论文标题
用于检测功率系统中错误数据注射攻击的机器学习方法的调查
A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems
论文作者
论文摘要
在过去的十年中,针对电力系统的网络攻击数量以及造成物理和经济损害的数量迅速增加。其中,虚假的数据注射攻击(FDIA)是一类针对电网监测系统的网络攻击。对手可以成功执行FDIA,以通过损害传感器或修改系统数据来操纵功率系统状态估计(SE)。 SE是能源管理系统(EMS)对基于系统冗余测量和网络拓扑估算未知状态变量的基本过程。 SE例程包括不良数据检测(BDD)算法,以消除所获得的测量结果,例如在传感器故障时。 FDIA可以绕过BDD模块将恶意数据向量注入一个未检测到的测量子集中,从而操纵SE过程的结果。为了克服传统基于残差的BDD方法的局限性,基于机器学习算法的数据驱动解决方案已被广泛采用,用于检测由于其快速执行时间和准确的结果,用于检测传感器数据的恶意操纵。本文对最新的机器学习方法进行了全面审查,该方法用于检测FDIA针对Power Syste SE算法。
Over the last decade, the number of cyberattacks targeting power systems and causing physical and economic damages has increased rapidly. Among them, False Data Injection Attacks (FDIAs) is a class of cyberattacks against power grid monitoring systems. Adversaries can successfully perform FDIAs in order to manipulate the power system State Estimation (SE) by compromising sensors or modifying system data. SE is an essential process performed by the Energy Management System (EMS) towards estimating unknown state variables based on system redundant measurements and network topology. SE routines include Bad Data Detection (BDD) algorithms to eliminate errors from the acquired measurements, e.g., in case of sensor failures. FDIAs can bypass BDD modules to inject malicious data vectors into a subset of measurements without being detected, and thus manipulate the results of the SE process. In order to overcome the limitations of traditional residual-based BDD approaches, data-driven solutions based on machine learning algorithms have been widely adopted for detecting malicious manipulation of sensor data due to their fast execution times and accurate results. This paper provides a comprehensive review of the most up-to-date machine learning methods for detecting FDIAs against power system SE algorithms.