Network Cascade Vulnerability using Constrained Bayesian Optimization

04/27/2023
by   Albert Lam, et al.
0

Measures of power grid vulnerability are often assessed by the amount of damage an adversary can exact on the network. However, the cascading impact of such attacks is often overlooked, even though cascades are one of the primary causes of large-scale blackouts. This paper explores modifications of transmission line protection settings as candidates for adversarial attacks, which can remain undetectable as long as the network equilibrium state remains unaltered. This forms the basis of a black-box function in a Bayesian optimization procedure, where the objective is to find protection settings that maximize network degradation due to cascading. Extensive experiments reveal that, against conventional wisdom, maximally misconfiguring the protection settings of all network lines does not cause the most cascading. More surprisingly, even when the degree of misconfiguration is resource constrained, it is still possible to find settings that produce cascades comparable in severity to instances where there are no constraints.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/30/2019

Black-box Adversarial Attacks with Bayesian Optimization

We focus on the problem of black-box adversarial attacks, where the aim ...
research
06/17/2022

Query-Efficient and Scalable Black-Box Adversarial Attacks on Discrete Sequential Data via Bayesian Optimization

We focus on the problem of adversarial attacks against models on discret...
research
05/11/2020

Upper Trust Bound Feasibility Criterion for Mixed Constrained Bayesian Optimization with Application to Aircraft Design

Bayesian optimization methods have been successfully applied to black bo...
research
09/19/2020

EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks

With the boom of edge intelligence, its vulnerability to adversarial att...
research
05/17/2019

Simple Black-box Adversarial Attacks

We propose an intriguingly simple method for the construction of adversa...
research
06/06/2018

Simulating the stochastic dynamics and cascade failure of power networks

For large-scale power networks, the failure of particular transmission l...
research
02/07/2018

Click Spam Prevention Model for On-Line Advertisement

This paper shows a vulnerability of the pay-per-click accounting of Goog...

Please sign up or login with your details

Forgot password? Click here to reset