THE SIGNIFICANCE OF LOCALIZATION AND ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION IN AN ACTIVE DISTRIBUTION SYSTEM
Main Article Content
Abstract
The increasing integration of distributed renewable energy sources into the grid has made it more challenging to design a cyber security plan for active distribution networks. This article outlines a method for locating and identifying cyberattacks in distributed active distribution systems using electrical waveform analysis. A sequential deep learning model is the foundation for cyber attack detection since it can identify even the smallest incursions. In a two-stage approach, the targeted cyberattack is first localized inside the estimated cyberattack sub-region. We introduce a network splitting strategy for "coarse" localization of hierarchical cyberattacks, based on a modified version of spectral clustering. It is recommended to create several waveform parameters and apply a normalised effect score based on statistical metrics of the waves themselves in order to further localise the origin of a cyberattack.Lastly, a comprehensive quantitative evaluation based on two case studies shows that, in comparison to both traditional and cutting-edge approaches, the suggested framework produces reliable estimations. Suggested Search Terms: Support Vector Machine, Random Forest, Logistic Regression, Gradient Boosting, and Cyber Attack Detection.
Downloads
Metrics
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
] Mehmood, A., Abbas, H., & Khan, S.
(2018). A hierarchical intrusion detection
system for power distribution networks
using decision trees. IEEE Access, 6, 29268-
Doi:
1109/ACCESS.2018.2846620
] Li, R. Xie, B. Yang, L. Guo, P. Ma, J.
Shi, J. Ye, and W. Song, “Detection and
identification of cyber and physical attacks
on distribution power grids with pvs: An
online high-dimensional data-driven
approach,” IEEE Journal of Emerging and
Selected Topics in Power Electronics, Early
Access
] Li, G., Lu, Z., Wu, J., Liu, Y., & He, X.
(2019). Anomaly detection in smart grids: A
hierarchical approach. IEEE Transactions on
Smart Grid, 10(6), 6728-6739. doi:
1109/TSG.2018.2847337 .
] Ye, L. Guo, B. Yang, F. Li, L. Du, L.
Guan, and W. Song, “Cyber–physical
security of powertrain systems in modern
electric vehicles: Vulnerabilities, challenges,
and future visions,” IEEE Journal of
Emerging and Selected Topics in Power
Electronics, vol. 9, no. 4, pp. 4639–4657,
] Raza, S., Hameed, A., Tariq, M., &
Ahmed, M. (2019). A hierarchical intrusion
detection system for industrial control
networks using support vector machines.
IEEE Access, 7, 30189-30201. doi:
1109/ACCESS.2019.2905985
] B. Wang, H. Wang, L. Zhang, D. Zhu,
D. Lin, and S. Wan, “A data driven method
to detect and localize the single-phase
grounding fault in distribution network
based on synchronized phasor
measurement,” EURASIP Journal on Wireless Communications and Networking,
vol. 2019, no. 1, p. 195, 2019.
] Y. He, G. J. Mendis, and J. Wei, “Realtime detection of false data injection attacks
in smart grid: A deep learning-based
intelligent mechanism,” IEEE Transactions
on Smart Grid, vol. 8, no. 5, pp. 2505–2516,
] Džafic, R. A. Jabr, S. Henselmeyer, and
T. Ðonlagi ´ c, “Fault location ´ in
distribution networks through graph
marking,” IEEE Transactions on Smart
Grid, vol. 9, no. 2, pp. 1345–1353, 2016.
] R. Bhargav, B. R. Bhalja, and C. P.
Gupta, “Novel fault detection and
localization algorithm for low voltage dc
micro grid,” IEEE Transactions on Industrial
Informatics, 2019.
] Wu, G. Wang, J. Sun, and J. Chen,
“Optimal partial feedback attacks in cyberphysical power systems,” IEEE Transactions
on Automatic Control, vol. 65, no. 9, pp.
–3926, 2020.
] Li, Y. Shi, A. Shinde, J. Ye, and W.-Z.
Song, “Enhanced cyber physical security in
internet of things through energy auditing,”
IEEE Internet of Things Journal, vol. 6, no.
, pp. 5224–5231, 2019.
] Wilson, D. R. Reising, R. W. Hay, R.
C. Johnson, A. A. Karrar, and T. D.
Loveless, “Automated identification of
electrical disturbance waveforms within an
operational smart power grid,” IEEE
Transactions on Smart Grid, vol. 11, no. 5,
pp. 4380– 4389, 2020.
] P. Dutta, A. Esmaeilian, and M.
Kezunovic, “Transmission-line fault
analysis using synchronized sampling,”
IEEE transactions on power delivery, vol.
, no. 2, pp. 942–950, 2014.
] Sadeghkhani, M. E. H. Golshan, A.
Mehrizi-Sani, J. M. Guerrero, and A. Ketabi,
“Transient monitoring function–based fault
detection for inverter-interfaced micro
grids,” IEEE Transactions on Smart Grid,
vol. 9, no. 3, pp. 2097–2107, 2016.
] Bastos, S. Santoso, W. Freitas, and W.
Xu, “Synchrowaveform measurement units
and applications,” in 2019 IEEE Power &
Energy Society General Meeting (PESGM).
IEEE, 2019, pp. 1–5.
] Schweitzer Engineering Laboratories,
Pullman, WA, USA, “SEL-T400L Time
Domain Line Protection,” https://selinc.com/
products/T400L/, Last Access: July 31,
] Candura instruments, Oakville, ON,
Canada. “IPSR intelligent Power System
Recorder,” https://www.candura.com/
products/ipsr.html, Last Access: July 31,
] D. Borkowski, A. Wetula, and A. Bien,
“Contactless measurement of ´ substation
bus bars voltages and waveforms
reconstruction using electric field sensors
and artificial neural network,” IEEE
Transactions on Smart Grid, vol. 6, no. 3,
pp. 1560–1569, 2014.
] B. Gao, R. Torquato, W. Xu, and W.
Freitas, “Waveform-based method for fast
and accurate identification of sub
synchronous resonance events,” IEEE
Transactions on Power Systems, vol. 34, no.
, pp. 3626–3636, 2019.
] Li, R. Xie, Z. Wang, L. Guo, J. Ye, P.
Ma, and W. Song, “Online distributed iot
security monitoring with multidimensional
streaming big data,” IEEE Internet of Things
Journal, vol. 7, no. 5, pp. 4387–4394, 2020.
] Li, A. Shinde, Y. Shi, J. Ye, X.-Y. Li,
and W.-Z. Song, “System statistics learningbased iot security: Feasibility and
suitability,” IEEE Internet of Things
Journal, vol. 6, no. 4, pp. 6396–6403, 2019.
] F. Li, Q. Li, J. Zhang, J. Kou, J. Ye,
W. Song, and H. A. Man tooth, “Detection
and diagnosis of data integrity attacks in
solar farms based on multilayer long shortterm memory network,” IEEE Transactions
on Power Electronics, vol. 36, no. 3, pp.
–2498, 2021.
] Wang and J. Shi, “Holistic modeling
and analysis of multistage manufacturing
processes with sparse effective inputs and
mixed profile outputs,” IISE Transactions,
vol. 53, no. 5, pp. 582–596, 2021.
] Ye, L. Guo, B. Yang, F. Li, L. Du, L.
Guan, and W. Song, “Cyber–physical
security of powertrain systems in modern
electric vehicles: Vulnerabilities, challenges,
and future visions,” IEEE Journal of
Emerging and Selected Topics in Power
Electronics, vol. 9, no. 4, pp. 4639–4657,