Dynamic Graph-Based Anomaly Detection in the Electrical Grid

by   Shimiao Li, et al.

Given sensor readings over time from a power grid, how can we accurately detect when an anomaly occurs? A key part of achieving this goal is to use the network of power grid sensors to quickly detect, in real-time, when any unusual events, whether natural faults or malicious, occur on the power grid. Existing bad-data detectors in the industry lack the sophistication to robustly detect broad types of anomalies, especially those due to emerging cyber-attacks, since they operate on a single measurement snapshot of the grid at a time. New ML methods are more widely applicable, but generally do not consider the impact of topology change on sensor measurements and thus cannot accommodate regular topology adjustments in historical data. Hence, we propose DYNWATCH, a domain knowledge based and topology-aware algorithm for anomaly detection using sensors placed on a dynamic grid. Our approach is accurate, outperforming existing approaches by 20 running in less than 1.7ms on average per time tick per sensor on a 60K+ branch case using a laptop computer, and scaling linearly in the size of the graph.


page 1

page 2

page 3

page 4


Power System Anomaly Detection and Classification Utilizing WLS-EKF State Estimation and Machine Learning

Power system state estimation is being faced with different types of ano...

Inference of Tampered Smart Meters with Validations from Feeder-Level Power Injections

Tampering of metering infrastructure of an electrical distribution syste...

Network Theoretic Analysis of Maximum a Posteriori Detectors for Sensor Analysis and Design

In this paper we characterize the performance of a class of maximum-a-po...

Bad-Data Sequence Detection for Power System State Estimation via ICA-GAN

A deep learning approach to the detection of bad-data sequences in power...

Using Neural Networks to Detect Line Outages from PMU Data

We propose an approach based on neural networks and the AC power flow eq...

Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems

The first-ever Ukraine cyberattack on power grid has proven its devastat...

Distort to Detect, not Affect: Detecting Stealthy Sensor Attacks with Micro-distortion

In this paper, we propose an effective and easily deployable approach to...

Please sign up or login with your details

Forgot password? Click here to reset