A data-driven algorithm to detect false data injections targeting both frequency regulation and market operation in power systems

Siddhartha Deb Roy, Sanjoy Debbarma*, Josep M. Guerrero

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

6 Citations (Scopus)

Abstract

This paper focuses on detecting cyber-attacks targeting the Automatic Generation Control (AGC) loop and market operation. To achieve this, a new data-driven learning algorithm is proposed that ensembles various learning tools such as K-Means clustering, Synthetic Minority Oversampling Technique oversampling, and Support Vector Data Description models as the base learners. Next, this paper devises a new feature variable, EF, which generates a relatively higher value for attack scenarios than normal grid states, thus aiding the classifier in predictions with low false alarms. The proposed approach can detect a wide range of cyber-attacks, including unseen attack cases. This paper further modelled and validated the detection of profit-oriented intelligent market operation attacks, absent in most of the previous works. Such attacks project themselves within the proximity of nominal grid states, making them difficult to predict. The algorithm's performance is finally compared with other learning models, and it is found that the proposed technique has superior prediction with True Positive Rate, True Negative Rate, and Geometric Accuracy as 98.13%, 99.85%, and 98.98%, respectively.

Original languageEnglish
Article number108409
JournalInternational Journal of Electrical Power and Energy Systems
Volume143
ISSN0142-0615
DOIs
Publication statusPublished - Dec 2022

Bibliographical note

Publisher Copyright:
© 2022 Elsevier Ltd

Keywords

  • AGC
  • Ensemble
  • FDI
  • Feature creation
  • Feature engineering
  • LFC
  • Machine learning
  • Market operation attacks
  • One class classifier
  • Power systems
  • SVDD

Fingerprint

Dive into the research topics of 'A data-driven algorithm to detect false data injections targeting both frequency regulation and market operation in power systems'. Together they form a unique fingerprint.

Cite this