An Anomaly Detection Method of Time Series Data for Cyber-Physical Integrated Energy System Based on Time-Frequency Feature Prediction

被引:4
作者
Chen, Jinyi [1 ]
Zhou, Suyang [1 ]
Qiu, Yue [1 ]
Xu, Boya [1 ]
机构
[1] Southeast Univ, Sch Elect Engn, Nanjing 210096, Peoples R China
基金
中国国家自然科学基金;
关键词
integrated energy system; false data injection attack; time-series data anomaly detection; time-frequency features; time-frequency transform; LOAD REDISTRIBUTION ATTACKS; WAVELET; NETWORK; DECOMPOSITION; PROTECTION;
D O I
10.3390/en15155565
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
An integrated energy system (IES) is vulnerable to network attacks due to the coupling features of multi-energy systems, as well as the deep integration between a physical system and an information system. The anomaly detection of the time-series data in an IES is a key problem to defend against network attacks and ensure the cyber-physical security of IES. Aiming at false data injection attacks (FDIAs) on IES, this paper proposes an anomaly detection method for time-series data in a cyber-physical integrated energy system based on time-frequency feature prediction. The time-frequency features of the time-series data are extracted based on three time-frequency transform methods (DWT, EMD, and EWT). Then the extracted time-frequency features are input to the autoencoder (AE) to capture the hidden features and nonlinear structure of the original data in the frequency domain. The time-domain data within the detected time period are predicted by applying regression prediction on the top-layer features of AE. Considering the uncertainty of regression prediction, kernel density estimation (KDE) is used to estimate the probability density function of prediction error and the interval of the predicted data is estimated accordingly. The estimated lower boundary value of the predicted data is selected as the attack judgment threshold for anomaly detection. The results of the case study verify the advantages of the proposed method in reducing the false positive rate and improving the anomaly detection accuracy.
引用
收藏
页数:24
相关论文
共 34 条
  • [1] [Anonymous], ESTIMATION GAS DEMAN
  • [2] [Anonymous], 2018, ULUSLARARAS MUHENDIS, DOI DOI 10.29137/UMAGD.350231
  • [3] [Anonymous], LOAD ELIA GRID
  • [4] Fault Protection in Microgrid Using Wavelet Multiresolution Analysis and Data Mining
    Baloch, Shazia
    Samsani, Sunil Srivatsav
    Muhammad, Mannan Saeed
    [J]. IEEE ACCESS, 2021, 9 : 86382 - 86391
  • [5] Bhatnagar N., 2020, Introduction to wavelet transforms, DOI DOI 10.1201/9781003006626
  • [6] Bobba R.B., 2010, Preprints of the First Workshop on Secure Control Systems, CPSWEEK, V2010
  • [7] Boya Xu, 2021, 2021 IEEE Sustainable Power and Energy Conference (iSPEC), P1003, DOI 10.1109/iSPEC53008.2021.9735834
  • [8] Using network flow data to analyse Distributed Reflection Denial of Service (DRDoS) attacks, as observed on the South African National Research and Education Network (SANReN) A postmortem analysis of the Memcached attack on the SANReN
    Burke, Ivan Daniel
    Herbert, Alan
    Mooi, Roderick
    [J]. PROCEEDINGS OF THE ANNUAL CONFERENCE OF THE SOUTH AFRICAN INSTITUTE OF COMPUTER SCIENTISTS AND INFORMATION TECHNOLOGISTS (SAICSIT 2018), 2018, : 164 - 170
  • [9] Chen Ben, 2021, 2021 IEEE International Conference on Multimedia and Expo (ICME), DOI 10.1109/ICME51207.2021.9428389
  • [10] Epileptic Focus Localization Using Discrete Wavelet Transform Based on Interictal Intracranial EEG
    Chen, Duo
    Wan, Suiren
    Bao, Forrest Sheng
    [J]. IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, 2017, 25 (05) : 413 - 425