Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning
<p>Network attack intrusion path.</p> "> Figure 2
<p>The execution process of the CIKS algorithm.</p> "> Figure 3
<p>The construction method of the pseudo sample database.</p> "> Figure 4
<p>The framework of the GBDT algorithm.</p> "> Figure 5
<p>LightGBM optimization strategy.</p> "> Figure 6
<p>The framework of the network attack detection method.</p> "> Figure 7
<p>The topology of a three-bus two-line transmission system.</p> "> Figure 8
<p>Sample statistics before and after sampling.</p> "> Figure 9
<p>Large sample classification report.</p> "> Figure 10
<p>Performance comparison of different algorithms.</p> "> Figure 11
<p>Complex network topology of a CPPS.</p> ">
Abstract
:1. Introduction
1.1. Background
- (1)
- Imbalanced datasets where the majority of samples are benign may lead to high rates of false alarms. To overcome the problem, a centralized SMOTE oversampling approach is presented to obtain sufficient network attack pseudo data and implement data balancing processing. The MRMR feature selection method is used to reduce the dimension of the data, reduce the training time of the network attack detection model, and improve the efficiency of network attack detection.
- (2)
- Based on the focal loss, a LightGBM-integrated learning classifier is built to correct errors during model iterations and increase the attention weights for misclassified samples. During the iterative process, the classification accuracy of such samples improves, increasing the efficiency of network attack and fault detection in general. The final attack detection rate is improved by 16.73%, and the precision is improved by 15.67%.
- (3)
- In the process of data flow transmission, the vulnerability index of each cyber-physical node is abstracted. Under the influence of network attacks, the vulnerability of the whole cyber-physical system is comprehensively quantified.
1.2. Related Works
2. Methodology
2.1. Analysis of Smart Grid Network Attack Path
2.2. Network Attack Path Analysis of Smart Grid
- (1)
- Clustering: based on the Kmeans clustering algorithm, clustering centers were determined in the minority sample space, and the minority samples were clustered into clusters according to the location of the cluster centers.
- (2)
- Filtering: Select clusters that participated in oversampling. The principle was that several clusters containing a large number of minority class samples participated in oversampling. After determining the clusters participating in the oversampling, we calculated the sampling weight of the clusters participating in the oversampling. The sampling weight determined the number of pseudo samples generated in the cluster. The clusters participating in the oversampling were given a sampling weight between 0 and 1. At the same time, the minority sample density lower clusters were assigned high sampling weights and generated more pseudo samples. The sampling weight depended on the ratio between the density of a single cluster and the average density of all selected clusters. The weight calculation steps are as follows:
- (a)
- For each filtered cluster , the Euclidean distance matrix between a few types of samples is calculated.
- (b)
- Add all the off-diagonal elements of the Euclidean distance matrix, and then divide by the number of non-diagonal elements to calculate the average minority sample distance for each cluster.
- (c)
- The minority sample number in each cluster is divided by the power of its average minority sample distance, and the density of the cluster is calculated as shown in Equation (1):
- (d)
- Calculate the sparse factor .
- (e)
- The sampling weight of each cluster is equal to the sparse factor of the cluster divided by the sum of the sparse factors of all clusters.
- (3)
- Sampling: after the sampling weight was determined, in the filtering stage, for clusters involved in sampling, oversampling was performed in turn. The oversampling is shown in Figure 3. A sample in the cluster was then randomly selected, and we performed a linear interpolation between the cluster center to generate a new sample. We looped the above steps until all pseudo samples in the cluster matched the weights determined in step (2), and the oversampling was ended.
2.3. Network Attack Detection Method Based on LightGBM
2.3.1. The Features of the LightGBM Algorithm
- (1)
- The mechanism that supports parallel training reduces the training time.
- (2)
- The algorithm supports a self-defined loss function, sets a reasonable loss function according to the business background, and constantly corrects errors in the iterative process, which improves the training precision.
- (3)
- The deep growth strategy controls the complexity of the model and reduces the risk of overfitting.
- (4)
- Data optimization uses the histogram algorithm to reduce model complexity.
2.3.2. The Improvement of the LightGBM Algorithm
2.4. Reliability Evaluation of Network Attack Detection Model
2.5. Network Attack Detection Model Construction
- (1)
- Collecting data based on a PMU, mainly including positive sequence, negative sequence, zero sequence voltage, current, and other continuous values, the average method is used to fill the missing value. The information layer data include discrete data such as relay logs, and structured heterogeneous data are constructed based on time.
- (2)
- To achieve data balancing, the number of samples to be sampled for each minority class of samples is established, and then pseudo samples are generated using the proposed CIKS algorithm and added to the original data. The minimum redundancy maximum relevance feature selection (MFS) algorithm is adopted to reduce the dimensionality and redundancy of the data.
- (3)
- The improved LightGBM classifier with focal loss function is trained on a balanced dataset to provide an autonomous network attack detection model, and the model’s performance is assessed on the test set.
- (4)
- Based on the results of network attack detection and cyber-physical topology, a reliability evaluation method of the network attack detection model is proposed. In the impact of network attacks, the method evaluates the risk of data interaction between cyber-physical nodes and obtains the final result based on the weighted average method. The weighted average approach is used to calculate the reliability quantification results of the final network attack identification model.
3. Example Analysis
3.1. Data Sources
- (1)
- The power system operates or maintains normally, and there is no network attack or failure state.
- (2)
- Fault: a small current ground fault occurs in the power system.
- (3)
- False data injection attack: the attacker tampered with the amount of data and bypassed the residual detection mechanism, which caused the dispatcher to lose normal control of the power system.
- (4)
- Remote tripping command injection attack: the attacker tampered with the control signal of the circuit breaker, so that the circuit breaker could not normally turn on and off.
- (5)
- Attack on fragile device attack: the attacker tampered with the relay settings so that the relay cannot be disconnected when the power system fails.
3.2. Performance Verification of Large Samples
3.2.1. Analysis of the Oversampling Effect
3.2.2. Analysis of Network Attack and Fault Detection Performance
3.2.3. Analysis of Network Attack Detection Performance
3.2.4. Analysis of Fault Detection Performance
3.3. Performance Comparison of Different Algorithms
3.4. Reliability Analysis of Network Attack Detection Model
4. Shortcomings
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Kim, S.H.; Park, S. CPS(Cyber-Physical System) based Manufacturing System Optimization. Procedia Comput. Sci. 2017, 122, 518–524. [Google Scholar] [CrossRef]
- Ran, W.; Kelly, T.P.; Hawkins, R.; Armengaud, E. DEIS: Dependability Engineering Innovation for Cyber-Physical Systems; Springer: Cham, Switzerland, 2017. [Google Scholar]
- Irmak, E.; Erkek, I. An overview of cyber-attack vectors on SCADA systems. In Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018. [Google Scholar]
- Che, L.; Liu, X.; Shuai, Z.; Li, Z.; Wen, Y. Cyber Cascades Screening Considering the Impacts of False Data Injection Attacks. IEEE Trans. Power Syst. 2018, 33, 6545–6556. [Google Scholar] [CrossRef]
- Giraldo, J.; Urbina, D.; Cardenas, A.; Valente, J.; Faisal, M.; Ruths, J.; Tippenhauer, N.O.; Sandberg, H.; Candell, R. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Comput. Surv. 2019, 51, 1–36. [Google Scholar] [CrossRef] [PubMed]
- Nateghi, S.; Shtessel, Y.; Edwards, C. Resilient control of cyber-physical systems under sensor and actuator attacks driven by adaptive sliding mode observer. Int. J. Robust Nonlinear Control 2021, 31, 7425–7443. [Google Scholar] [CrossRef]
- Shi, L.; Jian, Z. Vulnerability Assessment of Cyber Physical Power System Based on Dynamic Attack-defense Game Model. Autom. Electr. Power Syst. 2016, 40, 99–105. [Google Scholar]
- Jiang, Y.; Xu, A.; Zhang, Y.; Hong, C.; Cai, X. Anticipate Fault Sets Generation Methods for Cyber Physical Power System Considering Cyber-Attacks. In Proceedings of the 2020 12th IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), Nanjing, China, 20–23 September 2020; IEEE: Piscataway, NJ, USA, 2020. [Google Scholar]
- Cao, J.; Wang, D.; Qu, Z.; Cui, M.; Xu, P.; Xue, K.; Hu, K. A Novel False Data Injection Attack Detection Model of the Cyber-Physical Power System. IEEE Access 2020, 8, 95109–95125. [Google Scholar] [CrossRef]
- Wehenkel, L. Machine learning approaches to power-system security assessment. IEEE Expert 1997, 12, 60–72. [Google Scholar] [CrossRef] [Green Version]
- Hink, R.; Beaver, J.M.; Buckner, M.A.; Morris, T.; Adhikari, U.; Pan, S. Machine Learning for Power System Disturbance and Cyber-attack Discrimination. In Proceedings of the 7th International Symposium on Resilient Control Systems (ISRCS), Denver, CO, USA, 19–21 August 2014; IEEE: Piscataway, NJ, USA, 2014. [Google Scholar]
- Singh, N.K.; Mahajan, V. Analysis and Evaluation of Cyber-attack Impact on Critical Power System Infrastructure. Smart Sci. 2020, 9, 1–13. [Google Scholar] [CrossRef]
- Wang, D.; Wang, X.; Zhang, Y.; Jin, L. Detection of power grid disturbances and cyber-attacks based on machine learning. J. Inf. Secur. Appl. 2019, 46, 42–52. [Google Scholar] [CrossRef]
- Svetnik, V.; Wang, T.; Tong, C.; Liaw, A.; Sheridan, R.P.; Song, Q. Boosting: An ensemble learning tool for compound classification and QSAR modeling. J. Chem. Inf. Model. 2005, 45, 786. [Google Scholar] [CrossRef]
- Ganjkhani, M.; Fallah, S.N.; Badakhshan, S.; Shamshirband, S.; Chau, K.-W. A Novel Detection Algorithm to Identify False Data Injection Attacks on Power System State Estimation. Energies 2019, 12, 2209. [Google Scholar] [CrossRef] [Green Version]
- Xu, R.; Wang, R.; Guan, Z.; Wu, L.; Wu, J.; Du, X. Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid. IEEE Access 2017, 5, 13787–13798. [Google Scholar] [CrossRef]
- Zhao, J.; Zhang, G.; La Scala, M.; Dong, Z.Y.; Chen, C.; Wang, J. Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks. IEEE Trans. Smart Grid 2015, 8, 1580–1590. [Google Scholar] [CrossRef]
- Hu, Z.; Yong, W.; Tian, X.; Yang, X.; Meng, D.; Fan, R. False data injection attacks identification for smart grids. In Proceedings of the 2015 Third International Conference on Technological Advances in Electrical, Electronics and Computer Engineering(TAEECE), Beirut, Lebanon, 29 April–1 May 2015; IEEE: Piscataway, NJ, USA, 2015. [Google Scholar]
- Chaojun, G.; Jirutitijaroen, P.; Motani, M. Detecting False Data Injection Attacks in AC State Estimation. IEEE Trans. Smart Grid 2015, 6, 2476–2483. [Google Scholar] [CrossRef]
- Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter. IEEE Trans. Control Netw. Syst. 2014, 1, 370–379. [Google Scholar] [CrossRef]
- Ahmed, S.; Lee, Y.; Hyun, S.-H.; Koo, I. Feature Selection–Based Detection of Covert Cyber Deception Assaults in Smart Grid Communications Networks Using Machine Learning. IEEE Access 2018, 6, 27518–27529. [Google Scholar] [CrossRef]
- Mohammadpourfard, M.; Sami, A.; Seifi, A.R. A statistical unsupervised method against false data injection attacks: A visualization-based approach. Expert Syst. Appl. 2017, 84, 242–261. [Google Scholar] [CrossRef]
- Xue, D.; Jing, X.; Liu, H. Detection of False Data Injection Attacks in Smart Grid Utilizing ELM-Based OCON Framework. IEEE Access 2019, 7, 31762–31773. [Google Scholar] [CrossRef]
- James, J.Q.; Hou, Y.; Li, V.O.K. Online false data injection attack detection with wavelet transform and deep neural networks. IEEE Trans. Ind. Inform. 2018, 14, 3271–3280. [Google Scholar]
- Wang, T.; Yang, T.; Pan, X.; Meng, Y.; Li, H.; Chang, P. Network attack risk assessment of power grid CPS System based on attacker’s perspective. IOP Conf. Ser. Earth Environ. Sci. 2021, 675, 012161. [Google Scholar] [CrossRef]
- Wu, Y.; Weng, J.; Qiu, B.; Wei, Z.; Qian, F.; Deng, R.H. Random Delay Attack and Its Applications on Load Frequency Control of Power Systems. In Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing (DSC), Hangzhou, China, 18–20 November 2019; IEEE: Piscataway, NJ, USA, 2019. [Google Scholar]
- Mohsenian-Rad, A.-H.; Wong, V.W.S.; Jatskevich, J.; Schober, R.; Leon-Garcia, A. Autonomous Demand-Side Management Based on Game-Theoretic Energy Consumption Scheduling for the Future Smart Grid. IEEE Trans. Smart Grid 2010, 1, 320–331. [Google Scholar] [CrossRef] [Green Version]
- Li, J.; Yang, Y.; Sun, J.S.; Tomsovic, K.; Qi, H. ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems. In Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, Hong Kong, China, 7–11 June 2021. [Google Scholar]
- Li, B.; Wu, Y.; Song, J.; Lu, R.; Li, T.; Zhao, L. DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems. IEEE Trans. Ind. Inform. 2020, 17, 5615–5624. [Google Scholar] [CrossRef]
- Vuttipittayamongkol, P.; Elyan, E. Neighbourhood-based undersampling approach for handling imbalanced and overlapped data. Inf. Sci. 2019, 509, 47–70. [Google Scholar] [CrossRef]
- Last, F.; Douzas, G.; Bacao, F. Oversampling for imbalanced learning based on k-means and smote. arXiv 2017, arXiv:1711.00837. [Google Scholar]
- Wang, D.; Zhang, Y.; Zhao, Y. Lightgbm: An Effective miRNA Classification Method in Breast Cancer Patients. In Proceedings of the 2017 International Conference on Computational Biology and Bioinformatics, Newark, NJ, USA, 18–20 October 2017. [Google Scholar]
- Lin, T.Y.; Goyal, P.; Girshick, R.; He, K.; Dollar, P. Focal Loss for Dense Object Detection. IEEE Trans. Pattern Anal. Mach. Intell. 2017, 99, 2999–3007. [Google Scholar]
- Datasets. Available online: https://sites.google.com/a/uah.edu/tommy-morris-uah/ics-data-sets (accessed on 15 April 2014).
- Biggio, B.; Roli, F. Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning. In Proceedings of the 2018 ACM SIGSAC Conference, New York, NY, USA, 16–29 July 2018; ACM: New York, NY, USA, 2018. [Google Scholar]
- Apruzzese, G.; Andreolini, M.; Ferretti, L.; Marchetti, M.; Colajanni, M. Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems. ACM Digit. Threat. Res. Pract. 2021. [Google Scholar] [CrossRef]
- Apruzzese, G.; Andreolini, M.; Marchetti, M.; Colacino, V.G.; Russo, G. AppCon: Mitigating Evasion Attacks to ML Cyber Detectors. Symmetry 2020, 12, 653. [Google Scholar] [CrossRef] [Green Version]
Characteristic | Characteristic Description |
---|---|
PA1: VH–PA3: VH | Phase A–C Voltage Phase Angle |
PM1: V–PM3: V | Phase A–C Voltage Phase Magnitude |
PA4: IH–PA6: IH | Phase A–C Current Phase Angle |
PM4: I–PM6: I | Phase A–C Current Phase Magnitude |
PA7: VH–PA9: VH | Pos.–Neg.–Zero Voltage Phase Angle |
PM7: VH–PM9: VH | Pos.–Neg.–Zero Voltage Phase Magnitude |
PA10: VH–PA12: VH | Pos.–Neg.–Zero Current Phase Angle |
PM10: V–PM12: V | Pos.–Neg.–Zero Current Phase Magnitude |
F | Frequency for relays |
DF | Frequency Delta (df/dt) for relays |
PA: Z | Appearance Impedance for relays |
PA: ZH | Appearance Impedance Angle for relays |
S | Status Flag for relays |
Algorithm/Model | Accuracy | Precision | Recall | F1 Score |
---|---|---|---|---|
LightGBM | 0.7822 | 0.7778 | 0.7579 | 0.7662 |
CIS–LightGBM | 0.8879 | 0.8837 | 0.8842 | 0.8839 |
CIS–MFS–LightGBM | 0.9146 | 0.9097 | 0.9121 | 0.9109 |
CIS–MFS–FLGB | 0.9289 | 0.9345 | 0.9325 | 0.9335 |
Attack Type | Class | Traditional Precision | Improved Model Accuracy | Traditional F1 | Improved Model F1 |
---|---|---|---|---|---|
Data injection (FDIA) | 7–12 | 0.7518 | 0.9385 | 0.7084 | 0.9376 |
Remote tripping command injection (TRCJ) | 15–20 | 0.7473 | 0.9466 | 0.7326 | 0.9388 |
Relay setting change (RSC) | 21–30, 34–36 | 0.8286 | 0.9376 | 0.8211 | 0.9321 |
Fault Type and Cause | Class | Precision | F1 score |
---|---|---|---|
Fault from 10–19% (FLG) on L1 | 1 | 0.8814 | 0.9123 |
Fault from 20–79% (FLG) on L1 | 2 | 0.9286 | 0.9630 |
Fault from 80–90% (FLG) on L1 | 3 | 0.9091 | 0.8352 |
Fault from 10–19% (FLG) on L2 | 4 | 0.9792 | 0.9691 |
Fault from 20–79% (FLG) on L2 | 5 | 1.0000 | 1.0000 |
Fault from 80–90% (FLG) on L2 | 6 | 0.9091 | 0.9302 |
Fault from 10–19% (FDIA) on L1 | 7 | 0.7778 | 0.8235 |
Fault from 20–79% (FDIA) on L1 | 8 | 0.9189 | 0.9315 |
Fault from 80–90% (FDIA) on L1 | 9 | 0.9750 | 0.9398 |
Fault from 10–19% (FDIA) on L2 | 10 | 1.0000 | 1.0000 |
Fault from 20–79% (FDIA) on L2 | 11 | 1.0000 | 1.0000 |
Fault from 80–90% (FDIA) on L2 | 12 | 0.9592 | 0.9307 |
Fault (RSC) on L1 (RSC) on L1 | 0, 21–25, 33–36 | 0.9488 | 0.9409 |
Fault (RSC) on L2 (RSC) on L2 | 26–30 | 0.9194 | 0.9011 |
Average | — | 93.62% | 93.41% |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cao, J.; Wang, D.; Wang, Q.-M.; Yuan, X.-L.; Wang, K.; Chen, C.-L. Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning. Appl. Sci. 2022, 12, 6498. https://doi.org/10.3390/app12136498
Cao J, Wang D, Wang Q-M, Yuan X-L, Wang K, Chen C-L. Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning. Applied Sciences. 2022; 12(13):6498. https://doi.org/10.3390/app12136498
Chicago/Turabian StyleCao, Jie, Da Wang, Qi-Ming Wang, Xing-Liang Yuan, Kai Wang, and Chin-Ling Chen. 2022. "Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning" Applied Sciences 12, no. 13: 6498. https://doi.org/10.3390/app12136498
APA StyleCao, J., Wang, D., Wang, Q. -M., Yuan, X. -L., Wang, K., & Chen, C. -L. (2022). Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning. Applied Sciences, 12(13), 6498. https://doi.org/10.3390/app12136498