A Deep Learning Game Theoretic Model for Defending Against Large Scale Smart Grid Attacks

被引:2
|
作者
Cunningham, James D. [1 ]
Aved, Alexander [2 ]
Ferris, David [2 ]
Morrone, Philip [2 ]
Tucker, Conrad S. [3 ,4 ,5 ,6 ]
机构
[1] Carnegie Mellon Univ, Dept Mech Engn, Pittsburgh, PA 15213 USA
[2] Air Force Res Lab, Informat Exploitat Div, Rome, NY 13441 USA
[3] Carnegie Mellon Univ, Dept Mech Engn, Pittsburgh, PA 15213 USA
[4] Carnegie Mellon Univ, Machine Learning Dept, Pittsburgh, PA 15213 USA
[5] Carnegie Mellon Univ, Robot Dept, Pittsburgh, PA 15213 USA
[6] Carnegie Mellon Univ, Biomed Engn Dept, Pittsburgh, PA 15213 USA
关键词
Games; Security; Power system protection; Power system faults; Topology; Smart grids; Network topology; Deep learning; game theory; cybersecurity; smart grid security; CYBER-SECURITY; POWER; FAILURES; LEVEL;
D O I
10.1109/TSG.2022.3199187
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Power grids that are interdependent with communication networks create more possible modes of failure (e.g., cyberattacks) as well as more complex propagation of failure through the coupled networks. To ensure robust defense of smart grids, it is important to model both attacker and defender as intelligent, a scenario that the framework of game theory provides methods to analyze. However, prior works in applying game theoretic models to smart grid security limit the problem space to a small number targets under threat due to the inability of state-of-the-art methods to scale to large networks. Our method scales to large networks by combining neural networks that use featurized action representations with an approximation of large combinatorial actions to generalize knowledge about the best targets to attack/defend across graphs of various topologies and sizes. Our model's invariance to the size of the input graph allows us to transfer knowledge from games played on small graphs during training to large graphs during evaluation. Our experiments show that our method can learn Nash equilibrium strategies on small networks, and demonstrate low exploitability when generalized to large networks, especially compared to the common heuristics currently used to simulate attacks on large graphs.
引用
收藏
页码:1188 / 1197
页数:10
相关论文
共 50 条
  • [1] A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources
    Zhang, Ming
    Zheng, Zizhan
    Shroff, Ness B.
    [J]. DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015, 2015, 9406 : 93 - 112
  • [2] A Game-Theoretic Model on Coalitional Attacks in Smart Grid
    Yang, Xinyu
    He, Xiaofei
    Lin, Jie
    Yu, Wei
    Yang, Qingyu
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 435 - 442
  • [3] Defending Against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-Based Approach
    An, Dou
    Yang, Qingyu
    Liu, Wenmao
    Zhang, Yang
    [J]. IEEE ACCESS, 2019, 7 : 110835 - 110845
  • [4] Defending AI Models Against Adversarial Attacks in Smart Grids Using Deep Learning
    Avelino Sampedro, Gabriel
    Ojo, Stephen
    Krichen, Moez
    Alamro, Meznah A.
    Mihoub, Alaeddine
    Karovic, Vincent
    [J]. IEEE Access, 2024, 12 : 157408 - 157417
  • [5] Defending against Energy Dispatching Data Integrity Attacks in Smart Grid
    He, Xiaofei
    Yang, Xinyu
    Lin, Jie
    Ge, Linqiang
    Yu, Wei
    Yang, Qingyu
    [J]. 2015 IEEE 34TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2015,
  • [6] Defending Deep Learning Models Against Adversarial Attacks
    Mani, Nag
    Moh, Melody
    Moh, Teng-Sheng
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2021, 13 (01): : 72 - 89
  • [7] Game Theoretic Study of Protecting MIMO Transmissions Against Smart Attacks
    Li, Yanda
    Xiao, Liang
    Dai, Huaiyu
    Poor, H. Vincent
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [8] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    M. Pilz
    F. Baghaei Naeini
    K. Grammont
    C. Smagghe
    M. Davis
    J.-C. Nebel
    L. Al-Fagih
    E. Pfluegel
    [J]. International Journal of Information Security, 2020, 19 : 427 - 443
  • [9] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    Pilz, M.
    Naeini, F. Baghaei
    Grammont, K.
    Smagghe, C.
    Davis, M.
    Nebel, J. -C.
    Al-Fagih, L.
    Pfluegel, E.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) : 427 - 443
  • [10] A Game-Theoretic Model for Defending Against Malicious Users in RecDroid
    Rashidi, Bahman
    Fung, Carol
    [J]. PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 1339 - 1344