Automatic Generation Control (AGC) systems in smart grids are increasingly vulnerable to cyber-attacks, particularly False Data Injection (FDI) attacks, due to their reliance on information and communication technologies. These vulnerabilities pose significant threats to the reliable operation of power systems. To address this challenge, this research paper introduces the machine learning (ML) based cyberattack detection technique designed to identify FDI attacks with the highest accuracy proficiently. The study involves a comprehensive analysis of three features: the original discrete signal feature, the cycle-to-cycle-based feature, and the sample-to-sample-based feature. These features are utilized for detecting FDI attacks and distinguishing them from normal load variations. The research meticulously collects data by simulating diverse FDI attacks, including step attacks, pulse attacks, random attacks, and normal load variation cases on an AGC power system. Four ML classifiers are selected and compared for the classification task. The simulation results reveal that the sample-to-sample-based feature proves highly effective in distinguishing FDI attacks compared to the original signal and cycle-to-cycle-based features. Notably, the results indicate that the random subspace ensemble (RaSE) classifier, utilizing sample-to-sample-based features, effectively identifies and classifies all normal and FDI attacks. This research provides valuable insights into the potential of ML techniques for enhancing FDI attack detection in the AGC of power systems. It provides a potential pathway for overcoming the limitations associated with traditional model-based FDI detection methods.
Read full abstract