2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) 2020
DOI: 10.1109/smartgridcomm47815.2020.9302997
|View full text |Cite
|
Sign up to set email alerts
|

Deep Reinforcement Learning for DER Cyber-Attack Mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…Their scheme detects the voltage variances based on historical data and auto-adjusts the voltage of connected nodes to mitigate any malicious activity. Based on a similar technique of measuring the voltage variances, Ciaran et al [22] proposed a tool to predict future attacks on a node by comparing its performance statistics. In this model, the selected node uses deep reinforcement learning and its parameters are stored.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Their scheme detects the voltage variances based on historical data and auto-adjusts the voltage of connected nodes to mitigate any malicious activity. Based on a similar technique of measuring the voltage variances, Ciaran et al [22] proposed a tool to predict future attacks on a node by comparing its performance statistics. In this model, the selected node uses deep reinforcement learning and its parameters are stored.…”
Section: Related Workmentioning
confidence: 99%
“…Vincenzo's [15] and Ashutosh's [16] frameworks are performance friendly but these may not detect the hidden vulnerability as these models are based on a reactive approach rather than a proactive approach; where early detection of vulnerabilities is essential for securing the system. Likewise, in [20][21][22], IoT-and ICS-related threat detection and mitigation solutions were proposed to address specific network topologies. These solutions may not be extended to all types of nodes in hybrid networks.…”
Section: Gap Statementsmentioning
confidence: 99%
“…As shown in Fig. 1, in this paper, instead of controlling arbitrarily the parameters of the VV/VW curves, we only shift the value from the default value defining the curves [6,24]. The vector of actions a, output of the NN that approximates the optimum policy, is a function of the three-phase voltages at all, or part, of buses in the distribution system, which is the observation/input of the STGCN-DRL.…”
Section: B Drl Design For Vvcmentioning
confidence: 99%
“…The cyber attack is launched by translating the VV/VW curves and shifting η of the compromised smart inverter to induce an oscillation (the setup is borrowed from [6]). In Fig.…”
Section: B Full Observationsmentioning
confidence: 99%
See 1 more Smart Citation