ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION AND LOCALIZATION IN ACTIVE DISTRIBUTION SYSTEM

Main Article Content

MURALI Ponaganti

Abstract

Since dispersed renewable energy sources are increasingly being integrated into the grid, developing a cyber security plan for active distribution systems has become more difficult. This article describes an approach to using electrical waveform analysis to identify and localise cyberattacks in distributed active distribution systems. The cornerstone for cyber attack detection is a sequential deep learning model, which allows the identification of even the slightest intrusions. The targeted cyberattack is initially localised inside the estimated cyberattack sub-region in a twostage process. We present a network splitting approach based on a modified form of spectral clustering for "coarse" localisation of hierarchical cyber-attacks. To further localise the origin of a cyber assault, it is advised to define a number of waveform parameters and apply a normalised effect score based on statistical metrics of the waves themselves. Finally, a thorough quantitative assessment based on two case studies demonstrates that the proposed framework yields accurate estimations in contrast to both classic and state-of-the-art methods.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Ponaganti, M. . (2020). ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION AND LOCALIZATION IN ACTIVE DISTRIBUTION SYSTEM. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 11(2), 1139–1148. https://doi.org/10.61841/turcomat.v11i2.14507
Section
Research Articles

References

] Mehmood, A., Abbas, H., & Khan, S. (2018). A hierarchical intrusion detection system for power distribution

networks using decision trees. IEEE Access, 6, 29268-29280. Doi: 10.1109/ACCESS.2018.2846620

] Li, R. Xie, B. Yang, L. Guo, P. Ma, J. Shi, J. Ye, and W. Song, “Detection and identification of cyber and physical

attacks on distribution power grids with pvs: An online high-dimensional data-driven approach,” IEEE Journal of

Emerging and Selected Topics in Power Electronics, Early Access

] Li, G., Lu, Z., Wu, J., Liu, Y., & He, X. (2019). Anomaly detection in smart grids: A hierarchical approach. IEEE

Transactions on Smart Grid, 10(6), 6728-6739. doi: 10.1109/TSG.2018.2847337 .

] Ye, L. Guo, B. Yang, F. Li, L. Du, L. Guan, and W. Song, “Cyber–physical security of powertrain systems in

modern electric vehicles: Vulnerabilities, challenges, and future visions,” IEEE Journal of Emerging and Selected

Topics in Power Electronics, vol. 9, no. 4, pp. 4639–4657, 2021.

] Raza, S., Hameed, A., Tariq, M., & Ahmed, M. (2019). A hierarchical intrusion detection system for industrial

control networks using support vector machines. IEEE Access, 7, 30189-30201. doi: 10.1109/ACCESS.2019.2905985

] B. Wang, H. Wang, L. Zhang, D. Zhu, D. Lin, and S. Wan, “A data driven method to detect and localize the

single-phase grounding fault in distribution network based on synchronized phasor measurement,” EURASIP Journal

on Wireless Communications and Networking, vol. 2019, no. 1, p. 195, 2019.

] Y. He, G. J. Mendis, and J. Wei, “Real-time detection of false data injection attacks in smart grid: A deep learningbased intelligent mechanism,” IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2505–2516, 2017.

] Džafic, R. A. Jabr, S. Henselmeyer, and T. Ðonlagi ´ c, “Fault location ´ in distribution networks through graph

marking,” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 1345–1353, 2016.

] R. Bhargav, B. R. Bhalja, and C. P. Gupta, “Novel fault detection and localization algorithm for low voltage dc

micro grid,” IEEE Transactions on Industrial Informatics, 2019.

] Wu, G. Wang, J. Sun, and J. Chen, “Optimal partial feedback attacks in cyber-physical power systems,” IEEE

Transactions on Automatic Control, vol. 65, no. 9, pp. 3919–3926, 2020.

] Li, Y. Shi, A. Shinde, J. Ye, and W.-Z. Song, “Enhanced cyber physical security in internet of things through

energy auditing,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5224–5231, 2019.

] Wilson, D. R. Reising, R. W. Hay, R. C. Johnson, A. A. Karrar, and T. D. Loveless, “Automated identification

of electrical disturbance waveforms within an operational smart power grid,” IEEE Transactions on Smart Grid, vol.

, no. 5, pp. 4380– 4389, 2020.

] P. Dutta, A. Esmaeilian, and M. Kezunovic, “Transmission-line fault analysis using synchronized sampling,”

IEEE transactions on power delivery, vol. 29, no. 2, pp. 942–950, 2014.

] Sadeghkhani, M. E. H. Golshan, A. Mehrizi-Sani, J. M. Guerrero, and A. Ketabi, “Transient monitoring

function–based fault detection for inverter-interfaced micro grids,” IEEE Transactions on Smart Grid, vol. 9, no. 3,

pp. 2097–2107, 2016.

] Bastos, S. Santoso, W. Freitas, and W. Xu, “Synchrowaveform measurement units and applications,” in 2019

IEEE Power & Energy Society General Meeting (PESGM). IEEE, 2019, pp. 1–5.

] Schweitzer Engineering Laboratories, Pullman, WA, USA, “SEL-T400L Time Domain Line Protection,”

https://selinc.com/ products/T400L/, Last Access: July 31, 2020.

] Candura instruments, Oakville, ON, Canada. “IPSR intelligent Power System Recorder,”

https://www.candura.com/ products/ipsr.html, Last Access: July 31, 2020.

] D. Borkowski, A. Wetula, and A. Bien, “Contactless measurement of ´ substation bus bars voltages and

waveforms reconstruction using electric field sensors and artificial neural network,” IEEE Transactions on Smart Grid,

vol. 6, no. 3, pp. 1560–1569, 2014.

] B. Gao, R. Torquato, W. Xu, and W. Freitas, “Waveform-based method for fast and accurate identification of

sub synchronous resonance events,” IEEE Transactions on Power Systems, vol. 34, no. 5, pp. 3626–3636, 2019.

] Li, R. Xie, Z. Wang, L. Guo, J. Ye, P. Ma, and W. Song, “Online distributed iot security monitoring with

multidimensional streaming big data,” IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4387–4394, 2020.

] Li, A. Shinde, Y. Shi, J. Ye, X.-Y. Li, and W.-Z. Song, “System statistics learning-based iot security: Feasibility

and suitability,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6396–6403, 2019.

] F. Li, Q. Li, J. Zhang, J. Kou, J. Ye, W. Song, and H. A. Man tooth, “Detection and diagnosis of data integrity

attacks in solar farms based on multilayer long short-term memory network,” IEEE Transactions on Power Electronics,

vol. 36, no. 3, pp. 2495–2498, 2021.

] Wang and J. Shi, “Holistic modeling and analysis of multistage manufacturing processes with sparse effective

inputs and mixed profile outputs,” IISE Transactions, vol. 53, no. 5, pp. 582–596, 2021.

] Ye, L. Guo, B. Yang, F. Li, L. Du, L. Guan, and W. Song, “Cyber–physical security of powertrain systems in

modern electric vehicles: Vulnerabilities, challenges, and future visions,” IEEE Journal of Emerging and Selected

Topics in Power Electronics, vol. 9, no. 4, pp. 4639–4657, 2021.