An XGBoost-Based Vulnerability Analysis of Smart Grid Cascading Failures under Topology Attacks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

In interconnected industrial control networks like smart grids, topology attacks on physical grids can lead to severe cascading failures and large-scale blackouts. Effective defense on vulnerable devices can significantly reduce the risk of cascading failures and improve overall system robustness. In this paper, we investigate the vulnerability analysis problem from a graph theoretical classification perspective. By calculating a node vulnerability vector composed of features based on complex network theory, node embedding, extended betweenness and power flow distribution, we propose a node vulnerability analysis method based on XGBoost classifier. A cascading failure simulation model based on DC power flow is used to simulate the smart grid behaviours under topology attacks and create the dataset for the XGBoost classifier. The effectiveness of the proposed XGBoost-based method with newly-introduced features is demonstrated by case studies.

Original languageEnglish
Title of host publication2021 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages921-926
Number of pages6
ISBN (Electronic)9781665442077
DOIs
StatePublished - 2021
Event2021 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2021 - Melbourne, Australia
Duration: 17 Oct 202120 Oct 2021

Publication series

NameConference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
ISSN (Print)1062-922X

Conference

Conference2021 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2021
Country/TerritoryAustralia
CityMelbourne
Period17/10/2120/10/21

Fingerprint

Dive into the research topics of 'An XGBoost-Based Vulnerability Analysis of Smart Grid Cascading Failures under Topology Attacks'. Together they form a unique fingerprint.

Cite this