2019
DOI: 10.1109/access.2019.2902910
|View full text |Cite
|
Sign up to set email alerts
|

Detection of False Data Injection Attacks in Smart Grid Utilizing ELM-Based OCON Framework

Abstract: False data injection (FDI) attacks, as a new class of cyberattacks, bring a severe threat to the security and reliable operation of the smart grid by damaging the state estimation of the power system. To address this issue, an extreme learning machine (ELM)-based one-class-one-network (OCON) framework is proposed for detecting the FDI attacks in this paper. Under this framework, to effectively detect bus-based FDI attacks and identify the bus node being attacked, the subnets of state identification layer in OC… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 89 publications
(43 citation statements)
references
References 41 publications
0
43
0
Order By: Relevance
“…This kind of method doesn't need to solve complex time-domain equations of the power system, and clear performance indicators can be used to evaluate the performance, it is one of the current main FDIA detection methods. This type of method mainly includes support vector machine (SVM) [18], extreme learning machine [19], fuzzy C-means clustering [20], deep learning [21], ensemble learning, etc., [22]. The detection performance of traditional supervised learning algorithms such as SVM depends on the quality of the data heavily, such as the poor characterization ability of the feature set will cause a low detection rate.…”
Section: The Detection Methods Based On Machine Learningmentioning
confidence: 99%
“…This kind of method doesn't need to solve complex time-domain equations of the power system, and clear performance indicators can be used to evaluate the performance, it is one of the current main FDIA detection methods. This type of method mainly includes support vector machine (SVM) [18], extreme learning machine [19], fuzzy C-means clustering [20], deep learning [21], ensemble learning, etc., [22]. The detection performance of traditional supervised learning algorithms such as SVM depends on the quality of the data heavily, such as the poor characterization ability of the feature set will cause a low detection rate.…”
Section: The Detection Methods Based On Machine Learningmentioning
confidence: 99%
“…This can be done by using the kernel-independent component analysis to map the restricted data into a new Jacobian matrix, through which the undetectable attack is modeled [139]. [140] proposed an extreme learning machine (ELM) technique based on one-class-one-network (OCON) framework to detect any cyber threat on the AC state estimation. FDIA attacks are detected using Kullback-Leibler Distance in [141], where the accuracy of the detection mechanism is influenced by the predefined thresholds.…”
Section: A Fdia Detectionmentioning
confidence: 99%
“…In recent years, cyber attacks have become a hot topic in power system studies. In [21], a detection model based on extreme learning machine was proposed to test and identify FDI attacks. A DSEbased risk mitigation strategy was presented for eliminating threat levels from cyber attacks in [22].…”
Section: Introductionmentioning
confidence: 99%