An automatic algorithm of identifying vulnerable spots of internet data center power systems based on reinforcement learning

Abstract The internet data center (IDC) power system provides power guarantee for cloud computing and other information services, so its importance is self-evident. However, the occurrence time of malignant destructive events such as lightning strikes, errors in operation and cyber-attacks is unpredictable. But the loss can be minimized by formulating coping strategies in advance. So, identifying the vulnerable spots of the IDC power system come to be the key to guarantee the normal operation of information systems. Generally, the IDC power network can be modelled as a graph G, and then, the methods of finding nodes’ centrality can be applied to analyse the vulnerability. By our experience, it is not the best approach. Unlike the previous approaches, we do not solve the issue as the traditional graph problem. Instead, we fully utilize the characteristics of the IDC power network and apply reinforcement learning techniques to identify the vulnerability of the IDC power network. To our best knowledge, it is the first applying of artificial intelligence in traditional IDC power network. In this article, we propose PFEM, a parallel fault evolution model for the IDC power network, which can accelerate the process of electrical fault evolution. Moreover, we designed an algorithm which can automatically find the vulnerable spots of the IDC power network. The experiment on a real IDC power network demonstrate that the impact of vulnerable devices derived from our proposed algorithm after failure is about 5% higher than that of other algorithms, and tripping single-digit electrical devices of the IDC power system with our proposed algorithm will lead to loss of all loads.

[1]  Emilio Barocio,et al.  Vulnerability Analysis of Power Grids Using Modified Centrality Measures , 2013 .

[2]  Tao Huang,et al.  A framework for analyzing cascading failure in large interconnected power systems: A post-contingency evolution simulator , 2016 .

[3]  J. Liu,et al.  Robustness of single and interdependent scale-free interaction networks with various parameters , 2016 .

[4]  Meir Kalech,et al.  Cyber-attack detection in SCADA systems using temporal pattern recognition techniques , 2019, Comput. Secur..

[5]  Amin Abedi,et al.  Review of major approaches to analyze vulnerability in power system , 2019, Reliab. Eng. Syst. Saf..

[6]  Tyrone Fernando,et al.  A critical review of cascading failure analysis and modeling of power system , 2017 .

[7]  J. Fowler,et al.  An Application of the Highly Optimized Tolerance Model to Electrical Blackouts , 2003, Int. J. Bifurc. Chaos.

[8]  James S. Thorp,et al.  A stochastic study of hidden failures in power system protection , 1999, Decis. Support Syst..

[9]  C. Singh,et al.  Protection System Reliability Modeling: Unreadiness Probability and Mean Duration of Undetected Faults , 1980, IEEE Transactions on Reliability.

[10]  I. Dobson,et al.  Risk Assessment of Cascading Outages: Methodologies and Challenges , 2012, IEEE Transactions on Power Systems.

[11]  Paul Hines,et al.  A “Random Chemistry” Algorithm for Identifying Collections of Multiple Contingencies That Initiate Cascading Failure , 2012, IEEE Transactions on Power Systems.

[12]  Ian Dobson,et al.  Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model , 2005 .

[13]  M. Ouyang Comparisons of purely topological model, betweenness based model and direct current power flow model to analyze power grid vulnerability. , 2013, Chaos.

[14]  Frances M. T. Brazier,et al.  An entropy-based metric to quantify the robustness of power grids against cascading failures , 2013 .

[15]  Andrew Ginter,et al.  Cyber-Based Contingency Analysis , 2016, IEEE Transactions on Power Systems.

[16]  Jiajia Song,et al.  Dynamic Modeling of Cascading Failure in Power Systems , 2014, IEEE Transactions on Power Systems.

[17]  Jun Yan,et al.  Cascading Failure Analysis With DC Power Flow Model and Transient Stability Analysis , 2015, IEEE Transactions on Power Systems.

[18]  Thomas J. Overbye,et al.  An energy based security measure for assessing vulnerability to voltage collapse , 1990 .