Loading…

A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks

The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on smart grid 2023-11, Vol.14 (6), p.1-1
Main Authors: khaleghi, Ali, Ghazizadeh, Mohammad Sadegh, Aghamohammadi, Mohammad Reza
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343
cites cdi_FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343
container_end_page 1
container_issue 6
container_start_page 1
container_title IEEE transactions on smart grid
container_volume 14
creator khaleghi, Ali
Ghazizadeh, Mohammad Sadegh
Aghamohammadi, Mohammad Reza
description The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have been the focus of different studies. But fewer studies have been done to detect LR attacks that cause cascading failures. This paper presents a mechanism for identifying LR attacks that, besides causing overflow on lines, have the potential to generate cascading failure. A novel LR attack scheme with cascading failure potential is first proposed for this purpose. The detection mechanism has a basic exploitable structure based on analyzing the estimated cyber load data through the energy management system and a deep learning network. The performance evaluation of the detection mechanism is implemented with regard to the IEEE standard 118-bus system. Various attack scenarios under different conditions (topologies, target lines, and attack load level variations (α)) are used to verify the effectiveness of the proposed framework. The results clearly show an acceptable level of accuracy for the proposed mechanism, which can distinguish between LR attacks via the overload purpose while also showing the system's secure state.
doi_str_mv 10.1109/TSG.2023.3256480
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2879381907</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10068794</ieee_id><sourcerecordid>2879381907</sourcerecordid><originalsourceid>FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343</originalsourceid><addsrcrecordid>eNpNkM9LwzAYhoMoOHR3Dx4CnjuTJm2T45xuDiqKznNI82Nmbu1M0sPwnzdzQ_wu-SDv-3zwAHCF0QhjxG8Xb7NRjnIyInlRUoZOwABzyjOCSnz6txfkHAxDWKE0hJAy5wPwPYb3xmxhbaRvXbvM7mQwGo5jlOozfUWjouta-GTUh2xd2EC5lK4NEb500bTRyTWcyKCkTmU4lW7dewPnre5VwjQ7WHdSw1ejXYjeNf0v7EAPl-DMynUww-N7Ad6nD4vJY1Y_z-aTcZ2pnOcxw7QgBaaVoZhoSxDlSDfUWm4ZYpzYUjLLtNW4apqCMcu5payySkpOi4ZQcgFuDtyt7756E6JYdb1v00mRs4oThjmqUgodUsp3IXhjxda7jfQ7gZHYWxbJsthbFkfLqXJ9qDhjzL84KhOWkh_ylnjg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2879381907</pqid></control><display><type>article</type><title>A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks</title><source>IEEE Electronic Library (IEL) Journals</source><creator>khaleghi, Ali ; Ghazizadeh, Mohammad Sadegh ; Aghamohammadi, Mohammad Reza</creator><creatorcontrib>khaleghi, Ali ; Ghazizadeh, Mohammad Sadegh ; Aghamohammadi, Mohammad Reza</creatorcontrib><description>The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have been the focus of different studies. But fewer studies have been done to detect LR attacks that cause cascading failures. This paper presents a mechanism for identifying LR attacks that, besides causing overflow on lines, have the potential to generate cascading failure. A novel LR attack scheme with cascading failure potential is first proposed for this purpose. The detection mechanism has a basic exploitable structure based on analyzing the estimated cyber load data through the energy management system and a deep learning network. The performance evaluation of the detection mechanism is implemented with regard to the IEEE standard 118-bus system. Various attack scenarios under different conditions (topologies, target lines, and attack load level variations (α)) are used to verify the effectiveness of the proposed framework. The results clearly show an acceptable level of accuracy for the proposed mechanism, which can distinguish between LR attacks via the overload purpose while also showing the system's secure state.</description><identifier>ISSN: 1949-3053</identifier><identifier>EISSN: 1949-3061</identifier><identifier>DOI: 10.1109/TSG.2023.3256480</identifier><identifier>CODEN: ITSGBQ</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Cascading failure ; Costs ; Cyberattack ; Deep learning ; detection mechanism ; Electrical loads ; Energy management ; Failure ; false data injection attacks ; load redistribution attacks ; Performance evaluation ; Power system faults ; Power system protection ; Power systems ; State estimation ; Topology ; Transmission line measurements</subject><ispartof>IEEE transactions on smart grid, 2023-11, Vol.14 (6), p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343</citedby><cites>FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343</cites><orcidid>0000-0002-6635-0674 ; 0000-0002-8556-2218 ; 0000-0002-3929-6510</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10068794$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27923,27924,54795</link.rule.ids></links><search><creatorcontrib>khaleghi, Ali</creatorcontrib><creatorcontrib>Ghazizadeh, Mohammad Sadegh</creatorcontrib><creatorcontrib>Aghamohammadi, Mohammad Reza</creatorcontrib><title>A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks</title><title>IEEE transactions on smart grid</title><addtitle>TSG</addtitle><description>The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have been the focus of different studies. But fewer studies have been done to detect LR attacks that cause cascading failures. This paper presents a mechanism for identifying LR attacks that, besides causing overflow on lines, have the potential to generate cascading failure. A novel LR attack scheme with cascading failure potential is first proposed for this purpose. The detection mechanism has a basic exploitable structure based on analyzing the estimated cyber load data through the energy management system and a deep learning network. The performance evaluation of the detection mechanism is implemented with regard to the IEEE standard 118-bus system. Various attack scenarios under different conditions (topologies, target lines, and attack load level variations (α)) are used to verify the effectiveness of the proposed framework. The results clearly show an acceptable level of accuracy for the proposed mechanism, which can distinguish between LR attacks via the overload purpose while also showing the system's secure state.</description><subject>Cascading failure</subject><subject>Costs</subject><subject>Cyberattack</subject><subject>Deep learning</subject><subject>detection mechanism</subject><subject>Electrical loads</subject><subject>Energy management</subject><subject>Failure</subject><subject>false data injection attacks</subject><subject>load redistribution attacks</subject><subject>Performance evaluation</subject><subject>Power system faults</subject><subject>Power system protection</subject><subject>Power systems</subject><subject>State estimation</subject><subject>Topology</subject><subject>Transmission line measurements</subject><issn>1949-3053</issn><issn>1949-3061</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNpNkM9LwzAYhoMoOHR3Dx4CnjuTJm2T45xuDiqKznNI82Nmbu1M0sPwnzdzQ_wu-SDv-3zwAHCF0QhjxG8Xb7NRjnIyInlRUoZOwABzyjOCSnz6txfkHAxDWKE0hJAy5wPwPYb3xmxhbaRvXbvM7mQwGo5jlOozfUWjouta-GTUh2xd2EC5lK4NEb500bTRyTWcyKCkTmU4lW7dewPnre5VwjQ7WHdSw1ejXYjeNf0v7EAPl-DMynUww-N7Ad6nD4vJY1Y_z-aTcZ2pnOcxw7QgBaaVoZhoSxDlSDfUWm4ZYpzYUjLLtNW4apqCMcu5payySkpOi4ZQcgFuDtyt7756E6JYdb1v00mRs4oThjmqUgodUsp3IXhjxda7jfQ7gZHYWxbJsthbFkfLqXJ9qDhjzL84KhOWkh_ylnjg</recordid><startdate>20231101</startdate><enddate>20231101</enddate><creator>khaleghi, Ali</creator><creator>Ghazizadeh, Mohammad Sadegh</creator><creator>Aghamohammadi, Mohammad Reza</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-6635-0674</orcidid><orcidid>https://orcid.org/0000-0002-8556-2218</orcidid><orcidid>https://orcid.org/0000-0002-3929-6510</orcidid></search><sort><creationdate>20231101</creationdate><title>A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks</title><author>khaleghi, Ali ; Ghazizadeh, Mohammad Sadegh ; Aghamohammadi, Mohammad Reza</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cascading failure</topic><topic>Costs</topic><topic>Cyberattack</topic><topic>Deep learning</topic><topic>detection mechanism</topic><topic>Electrical loads</topic><topic>Energy management</topic><topic>Failure</topic><topic>false data injection attacks</topic><topic>load redistribution attacks</topic><topic>Performance evaluation</topic><topic>Power system faults</topic><topic>Power system protection</topic><topic>Power systems</topic><topic>State estimation</topic><topic>Topology</topic><topic>Transmission line measurements</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>khaleghi, Ali</creatorcontrib><creatorcontrib>Ghazizadeh, Mohammad Sadegh</creatorcontrib><creatorcontrib>Aghamohammadi, Mohammad Reza</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on smart grid</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>khaleghi, Ali</au><au>Ghazizadeh, Mohammad Sadegh</au><au>Aghamohammadi, Mohammad Reza</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks</atitle><jtitle>IEEE transactions on smart grid</jtitle><stitle>TSG</stitle><date>2023-11-01</date><risdate>2023</risdate><volume>14</volume><issue>6</issue><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1949-3053</issn><eissn>1949-3061</eissn><coden>ITSGBQ</coden><abstract>The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have been the focus of different studies. But fewer studies have been done to detect LR attacks that cause cascading failures. This paper presents a mechanism for identifying LR attacks that, besides causing overflow on lines, have the potential to generate cascading failure. A novel LR attack scheme with cascading failure potential is first proposed for this purpose. The detection mechanism has a basic exploitable structure based on analyzing the estimated cyber load data through the energy management system and a deep learning network. The performance evaluation of the detection mechanism is implemented with regard to the IEEE standard 118-bus system. Various attack scenarios under different conditions (topologies, target lines, and attack load level variations (α)) are used to verify the effectiveness of the proposed framework. The results clearly show an acceptable level of accuracy for the proposed mechanism, which can distinguish between LR attacks via the overload purpose while also showing the system's secure state.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TSG.2023.3256480</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-6635-0674</orcidid><orcidid>https://orcid.org/0000-0002-8556-2218</orcidid><orcidid>https://orcid.org/0000-0002-3929-6510</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1949-3053
ispartof IEEE transactions on smart grid, 2023-11, Vol.14 (6), p.1-1
issn 1949-3053
1949-3061
language eng
recordid cdi_proquest_journals_2879381907
source IEEE Electronic Library (IEL) Journals
subjects Cascading failure
Costs
Cyberattack
Deep learning
detection mechanism
Electrical loads
Energy management
Failure
false data injection attacks
load redistribution attacks
Performance evaluation
Power system faults
Power system protection
Power systems
State estimation
Topology
Transmission line measurements
title A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T16%3A29%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Deep%20Learning-Based%20Attack%20Detection%20Mechanism%20against%20Potential%20Cascading%20Failure%20Induced%20by%20Load%20Redistribution%20Attacks&rft.jtitle=IEEE%20transactions%20on%20smart%20grid&rft.au=khaleghi,%20Ali&rft.date=2023-11-01&rft.volume=14&rft.issue=6&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1949-3053&rft.eissn=1949-3061&rft.coden=ITSGBQ&rft_id=info:doi/10.1109/TSG.2023.3256480&rft_dat=%3Cproquest_cross%3E2879381907%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2879381907&rft_id=info:pmid/&rft_ieee_id=10068794&rfr_iscdi=true