False Data Injection Attacks Detection Based on Stacking and MIC-DCXGB
<p>The behavior of FDIA.</p> "> Figure 2
<p>Stacking based FDIA detection method.</p> "> Figure 3
<p>IEEE-14 node system detection path diagram.</p> "> Figure 4
<p>Flowchart.</p> "> Figure 5
<p>IEEE-14 node system each state detection accuracy.</p> "> Figure 6
<p>IEEE-57 node system each state detection accuracy.</p> ">
Abstract
:1. Introduction
- This study proposes a defense strategy against False Data Injection based on Stacking and MIC-DCXGB. The Stacking method is used to detect whether FDIA exists in measurement samples; MIC is introduced for feature selection to address the high-dimensional redundancy of measurement data; and DCXGB classifies the status of each node to precisely localize attack locations.
- It sets up a two-layer detector framework to leverage positive feedback in information transmission, continually reducing errors in the predictive information learned by subsequent classifiers, thereby more accurately localizing FDIA.
- Specifically, MIC-XGB and the MIC-XGB that learns label correlations are used as the first and second-layer detectors, respectively, and defining this method as MIC-XGB with a “double-layer confidence” structure.
2. Principles of Related Models
2.1. Principles of False Data Injection Attack
2.2. The Principle of Stacking for False Data Detection
3. MIC-DCXGB
3.1. MIC-XGB Detector
3.2. MIC-DCXGB Detector
- (1)
- Low Complexity: Despite being a higher-order modeling approach, selective use of prediction information keeps the model simple, with minimal computational and spatial costs.
- (2)
- High Expandability: The method performs well and can be extended to any network size for FDIA detection problems.
- (3)
- Strong Interpretability: Based on “information theory”, both MIC feature selection and XGB classification offer a more rational explanation of predictions.
4. Results Verification
4.1. Base Learners and Meta-Learners
4.2. MIC Feature Selection Analysis
4.3. Attack Examples with Complete Information
4.4. Attack Examples with Partial Information
5. Conclusions
- The FDIA localization problem is transformed into a multi-label binary classification problem after detecting FDIA by our proposed method.
- This approach not only reduces the impact of feature redundancy on classifier performance and improves learning efficiency but also incorporates grid topology relationships to utilize label correlations.
- This enhancement strengthens the learning of samples with less reliable classifications, resulting in more precise and reliable detection outcomes.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Huang, B.; Li, Y.; Zhan, F.; Sun, Q.; Zhan, H. A Distributed Robust Economic Dispatch Strategy for Integrated Energy System Considering Cyber-Attacks. IEEE Trans. Ind. Inform. 2022, 18, 880–890. [Google Scholar] [CrossRef]
- Huang, B.; Zheng, S.; Wang, R.; Wang, H.; Xiao, J.; Wang, P. Distributed Optimal Control of DC Microgrid Considering Balance of Charge State. IEEE Trans. Energy Convers. 2022, 37, 2162–2174. [Google Scholar] [CrossRef]
- Li, Y.; Zhang, H.; Liang, X.; Huang, B. Event-triggered based distributed cooperative energy management for multienergy systems. IEEE Trans. Ind. Inform. 2019, 15, 2008–2022. [Google Scholar] [CrossRef]
- Liu, Z.; Huang, B.; Hu, X.; Du, P.; Sun, Q. Blockchain-Based Renewable Energy Trading Using Information Entropy Theory. IEEE Trans. Netw. Sci. Eng. 2023, 10, 1–12. [Google Scholar] [CrossRef]
- Li, Y.; Gao, D.W.; Gao, W.; Zhang, H.; Zhou, J. A Distributed Double-Newton Descent Algorithm for Cooperative Energy Management of Multiple Energy Bodies in Energy Internet. IEEE Trans. Ind. Inform. 2021, 17, 5993–6003. [Google Scholar] [CrossRef]
- Li, D.; Sun, Q.; Wang, R.; Sui, Z. Transient Stability Analysis and Enhancement of Inverter-Based Microgrid Considering Current Limitation. IEEE Trans. Power Electron. 2024, 10, 1109. [Google Scholar] [CrossRef]
- Wang, J.; Hui, L.C.; Yiu, S.M.; Wang, E.K.; Fang, J. A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitouscities. Pervasive Mob. Comput. 2017, 39, 52–64. [Google Scholar] [CrossRef]
- Chaojun, G.; Jirutitijaroen, P.; Motani, M. Detecting false data injection attacks in ac state estimation. IEEE Trans. Smart Grid 2015, 6, 2476–2483. [Google Scholar] [CrossRef]
- Li, Y.; Gao, D.W.; Gao, W.; Zhang, H.; Zhou, J. Double-Mode Energy Management for Multi-Energy System via Distributed Dynamic Event-Triggered Newton-Raphson Algorithm. IEEE Trans. Smart Grid 2020, 11, 5339–5356. [Google Scholar] [CrossRef]
- Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. Acm Trans. Inf. Syst. Secur. 2011, 14, 309–341. [Google Scholar] [CrossRef]
- Liu, X.; Li, Z. False data attacks against ac state estimation with incomplete network information. IEEE Trans. Smart Grid 2017, 8, 2239–2248. [Google Scholar] [CrossRef]
- Erjian, Y. Zero Residual Identification Method for Bad Data in Power System State Estimation. Electr. Power Technol. 1981, 66–73. [Google Scholar]
- Yong, S.Z.; Foo, M.Q.; Frazzoli, E. Robust and resilient estimation for Cyber-Physical Systems under adversarial attacks. In Proceedings of the 2016 American Control Conference (ACC), Boston, MA, USA, 6–8 July 2016; pp. 308–315. [Google Scholar]
- Wan, W.; Kim, H.; Hovakimyan, N.; Voulgaris, P.G. Attack-resilient Estimation for Linear Discrete-time Stochastic Systems with Input and State Constraints. In Proceedings of the 2019 IEEE 58th Conference on Decision and Control (CDC), Nice, France, 11–13 December 2019; pp. 5107–5112. [Google Scholar]
- Yang, S.; Tan, B.; Guo, J. Detection of False Data Injection Attacks in New Energy Internet Based on Double Markov Chains. Electr. Power Autom. Equip. 2021, 41, 131–137. [Google Scholar]
- Xue, W.; Wu, T. Active Learning-Based XGBoost for Cyber Physical System Against Generic AC False Data Injection Attacks. IEEE Access 2020, 8, 144575–144584. [Google Scholar] [CrossRef]
- Reshef, D.N.; Reshef, Y.A.; Finucane, H.K.; Grossman, S.R.; McVean, G.; Turnbaugh, P.J.; Lander, E.S.; Mitzenmacher, M.; Sabeti, P.C. Detecting Novel Associations in Large Data Sets. Science 2011, 334, 1518–1524. [Google Scholar] [CrossRef]
- Hu, R.; Ma, X.; Sun, B.; Wang, M.; Cheng, W.; Zhang, H.; Ye, H.; Tang, J.; Zheng, L. Transient Safety Assessment and Its Interpretability Based on Feature Selection. Power Syst. Technol. 2023, 47, 755–762. [Google Scholar]
- Zia, M.F.; Inayat, U.; Noor, W.; Pangracious; Benbouzid, M. Locational Detection of False Data Injection Based on Multilabel Machine Learning Attack in Smart Grid Classification Methods. In Proceedings of the 2023 IEEE IAS Global Conference on Renewable Energy and Hydrogen Technologies (GlobConHT), Male, Maldives, 11–12 March 2023; pp. 1–5. [Google Scholar]
- Liu, Z.; Huang, B.; Li, Y.; Sun, Q.; Pedersen, T.B.; Gao, D.W. Pricing Game and Blockchain for Electricity Data Trading in Low-Carbon Smart Energy Systems. IEEE Trans. Ind. Inform. 2024, 20, 6446–6456. [Google Scholar] [CrossRef]
- Wei, S.; Wu, Z.; Xu, J.; Hu, Q. Multiarea Probabilistic Forecasting-Aided Interval State Estimation for FDIA Identification in Power Distribution Networks. IEEE Trans. Ind. Inform. 2024, 20, 4271–4282. [Google Scholar] [CrossRef]
- Zhang, M.-L.; Zhou, Z.-H. A Review on Multi-Label L earning Algorithms. IEEE Trans. Knowl. Data Eng. 2014, 26, 1819–1837. [Google Scholar] [CrossRef]
- Huang, B.; Liu, L.; Zhang, H.; Li, Y.; Sun, Q. Distributed Optimal Economic Dispatch for Microgrids Considering Communication Delays. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1634–1642. [Google Scholar] [CrossRef]
- Fawcett, T. An introduction to ROC analysis. Pattern Recognit. Lett. 2006, 27, 861–874. [Google Scholar] [CrossRef]
- Huang, B.; Li, Y.; Zhang, H.; Sun, Q. Distributed optimal co-multi-microgrids energy management for energy internet. IEEE/CAA J. Autom. Sin. 2016, 3, 357–364. [Google Scholar] [CrossRef]
- Mohammadpourfard, M.; Weng, Y.; Genc, I.; Kim, T. An Accurate False Data Injection Attack (FDIA) Detection in Renewable-Rich Power Grids. In Proceedings of the 2022 10th Workshop on Modelling and Simulation of Cyber-Physical Energy Systems (MSCPES), Milan, Italy, 3 May 2022; pp. 1–5. [Google Scholar]
- Liu, Z.; Wang, D.; Wang, J.; Wang, X.; Li, H. A Blockchain-Enabled Secure Power Trading Mechanism for Smart Grid Employing Wireless Networks. IEEE Access 2020, 8, 177745–177756. [Google Scholar] [CrossRef]
- Verma, B.; Rahman, A. Cluster-Oriented Ensemble Classifier: Impact of Multicluster Characterization on Ensemble Classifier Learning. IEEE Trans. Knowl. Data Eng. 2012, 24, 605–618. [Google Scholar] [CrossRef]
- Liu, Z.; Xu, Y.; Zhang, C.; Elahi, H.; Zhou, X. A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles. Digit. Commun. Netw. 2022, 8, 976–983. [Google Scholar] [CrossRef]
Model | Accuracy | F1 Value | ROC-AUC |
---|---|---|---|
LR | 0.6202 | 0.5935 | 0.6203 |
KNN | 0.8457 | 0.8176 | 0.8458 |
SVM | 0.5753 | 0.2860 | 0.5755 |
RF | 0.9979 | 0.9979 | 0.9979 |
ET | 0.9992 | 0.9992 | 0.9992 |
XGB | 0.9764 | 0.9759 | 0.9764 |
LGB | 0.9949 | 0.9948 | 0.9949 |
Model | Q Values | |||
---|---|---|---|---|
LGB | 0.6440 | 0.9936 | 0.9917 | 0.9994 |
XGB | 0.5290 | 0.9890 | 0.9663 | 0.9994 |
ET | 0.9086 | 0.9907 | 0.9663 | 0.9917 |
RF | 0.5630 | 0.9907 | 0.9890 | 0.9936 |
KNN | 0.5630 | 0.9086 | 0.5290 | 0.6440 |
Model | Accuracy | F1 Value | ROC-AUC | Time/s |
---|---|---|---|---|
LR | 0.9994 | 0.9993 | 0.9994 | 24.1472 |
DT | 0.9856 | 0.9857 | 0.9857 | 28.3963 |
Model | Localization | Accuracy | Precision | Recall | F1 Value | AUC Value |
---|---|---|---|---|---|---|
MIC-DCXGB | 0.8688 | 0.9902 | 0.9890 | 0.9882 | 0.9886 | 0.9977 |
MIC-XGB | 0.8354 | 0.9798 | 0.9839 | 0.9688 | 0.9763 | 0.9962 |
CNN-XGB | 0.8333 | 0.9788 | 0.9811 | 0.9694 | 0.9752 | 0.9969 |
XGB | 0.8104 | 0.9724 | 0.9878 | 0.9476 | 0.9673 | 0.9954 |
DBN-ELM | 0.6042 | 0.9586 | 0.9703 | 0.9321 | 0.9508 | 0.9904 |
CNN | 0.4771 | 0.9466 | 0.9591 | 0.9148 | 0.9364 | 0.9873 |
Model | Localization | Accuracy | Precision | Recall | F1 Value | AUC Value |
---|---|---|---|---|---|---|
MIC-DCXGB | 0.5875 | 0.9785 | 0.9706 | 0.9677 | 0.9691 | 0.9950 |
MIC-XGB | 0.5104 | 0.9679 | 0.9622 | 0.9450 | 0.9535 | 0.9932 |
CNN-XGB | 0.4917 | 0.9672 | 0.9592 | 0.9444 | 0.9517 | 0.9923 |
XGB | 0.5063 | 0.9602 | 0.9549 | 0.9298 | 0.9422 | 0.9917 |
DBN-ELM | 0.1708 | 0.8926 | 0.8854 | 0.7943 | 0.8374 | 0.9367 |
CNN | 0.2125 | 0.8964 | 0.8869 | 0.7990 | 0.8406 | 0.9581 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Li, T.; Xia, T.; Zhang, H.; Liu, D.; Zhao, H.; Liu, Z. False Data Injection Attacks Detection Based on Stacking and MIC-DCXGB. Sustainability 2024, 16, 9692. https://doi.org/10.3390/su16229692
Li T, Xia T, Zhang H, Liu D, Zhao H, Liu Z. False Data Injection Attacks Detection Based on Stacking and MIC-DCXGB. Sustainability. 2024; 16(22):9692. https://doi.org/10.3390/su16229692
Chicago/Turabian StyleLi, Tong, Tian Xia, Haoming Zhang, Dongyang Liu, Hai Zhao, and Zhuolin Liu. 2024. "False Data Injection Attacks Detection Based on Stacking and MIC-DCXGB" Sustainability 16, no. 22: 9692. https://doi.org/10.3390/su16229692
APA StyleLi, T., Xia, T., Zhang, H., Liu, D., Zhao, H., & Liu, Z. (2024). False Data Injection Attacks Detection Based on Stacking and MIC-DCXGB. Sustainability, 16(22), 9692. https://doi.org/10.3390/su16229692