DeepAI AI Chat
Log In Sign Up

Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach

09/14/2018
by   Mehmet Necip Kurt, et al.
Columbia University
0

Early detection of cyber-attacks is crucial for a safe and reliable operation of the smart grid. In the literature, outlier detection schemes making sample-by-sample decisions and online detection schemes requiring perfect attack models have been proposed. In this paper, we formulate the online attack/anomaly detection problem as a partially observable Markov decision process (POMDP) problem and propose a universal robust online detection algorithm using the framework of model-free reinforcement learning (RL) for POMDPs. Numerical studies illustrate the effectiveness of the proposed RL-based algorithm in timely and accurate detection of cyber-attacks targeting the smart grid.

READ FULL TEXT

page 1

page 2

page 3

page 4

02/28/2018

Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid

For a safe and reliable operation of the smart grid, timely detection of...
08/01/2021

A Sequential Supervised Machine Learning Approach for Cyber Attack Detection in a Smart Grid System

Modern smart grid systems are heavily dependent on Information and Commu...
05/25/2023

Bayesian Reinforcement Learning for Automatic Voltage Control under Cyber-Induced Uncertainty

Voltage control is crucial to large-scale power system reliable operatio...
09/14/2022

Detection of Smart Grid Integrity Attacks Using Signal Temporal Logic

Cyber-attacks can have severe impacts on critical infrastructures, from ...
11/09/2020

Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning

Adversary emulation is an offensive exercise that provides a comprehensi...
10/21/2021

Attack Detection and Localization in Smart Grid with Image-based Deep Learning

Smart grid's objective is to enable electricity and information to flow ...
08/16/2021

Using Cyber Terrain in Reinforcement Learning for Penetration Testing

Reinforcement learning (RL) has been applied to attack graphs for penetr...