Adversarial Attack Mitigation Strategy for Machine Learning-Based Network Attack Detection Model in Power System

被引:32
作者
Huang, Rong [1 ]
Li, Yuancheng [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
关键词
Training; Data models; Power system stability; Power systems; Power measurement; Computational modeling; Perturbation methods; Adversarial attack; mitigation strategy; machine learning; network attack detection; vulnerability analysis; power system; DATA INJECTION ATTACKS; NEURAL-NETWORK; DEFENSE; ROBUSTNESS;
D O I
10.1109/TSG.2022.3217060
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The network attack detection model based on machine learning (ML) has received extensive attention and research in PMU measurement data protection of power systems. However, well-trained ML-based detection models are vulnerable to adversarial attacks. By adding meticulously designed perturbations to the original data, the attacker can significantly decrease the accuracy and reliability of the model, causing the control center to receive unreliable PMU measurement data. This paper takes the network attack detection model in the power system as a case study to analyze the vulnerability of the ML-based detection model under adversarial attacks. And then, a mitigation strategy for adversarial attacks based on causal theory is proposed, which can enhance the robustness of the detection model under different adversarial attack scenarios. Unlike adversarial training, this mitigation strategy does not require adversarial samples to train models, saving computing resources. Furthermore, the strategy only needs a small amount of detection model information and can be migrated to various models. Simulation experiments on the IEEE node systems verify the threat of adversarial attacks against different ML-based detection models and the effectiveness of the proposed mitigation strategy.
引用
收藏
页码:2367 / 2376
页数:10
相关论文
共 46 条
[1]   A Self-Tuning Cyber-Attacks' Location Identification Approach for Critical Infrastructures [J].
Alabassi, Abdul ;
Jahromi, Amir Namavar ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Siano, Pierluigi ;
Leung, Henry .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (07) :5018-5027
[2]  
Besserve M., 2020, P INT C LEARNING REP
[3]   HopSkipJumpAttack: A Query-Efficient Decision-Based Attack [J].
Chen, Jianbo ;
Jordan, Michael, I ;
Wainwright, Martin J. .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1277-1294
[4]   Multi-Agent Reinforcement Learning for Decentralized Resilient Secondary Control of Energy Storage Systems Against DoS Attacks [J].
Chen, Pengcheng ;
Liu, Shichao ;
Chen, Bo ;
Yu, Li .
IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (03) :1739-1750
[5]   Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks [J].
Dong, Yinpeng ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :4307-4316
[6]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193
[7]   Learning-Based Simultaneous Detection and Characterization of Time Delay Attack in Cyber-Physical Systems [J].
Ganesh, Prakhar ;
Lou, Xin ;
Chen, Yao ;
Tan, Rui ;
Yau, David K. Y. ;
Chen, Deming ;
Winslett, Marianne .
IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (04) :3581-3593
[8]   Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory [J].
Gao, Lijun ;
Li, Yanting ;
Zhang, Lu ;
Lin, Feng ;
Ma, Maode .
IEEE ACCESS, 2019, 7 :43018-43030
[9]   DAG-GAN: CAUSAL STRUCTURE LEARNING WITH GENERATIVE ADVERSARIAL NETS [J].
Gao, Yinghua ;
Shen, Li ;
Xia, Shu-Tao .
2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, :3320-3324
[10]  
Goodfellow Ian J., 2014, P 3 INT C LEARN REPR