Towards Detecting Stealthy Attacks in Power Grid using Deep - - PowerPoint PPT Presentation

towards detecting stealthy attacks in power grid using
SMART_READER_LITE
LIVE PREVIEW

Towards Detecting Stealthy Attacks in Power Grid using Deep - - PowerPoint PPT Presentation

Towards Detecting Stealthy Attacks in Power Grid using Deep Learning Mohammad Ashrafuzzaman, Yacine Chakhchoukh and Frederick T. Sheldon Departments of Computer Science and Electrical & Computer Engineering, University of Idaho, Moscow


slide-1
SLIDE 1

Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security | cred-c.org

Towards Detecting Stealthy Attacks in Power Grid using Deep Learning

Mohammad Ashrafuzzaman, Yacine Chakhchoukh and Frederick T. Sheldon Departments of Computer Science and Electrical & Computer Engineering, University of Idaho, Moscow

slide-2
SLIDE 2

cred-c.org | 2

Stealthy Data Integrity Attacks

  • Surreptitiously changing data
  • Intelligently and incognito
  • Fooling the SCADA operators
  • Cumulative ripple effect can be disastrous
slide-3
SLIDE 3

cred-c.org | 3

Insider Threat

slide-4
SLIDE 4

cred-c.org | 4

Outside Attacker

slide-5
SLIDE 5

Stealthy Attacks in Power Grid

  • Get access to one or more SCADA control Centers (in a Substation)
  • Modify actual measurement data to deceive operators

Detection Mechanism:

  • Find anomalous data pattern
slide-6
SLIDE 6

cred-c.org | 6

Statistical and Machine Learning Approaches

  • Statistical Methods
  • Weighted Least Squares
  • Least Trimmed Squares
  • Chi Squares
  • And more
  • Machine Learning Methods
  • Distance Ratio Estimator
  • K-Nearest Neighbor
  • Support vector Machines
  • And more
slide-7
SLIDE 7

Deep Learning Based Approach

  • Deep Learning is being used for predictive analytics and anomaly

detection in many different and diverse areas.

  • Why not then to detect bad data in power grid!
slide-8
SLIDE 8

cred-c.org | 8

So Many Deep Learning Methods

  • Stacked Auto-Encoder
  • Deep Belief Network
  • Deep/Restricted Boltzmann Machine
  • Convolutional Neural Network
  • Recurrent Neural Network
  • And many more!!

Each of these have variations on the theme.

slide-9
SLIDE 9

cred-c.org | 9

Preprocessing

  • Need to pre-process data before applying deep learning method
  • For example: For selecting appropriate predictors or features
slide-10
SLIDE 10

cred-c.org | 10

So Many Methods Again

  • Random Forest Classifier or Regressor
  • Principal Component Analysis (PCA)
  • Quadratic Discriminant Analysis (QDA)
  • Regularized Discriminant Analysis (RDA)
  • Linear Discriminant Analysis (LDA)
  • Even, unsupervised deep learning
slide-11
SLIDE 11

cred-c.org | 11

More Variations

  • Each of these methods can further be fine-tuned and optimized by

varying the hyper-parameter values

slide-12
SLIDE 12

cred-c.org | 12

How to Measure

  • Use Confusion Matrix
slide-13
SLIDE 13

cred-c.org | 13

How to Measure

  • Metrics to Evaluate
  • Accuracy

[(TP+TN)/Total]

  • Precision

[TP/(FP+TP)/Total]

  • Recall

[TP/(FN+TP)/Total], aka, Detection rate

  • False Positive Rate

[FP/(FP+TN)/Total]

  • Misclassification Rate

[(FP+FN)/Total]

  • Specificity

[TN/(TN+FP)]

  • Prevalence

[(FP+TN)/Total]

  • Execution Time
  • Time for Training
  • Time for real-time detection
slide-14
SLIDE 14

cred-c.org | 14

The Matrix

  • Perform an experiment with
  • a feature selection method
  • a deep learning method
  • A set of hyper-parameter values
  • Tabulate the performance metrics
  • Repeat with changing one of the three above

Will yield a comparison matrix

slide-15
SLIDE 15

cred-c.org | 15

IEEE 14-Bus System

slide-16
SLIDE 16

cred-c.org | 16

Data Set

  • Power Grid SCADA dataset:
  • 40 active power-flows
  • 14 active power-injections and
  • 68 reactive power and voltage measurements.
  • 10,000 sets of measurement data
  • 1 bus is compromised
  • Attack simulated by randomly modifying data at slack Bus
slide-17
SLIDE 17

cred-c.org | 17

Feature Selection

  • Random Forest Classifier
slide-18
SLIDE 18

cred-c.org | 18

Anomaly Detection

  • Stacked Autoencoder
  • Feedforward
  • 4 hidden layers
  • 50 hidden cells in each hidden layer
  • Tanh activation function
  • 50 epochs
  • 0.005 learning rate
  • 70%-30% train-test split
slide-19
SLIDE 19

cred-c.org | 19

Performance Matrix

slide-20
SLIDE 20

http://cred-c.org @credcresearch facebook.com/credcresearch/

Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security