Loading…
A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks
The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have...
Saved in:
Published in: | IEEE transactions on smart grid 2023-11, Vol.14 (6), p.1-1 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343 |
---|---|
cites | cdi_FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343 |
container_end_page | 1 |
container_issue | 6 |
container_start_page | 1 |
container_title | IEEE transactions on smart grid |
container_volume | 14 |
creator | khaleghi, Ali Ghazizadeh, Mohammad Sadegh Aghamohammadi, Mohammad Reza |
description | The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have been the focus of different studies. But fewer studies have been done to detect LR attacks that cause cascading failures. This paper presents a mechanism for identifying LR attacks that, besides causing overflow on lines, have the potential to generate cascading failure. A novel LR attack scheme with cascading failure potential is first proposed for this purpose. The detection mechanism has a basic exploitable structure based on analyzing the estimated cyber load data through the energy management system and a deep learning network. The performance evaluation of the detection mechanism is implemented with regard to the IEEE standard 118-bus system. Various attack scenarios under different conditions (topologies, target lines, and attack load level variations (α)) are used to verify the effectiveness of the proposed framework. The results clearly show an acceptable level of accuracy for the proposed mechanism, which can distinguish between LR attacks via the overload purpose while also showing the system's secure state. |
doi_str_mv | 10.1109/TSG.2023.3256480 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2879381907</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10068794</ieee_id><sourcerecordid>2879381907</sourcerecordid><originalsourceid>FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343</originalsourceid><addsrcrecordid>eNpNkM9LwzAYhoMoOHR3Dx4CnjuTJm2T45xuDiqKznNI82Nmbu1M0sPwnzdzQ_wu-SDv-3zwAHCF0QhjxG8Xb7NRjnIyInlRUoZOwABzyjOCSnz6txfkHAxDWKE0hJAy5wPwPYb3xmxhbaRvXbvM7mQwGo5jlOozfUWjouta-GTUh2xd2EC5lK4NEb500bTRyTWcyKCkTmU4lW7dewPnre5VwjQ7WHdSw1ejXYjeNf0v7EAPl-DMynUww-N7Ad6nD4vJY1Y_z-aTcZ2pnOcxw7QgBaaVoZhoSxDlSDfUWm4ZYpzYUjLLtNW4apqCMcu5payySkpOi4ZQcgFuDtyt7756E6JYdb1v00mRs4oThjmqUgodUsp3IXhjxda7jfQ7gZHYWxbJsthbFkfLqXJ9qDhjzL84KhOWkh_ylnjg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2879381907</pqid></control><display><type>article</type><title>A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks</title><source>IEEE Electronic Library (IEL) Journals</source><creator>khaleghi, Ali ; Ghazizadeh, Mohammad Sadegh ; Aghamohammadi, Mohammad Reza</creator><creatorcontrib>khaleghi, Ali ; Ghazizadeh, Mohammad Sadegh ; Aghamohammadi, Mohammad Reza</creatorcontrib><description>The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have been the focus of different studies. But fewer studies have been done to detect LR attacks that cause cascading failures. This paper presents a mechanism for identifying LR attacks that, besides causing overflow on lines, have the potential to generate cascading failure. A novel LR attack scheme with cascading failure potential is first proposed for this purpose. The detection mechanism has a basic exploitable structure based on analyzing the estimated cyber load data through the energy management system and a deep learning network. The performance evaluation of the detection mechanism is implemented with regard to the IEEE standard 118-bus system. Various attack scenarios under different conditions (topologies, target lines, and attack load level variations (α)) are used to verify the effectiveness of the proposed framework. The results clearly show an acceptable level of accuracy for the proposed mechanism, which can distinguish between LR attacks via the overload purpose while also showing the system's secure state.</description><identifier>ISSN: 1949-3053</identifier><identifier>EISSN: 1949-3061</identifier><identifier>DOI: 10.1109/TSG.2023.3256480</identifier><identifier>CODEN: ITSGBQ</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Cascading failure ; Costs ; Cyberattack ; Deep learning ; detection mechanism ; Electrical loads ; Energy management ; Failure ; false data injection attacks ; load redistribution attacks ; Performance evaluation ; Power system faults ; Power system protection ; Power systems ; State estimation ; Topology ; Transmission line measurements</subject><ispartof>IEEE transactions on smart grid, 2023-11, Vol.14 (6), p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343</citedby><cites>FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343</cites><orcidid>0000-0002-6635-0674 ; 0000-0002-8556-2218 ; 0000-0002-3929-6510</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10068794$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27923,27924,54795</link.rule.ids></links><search><creatorcontrib>khaleghi, Ali</creatorcontrib><creatorcontrib>Ghazizadeh, Mohammad Sadegh</creatorcontrib><creatorcontrib>Aghamohammadi, Mohammad Reza</creatorcontrib><title>A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks</title><title>IEEE transactions on smart grid</title><addtitle>TSG</addtitle><description>The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have been the focus of different studies. But fewer studies have been done to detect LR attacks that cause cascading failures. This paper presents a mechanism for identifying LR attacks that, besides causing overflow on lines, have the potential to generate cascading failure. A novel LR attack scheme with cascading failure potential is first proposed for this purpose. The detection mechanism has a basic exploitable structure based on analyzing the estimated cyber load data through the energy management system and a deep learning network. The performance evaluation of the detection mechanism is implemented with regard to the IEEE standard 118-bus system. Various attack scenarios under different conditions (topologies, target lines, and attack load level variations (α)) are used to verify the effectiveness of the proposed framework. The results clearly show an acceptable level of accuracy for the proposed mechanism, which can distinguish between LR attacks via the overload purpose while also showing the system's secure state.</description><subject>Cascading failure</subject><subject>Costs</subject><subject>Cyberattack</subject><subject>Deep learning</subject><subject>detection mechanism</subject><subject>Electrical loads</subject><subject>Energy management</subject><subject>Failure</subject><subject>false data injection attacks</subject><subject>load redistribution attacks</subject><subject>Performance evaluation</subject><subject>Power system faults</subject><subject>Power system protection</subject><subject>Power systems</subject><subject>State estimation</subject><subject>Topology</subject><subject>Transmission line measurements</subject><issn>1949-3053</issn><issn>1949-3061</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNpNkM9LwzAYhoMoOHR3Dx4CnjuTJm2T45xuDiqKznNI82Nmbu1M0sPwnzdzQ_wu-SDv-3zwAHCF0QhjxG8Xb7NRjnIyInlRUoZOwABzyjOCSnz6txfkHAxDWKE0hJAy5wPwPYb3xmxhbaRvXbvM7mQwGo5jlOozfUWjouta-GTUh2xd2EC5lK4NEb500bTRyTWcyKCkTmU4lW7dewPnre5VwjQ7WHdSw1ejXYjeNf0v7EAPl-DMynUww-N7Ad6nD4vJY1Y_z-aTcZ2pnOcxw7QgBaaVoZhoSxDlSDfUWm4ZYpzYUjLLtNW4apqCMcu5payySkpOi4ZQcgFuDtyt7756E6JYdb1v00mRs4oThjmqUgodUsp3IXhjxda7jfQ7gZHYWxbJsthbFkfLqXJ9qDhjzL84KhOWkh_ylnjg</recordid><startdate>20231101</startdate><enddate>20231101</enddate><creator>khaleghi, Ali</creator><creator>Ghazizadeh, Mohammad Sadegh</creator><creator>Aghamohammadi, Mohammad Reza</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0002-6635-0674</orcidid><orcidid>https://orcid.org/0000-0002-8556-2218</orcidid><orcidid>https://orcid.org/0000-0002-3929-6510</orcidid></search><sort><creationdate>20231101</creationdate><title>A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks</title><author>khaleghi, Ali ; Ghazizadeh, Mohammad Sadegh ; Aghamohammadi, Mohammad Reza</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cascading failure</topic><topic>Costs</topic><topic>Cyberattack</topic><topic>Deep learning</topic><topic>detection mechanism</topic><topic>Electrical loads</topic><topic>Energy management</topic><topic>Failure</topic><topic>false data injection attacks</topic><topic>load redistribution attacks</topic><topic>Performance evaluation</topic><topic>Power system faults</topic><topic>Power system protection</topic><topic>Power systems</topic><topic>State estimation</topic><topic>Topology</topic><topic>Transmission line measurements</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>khaleghi, Ali</creatorcontrib><creatorcontrib>Ghazizadeh, Mohammad Sadegh</creatorcontrib><creatorcontrib>Aghamohammadi, Mohammad Reza</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on smart grid</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>khaleghi, Ali</au><au>Ghazizadeh, Mohammad Sadegh</au><au>Aghamohammadi, Mohammad Reza</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks</atitle><jtitle>IEEE transactions on smart grid</jtitle><stitle>TSG</stitle><date>2023-11-01</date><risdate>2023</risdate><volume>14</volume><issue>6</issue><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1949-3053</issn><eissn>1949-3061</eissn><coden>ITSGBQ</coden><abstract>The occurrence of load redistribution (LR) attacks has disastrous consequences for the power system, but these attacks have a significant impact when they cause cascading failures in the system. The mechanisms and strategies for detecting and designing LR attacks resulting in overflow on lines have been the focus of different studies. But fewer studies have been done to detect LR attacks that cause cascading failures. This paper presents a mechanism for identifying LR attacks that, besides causing overflow on lines, have the potential to generate cascading failure. A novel LR attack scheme with cascading failure potential is first proposed for this purpose. The detection mechanism has a basic exploitable structure based on analyzing the estimated cyber load data through the energy management system and a deep learning network. The performance evaluation of the detection mechanism is implemented with regard to the IEEE standard 118-bus system. Various attack scenarios under different conditions (topologies, target lines, and attack load level variations (α)) are used to verify the effectiveness of the proposed framework. The results clearly show an acceptable level of accuracy for the proposed mechanism, which can distinguish between LR attacks via the overload purpose while also showing the system's secure state.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/TSG.2023.3256480</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-6635-0674</orcidid><orcidid>https://orcid.org/0000-0002-8556-2218</orcidid><orcidid>https://orcid.org/0000-0002-3929-6510</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1949-3053 |
ispartof | IEEE transactions on smart grid, 2023-11, Vol.14 (6), p.1-1 |
issn | 1949-3053 1949-3061 |
language | eng |
recordid | cdi_proquest_journals_2879381907 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Cascading failure Costs Cyberattack Deep learning detection mechanism Electrical loads Energy management Failure false data injection attacks load redistribution attacks Performance evaluation Power system faults Power system protection Power systems State estimation Topology Transmission line measurements |
title | A Deep Learning-Based Attack Detection Mechanism against Potential Cascading Failure Induced by Load Redistribution Attacks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T16%3A29%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Deep%20Learning-Based%20Attack%20Detection%20Mechanism%20against%20Potential%20Cascading%20Failure%20Induced%20by%20Load%20Redistribution%20Attacks&rft.jtitle=IEEE%20transactions%20on%20smart%20grid&rft.au=khaleghi,%20Ali&rft.date=2023-11-01&rft.volume=14&rft.issue=6&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1949-3053&rft.eissn=1949-3061&rft.coden=ITSGBQ&rft_id=info:doi/10.1109/TSG.2023.3256480&rft_dat=%3Cproquest_cross%3E2879381907%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c292t-14535147e413df30490db4ff9f80893f6a8f8dfd17bb588f99f487fcaa945b343%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2879381907&rft_id=info:pmid/&rft_ieee_id=10068794&rfr_iscdi=true |