Abstract
In interconnected industrial control networks like smart grids, topology attacks on physical grids can lead to severe cascading failures and large-scale blackouts. Effective defense on vulnerable devices can significantly reduce the risk of cascading failures and improve overall system robustness. In this paper, we investigate the vulnerability analysis problem from a graph theoretical classification perspective. By calculating a node vulnerability vector composed of features based on complex network theory, node embedding, extended betweenness and power flow distribution, we propose a node vulnerability analysis method based on XGBoost classifier. A cascading failure simulation model based on DC power flow is used to simulate the smart grid behaviours under topology attacks and create the dataset for the XGBoost classifier. The effectiveness of the proposed XGBoost-based method with newly-introduced features is demonstrated by case studies.
| Original language | English |
|---|---|
| Title of host publication | 2021 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2021 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 921-926 |
| Number of pages | 6 |
| ISBN (Electronic) | 9781665442077 |
| DOIs | |
| State | Published - 2021 |
| Event | 2021 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2021 - Melbourne, Australia Duration: 17 Oct 2021 → 20 Oct 2021 |
Publication series
| Name | Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics |
|---|---|
| ISSN (Print) | 1062-922X |
Conference
| Conference | 2021 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2021 |
|---|---|
| Country/Territory | Australia |
| City | Melbourne |
| Period | 17/10/21 → 20/10/21 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 7 Affordable and Clean Energy
Fingerprint
Dive into the research topics of 'An XGBoost-Based Vulnerability Analysis of Smart Grid Cascading Failures under Topology Attacks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver