Extremely Randomized Trees-Based Scheme for Stealthy Cyber-Attack Detection in Smart Grid Networks

Smart grids have become susceptible to cyber-attacks, being one of the most diversified cyber–physical systems. Measurements collected by the supervisory control and data acquisition system can be compromised by a smart hacker, who can cheat a bad-data detector during state estimation by injecting biased values into the sensor-collected measurements. This may result in false control decisions, compromising the security of the smart grid, and leading to financial losses, power network disruptions, or a combination of both. To overcome these problems, we propose a novel approach to cyber-attacks detection, based on an extremely randomized trees algorithm and kernel principal component analysis for dimensionality reduction. A performance evaluation of the proposed scheme is done by using the standard IEEE 57-bus and 118-bus systems. Numerical results show that the proposed scheme outperforms state-of-art approaches while improving the accuracy in detection of stealth cyber-attacks in smart-grid measurements.

[1]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[2]  Chen Jing,et al.  SVM and PCA based fault classification approaches for complicated industrial process , 2015, Neurocomputing.

[3]  Insoo Koo,et al.  Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest , 2019, IEEE Transactions on Information Forensics and Security.

[4]  Zhu Han,et al.  Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis , 2016, IEEE Systems Journal.

[5]  Ying Jun Zhang,et al.  Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation , 2014, IEEE Journal on Selected Areas in Communications.

[6]  Geoffrey E. Hinton,et al.  Neighbourhood Components Analysis , 2004, NIPS.

[7]  Nei Kato,et al.  An early warning system against malicious activities for smart grid communications , 2011, IEEE Network.

[8]  Xiaodong Wang,et al.  Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.

[9]  Lior Rokach,et al.  Ensemble learning: A survey , 2018, WIREs Data Mining Knowl. Discov..

[10]  Thomas H. Morris,et al.  Machine learning for power system disturbance and cyber-attack discrimination , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).

[11]  Quan Wang,et al.  Kernel Principal Component Analysis and its Applications in Face Recognition and Active Shape Models , 2012, ArXiv.

[12]  S T Roweis,et al.  Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.

[13]  Insoo Koo,et al.  Prediction of Digital Terrestrial Television Coverage Using Machine Learning Regression , 2019, IEEE Transactions on Broadcasting.

[14]  Francisco Herrera,et al.  A Review on Ensembles for the Class Imbalance Problem: Bagging-, Boosting-, and Hybrid-Based Approaches , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[15]  Zuyi Li,et al.  Local Load Redistribution Attacks in Power Systems With Incomplete Network Information , 2014, IEEE Transactions on Smart Grid.

[16]  Anupam Joshi,et al.  Data integrity attack in smart grid: optimised attack to gain momentary economic profit , 2016 .

[17]  S. Rigatti Random Forest. , 2017, Journal of insurance medicine.

[18]  H. Vincent Poor,et al.  Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[19]  Saifur Rahman,et al.  Communication network requirements for major smart grid applications in HAN, NAN and WAN , 2014, Comput. Networks.

[20]  S. Karsoliya,et al.  Approximating Number of Hidden layer neurons in Multiple Hidden Layer BPNN Architecture , 2012 .

[21]  Rong Zheng,et al.  Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.

[22]  Beibei Li,et al.  Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..

[23]  João Miguel da Costa Sousa,et al.  Modified binary PSO for feature selection using SVM applied to mortality prediction of septic patients , 2013, Appl. Soft Comput..

[24]  J. Casazza,et al.  Understanding electric power systems : an overview of the technology and the marketplace , 2003 .

[25]  Rongxing Lu,et al.  Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.

[26]  Robert C. Green,et al.  Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .

[27]  Haibo He,et al.  Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[28]  Mehmet Necip Kurt,et al.  Distributed Quickest Detection of Cyber-Attacks in Smart Grid , 2018, IEEE Transactions on Information Forensics and Security.

[29]  Yi Qian,et al.  Defense Mechanisms against Data Injection Attacks in Smart Grid Networks , 2017, IEEE Communications Magazine.

[30]  B. K. Panigrahi,et al.  Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid , 2018, IEEE Transactions on Industrial Informatics.

[31]  Jinping Hao,et al.  Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids , 2015, IEEE Transactions on Industrial Informatics.

[32]  Yi Cao,et al.  Nonlinear process fault detection and identification using kernel PCA and kernel density estimation , 2016 .

[33]  Pierre Geurts,et al.  Extremely randomized trees , 2006, Machine Learning.

[34]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[35]  Trevor Hastie,et al.  Multi-class AdaBoost ∗ , 2009 .

[36]  Erkki Oja,et al.  Independent component analysis: algorithms and applications , 2000, Neural Networks.

[37]  Insoo Koo,et al.  Feature Selection–Based Detection of Covert Cyber Deception Assaults in Smart Grid Communications Networks Using Machine Learning , 2018, IEEE Access.

[38]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[39]  Jin Hyun Park,et al.  Fault detection and identification of nonlinear processes based on kernel PCA , 2005 .

[40]  Dacheng Tao,et al.  Classification with Noisy Labels by Importance Reweighting , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.