The False data injection attack (FDIA) against the Cyber-Physical Power System (CPPS) is a kind of data integrity attack. With more and more cyber vulnerabilities detected out, different types of FDIAs are emerging as severe threats to the stable operation of CPPS gradually. In this paper, the invasion pathway of the FDIA against CPPS is explored in detail, and a novel FDIA detection model based on ensemble learning is further provided. First, a pseudo-sample database is built to assist the training and evaluation of this model, and it's more important to update the model in the future. Furthermore, the optimal feature set is extracted to characterize the behavior of the FDIA, which improves the precision of the FDIA detection model. Finally, a focal-loss-lightgbm (FLGB) ensemble classifier is constructed to detect the FDIA behavior automatically and accurately. We illustrated the performance of this model by a fusion of measurement data and power system audit logs. This model utilizes the offline training way, the conclusion shows the high precision and stability of this model, which ensures the stable operation of the smart grid and improves the FDIA resistance ability of the CPPS. INDEX TERMS CPPS, FDIA detection model, invasion pathway analysis, ensemble learning.
In the analysis of coordinated network attacks on electric power cyber-physical system (CPS), it is difficult to restore the complete attack path, and the intent of the attack cannot be identified automatically. A method is therefore proposed for the extracting patterns of coordinated network attacks on electric power CPS based on temporal-topological correlation. First, the attack events are aggregated according to the alarm log of the cyber space, and a temporal-causal Bayesian network-based cyber attack recognition algorithm is proposed to parse out the cyber attack sequences of the same attacker. Then, according to the characteristic curves of different attack measurement data in physical space, a combination of physical attack event criteria algorithm is designed to distinguish the types of physical attack events. Finally, physical attack events and cyber attack sequences are matched via temporal-topological correlation, frequent patterns of attack sequences are extracted, and hidden multi-step attack patterns are found from scattered grid measurement data and information from alarm logs. The effectiveness and efficiency of the proposed method are verified by the testbed at Mississippi State University. INDEX TERMS Cyber-physical system, attack pattern, temporal-topological correlation, fuzzy feature analysis, frequent pattern tree.
The problem of load fluctuation in the distribution network and increasing power grid cost input caused by the unpredictable behavior of electric vehicle (EV) users in response to electricity price is investigated in this paper. An optimization model method for the charging and discharging price of electric vehicles is proposed, considering the vehicle owner response and power grid cost. The rule of EV user travel is first analyzed, and the travel and battery state constraints are defined. Under the constraints of user charging and discharging behavior and battery characteristics, a user transfer rate and unit energy cost function is designed to construct a multi-objective model of charging and discharging price that minimizes electricity expenditure and avoids an increase in power grid investment. Finally, an improved multi-target fish swarm algorithm is presented to solve the model optimization problem. The example analysis shows that the proposed method can reduce the peak-valley load difference of the system and cost input of the power grid, as well as provide users with regulation ability to access the power grid at different time periods.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.