Skip to main content

Detection of False Data Injection Cyber-Attack in Smart Grid by Convolutional Neural Network-Based Deep Learning Technique

  • Conference paper
  • First Online:
Security, Privacy and Data Analytics

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 848))

Abstract

Electric Power Grid is getting evolved with the aid of advanced sensors, modern communication system, and cutting-edge computation capabilities enabling smart grid operations. At the same time, it is getting more vulnerable to cyberattack such as False Data Injection Attack (FDIA). The critical control process of smart power grid depends on correct State Estimation (SE). A FDIA targets the measurements which are used to calculate SE, thus result in erroneous SE calculation. This results in disrupting the control system, causing havoc to the power transmission. An attacker with some information of the system may perform FDIA which cannot be detected by conventional threshold-based detection system. So, Machine Learning (ML)-based systems are being proposed for detection of FDIA. In this paper, some ML-based models, e.g., Support Vector Machines (SVM), Light Gradient Boosting Machine (LGBM) are prepared, tuned and their performance are tested. Some Deep Learning (DL)-based models, e.g., Convolutional Neural Network (CNN), Artificial Neural Network (ANN) are also experimented with. The CNN models show better results, so a number of configurations are tested on. Finally, a CNN-based model is proposed for detection of FDIA in smart grid in this paper. The models are tested on data related to IEEE 14 BUS. The results of the experiment represent that the proposed Deep Learning-based CNN model can detect FDIA in electric power grid with high accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang S, Bi S, Zhang YA (2020) Locational detection of the false data injection attack in a smart grid: a multilabel classification approach. IEEE Internet Things J 7(9):8218–8227. https://doi.org/10.1109/jiot.2020.2983911.Author F, Author S (2016) Title of a proceedings paper. In: Editor F, Editor S (eds) Conference 2016, LNCS, vol 9999, pp 1–13. Springer, Heidelberg

  2. Gai K, Xu K, Lu Z, Qiu M, Zhu L (2019) Fusion of cognitive wireless networks and edge computing. IEEE Wirel Commun 26(3):69–75

    Article  Google Scholar 

  3. The ‘Air gap’ between IT & OT is disappearing, & we're not ready to manage the risk. (26 Feb 2019). Infosecurity Magazine. https://www.infosecurity-magazine.com/infosec/air-gap-between-it-and-ot-1-1-1-1/

  4. McLaughlin S, Konstantinou C, Wang X, Davi L, Sadeghi A, Maniatakos M, Karri R (2016) The cybersecurity landscape in industrial control systems. Proc IEEE 104(5):1039–1057. https://doi.org/10.1109/jproc.2015.2512235

    Article  Google Scholar 

  5. Haque NI, Shahriar MH, Dastgir MG, Debnath A, Parvez I, Sarwat A, Rahman MA (2020) Machine learning in generation, detection, and mitigation of cyberattacks in smart grid: a survey. arXiv:2010.00661

  6. Schellenberger C, Zhang P (2017) Detection of covert attacks on cyber-physical systems by extending the system dynamics with an auxiliary system. In: 2017 IEEE 56th annual conference on decision and control (CDC). IEEE, pp 1374–1379

    Google Scholar 

  7. Ford V, Siraj A, Eberle W (2014) Smart grid energy fraud detection using artificial neural networks. In: 2014 IEEE symposium on computational intelligence applications in smart grid (CIASG). IEEE, pp 1–6

    Google Scholar 

  8. Vijayanand R, Devaraj D, Kannapiran B (2019) A novel deep learning based intrusion detection system for smart meter communication network. In: 2019 IEEE international conference on intelligent techniques in control, optimization and signal processing (INCOS). IEEE, pp 1–3

    Google Scholar 

  9. Dutta S (2021) Cyber attacks on power grid: 10 power assets, Mumbai, Tamil Nadu ports came under RedEcho cyberattack|India business news—Times of India. The Times of India. https://timesofindia.indiatimes.com/business/india-business/10-power-assets-mumbai-tamil-nadu-ports-came-under-redecho-cyberattack/articleshow/81337328.cms. Accessed 5 Mar 2021

  10. Maharashtra cyber police suspects cyber attack behind Mumbai power outage. (2021) Hindustan Times. https://www.hindustantimes.com/cities/mumbai-news/maharashtra-cyber-police-suspects-cyber-attack-behind-mumbai-power-outage-101614654439868.html. Accessed 2 Mar 2021

  11. Decoding motives behind the Kudankulam intrusion (2019) Hindustan Times. https://www.hindustantimes.com/analysis/decoding-motives-behind-the-kudankulam-intrusion/story-c3odQAUqOT1nDgjOMFQRPK.html. Accessed 22 Nov 2019

  12. Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14(1):1–33. https://doi.org/10.1145/1952982.1952995

    Article  Google Scholar 

  13. Rahman MA, Mohsenian-Rad H (2013) False data injection attacks against nonlinear state estimation in smart power grids. In: 2013 IEEE power & energy society general meeting. https://doi.org/10.1109/pesmg.2013.6672638

  14. Chakhchoukh Y, Liu S, Sugiyama M, Ishii H (2016) Statistical outlier detection for diagnosis of cyber attacks in power state estimation. In: 2016 IEEE power and energy society general meeting (PESGM). https://doi.org/10.1109/pesgm.2016.7741572

  15. Esmalifalak M, Liu L, Nguyen N, Zheng R, Han Z (2017) Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst J 11(3):1644–1652. https://doi.org/10.1109/jsyst.2014.2341597

    Article  Google Scholar 

  16. Wang Y, Amin MM, Fu J, Moussa HB (2017) A novel data analytical approach for false data injection cyber-physical attack mitigation in smart grids. IEEE Access 5:26022–26033

    Article  Google Scholar 

  17. Chakhchoukh Y, Liu S, Sugiyama M, Ishii H (2016) Statistical outlier detection for diagnosis of cyber attacks in power state estimation. In: 2016 IEEE power and energy society general meeting (PESGM). IEEE, pp 1–5

    Google Scholar 

  18. Wang H, Ruan J, Wang G, Zhou B, Liu Y, Fu X, Peng J (2018) Deep learning-based interval state estimation of AC smart grids against sparse cyber attacks. IEEE Trans Industr Inf 14(11):4766–4778

    Article  Google Scholar 

  19. Ashrafuzzaman M, Chakhchoukh Y, Jillepalli AA, Tosic PT, de Leon DC, Sheldon FT, Johnson BK (2018) Detecting stealthy false data injection attacks in power grids using deep learning. In: 2018 14th international wireless communications & mobile computing conference (IWCMC). IEEE, pp 219–225

    Google Scholar 

  20. Niu X, Li J, Sun J, Tomsovic K (2019) Dynamic detection of false data injection attack in smart grid using deep learning. In: 2019 IEEE power & energy society innovative smart grid technologies conference (ISGT). IEEE, pp 1–6

    Google Scholar 

  21. Wang S, Bi S, Zhang YJA (2020) Locational detection of the false data injection attack in a smart grid: a multilabel classification approach. IEEE Int Things J 7(9):8218–8227

    Article  Google Scholar 

  22. Suthaharan S (2016) Support vector machine. In: Machine learning models and algorithms for big data classification. Springer, Boston, MA, pp 207–235

    Google Scholar 

  23. Prashant111 (2020) SVM classifier tutorial. Kaggle: Your Machine Learning and Data Science Community. https://www.kaggle.com/prashant111/svm-classifier-tutorial?scriptVersionId=30116289. Accessed 13 Mar 2020

  24. Ke G, Meng Q, Finley T, Wang T, Chen W, Ma W, Liu TY (2017) Lightgbm: a highly efficient gradient boosting decision tree. Adv Neural Inf Process Syst 30:3146–3154

    Google Scholar 

  25. Prashant111 (2020) LightGBM classifier in Python. Kaggle: Your Machine Learning and Data Science Community. https://www.kaggle.com/prashant111/lightgbm-classifier-in-python. Accessed 21 July 2020

  26. Wasserman PD, Schwartz T (1988) Neural networks. II. What are they and why is everybody so interested in them now? In: IEEE Expert, vol 3, no 1. Spring, pp 10–15

    Google Scholar 

  27. Saha, Sumit (2018) A comprehensive guide to convolutional neural networks—the ELI5 Way. Medium, Towards Data Science, 15 Dec 2018, https://towardsdatascience.com/a-comprehensive-guide-to-convolutional-neural-networks-the-eli5-way-3bd2b1164a53

  28. Bhandare A, Bhide M, Gokhale P, Chandavarkar R (2016) Applications of convolutional neural networks. Int J Comput Sci Inf Technol 7(5):2206–2215

    Google Scholar 

  29. Szegedy C, Liu W, Jia Y, Sermanet P, Reed S, Anguelov D, Erhan D, Vanhoucke V, Rabinovich A (2015) Going deeper with convolutions. In: 2015 IEEE conference on computer vision and pattern recognition (CVPR). https://doi.org/10.1109/cvpr.2015.7298594

  30. Study of Reducing Computational Complexity of CNNs by Ranking the Features According to Their Importance—Department of Electrical Engineering Department of Electrical Engineering—Indian Institute of Technology Madras, http://www.ee.iitm.ac.in/event/study-of-reducing- computational-complexity-of-cnns-by-ranking-the- features-according-to-their-importance. Accessed 2 May 2019

  31. Khapra MM, CS7015 (Deep Learning): Convolutional Neural Networks, LeNet, AlexNet, ZF- Net, VGGNet, GoogLeNet and ResNet. https://www.cse.iitm.ac.in/~miteshk/CS7015/Slides/Teaching/pdf/Lecture11.pdf

  32. University of Washington, Power System Test Case Archive. http://www.ee.washington.edu/research/pstca/.

  33. http://www.ece.uah.edu/~thm0009/icsdatasets/PowerSystem_Dataset_README.pdf

  34. Confusion matrix (2004) Wikipedia, the free encyclopedia. https://en.wikipedia.org/wiki/Confusion_matrix. Accessed 15 June 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anupam Khan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khan, A. (2022). Detection of False Data Injection Cyber-Attack in Smart Grid by Convolutional Neural Network-Based Deep Learning Technique. In: Rao, U.P., Patel, S.J., Raj, P., Visconti, A. (eds) Security, Privacy and Data Analytics. Lecture Notes in Electrical Engineering, vol 848. Springer, Singapore. https://doi.org/10.1007/978-981-16-9089-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-9089-1_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-9088-4

  • Online ISBN: 978-981-16-9089-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics