Detection of False Data Injection Attacks Using the Autoencoder Approach

March 04, 2020 ยท Declared Dead ยท ๐Ÿ› IEEE International Conference on Probabilistic Methods Applied to Power Systems

๐Ÿ‘ป CAUSE OF DEATH: Ghosted
No code link whatsoever

"No code URL or promise found in abstract"

Evidence collected by the PWNC Scanner

Authors Chenguang Wang, Simon Tindemans, Kaikai Pan, Peter Palensky arXiv ID 2003.02229 Category eess.SY: Systems & Control (EE) Cross-listed cs.CR, eess.SP Citations 31 Venue IEEE International Conference on Probabilistic Methods Applied to Power Systems Last Checked 1 month ago
Abstract
State estimation is of considerable significance for the power system operation and control. However, well-designed false data injection attacks can utilize blind spots in conventional residual-based bad data detection methods to manipulate measurements in a coordinated manner and thus affect the secure operation and economic dispatch of grids. In this paper, we propose a detection approach based on an autoencoder neural network. By training the network on the dependencies intrinsic in 'normal' operation data, it effectively overcomes the challenge of unbalanced training data that is inherent in power system attack detection. To evaluate the detection performance of the proposed mechanism, we conduct a series of experiments on the IEEE 118-bus power system. The experiments demonstrate that the proposed autoencoder detector displays robust detection performance under a variety of attack scenarios.
Community shame:
Not yet rated
Community Contributions

Found the code? Know the venue? Think something is wrong? Let us know!

๐Ÿ“œ Similar Papers

In the same crypt โ€” Systems & Control (EE)

Died the same way โ€” ๐Ÿ‘ป Ghosted