4.7 Article

A data-driven approach to anomaly detection and vulnerability dynamic analysis for large-scale integrated energy systems

Journal

ENERGY CONVERSION AND MANAGEMENT
Volume 234, Issue -, Pages -

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.enconman.2021.113926

Keywords

Integrated energy system; Anomaly detection; Vulnerability analysis; Data-driven; Complex network theory

Funding

  1. National Natural Science Foundation of China [51904316]
  2. China University of Petroleum, Beijing [2462020YXZZ045]

Ask authors/readers for more resources

The study introduces a method to detect anomalies in an integrated energy system and analyze the system's vulnerability. By combining anomaly detection and complex network theory modeling, the approach effectively exposes security vulnerabilities in the system.
In an integrated energy system (IES), the operating state of each energy subsystem changes relatively frequently, which can seriously threaten the security of IES operation. A systematic data-driven approach is proposed for detecting anomalies and analyzing the dynamics of IES vulnerability. Firstly, an anomaly detection method is introduced to determine whether there are anomalies in the system operation. The method can be set up even if the data labels for discriminating the anomalies are unknown, often the cause in practice. Secondly, a method of complex network phase theory is proposed to model information propagation among IES nodes representative of the IES physical entities. Complex network models can then be constructed to describe the system behavior in different operating conditions and over different time horizons. The degree centrality, betweenness centrality, and closeness centrality are used as indications to analyze changes in IES vulnerability. Finally, a method is proposed to identify the critical points of the IES from the point of view of its vulnerability. The new approach is applied to analyze the vulnerability of an IES in Spain. The results show that the proposed methods allow revealing system anomalies, vulnerability and weaknesses. Outcomes from an analysis by these methods can be used by managers to take defensive measures in advance for preventing and mitigating the impact of potential factors and threats on the IES.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available