Machine Learning-Based Anomaly Detection for Load Forecasting Under Cyberattacks

Accurate load forecasting can create both economic and reliability benefits for power system operators. However, the cyberattack on load forecasting may mislead operators to make unsuitable operational decisions for the electricity delivery. To effectively and accurately detect these cyberattacks, this paper develops a machine learning-based anomaly detection (MLAD) methodology. First, load forecasts provided by neural networks are used to reconstruct the benchmark and scaling data by using the ${k}$ -means clustering. Second, the cyberattack template is estimated by the naive Bayes classification based on the cumulative distribution function and statistical features of the scaling data. Finally, the dynamic programming is utilized to calculate both the occurrence and parameter of one cyberattack on load forecasting data. A widely used symbolic aggregation approximation method is compared with the developed MLAD method. Numerical simulations on the publicly load data show that the MLAD method can effectively detect cyberattacks for load forecasting data with relatively high accuracy. Also, the robustness of MLAD is verified by thousands of attack scenarios based on Monte Carlo simulation.

[1]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[2]  Lingfeng Wang,et al.  A Robustness-Oriented Power Grid Operation Strategy Considering Attacks , 2018, IEEE Transactions on Smart Grid.

[3]  Jie Zhang,et al.  Wind Power Ramp Event Forecasting Using a Stochastic Scenario Generation Method , 2015, IEEE Transactions on Sustainable Energy.

[4]  Charu C. Aggarwal,et al.  Outlier Detection for Temporal Data: A Survey , 2014, IEEE Transactions on Knowledge and Data Engineering.

[5]  Jinfu Chen,et al.  Distributed Framework for Detecting PMU Data Manipulation Attacks With Deep Autoencoders , 2019, IEEE Transactions on Smart Grid.

[6]  D.M. Mount,et al.  An Efficient k-Means Clustering Algorithm: Analysis and Implementation , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[7]  Paul J. Roebber,et al.  Visualizing Multiple Measures of Forecast Quality , 2009 .

[8]  Jie Zhang,et al.  Statistical Representation of Wind Power Ramps Using a Generalized Gaussian Mixture Model , 2018, IEEE Transactions on Sustainable Energy.

[9]  Yong-June Shin,et al.  Wavelet-Based Event Detection Method Using PMU Data , 2017, IEEE Transactions on Smart Grid.

[10]  Jianhui Wang,et al.  A Novel Event Detection Method Using PMU Data With High Precision , 2019, IEEE Transactions on Power Systems.

[11]  Meng Yue,et al.  An integrated anomaly detection method for load forecasting data under cyberattacks , 2017, 2017 IEEE Power & Energy Society General Meeting.

[12]  Jie Zhang,et al.  An Optimized Swinging Door Algorithm for Identifying Wind Ramping Events , 2016, IEEE Transactions on Sustainable Energy.

[13]  Ying Chen,et al.  Short-Term Load Forecasting: Similar Day-Based Wavelet Neural Networks , 2010, IEEE Transactions on Power Systems.

[14]  Jianhui Wang,et al.  A Hierarchical Framework for Smart Grid Anomaly Detection Using Large-Scale Smart Meter Data , 2018, IEEE Transactions on Smart Grid.

[15]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[16]  Zhao Yang Dong,et al.  Generalized FDIA-Based Cyber Topology Attack With Application to the Australian Electricity Market Trading Mechanism , 2018, IEEE Transactions on Smart Grid.

[17]  James C. Bezdek,et al.  Efficient Unsupervised Parameter Estimation for One-Class Support Vector Machines , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[18]  Bijaya Ketan Panigrahi,et al.  A New Approach to Power System Disturbance Assessment Using Wide-Area Postdisturbance Records , 2018, IEEE Transactions on Industrial Informatics.

[19]  Siddharth Sridhar,et al.  Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.

[20]  Yang Weng,et al.  Identification of False Data Injection Attacks With Considering the Impact of Wind Generation and Topology Reconfigurations , 2018, IEEE Transactions on Sustainable Energy.

[21]  Michael I. Jordan,et al.  On Discriminative vs. Generative Classifiers: A comparison of logistic regression and naive Bayes , 2001, NIPS.

[22]  Yang Liu,et al.  The Hierarchical Smart Home Cyberattack Detection Considering Power Overloading and Frequency Disturbance , 2016, IEEE Transactions on Industrial Informatics.

[23]  F. Pukelsheim The Three Sigma Rule , 1994 .

[24]  Athanasios V. Vasilakos,et al.  Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems , 2018, IEEE Transactions on Smart Grid.

[25]  Rong Zheng,et al.  Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.

[26]  Junbo Zhao,et al.  Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks , 2017, IEEE Transactions on Smart Grid.

[27]  Eamonn J. Keogh,et al.  HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[28]  Ram Rajagopal,et al.  Detection and Statistics of Wind Power Ramps , 2013, IEEE Transactions on Power Systems.

[29]  N. G. Boulaxis,et al.  Optimal Feeder Routing in Distribution System Planning Using Dynamic Programming Technique and GIS Facilities , 2001, IEEE Power Engineering Review.

[30]  Junfeng Yang,et al.  Improving the Accuracy of Bus Load Forecasting by a Two-Stage Bad Data Identification Method , 2014, IEEE Transactions on Power Systems.