ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION AND LOCALIZATION IN ACTIVE DISTRIBUTION SYSTEM
Main Article Content
Abstract
Since dispersed renewable energy sources are increasingly being integrated into the grid, developing a cyber security plan for active distribution systems has become more difficult. This article describes an approach to using electrical waveform analysis to identify and localise cyberattacks in distributed active distribution systems. The cornerstone for cyber attack detection is a sequential deep learning model, which allows the identification of even the slightest intrusions. The targeted cyberattack is initially localised inside the estimated cyberattack sub-region in a twostage process. We present a network splitting approach based on a modified form of spectral clustering for "coarse" localisation of hierarchical cyber-attacks. To further localise the origin of a cyber assault, it is advised to define a number of waveform parameters and apply a normalised effect score based on statistical metrics of the waves themselves. Finally, a thorough quantitative assessment based on two case studies demonstrates that the proposed framework yields accurate estimations in contrast to both classic and state-of-the-art methods.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
] Mehmood, A., Abbas, H., & Khan, S. (2018). A hierarchical intrusion detection system for power distribution
networks using decision trees. IEEE Access, 6, 29268-29280. Doi: 10.1109/ACCESS.2018.2846620
] Li, R. Xie, B. Yang, L. Guo, P. Ma, J. Shi, J. Ye, and W. Song, “Detection and identification of cyber and physical
attacks on distribution power grids with pvs: An online high-dimensional data-driven approach,” IEEE Journal of
Emerging and Selected Topics in Power Electronics, Early Access
] Li, G., Lu, Z., Wu, J., Liu, Y., & He, X. (2019). Anomaly detection in smart grids: A hierarchical approach. IEEE
Transactions on Smart Grid, 10(6), 6728-6739. doi: 10.1109/TSG.2018.2847337 .
] Ye, L. Guo, B. Yang, F. Li, L. Du, L. Guan, and W. Song, “Cyber–physical security of powertrain systems in
modern electric vehicles: Vulnerabilities, challenges, and future visions,” IEEE Journal of Emerging and Selected
Topics in Power Electronics, vol. 9, no. 4, pp. 4639–4657, 2021.
] Raza, S., Hameed, A., Tariq, M., & Ahmed, M. (2019). A hierarchical intrusion detection system for industrial
control networks using support vector machines. IEEE Access, 7, 30189-30201. doi: 10.1109/ACCESS.2019.2905985
] B. Wang, H. Wang, L. Zhang, D. Zhu, D. Lin, and S. Wan, “A data driven method to detect and localize the
single-phase grounding fault in distribution network based on synchronized phasor measurement,” EURASIP Journal
on Wireless Communications and Networking, vol. 2019, no. 1, p. 195, 2019.
] Y. He, G. J. Mendis, and J. Wei, “Real-time detection of false data injection attacks in smart grid: A deep learningbased intelligent mechanism,” IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2505–2516, 2017.
] Džafic, R. A. Jabr, S. Henselmeyer, and T. Ðonlagi ´ c, “Fault location ´ in distribution networks through graph
marking,” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 1345–1353, 2016.
] R. Bhargav, B. R. Bhalja, and C. P. Gupta, “Novel fault detection and localization algorithm for low voltage dc
micro grid,” IEEE Transactions on Industrial Informatics, 2019.
] Wu, G. Wang, J. Sun, and J. Chen, “Optimal partial feedback attacks in cyber-physical power systems,” IEEE
Transactions on Automatic Control, vol. 65, no. 9, pp. 3919–3926, 2020.
] Li, Y. Shi, A. Shinde, J. Ye, and W.-Z. Song, “Enhanced cyber physical security in internet of things through
energy auditing,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5224–5231, 2019.
] Wilson, D. R. Reising, R. W. Hay, R. C. Johnson, A. A. Karrar, and T. D. Loveless, “Automated identification
of electrical disturbance waveforms within an operational smart power grid,” IEEE Transactions on Smart Grid, vol.
, no. 5, pp. 4380– 4389, 2020.
] P. Dutta, A. Esmaeilian, and M. Kezunovic, “Transmission-line fault analysis using synchronized sampling,”
IEEE transactions on power delivery, vol. 29, no. 2, pp. 942–950, 2014.
] Sadeghkhani, M. E. H. Golshan, A. Mehrizi-Sani, J. M. Guerrero, and A. Ketabi, “Transient monitoring
function–based fault detection for inverter-interfaced micro grids,” IEEE Transactions on Smart Grid, vol. 9, no. 3,
pp. 2097–2107, 2016.
] Bastos, S. Santoso, W. Freitas, and W. Xu, “Synchrowaveform measurement units and applications,” in 2019
IEEE Power & Energy Society General Meeting (PESGM). IEEE, 2019, pp. 1–5.
] Schweitzer Engineering Laboratories, Pullman, WA, USA, “SEL-T400L Time Domain Line Protection,”
https://selinc.com/ products/T400L/, Last Access: July 31, 2020.
] Candura instruments, Oakville, ON, Canada. “IPSR intelligent Power System Recorder,”
https://www.candura.com/ products/ipsr.html, Last Access: July 31, 2020.
] D. Borkowski, A. Wetula, and A. Bien, “Contactless measurement of ´ substation bus bars voltages and
waveforms reconstruction using electric field sensors and artificial neural network,” IEEE Transactions on Smart Grid,
vol. 6, no. 3, pp. 1560–1569, 2014.
] B. Gao, R. Torquato, W. Xu, and W. Freitas, “Waveform-based method for fast and accurate identification of
sub synchronous resonance events,” IEEE Transactions on Power Systems, vol. 34, no. 5, pp. 3626–3636, 2019.
] Li, R. Xie, Z. Wang, L. Guo, J. Ye, P. Ma, and W. Song, “Online distributed iot security monitoring with
multidimensional streaming big data,” IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4387–4394, 2020.
] Li, A. Shinde, Y. Shi, J. Ye, X.-Y. Li, and W.-Z. Song, “System statistics learning-based iot security: Feasibility
and suitability,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6396–6403, 2019.
] F. Li, Q. Li, J. Zhang, J. Kou, J. Ye, W. Song, and H. A. Man tooth, “Detection and diagnosis of data integrity
attacks in solar farms based on multilayer long short-term memory network,” IEEE Transactions on Power Electronics,
vol. 36, no. 3, pp. 2495–2498, 2021.
] Wang and J. Shi, “Holistic modeling and analysis of multistage manufacturing processes with sparse effective
inputs and mixed profile outputs,” IISE Transactions, vol. 53, no. 5, pp. 582–596, 2021.
] Ye, L. Guo, B. Yang, F. Li, L. Du, L. Guan, and W. Song, “Cyber–physical security of powertrain systems in
modern electric vehicles: Vulnerabilities, challenges, and future visions,” IEEE Journal of Emerging and Selected
Topics in Power Electronics, vol. 9, no. 4, pp. 4639–4657, 2021.