Loading…

A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks

The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on smart grid 2023-11, Vol.14 (6), p.1-1
Main Authors: khaleghi, Ali, Ghazizadeh, Mohammad Sadegh, Aghamohammadi, Mohammad Reza
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have been the focus of different studies. But fewer studies have been done to detect LR attacks that cause cascading failures. This paper presents a mechanism for identifying LR attacks that, besides causing overflow on lines, have the potential to generate cascading failure. A novel LR attack scheme with cascading failure potential is first proposed for this purpose. The detection mechanism has a basic exploitable structure based on analyzing the estimated cyber load data through the energy management system and a deep learning network. The performance evaluation of the detection mechanism is implemented with regard to the IEEE standard 118-bus system. Various attack scenarios under different conditions (topologies, target lines, and attack load level variations (α)) are used to verify the effectiveness of the proposed framework. The results clearly show an acceptable level of accuracy for the proposed mechanism, which can distinguish between LR attacks via the overload purpose while also showing the system's secure state.
ISSN:1949-3053
1949-3061
DOI:10.1109/TSG.2023.3256480