Detecting and Mitigating Data Integrity Attacks on Distributed Algorithms for Optimal Power Flow using Machine Learning
dc.contributor.author | Harris, Rachel | |
dc.contributor.author | Molzahn, Daniel | |
dc.date.accessioned | 2023-12-26T18:39:52Z | |
dc.date.available | 2023-12-26T18:39:52Z | |
dc.date.issued | 2024-01-03 | |
dc.identifier.doi | 10.24251/HICSS.2023.382 | |
dc.identifier.isbn | 978-0-9981331-7-1 | |
dc.identifier.other | 2e2f2001-f803-48fa-94b5-1df855a5adeb | |
dc.identifier.uri | https://hdl.handle.net/10125/106765 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 57th Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Resilient Networks | |
dc.subject | cybersecurity | |
dc.subject | data integrity attack | |
dc.subject | distributed optimization | |
dc.subject | optimal power flow | |
dc.title | Detecting and Mitigating Data Integrity Attacks on Distributed Algorithms for Optimal Power Flow using Machine Learning | |
dc.type | Conference Paper | |
dc.type.dcmi | Text | |
dcterms.abstract | Using distributed algorithms, multiple computing agents can coordinate their operations by jointly solving optimal power flow problems. However, cyberattacks on the data communicated among agents may maliciously alter the behavior of a distributed algorithm. To improve cybersecurity, this paper proposes a machine learning method for detecting and mitigating data integrity attacks on distributed algorithms for solving optimal power flow problems. In an offline stage with trustworthy data, agents train and share machine learning models of their local subproblems. During online execution, each agent uses the trained models from neighboring agents to detect cyberattacks using a reputation system and then mitigate their impacts. Numerical results show that this method reliably, accurately, and quickly detects data integrity attacks and effectively mitigates their impacts to achieve near-feasible and near-optimal operating points. | |
dcterms.extent | 10 pages | |
prism.startingpage | 3170 |
Files
Original bundle
1 - 1 of 1