Detection Mechanism of FDI attack feature based on Deep Learning

被引:6
作者
Pu, Qiang [1 ]
Qin, Hao [1 ]
Han, Hu [3 ]
Xia, Yuanyi [2 ]
Li, Zhihao [1 ]
Xie, Kejun [1 ]
Wang, Wenqing [1 ]
机构
[1] Anhui Jiyuan Software Co Ltd, SGITG, Hefei, Anhui, Peoples R China
[2] State Grid Jiangsu Informat & Telecommun Co, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Sch Internet Things, Nanjing, Jiangsu, Peoples R China
来源
2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI) | 2018年
关键词
False data injection; Deep belief network; detection; security defense system; ALGORITHM;
D O I
10.1109/SmartWorld.2018.00297
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At present, with the continuous optimization of grid standards in power system, the degree of convergence of information and communication technologies has become increasingly closer. However, it has also led to the exposure of important infrastructures in the smart grid, especially to the advanced measurement systems in smart metering communication systems. And the most typical type of attacks is False data injection (FDI). Therefore, consumer-centric communication devices, such as Phaser Measurement Units (PMUs) and smart meters, provide powerful support for data acquisition and transmission. As these devices facilitate the acquisition, transmission and consumption of power system data through the integration of communications, some malicious users initiate attacks against measured data in the meter for their own or other economic intention. This kind of attack behavior, on the one hand, affects the availability of meter data. On the other hand, it seriously undermines the authenticity and confidentiality of the measurement data itself. Therefore, in this paper, we proposed attack recognition mechanism based on Deep Belief Network to extract attack features. Our aim is to study the FDI attack behavior and accurately extract the relevant features of the behavior, and provide an effective criterion for the accurate identification of attack behavior in the smart grid. At the same time, through the optimization of the number of nerve cells and the number of layers in each layer of the deep neural network to ensure the real-time detection, the security defense system of the power grid is further enhanced.
引用
收藏
页码:1761 / 1765
页数:5
相关论文
共 15 条
[1]  
Alcalá-Fdez J, 2011, J MULT-VALUED LOG S, V17, P255
[2]  
Campo Giralte Luis, 2013, COMPUTERS ELECT ENG, V39, P2252
[3]   High-Dimensional Estimation of Structured Signals From Non-Linear Observations With General Convex Loss Functions [J].
Genzel, Martin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (03) :1601-1619
[4]  
Heaton J., 2015, Deep Learning and Neural Networks
[5]   A fast learning algorithm for deep belief nets [J].
Hinton, Geoffrey E. ;
Osindero, Simon ;
Teh, Yee-Whye .
NEURAL COMPUTATION, 2006, 18 (07) :1527-1554
[6]   Speeding-Up Association Rule Mining With Inverted Index Compression [J].
Maria Luna, Jose ;
Cano, Alberto ;
Pechenizkiy, Mykola ;
Ventura, Sebastian .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (12) :3059-3072
[7]   A Multiobjective Evolutionary Algorithm Based on Decision Variable Analyses for Multiobjective Optimization Problems With Large-Scale Variables [J].
Ma, Xiaoliang ;
Liu, Fang ;
Qi, Yutao ;
Wang, Xiaodong ;
Li, Lingling ;
Jiao, Licheng ;
Yin, Minglei ;
Gong, Maoguo .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2016, 20 (02) :275-298
[8]  
Prasanna K, 2014, 2014 International Conference on Science Engineering and Management Research (ICSEMR)
[9]  
Sukhbaatar Sainbaya., 2011, J MACH LEARN RES, V20, P231
[10]   Big Data Analytics for System Stability Evaluation Strategy in the Energy Internet [J].
Wang, Kun ;
Li, Huining ;
Feng, Yixiong ;
Tian, Guangdong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) :1969-1978