Reinforcement Learning for Cyber-Physical Security Assessment of Power Systems

The protection of power systems is of paramount significance for the supply of electricity. Contingency analysis allows to access the impact of power grid components failures. Typically, power systems are designed to handle $N-2$ contingencies. Existing algorithms mainly focus on performance and computational efficiency. There has been little effort in designing contingency methods from a cybersecurity perspective. To address this limitation, we study contingency analysis in the context of power system planning and operation towards cyber-physical security assessment. The proposed methodology considers attackers transitions in the network based on the $N-2$ critical contingency pairs. We develop an online reinforcement $Q -$learning scheme to solve a Markov decision process that models adversarial actions. In this model, the adversary aims to maximize the cumulative reward before making any action and learns adaptively how to optimize the attack strategies. We validate and test the algorithm on eleven literature-based and synthetic power grid test cases.

[1]  Michail Maniatakos,et al.  Attacking the smart grid using public information , 2016, 2016 17th Latin-American Test Symposium (LATS).

[2]  Thomas J. Overbye,et al.  Linear Analysis of Multiple Outage Interaction , 2009, 2009 42nd Hawaii International Conference on System Sciences.

[3]  Andrew Ginter,et al.  Cyber-Based Contingency Analysis , 2016, IEEE Transactions on Power Systems.

[4]  Saman A. Zonouz,et al.  CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.

[5]  O. Alsaç,et al.  Analytical and computational improvements in performance-index ranking algorithms for networks , 1985 .

[6]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[7]  G. Gross,et al.  Detection of Island Formation and Identification of Causal Factors Under Multiple Line Outages , 2007, IEEE Transactions on Power Systems.

[8]  W. F. Tinney,et al.  An adaptive localization method for real-time security analysis , 1991 .

[9]  Jianhui Wang,et al.  Cyber-Physical Modeling and Cyber-Contingency Assessment of Hierarchical Control Systems , 2015, IEEE Transactions on Smart Grid.

[10]  Claudio M. Rocco Sanseverino,et al.  Assessing the Vulnerability of a Power System Through a Multiple Objective Contingency Screening Approach , 2011, IEEE Transactions on Reliability.

[11]  I-Ta Cheng,et al.  Automation of Contingency Analysis for Special Protection Systems in Taiwan Power System , 2007, 2007 International Conference on Intelligent Systems Applications to Power Systems.

[12]  T. J. Overbye,et al.  Multiple Element Contingency Screening , 2011, IEEE Transactions on Power Systems.

[13]  William H. Sanders,et al.  SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures , 2014, IEEE Transactions on Smart Grid.

[14]  M. Enns,et al.  Fast Linear Contingency Analysis , 1982, IEEE Transactions on Power Apparatus and Systems.

[15]  Daniel Bienstock,et al.  The N-k Problem in Power Grids: New Models, Formulations, and Numerical Experiments , 2009, SIAM J. Optim..

[16]  Chao Yang,et al.  Severe Multiple Contingency Screening in Electric Power Systems , 2008, IEEE Transactions on Power Systems.

[17]  Michail Maniatakos,et al.  Open Source Intelligence for Energy Sector Cyberattacks , 2019, Advanced Sciences and Technologies for Security Applications.

[18]  J.D. McCalley,et al.  Identifying high risk N-k contingencies for online security assessment , 2005, IEEE Transactions on Power Systems.

[19]  Michail Maniatakos,et al.  Security analysis of smart grid , 2017 .

[20]  K. Turitsyn,et al.  Fast and Reliable Screening of N-2 Contingencies , 2016, IEEE Transactions on Power Systems.

[21]  Konstantin S. Turitsyn,et al.  Fast Algorithm for N-2 Contingency Problem , 2013, 2013 46th Hawaii International Conference on System Sciences.

[22]  G. C. Ejebe,et al.  Fast contingency screening and evaluation for voltage security analysis , 1988 .

[23]  V. Brandwajn,et al.  Efficient bounding method for linear contingency analysis , 1988 .