Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit
Data
- URL: http://arxiv.org/abs/2209.12665v1
- Date: Wed, 21 Sep 2022 11:22:01 GMT
- Title: Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit
Data
- Authors: Yuval Abraham Regev, Henrik Vassdal, Ugur Halden, Ferhat Ozgur Catak,
Umit Cali
- Abstract summary: Using phasor measurement units (PMUs) to surveil the power system is one of the technologies that have a promising future.
The increased cyber-physical interaction offers both benefits and drawbacks, where one of the drawbacks comes in the form of anomalies in the measurement data.
This paper aims to develop a hybrid AI-based model that is based on various methods for anomaly detection in PMUs data.
- Score: 0.41998444721319217
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Over the last few decades, extensive use of information and communication
technologies has been the main driver of the digitalization of power systems.
Proper and secure monitoring of the critical grid infrastructure became an
integral part of the modern power system. Using phasor measurement units (PMUs)
to surveil the power system is one of the technologies that have a promising
future. Increased frequency of measurements and smarter methods for data
handling can improve the ability to reliably operate power grids. The increased
cyber-physical interaction offers both benefits and drawbacks, where one of the
drawbacks comes in the form of anomalies in the measurement data. The anomalies
can be caused by both physical faults on the power grid, as well as
disturbances, errors, and cyber attacks in the cyber layer. This paper aims to
develop a hybrid AI-based model that is based on various methods such as Long
Short Term Memory (LSTM), Convolutional Neural Network (CNN) and other relevant
hybrid algorithms for anomaly detection in phasor measurement unit data. The
dataset used within this research was acquired by the University of Texas,
which consists of real data from grid measurements. In addition to the real
data, false data that has been injected to produce anomalies has been analyzed.
The impacts and mitigating methods to prevent such kind of anomalies are
discussed.
Related papers
- Anomaly Detection in Power Grids via Context-Agnostic Learning [4.865842426618145]
Given time-series measurement values coming from a fixed set of sensors on the grid, can we identify anomalies in the network topology or measurement data?
Recent data-driven ML techniques have shown promise by using a combination of current and historical data for anomaly detection.
We propose a novel context-aware anomaly detection algorithm, GridCAL, that considers the effect of regular topology and load/generation changes.
arXiv Detail & Related papers (2024-04-11T16:37:01Z) - An Unsupervised Adversarial Autoencoder for Cyber Attack Detection in Power Distribution Grids [0.0]
This paper proposes an unsupervised adversarial autoencoder (AAE) model to detect false data injection attacks (FDIAs) in unbalanced power distribution grids.
The proposed method utilizes long short-term memory (LSTM) in the structure of the autoencoder to capture the temporal dependencies in the time-series measurements.
It is tested on IEEE 13-bus and 123-bus systems with historical meteorological data and historical real-world load data.
arXiv Detail & Related papers (2024-03-31T01:20:01Z) - Learning From High-Dimensional Cyber-Physical Data Streams for
Diagnosing Faults in Smart Grids [4.616703548353371]
Fault diagnosis in cyber-physical power systems is affected by data quality.
These systems generate massive amounts of data that overburden the system with excessive computational costs.
This paper presents the effect of feature engineering on mitigating the aforementioned challenges.
arXiv Detail & Related papers (2023-03-15T01:21:50Z) - A Robust and Explainable Data-Driven Anomaly Detection Approach For
Power Electronics [56.86150790999639]
We present two anomaly detection and classification approaches, namely the Matrix Profile algorithm and anomaly transformer.
The Matrix Profile algorithm is shown to be well suited as a generalizable approach for detecting real-time anomalies in streaming time-series data.
A series of custom filters is created and added to the detector to tune its sensitivity, recall, and detection accuracy.
arXiv Detail & Related papers (2022-09-23T06:09:35Z) - Ranking-Based Physics-Informed Line Failure Detection in Power Grids [66.0797334582536]
Real-time and accurate detecting of potential line failures is the first step to mitigating the extreme weather impact and activating emergency controls.
Power balance equations nonlinearity, increased uncertainty in generation during extreme events, and lack of grid observability compromise the efficiency of traditional data-driven failure detection methods.
This paper proposes a Physics-InformEd Line failure Detector (FIELD) that leverages grid topology information to reduce sample and time complexities and improve localization accuracy.
arXiv Detail & Related papers (2022-08-31T18:19:25Z) - Self-Supervised and Interpretable Anomaly Detection using Network
Transformers [1.0705399532413615]
This paper introduces the Network Transformer (NeT) model for anomaly detection.
NeT incorporates the graph structure of the communication network in order to improve interpretability.
The presented approach was tested by evaluating the successful detection of anomalies in an Industrial Control System.
arXiv Detail & Related papers (2022-02-25T22:05:59Z) - Convolutional generative adversarial imputation networks for
spatio-temporal missing data in storm surge simulations [86.5302150777089]
Generative Adversarial Imputation Nets (GANs) and GAN-based techniques have attracted attention as unsupervised machine learning methods.
We name our proposed method as Con Conval Generative Adversarial Imputation Nets (Conv-GAIN)
arXiv Detail & Related papers (2021-11-03T03:50:48Z) - TELESTO: A Graph Neural Network Model for Anomaly Classification in
Cloud Services [77.454688257702]
Machine learning (ML) and artificial intelligence (AI) are applied on IT system operation and maintenance.
One direction aims at the recognition of re-occurring anomaly types to enable remediation automation.
We propose a method that is invariant to dimensionality changes of given data.
arXiv Detail & Related papers (2021-02-25T14:24:49Z) - Multi-Source Data Fusion for Cyberattack Detection in Power Systems [1.8914160585516038]
We show that fusing information from multiple data sources can help identify cyber-induced incidents and reduce false positives.
We perform multi-source data fusion for training IDS in a cyber-physical power system testbed.
Results are presented using the proposed data fusion application to infer False Data and Command injection-based Man-in- The-Middle attacks.
arXiv Detail & Related papers (2021-01-18T06:34:45Z) - Contextual-Bandit Anomaly Detection for IoT Data in Distributed
Hierarchical Edge Computing [65.78881372074983]
IoT devices can hardly afford complex deep neural networks (DNN) models, and offloading anomaly detection tasks to the cloud incurs long delay.
We propose and build a demo for an adaptive anomaly detection approach for distributed hierarchical edge computing (HEC) systems.
We show that our proposed approach significantly reduces detection delay without sacrificing accuracy, as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-04-15T06:13:33Z) - Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing [71.86955275376604]
We propose an adaptive anomaly detection approach for hierarchical edge computing (HEC) systems to solve this problem.
We design an adaptive scheme to select one of the models based on the contextual information extracted from input data, to perform anomaly detection.
We evaluate our proposed approach using a real IoT dataset, and demonstrate that it reduces detection delay by 84% while maintaining almost the same accuracy as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-01-10T05:29:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.