A3D: Attention-based auto-encoder anomaly detector for false data injection attacks

被引:32
作者
Kundu, Arnav [1 ]
Sahu, Abhijeet [1 ]
Serpedin, Erchin [1 ]
Davis, Katherine [1 ]
机构
[1] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
基金
美国国家科学基金会;
关键词
Anomaly detection; Auto-Encoders; Monotonic attention; False data injection attacks; Recurrent neural networks;
D O I
10.1016/j.epsr.2020.106795
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the influx of more advanced and more connected computing and control devices, the electric power grid has continuously evolved to rely on communication networks for efficient operation and control. A challenge with these new technologies is that they may introduce new and unforeseen avenues of access, making the grid more susceptible to cyber attacks. False Data Injection Attacks (FDIA) are a particular type of attack that aims to cause disruptions in the operation of the power grid by affecting the feedback mechanism to control the grid. This is carried out by modifying the measurements which enable a state estimator to approximate the state of the system. These attacks are designed in such a way that they preserve the system equations on which the state estimator operates; therefore, they cannot be detected by a simple residual-based detection mechanism. In this paper, we propose monotonic attention based auto-encoders, an unsupervised learning technique to detect FDIAs. The auto-encoder is trained under normal operating conditions, and we hypothesize that it will produce outputs which are close to the true system values at normal operation even if the measurements are modified by an adversary. Based on this hypothesis, that high reconstruction error occurs for the attacked conditions, the intrusion detection is performed by a threshold mechanism using Precision-Recall curve. We validate the efficacy of our proposed attention-based auto-encoder anomaly detector (A3D) over other variants of auto-encoders such as ANN and RNN based auto-encoders, and a few supervised learning techniques, by performing FDIAs on a IEEE 14 bus system.
引用
收藏
页数:7
相关论文
共 42 条
[1]  
Alert D., 2016, ANAL CYBER ATTACK UK
[2]  
[Anonymous], 2011, ARXIV14090473
[3]  
[Anonymous], 1 WORKSH SEC CONTR S
[4]   Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid [J].
Ashok, Aditya ;
Govindarasu, Manimaran ;
Wang, Jianhui .
PROCEEDINGS OF THE IEEE, 2017, 105 (07) :1389-1407
[5]  
Ayad A, 2018, INNOV SMART GRID TEC
[6]   Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation [J].
Bi, Suzhi ;
Zhang, Ying Jun .
IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (03) :1216-1227
[7]  
Chalapathy R., 2019, DEEP LEARNING ANOMAL
[8]  
Chalapathy Raghavendra, 2016, P 7 INT WORKSH HLTH
[9]   Smart Attacks in Smart Grid Communication Networks [J].
Chen, Pin-Yu ;
Cheng, Shin-Ming ;
Chen, Kwang-Cheng .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (08) :24-29
[10]  
Clevert D., 2016, FAST ACCURATE DEEP N