AI-Driven Approach for Detecting Cyber-Attacks Targeting Two-Area Four-Machine System

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the increased dependency on Wide Area Network (WAN) signals in power systems for critical functions, cyber-attacks on the communication lines can lead to catastrophic results, such as the complete shutdown of a country's power grid. Detecting these potential attacks on WAN signals is of utmost importance. In this work, we explore several data-driven approaches for detecting stealthy false data injection attacks on a critical component of the power system, the Wide Area Damping Control (WADC). After extensive simulations on the two-area test system for data collection, we test four machine/deep learning approaches to detect the attack injections in real time. The four techniques are eXtreme Gradient Boosting (XGBoost), Gradient Boosting Classifier (GBC), Long Short Term Memory (LSTM), and Convolutional Neural Networks (CNNs). We consider two cases; the first is where all voltage and current signals are sent to the central WADC. The second is when only the required tie line power measurement is sent. In both cases, LSTM results in the highest detection accuracy, exceeding 99.5% in the first case and 94.2% in the second case. These results reflect the importance of redundant data availability.

Original languageBritish English
Title of host publication2024 IEEE Kansas Power and Energy Conference, KPEC 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350372403
DOIs
StatePublished - 2024
Event5th IEEE Kansas Power and Energy Conference, KPEC 2024 - Manhattan, United States
Duration: 25 Apr 202426 Apr 2024

Publication series

Name2024 IEEE Kansas Power and Energy Conference, KPEC 2024

Conference

Conference5th IEEE Kansas Power and Energy Conference, KPEC 2024
Country/TerritoryUnited States
CityManhattan
Period25/04/2426/04/24

Keywords

  • Cyber-attacks
  • Deep Learning (DL)
  • False Data Injection Attacks (FDIAs)
  • Long Short-Term Memory (LSTM)
  • Power Systems
  • Wide Area Damping Control (WADC)

Fingerprint

Dive into the research topics of 'AI-Driven Approach for Detecting Cyber-Attacks Targeting Two-Area Four-Machine System'. Together they form a unique fingerprint.

Cite this