A Reinforcement Learning Approach for Defending Against Multiscenario Load Redistribution Attacks

被引:13
作者
Lei, Jieyu [1 ]
Gao, Shibin [1 ]
Shi, Jian [2 ]
Wei, Xiaoguang [1 ]
Dong, Ming [3 ]
Wang, Wenshuang [4 ]
Han, Zhu [5 ,6 ]
机构
[1] Southwest Jiaotong Univ, Sch Elect Engn, Chengdu 611756, Peoples R China
[2] Univ Houston, Dept Engn Technol, Houston, TX 77004 USA
[3] Alberta Elect Syst Operator, State Key Lab Power Transmiss Equipment & Syst Se, Calgary, AB T2P 0L4, Canada
[4] Univ Houston, Dept Math, Houston, TX 77004 USA
[5] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
[6] Kyung Hee Univ, Dept Comp Sci & Engn, Seoul 446701, South Korea
基金
中国国家自然科学基金;
关键词
State estimation; Security; Markov processes; Load shedding; Generators; Computer crime; Power measurement; False data attack; load redistribution attack; reinforcement learning; critical branch identification; DATA INJECTION ATTACKS; PROTECTION;
D O I
10.1109/TSG.2022.3175470
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The accelerated digitalization of today's electric power infrastructure has highlighted the gravity of cyber resilience in the electricity ecosystem. Due to the expanded attack surface inherited in the digitalized operational and information technologies, the electricity sector is facing a continually escalating cyberthreat landscape and must act to prepare for more frequent and sophisticated cyberattacks as the new normal. To aid in this effort, this paper presents a novel approach to identify critical branches to strengthen and by doing so, shield the smart-grid power system from the threat of load redistribution attacks (LRAs) under a wide range of operating scenarios. Compared with conventional critical branch identification approaches, we propose a new concept, namely, chain of defense, that empowers the system operator to incorporate existing cyber protections and develop branch strengthening strategy in a more dynamic, adaptive, and flexible way. We then propose a novel reinforcement learning framework to identify the most effective chain of defense. A cross-updating search strategy is developed to specifically ensure that the identified chain of defense can safeguard the network from the two-fold damaging effects of the LRAs on operation economics and security simultaneously. The effectiveness of the proposed approach is evaluated on the IEEE 14-bus system and the European 89-bus system. Simulation results indicate that the proposed approach provides more comprehensive and effective mitigation against the damaging effects of LRAs compared with the conventional approaches.
引用
收藏
页码:3711 / 3722
页数:12
相关论文
共 31 条
  • [1] Minimax-Regret Robust Defensive Strategy Against False Data Injection Attacks
    Abusorrah, Abdullah
    Alabdulwahab, Ahmed
    Li, Zhiyi
    Shahidehpour, Mohammad
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (02) : 2068 - 2079
  • [2] Bellman R., 1958, Dynamic Programming
  • [3] Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation
    Bi, Suzhi
    Zhang, Ying Jun
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (03) : 1216 - 1227
  • [4] Fast Screening of High-Risk Lines Under False Data Injection Attacks
    Che, Liang
    Liu, Xuan
    Li, Zuyi
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (04) : 4003 - 4014
  • [5] Cyber Cascades Screening Considering the Impacts of False Data Injection Attacks
    Che, Liang
    Liu, Xuan
    Shuai, Zhikang
    Li, Zuyi
    Wen, Yunfeng
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (06) : 6545 - 6556
  • [6] Mitigating False Data Attacks Induced Overloads Using a Corrective Dispatch Scheme
    Che, Liang
    Liu, Xuan
    Li, Zuyi
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (03) : 3081 - 3091
  • [7] Model-Free Emergency Frequency Control Based on Reinforcement Learning
    Chen, Chunyu
    Cui, Mingjian
    Li, Fangxing
    Yin, Shengfei
    Wang, Xinan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) : 2336 - 2346
  • [8] Parameter tampering cyberattack and event-trigger detection in game-based interactive demand response
    Chen, Liudong
    Ma, Li
    Liu, Nian
    Wang, Lingfeng
    Liu, Zhaoxi
    [J]. INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2022, 135
  • [9] Defending Against False Data Injection Attacks on Power System State Estimation
    Deng, Ruilong
    Xiao, Gaoxi
    Lu, Rongxing
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) : 198 - 207
  • [10] A Stealthy Attack Against Electricity Market Using Independent Component Analysis
    Esmalifalak, Mohammad
    Huy Nguyen
    Zheng, Rong
    Xie, Le
    Song, Lingyang
    Han, Zhu
    [J]. IEEE SYSTEMS JOURNAL, 2018, 12 (01): : 297 - 307