| Literature DB >> 35590835 |
Saleh Almasabi1, Turki Alsuwian1, Muhammad Awais2, Muhammad Irfan1, Mohammed Jalalah1,3, Belqasem Aljafari1, Farid A Harraz3,4.
Abstract
Cyber-threats are becoming a big concern due to the potential severe consequences of such threats is false data injection (FDI) attacks where the measures data is manipulated such that the detection is unfeasible using traditional approaches. This work focuses on detecting FDIs for phasor measurement units where compromising one unit is sufficient for launching such attacks. In the proposed approach, moving averages and correlation are used along with machine learning algorithms to detect such attacks. The proposed approach is tested and validated using the IEEE 14-bus and the IEEE 30-bus test systems. The proposed performance was sufficient for detecting the location and attack instances under different scenarios and circumstances.Entities:
Keywords: cyber-physical security; false data injection attacks; machine learning; phasor measurement units; smart grids; state estimation
Year: 2022 PMID: 35590835 PMCID: PMC9105009 DOI: 10.3390/s22093146
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Cyber-threat for smart grids.
Figure 2Detection of False Data Injection using machine learning.
SVM classification parameters.
| Sr.No | Parameter’s List of SVM |
|---|---|
| 1 | cache_size = 200, |
| 2 | decision_function_shape = ’ovr’ |
| 3 | Complexity = 1 |
| 4 | kernel = linear |
XGB classification parameters.
| XGB Parameters | Selected Value |
|---|---|
| booster | gbtree |
| learning_rate | 0.3 |
| max_depth | 6 |
| min_child_weight | 1 |
| sampling_method | uniform |
| lambda | 1 |
Figure 3IEEE 14-bus test system [26].
Figure 4IEEE 30-bus test system [26].
Summary of Scenarios of the FDIs experiments.
| Scenarios | Number of | Attacked | Attack | Duration |
|---|---|---|---|---|
| IEEE-14 bus test system | ||||
| Scenario I | 50 | Constant | Constant | Variable |
| Scenario II | 50 | A single random | Constant | Variable |
| Scenario III | 50 | A single random | Variable | Variable |
| IEEE-30 bus test system | ||||
| Scenario I | 50 | Constant | Constant | Variable |
| Scenario II | 50 | A single random | Variable | Constant |
| Scenario III | 10 | A single random | Variable | Variable |
| Scenario IV | 10 | Multiple random | Variable | Variable |
Performance of detecting location of Attacked PMUs.
| Case | Attacked PMUs |
| Identification Accuracy |
|---|---|---|---|
| IEEE-14 bus test system | |||
| Scenario I: case 1 | 7 | constant | 100% |
| Scenario I: case 5 | 2 | constant | 100% |
| Scenario II: case 9 | 6 | variable | 100% |
| Scenario II: case 19 | 9 | variable | 100% |
| Scenario III: case 2 | 7 | variable | 100% |
| Scenario III: case 7 | 6 | variable | 100% |
| IEEE-30 bus test system | |||
| Scenario II: case 3 | 12 | variable | 100% |
| Scenario II: case 7 | 8 | variable | 100% |
| Scenario III: case 8 | 2 | variable | 100% |
| Scenario III: case 5 | 24 | variable | 100% |
| Scenario IV: case 2 | 11, 27 | variable | 100% |
| Scenario IV: case 7 | 1, 12 | variable | 100% |
Figure 5Performance analysis of various classifiers and data collection scenarios.
Sample of the performance for scenario I.
| F-Score | SVM | ||
|---|---|---|---|
| 100% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 4099 | 0 | Attacked |
| 0 | 60,700 | Not Attacked | |
|
|
| ||
| 93.78% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 4099 | 0 | Attacked |
| 786 | 59,914 | Not Attacked | |
|
|
| ||
| 100% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 4099 | 0 | Attacked |
| 0 | 70,700 | Not Attacked | |
Sample of the performance for scenario II.
| F-Score | SVM | ||
|---|---|---|---|
| 100% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 6513 | 0 | Attacked |
| 0 | 58,286 | Not Attacked | |
|
|
| ||
| 91.99% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 6513 | 0 | Attacked |
| 1390 | 56,896 | Not Attacked | |
|
|
| ||
| 100% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 6513 | 0 | Attacked |
| 0 | 58,286 | Not Attacked | |
Sample of the performance for scenario III.
| F-Score | SVM | ||
|---|---|---|---|
| 100% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 5678 | 0 | Attacked |
| 0 | 59,121 | Not Attacked | |
|
|
| ||
| 92.14% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 5678 | 0 | Attacked |
| 968 | 58,153 | Not Attacked | |
|
|
| ||
| 100% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 5678 | 0 | Attacked |
| 0 | 59,121 | Not Attacked | |
Sample of the performance for scenario IV.
| F-Score | SVM | ||
|---|---|---|---|
| 100% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 17,887 | 0 | Attacked |
| 0 | 46896 | Not Attacked | |
|
|
| ||
| 92.88% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 17,887 | 0 | Attacked |
| 1371 | 45,525 | Not Attacked | |
|
|
| ||
| 100% | Predicted Class | ||
| Attacked | Not Attacked | ← Classified as | |
| Actual Class | 17,887 | 0 | Attacked |
| 0 | 46,896 | Not Attacked | |
Comparison of performance with the literature.
| Case | Our Approach | Our Approach | Our Approach | Ref. [ |
|---|---|---|---|---|
| IEEE-14 bus test system | ||||
| Scenario I: Average | 100 | 93.68 | 100 | 99.99 |
| Scenario II: Average | 100 | 92.42 | 100 | 99.99 |
| Scenario III: Average | 100 | 92.41 | 100 | 99.80 |
| IEEE-30 bus test system | ||||
| Scenario I: Average | 100 | 92.11 | 100 | — |
| Scenario II: Average | 100 | 92.21 | 100 | — |
| Scenario III: Average | 100 | 92.34 | 100 | 98.97 |
| Scenario IV: Average | 100 | 91.89 | 100 | — |