首页> 外文期刊>Electric power systems research >A3D: Attention-based auto-encoder anomaly detector for false data injection attacks
【24h】

A3D: Attention-based auto-encoder anomaly detector for false data injection attacks

机译:A3D:基于关注的自动编码器异常检测器,用于假数据注入攻击

获取原文
获取原文并翻译 | 示例
           

摘要

With the influx of more advanced and more connected computing and control devices, the electric power grid has continuously evolved to rely on communication networks for efficient operation and control. A challenge with these new technologies is that they may introduce new and unforeseen avenues of access, making the grid more susceptible to cyber attacks. False Data Injection Attacks (FDIA) are a particular type of attack that aims to cause disruptions in the operation of the power grid by affecting the feedback mechanism to control the grid. This is carried out by modifying the measurements which enable a state estimator to approximate the state of the system. These attacks are designed in such a way that they preserve the system equations on which the state estimator operates; therefore, they cannot be detected by a simple residual-based detection mechanism. In this paper, we propose monotonic attention based auto-encoders, an unsupervised learning technique to detect FDIAs. The auto-encoder is trained under normal operating conditions, and we hypothesize that it will produce outputs which are close to the true system values at normal operation even if the measurements are modified by an adversary. Based on this hypothesis, that high reconstruction error occurs for the attacked conditions, the intrusion detection is performed by a threshold mechanism using Precision-Recall curve. We validate the efficacy of our proposed attention-based auto-encoder anomaly detector (A3D) over other variants of auto-encoders such as ANN and RNN based auto-encoders, and a few supervised learning techniques, by performing FDIAs on a IEEE 14 bus system.
机译:随着更先进和更多连接的计算和控制设备的流入,电力电网连续发展依赖于通信网络以实现有效的操作和控制。与这些新技术的挑战是他们可能会引入新的和无法预料的访问途径,使网格更容易受到网络攻击的影响。假数据注入攻击(FDIA)是一种特定类型的攻击,该攻击旨在通过影响控制电网的反馈机制来引起电网的操作中断。这是通过修改能够使状态估计器近似于系统的状态的测量来执行的。这些攻击的设计是这样的,使得它们保留了状态估计器所操作的系统方程;因此,不能通过简单的残余检测机制来检测它们。在本文中,我们提出了基于单调的自动编码器,一种无监督的学习技术来检测FDIAS。自动编码器在正常运行条件下培训,我们假设它将产生靠近正常操作的输出,即使通过对手修改测量值也是如此。基于该假设,对攻击条件发生高重建误差,通过使用精密召回曲线的阈值机制来执行入侵检测。我们通过在IEEE 14总线上执行FDIAS来验证我们提出的基于ANN和基于RNN和RNN的自动编码器(如ANN和RNN和RNN和RNN的自动编码器)的其他变体的疗效系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号