Electric Power ›› 2024, Vol. 57 ›› Issue (9): 32-43.DOI: 10.11930/j.issn.1004-9649.202312067

• Cross Domain Attack Threats and Defense Against Power Infrastructure • Previous Articles     Next Articles

Defense Methods for Adversarial Attacks Against Power CPS Data-Driven Algorithms

Weiping ZHU1(), Yi TANG2(), Xingshen WEI3(), Zengji LIU2()   

  1. 1. State Grid Jiangsu Electric Power Co., Ltd., Nanjing 210024, China
    2. School of Electrical Engineering, Southeast University, Nanjing 211189, China
    3. NARI Group Corporation (State Grid Electric Power Research Institute), Nanjing 211106, China
  • Received:2023-12-17 Accepted:2024-03-16 Online:2024-09-23 Published:2024-09-28
  • Supported by:
    This work is supported by Science and Technology Project of SGCC (Further Research on Key Technologies of Network Security Dynamic Defense for New Distribution Systems, No.5400-202340217A-1-1-ZN).

Abstract:

The integration of large-scale power electronic devices has introduced a large number of strong nonlinear measurement/control nodes into the system, gradually transforming the traditional power system into a cyber physical system (CPS). Many system problems that were originally solved by model-driven methods have had to be analyzed using data-driven algorithms due to limitations such as dimensional disasters. However, the inherent flaws of data-driven algorithms introduce new risks to the safe and stable operation of the system, which attackers can exploit to launch adversarial attacks that may cause system power outages and even instability. In response to the potential adversarial attacks on data-driven algorithms in power CPS, this paper proposes corresponding defense methods from such three aspects as abnormal data filtering and recovery, algorithm vulnerability mining and optimization, and algorithm self interpretability improvement: abnormal data filter, GAN-based vulnerability mining and optimization method, data knowledge fusion model and its training method. The effectiveness of the proposed method is verified through case analysis.

Key words: adversarial attacks, data-driven algorithms, power CPS, attack defense