of the smart grid operator. From the attacker's viewpoint, to minimize the attack cost, a model-free data-driven algorithm for finding the measurements to which the TSP function is vulnerable is considered. The attack vector that maximizes the TSP classifier's inaccuracy reduces the performance of TSP significantly. From the perspective of the system operator and to defend the system against data integrity attacks, two unsupervised learning algorithms which are principal component analysis and fuzzy c-means clustering, are combined and employed to detect the falsified phasor measurement units (PMUs) in the system. In the proposed framework, a denoising autoencoder model is also developed to eliminate the effect of stealthy cyber-attacks. When a cyber-attack is detected, the denoising autoencoder-based model is triggered to recover the damage of the cyber-attack, while a well-tuned long short-term memory model is implemented for the TSP application. The proposed framework is tested on two IEEE test systems, including 39-bus and 127-bus systems, with various attack scenarios. Results show that the developed system is more resilient to the attacks than the existing well-established TSP functions.
引用
收藏
页数:12
相关论文
共 42 条
[1]  
Abur A., 2004, Power System State Estimation: Theory and Implementation.
[2]   DT based intelligent predictor for out of step condition of generator by using PMU data [J].
Aghamohammadi, Mohammad Reza ;
Abedi, Morteza .
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2018, 99 :95-106
[3]   Dynamic Security Assessment for Power System Under Cyber-Attack [J].
Al-Gburi, Qusay A. ;
Ariff, Mohd Aifaa Mohd .
JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2019, 14 (02) :549-559
[4]  
[Anonymous], 2008, P 25 INT C MACH LEAR, DOI DOI 10.1145/1390156.1390294
[5]  
[Anonymous], BBC NEWS
[6]   FCM - THE FUZZY C-MEANS CLUSTERING-ALGORITHM [J].
BEZDEK, JC ;
EHRLICH, R ;
FULL, W .
COMPUTERS & GEOSCIENCES, 1984, 10 (2-3) :191-203
[7]   Real-Time Prediction and Control of Transient Stability Using Transient Energy Function [J].
Bhui, Pratyasa ;
Senroy, Nilanjan .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2017, 32 (02) :923-934
[8]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[9]   XGBoost: A Scalable Tree Boosting System [J].
Chen, Tianqi ;
Guestrin, Carlos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :785-794
[10]  
Farraj A, 2017, IMPACT CYBER ATTACKS, P29