Exploiting Vulnerabilities of Load Forecasting Through Adversarial Attacks

From MaRDI portal
Publication:6317150

arXiv1904.06606MaRDI QIDQ6317150

Author name not available (Why is that?)

Publication date: 13 April 2019

Abstract: Load forecasting plays a critical role in the operation and planning of power systems. By using input features such as historical loads and weather forecasts, system operators and utilities build forecast models to guide decision making in commitment and dispatch. As the forecasting techniques becomes more sophisticated, however, they also become more vulnerable to cybersecurity threats. In this paper, we study the vulnerability of a class of load forecasting algorithms and analyze the potential impact on the power system operations, such as load shedding and increased dispatch costs. Specifically, we propose data injection attack algorithms that require minimal assumptions on the ability of the adversary. The attacker does not need to have knowledge about the load forecasting model or the underlying power system. Surprisingly, our results indicate that standard load forecasting algorithms are quite vulnerable to the designed black-box attacks. By only injecting malicious data in temperature from online weather forecast APIs, an attacker could manipulate load forecasts in arbitrary directions and cause significant and targeted damages to system operations.




Has companion code repository: https://github.com/chennnnnyize/load_forecasts_attack








This page was built for publication: Exploiting Vulnerabilities of Load Forecasting Through Adversarial Attacks

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6317150)