Training Strategies for Autoencoder-based Detection of False Data Injection Attacks

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

2 Citations (Scopus)
40 Downloads (Pure)

Abstract

The security of energy supply in a power grid critically depends on the ability to accurately estimate the state of the system. However, manipulated power flow measurements can potentially hide overloads and bypass the bad data detection scheme to interfere the validity of estimated states. In this paper, we use an autoencoder neural network to detect anomalous system states and investigate the impact of hyperparameters on the detection performance for false data injection attacks that target power flows. Experimental results on the IEEE 118 bus system indicate that the proposed mechanism has the ability to achieve satisfactory learning efficiency and detection accuracy.
Original languageEnglish
Title of host publication2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe)
Subtitle of host publicationProceedings
PublisherIEEE
Pages1-5
Number of pages5
ISBN (Electronic)978-1-7281-7100-5
ISBN (Print)978-1-7281-7101-2
DOIs
Publication statusPublished - 2020
Event10th IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2020 - Virtual/online event due to COVID-19, Delft, Netherlands
Duration: 26 Oct 202028 Oct 2020
Conference number: 10
https://ieee-isgt-europe.org/

Conference

Conference10th IEEE PES Innovative Smart Grid Technologies Europe, ISGT-Europe 2020
Abbreviated titleISGT-Europe 2020
Country/TerritoryNetherlands
CityDelft
Period26/10/2028/10/20
OtherVirtual/online event due to COVID-19
Internet address

Bibliographical note

"Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public."

Keywords

  • Anomaly detection
  • autoencoder
  • false data injection attack
  • hyperparameter tuning

Fingerprint

Dive into the research topics of 'Training Strategies for Autoencoder-based Detection of False Data Injection Attacks'. Together they form a unique fingerprint.

Cite this