Skip to main content
Erschienen in: Journal of Network and Systems Management 4/2021

01.10.2021

An Ensemble Classifier Based Scheme for Detection of False Data Attacks Aiming at Disruption of Electricity Market Operation

verfasst von: Prasanta Kumar Jena, Subhojit Ghosh, Ebha Koley, Murli Manohar

Erschienen in: Journal of Network and Systems Management | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wide area monitoring and control of modern power network demand real-time estimation of state variables from sensor measurements. Maintaining a high degree of reliability and accuracy in the state estimation process is important in avoiding any disruption in the electricity market operation. The market operation in power networks aims at providing a win-win situation for both the utility and consumer. The exposure and vulnerability of cyber components in smart grids allow for manipulating the electricity market by falsifying the state variables. The attacker can cause intentional profit/loss to the utility/consumer by misdirecting the estimated states through the injection of false data into the sensor information. Hence, maintaining integrity in the market operation demands a mechanism for detecting false data injection attack (FDIA). This paper proposes a classification-based approach for detecting FDIAs aiming at electricity market disruption. For any variation in the predicted and real-time nodal electricity price, the proposed decision tree (DT) based ensemble classifier is executed using state information to identify the prevailing scenario as a contingency or FDIA. The effectiveness of the proposed scheme has been extensively validated for various contingency and FDIA scenarios in IEEE 14 bus, 39 bus, and 57 bus test power systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
5.
Zurück zum Zitat Khaitan, S.K., McCalley, J.D., Liu, C.C.: Cyber Physical Systems Approach to Smart Electric Power Grid. Springer, New York (2015)CrossRef Khaitan, S.K., McCalley, J.D., Liu, C.C.: Cyber Physical Systems Approach to Smart Electric Power Grid. Springer, New York (2015)CrossRef
7.
Zurück zum Zitat Eder-Neuhauser, P., Zseby, T., Fabini, J., Vormayr, G.: Cyber attack models for smart grid environments. Sustain. Energy Grids Netw. 12, 10–29 (2017)CrossRef Eder-Neuhauser, P., Zseby, T., Fabini, J., Vormayr, G.: Cyber attack models for smart grid environments. Sustain. Energy Grids Netw. 12, 10–29 (2017)CrossRef
8.
Zurück zum Zitat Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Security. 14(1), 1–33 (2011)CrossRef Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Security. 14(1), 1–33 (2011)CrossRef
9.
Zurück zum Zitat He, H., Yan, J.: Cyber-physical attacks and defences in the smart grid: a survey. IET Cyber-Phys. Syst. 1(1), 13–27 (2016)CrossRef He, H., Yan, J.: Cyber-physical attacks and defences in the smart grid: a survey. IET Cyber-Phys. Syst. 1(1), 13–27 (2016)CrossRef
10.
Zurück zum Zitat Ott, A.L.: Experience with PJM market operation, system design, and implementation. IEEE Trans. Power Syst. 18(2), 528–534 (2003)CrossRef Ott, A.L.: Experience with PJM market operation, system design, and implementation. IEEE Trans. Power Syst. 18(2), 528–534 (2003)CrossRef
11.
Zurück zum Zitat Zheng, T., Litvinov, E.: Ex post pricing in the co-optimized energy and reserve market. IEEE Trans. Power Syst. 21(4), 1528–1538 (2006)CrossRef Zheng, T., Litvinov, E.: Ex post pricing in the co-optimized energy and reserve market. IEEE Trans. Power Syst. 21(4), 1528–1538 (2006)CrossRef
12.
Zurück zum Zitat Abur, A., Exposito, A.G.: Power System State Estimation: Theory and Implementation. CRC Press, Boca Raton (2004)CrossRef Abur, A., Exposito, A.G.: Power System State Estimation: Theory and Implementation. CRC Press, Boca Raton (2004)CrossRef
15.
Zurück zum Zitat Shukla, S.K., Koley, E., Ghosh, S.: DC offset estimation-based fault detection in transmission line during power swing using ensemble of decision tree. IET Sci. Meas. Technol. 13(2), 212–222 (2018)CrossRef Shukla, S.K., Koley, E., Ghosh, S.: DC offset estimation-based fault detection in transmission line during power swing using ensemble of decision tree. IET Sci. Meas. Technol. 13(2), 212–222 (2018)CrossRef
16.
Zurück zum Zitat Li, S., Yılmaz, Y., Wang, X.: Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans. Smart Grid. 6(6), 2725–2735 (2014)CrossRef Li, S., Yılmaz, Y., Wang, X.: Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans. Smart Grid. 6(6), 2725–2735 (2014)CrossRef
17.
Zurück zum Zitat Liu, X., Zhu, P., Zhang, Y., Chen, K.: A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure. IEEE Trans. Smart Grid. 6(5), 2435–2443 (2015)CrossRef Liu, X., Zhu, P., Zhang, Y., Chen, K.: A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure. IEEE Trans. Smart Grid. 6(5), 2435–2443 (2015)CrossRef
18.
Zurück zum Zitat Liu, L., Esmalifalak, M., Ding, Q., Emesih, V.A., Han, Z.: Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid. 5(2), 612–621 (2014)CrossRef Liu, L., Esmalifalak, M., Ding, Q., Emesih, V.A., Han, Z.: Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid. 5(2), 612–621 (2014)CrossRef
19.
Zurück zum Zitat Luo, X., Wang, X., Pan, X., Guan, X.: Detection and isolation of false data injection attack for smart grids via unknown input observers. IET Gener. Transm. Distrib. 13(8), 1277–1286 (2019)CrossRef Luo, X., Wang, X., Pan, X., Guan, X.: Detection and isolation of false data injection attack for smart grids via unknown input observers. IET Gener. Transm. Distrib. 13(8), 1277–1286 (2019)CrossRef
20.
Zurück zum Zitat Li, B., Ding, T., Huang, C., Zhao, J., Yang, Y., Chen, Y.: Detecting false data injection attacks against power system state estimation with fast go-decomposition approach. IEEE Trans. Industr. Inf. 15(5), 2892–2904 (2019)CrossRef Li, B., Ding, T., Huang, C., Zhao, J., Yang, Y., Chen, Y.: Detecting false data injection attacks against power system state estimation with fast go-decomposition approach. IEEE Trans. Industr. Inf. 15(5), 2892–2904 (2019)CrossRef
21.
Zurück zum Zitat Chen, P.Y., Yang, S., McCann, J.A., Lin, J., Yang, X.: Detection of false data injection attacks in smart-grid systems. IEEE Commun. Mag. 53(2), 206–213 (2015)CrossRef Chen, P.Y., Yang, S., McCann, J.A., Lin, J., Yang, X.: Detection of false data injection attacks in smart-grid systems. IEEE Commun. Mag. 53(2), 206–213 (2015)CrossRef
22.
Zurück zum Zitat Chaojun, G., Jirutitijaroen, P., Motani, M.: Detecting false data injection attacks in ac state estimation. IEEE Trans. Smart Grid. 6(5), 2476–2483 (2015)CrossRef Chaojun, G., Jirutitijaroen, P., Motani, M.: Detecting false data injection attacks in ac state estimation. IEEE Trans. Smart Grid. 6(5), 2476–2483 (2015)CrossRef
23.
Zurück zum Zitat Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020) Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. 50, 102419 (2020)
24.
Zurück zum Zitat Wang, D., Wang, X., Zhang, Y., Jin, L.: Detection of power grid disturbances and cyber-attacks based on machine learning. J. Inf. Secur. Appl. 46, 42–52 (2019) Wang, D., Wang, X., Zhang, Y., Jin, L.: Detection of power grid disturbances and cyber-attacks based on machine learning. J. Inf. Secur. Appl. 46, 42–52 (2019)
25.
Zurück zum Zitat Khanna, K., Panigrahi, B.K., Joshi, A.: AI-based approach to identify compromised meters in data integrity attacks on smart grid. IET Gener. Transm. Distrib. 12(5), 1052–1066 (2018)CrossRef Khanna, K., Panigrahi, B.K., Joshi, A.: AI-based approach to identify compromised meters in data integrity attacks on smart grid. IET Gener. Transm. Distrib. 12(5), 1052–1066 (2018)CrossRef
26.
Zurück zum Zitat Cui, M., Wang, J., Yue, M.: Machine learning-based anomaly detection for load forecasting under cyberattacks. IEEE Trans. Smart Grid 10(5), 5724–5734 (2019)CrossRef Cui, M., Wang, J., Yue, M.: Machine learning-based anomaly detection for load forecasting under cyberattacks. IEEE Trans. Smart Grid 10(5), 5724–5734 (2019)CrossRef
28.
Zurück zum Zitat Wang, Q., Cai, X., Tang, Y., Ni, M.: Methods of cyber-attack identification for power systems based on bilateral cyber-physical information. Int. J. Electr. Power Energy Syst. 125, 106515 (2020)CrossRef Wang, Q., Cai, X., Tang, Y., Ni, M.: Methods of cyber-attack identification for power systems based on bilateral cyber-physical information. Int. J. Electr. Power Energy Syst. 125, 106515 (2020)CrossRef
30.
Zurück zum Zitat Mukherjee, R., De, A.: Development of an ensemble decision tree-based power system dynamic security state predictor. IEEE Syst. J. 14(3), 3836–3843 (2020)CrossRef Mukherjee, R., De, A.: Development of an ensemble decision tree-based power system dynamic security state predictor. IEEE Syst. J. 14(3), 3836–3843 (2020)CrossRef
31.
Zurück zum Zitat Liang, G., Zhao, J., Luo, F., Weller, S.R., Dong, Z.Y.: A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8(4), 1630–1638 (2016)CrossRef Liang, G., Zhao, J., Luo, F., Weller, S.R., Dong, Z.Y.: A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8(4), 1630–1638 (2016)CrossRef
32.
Zurück zum Zitat Deng, R., Xiao, G., Lu, R., Liang, H., Vasilakos, A.V.: False data injection on state estimation in power systems-Attacks, impacts, and defense: A survey. IEEE Trans. Industr. Inf. 13(2), 411–423 (2017)CrossRef Deng, R., Xiao, G., Lu, R., Liang, H., Vasilakos, A.V.: False data injection on state estimation in power systems-Attacks, impacts, and defense: A survey. IEEE Trans. Industr. Inf. 13(2), 411–423 (2017)CrossRef
33.
Zurück zum Zitat Liang, G., Weller, S.R., Zhao, J., Luo, F., Dong, Z.Y.: A framework for cyber-topology attacks: Line-switching and new attack scenarios. IEEE Trans. Smart Grid 10(2), 1704–1712 (2019)CrossRef Liang, G., Weller, S.R., Zhao, J., Luo, F., Dong, Z.Y.: A framework for cyber-topology attacks: Line-switching and new attack scenarios. IEEE Trans. Smart Grid 10(2), 1704–1712 (2019)CrossRef
34.
Zurück zum Zitat Polikar, R.: Ensemble based systems in decision making. IEEE Circuits Syst. Mag. 6(3), 21–45 (2006)CrossRef Polikar, R.: Ensemble based systems in decision making. IEEE Circuits Syst. Mag. 6(3), 21–45 (2006)CrossRef
35.
Zurück zum Zitat Ho, T.K.: The random subspace method for constructing decision forests. IEEE Trans. Pattern Anal. Mach. Intell. 20(8), 832–844 (1998)CrossRef Ho, T.K.: The random subspace method for constructing decision forests. IEEE Trans. Pattern Anal. Mach. Intell. 20(8), 832–844 (1998)CrossRef
36.
Zurück zum Zitat Manohar, M., Koley, E., Ghosh, S.: Reliable protection scheme for PV integrated microgrid using an ensemble classifier approach with real-time validation. IET Sci. Meas. Technol. 12(2), 200–208 (2018)CrossRef Manohar, M., Koley, E., Ghosh, S.: Reliable protection scheme for PV integrated microgrid using an ensemble classifier approach with real-time validation. IET Sci. Meas. Technol. 12(2), 200–208 (2018)CrossRef
37.
Zurück zum Zitat González, C., Mira-McWilliams, J., Juárez, I.: Important variable assessment and electricity price forecasting based on regression tree models: classification and regression trees, Bagging and Random Forests. IET Gener. Transm. Distrib. 9(11), 1120–1128 (2015)CrossRef González, C., Mira-McWilliams, J., Juárez, I.: Important variable assessment and electricity price forecasting based on regression tree models: classification and regression trees, Bagging and Random Forests. IET Gener. Transm. Distrib. 9(11), 1120–1128 (2015)CrossRef
39.
Zurück zum Zitat Ahmed, S., Lee, Y., Hyun, S.H., Koo, I.: Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest. IEEE Trans. Inf. Forensics Secur. 14(10), 2765–2777 (2019)CrossRef Ahmed, S., Lee, Y., Hyun, S.H., Koo, I.: Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest. IEEE Trans. Inf. Forensics Secur. 14(10), 2765–2777 (2019)CrossRef
41.
Zurück zum Zitat Dubey, R., Samantaray, S.R., Panigrahi, B.K., Venkoparao, V.G.: Data-mining model based adaptive protection scheme to enhance distance relay performance during power swing. Int. J. Electr. Power Energy Syst. 81, 361–370 (2016)CrossRef Dubey, R., Samantaray, S.R., Panigrahi, B.K., Venkoparao, V.G.: Data-mining model based adaptive protection scheme to enhance distance relay performance during power swing. Int. J. Electr. Power Energy Syst. 81, 361–370 (2016)CrossRef
44.
Zurück zum Zitat Mitchell, T.M.: Machine Learning. McGraw-Hill, Germany (1997)MATH Mitchell, T.M.: Machine Learning. McGraw-Hill, Germany (1997)MATH
Metadaten
Titel
An Ensemble Classifier Based Scheme for Detection of False Data Attacks Aiming at Disruption of Electricity Market Operation
verfasst von
Prasanta Kumar Jena
Subhojit Ghosh
Ebha Koley
Murli Manohar
Publikationsdatum
01.10.2021
Verlag
Springer US
Erschienen in
Journal of Network and Systems Management / Ausgabe 4/2021
Print ISSN: 1064-7570
Elektronische ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-021-09610-y

Weitere Artikel der Ausgabe 4/2021

Journal of Network and Systems Management 4/2021 Zur Ausgabe