Surrogate Gradient-based Deep Reinforcement Learning for Power System Post-contingency Safety Control Against Cyber-attacks

被引:0
|
作者
Zhu, Jizhong [1 ]
Huang, Linying [1 ]
Chen, Yixi [1 ]
机构
[1] School of Electric Power Engineering, South China University of Technology, Guangdong, Guangzhou,510641, China
来源
关键词
Computer viruses - Cyber attacks - Reinforcement learning;
D O I
10.13335/j.1000-3673.pst.2024.0643
中图分类号
学科分类号
摘要
To address the security and stability problem of power systems in the restoration process after cyber-attacks while coping with environmental uncertainties, a surrogate gradient-based deep reinforcement learning for power system post-contingency safety control strategy against cyber-attacks is proposed in this paper. First, the cyber-attack models against information system data and functions are established, and the system security control model is constructed. The evolution process of system events under cyber-attacks is analyzed. Second, the Markov decision process of the security control strategy is defined under the framework of deep reinforcement learning. Then, a surrogate gradient-based deep reinforcement learning algorithm is designed, where the agent population is generated by perturbing the agent parameters, and the weighted average of the fitness values corresponding to each perturbation is used as the surrogate gradient. Finally, the effectiveness and superiority of the proposed method are verified on the IEEE 39-bus system. © 2024 Power System Technology Press. All rights reserved.
引用
收藏
页码:4041 / 4049
相关论文
共 50 条
  • [1] Safety securing approach against cyber-attacks for process control system
    Hashimoto, Yoshihiro
    Toyoshima, Takeshi
    Yogo, Shuichi
    Koike, Masato
    Hamaguchi, Takashi
    Jing, Sun
    Koshijima, Ichiro
    COMPUTERS & CHEMICAL ENGINEERING, 2013, 57 : 181 - 186
  • [2] Detection of Cyber-Attacks in a Discrete Event System Based on Deep Learning
    Ding, Sichen
    Liu, Gaiyun
    Yin, Li
    Wang, Jianzhou
    Li, Zhiwu
    MATHEMATICS, 2024, 12 (17)
  • [3] An IoT-Based Deep Learning Approach for Online Fault Detection Against Cyber-Attacks
    Rajkumar S.
    Sheeba S.L.
    Sivakami R.
    Prabu S.
    Selvarani A.
    SN Computer Science, 4 (4)
  • [4] Deep Machine Learning Model-Based Cyber-Attacks Detection in Smart Power Systems
    Almalaq, Abdulaziz
    Albadran, Saleh
    Mohamed, Mohamed A.
    MATHEMATICS, 2022, 10 (15)
  • [5] A Cooperative Control Strategy against Cyber-attacks for Power System with High Penetration Wind Farm
    Yang, Kai
    Li, Jian
    Zhang, Guangdou
    Xing, Yankai
    Bamisile, Olusola
    Huang, Qi
    2022 4TH ASIA ENERGY AND ELECTRICAL ENGINEERING SYMPOSIUM (AEEES 2022), 2022, : 321 - 327
  • [6] Reliable Deep Learning and IoT-Based Monitoring System for Secure Computer Numerical Control Machines Against Cyber-Attacks With Experimental Verification
    Tran, Minh-Quang
    Elsisi, Mahmoud
    Liu, Meng-Kun
    Vu, Viet Q.
    Mahmoud, Karar
    Darwish, Mohamed M. F.
    Abdelaziz, Almoataz Y.
    Lehtonen, Matti
    IEEE ACCESS, 2022, 10 : 23186 - 23197
  • [7] Multi-Agent Graph-Attention Deep Reinforcement Learning for Post-Contingency Grid Emergency Voltage Control
    Zhang, Ying
    Yue, Meng
    Wang, Jianhui
    Yoo, Shinjae
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (03) : 3340 - 3350
  • [8] An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks
    Abu Al-Haija, Qasem
    Zein-Sabatto, Saleh
    ELECTRONICS, 2020, 9 (12) : 1 - 26
  • [9] A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems
    Wu Wang
    Fouzi Harrou
    Benamar Bouyeddou
    Sidi-Mohammed Senouci
    Ying Sun
    Cluster Computing, 2022, 25 : 561 - 578
  • [10] A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems
    Wang, Wu
    Harrou, Fouzi
    Bouyeddou, Benamar
    Senouci, Sidi-Mohammed
    Sun, Ying
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 561 - 578