Abstract:We consider a bilevel attacker-defender problem to find the worst-case attack on the relays that control transmission grid components. The attacker infiltrates some number of relays and renders all of the components connected to them inoperable, with the goal of maximizing load shed. The defender responds by minimizing the resulting load shed, re-dispatching using a DC optimal power flow (DCOPF) problem on the remaining network. Though worst-case interdiction problems on the transmission grid have been studied… Show more
“…Due to the challenges inherent to this formulation, many solution approaches simplify the problem to yield a structure suited for single-level reformulation. The network flow model used in [11], for example, linearly relaxes the power flow equations in the lower-level problem. Conversely, the two new approaches presented in the next section of this paper train NNs with sampled solutions to the nonlinear lower-level problem (6c)-(6d) to preserve some of the nonlinear behavior and allow for fast online detection of multiple dangerous contingencies across a range of operation.…”
Section: The N − K Interdiction Problemmentioning
confidence: 99%
“…This section presents three approaches for solving the N − k interdiction problem ( 6): a state-of-the-art bilevel programming approach that uses a network flow relaxation of the power flow equations [11], a new approach that uses a NN reformulated as a MILP, and a new multi-step NN regression approach.…”
Section: Solution Approachesmentioning
confidence: 99%
“…As a benchmark, we consider the recently proposed approach in [11] that solves the N − k interdiction problem using a network flow relaxation of the power flow equations [17] in the lower-level problem. While the upper-level problem is similar to that of model ( 6), the lower-level problem is much simpler in that it (i) is linear, (ii) cannot remove other network components, and (iii) focuses only on minimizing the load shed.…”
“…Most formulations therefore rely on linearizing the lower-level problem, which can lead to "false positives" or "false negatives" when identifying dangerous contingencies [3], [8]- [11]. In essence, solving this problem involves a tradeoff between solution correctness and computational tractability.…”
Section: Introductionmentioning
confidence: 99%
“…We also consider a range of load variation, i.e., the factor by which loads may randomly vary from nominal values during training and run-time testing, in both of these approaches to make the predictions flexible to different load patterns and/or inclusion of distributed solar. We compare the performance of these new ML approaches to the state-of-the-art linearized bilevel optimization approach in [11]. The results demonstrate that the ML methods outperform this linearized approach at finding the most dangerous contingencies on average over several test cases and contingency sizes.…”
Power grids must be operated, designed, and maintained such that a small number of line failures will not result in significant load shedding. To identify problematic combinations of failures, we consider an N − k interdiction problem that seeks the set of k failed lines (out of N total lines) that result in the largest load shed. This is formulated as a bilevel optimization problem with an upper level representing the attacker that selects line failures and a lower level modeling the defender's generator redispatch. Compounding the difficulties inherent to the bilevel nature of interdiction problems, we consider a nonlinear AC power flow model that makes this problem intractable with traditional approaches. Furthermore, since the solutions found at a particular load condition may not generalize to other loading conditions, operators may need to quickly recompute these worst-case failures online to protect against them during operations. To address these challenges, we formulate and compare the performance of three simplified methods for solving the N − k interdiction problem: a state-of-the-art optimization approach based on a network-flow relaxation of the power flow equations and two newly developed machine learning (ML) algorithms that predict load sheds given the state of the network.
“…Due to the challenges inherent to this formulation, many solution approaches simplify the problem to yield a structure suited for single-level reformulation. The network flow model used in [11], for example, linearly relaxes the power flow equations in the lower-level problem. Conversely, the two new approaches presented in the next section of this paper train NNs with sampled solutions to the nonlinear lower-level problem (6c)-(6d) to preserve some of the nonlinear behavior and allow for fast online detection of multiple dangerous contingencies across a range of operation.…”
Section: The N − K Interdiction Problemmentioning
confidence: 99%
“…This section presents three approaches for solving the N − k interdiction problem ( 6): a state-of-the-art bilevel programming approach that uses a network flow relaxation of the power flow equations [11], a new approach that uses a NN reformulated as a MILP, and a new multi-step NN regression approach.…”
Section: Solution Approachesmentioning
confidence: 99%
“…As a benchmark, we consider the recently proposed approach in [11] that solves the N − k interdiction problem using a network flow relaxation of the power flow equations [17] in the lower-level problem. While the upper-level problem is similar to that of model ( 6), the lower-level problem is much simpler in that it (i) is linear, (ii) cannot remove other network components, and (iii) focuses only on minimizing the load shed.…”
“…Most formulations therefore rely on linearizing the lower-level problem, which can lead to "false positives" or "false negatives" when identifying dangerous contingencies [3], [8]- [11]. In essence, solving this problem involves a tradeoff between solution correctness and computational tractability.…”
Section: Introductionmentioning
confidence: 99%
“…We also consider a range of load variation, i.e., the factor by which loads may randomly vary from nominal values during training and run-time testing, in both of these approaches to make the predictions flexible to different load patterns and/or inclusion of distributed solar. We compare the performance of these new ML approaches to the state-of-the-art linearized bilevel optimization approach in [11]. The results demonstrate that the ML methods outperform this linearized approach at finding the most dangerous contingencies on average over several test cases and contingency sizes.…”
Power grids must be operated, designed, and maintained such that a small number of line failures will not result in significant load shedding. To identify problematic combinations of failures, we consider an N − k interdiction problem that seeks the set of k failed lines (out of N total lines) that result in the largest load shed. This is formulated as a bilevel optimization problem with an upper level representing the attacker that selects line failures and a lower level modeling the defender's generator redispatch. Compounding the difficulties inherent to the bilevel nature of interdiction problems, we consider a nonlinear AC power flow model that makes this problem intractable with traditional approaches. Furthermore, since the solutions found at a particular load condition may not generalize to other loading conditions, operators may need to quickly recompute these worst-case failures online to protect against them during operations. To address these challenges, we formulate and compare the performance of three simplified methods for solving the N − k interdiction problem: a state-of-the-art optimization approach based on a network-flow relaxation of the power flow equations and two newly developed machine learning (ML) algorithms that predict load sheds given the state of the network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.