THE SIGNIFICANCE OF LOCALIZATION AND ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION IN AN ACTIVE DISTRIBUTION SYSTEM

Main Article Content

M. NIRMALA
M. VARUN

Abstract

The increasing integration of distributed renewable energy sources into the grid has made it more challenging to design a cyber security plan for active distribution networks. This article outlines a method for locating and identifying cyberattacks in distributed active distribution systems using electrical waveform analysis. A sequential deep learning model is the foundation for cyber attack detection since it can identify even the smallest incursions. In a two-stage approach, the targeted cyberattack is first localized inside the estimated cyberattack sub-region. We introduce a network splitting strategy for "coarse" localization of hierarchical cyberattacks, based on a modified version of spectral clustering. It is recommended to create several waveform parameters and apply a normalised effect score based on statistical metrics of the waves themselves in order to further localise the origin of a cyberattack.Lastly, a comprehensive quantitative evaluation based on two case studies shows that, in comparison to both traditional and cutting-edge approaches, the suggested framework produces reliable estimations. Suggested Search Terms: Support Vector Machine, Random Forest, Logistic Regression, Gradient Boosting, and Cyber Attack Detection.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
NIRMALA, M., & VARUN, M. (2020). THE SIGNIFICANCE OF LOCALIZATION AND ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION IN AN ACTIVE DISTRIBUTION SYSTEM. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 11(3), 2775–2784. https://doi.org/10.61841/turcomat.v11i3.14582
Section
Research Articles

References

] Mehmood, A., Abbas, H., & Khan, S.

(2018). A hierarchical intrusion detection

system for power distribution networks

using decision trees. IEEE Access, 6, 29268-

Doi:

1109/ACCESS.2018.2846620

] Li, R. Xie, B. Yang, L. Guo, P. Ma, J.

Shi, J. Ye, and W. Song, “Detection and

identification of cyber and physical attacks

on distribution power grids with pvs: An

online high-dimensional data-driven

approach,” IEEE Journal of Emerging and

Selected Topics in Power Electronics, Early

Access

] Li, G., Lu, Z., Wu, J., Liu, Y., & He, X.

(2019). Anomaly detection in smart grids: A

hierarchical approach. IEEE Transactions on

Smart Grid, 10(6), 6728-6739. doi:

1109/TSG.2018.2847337 .

] Ye, L. Guo, B. Yang, F. Li, L. Du, L.

Guan, and W. Song, “Cyber–physical

security of powertrain systems in modern

electric vehicles: Vulnerabilities, challenges,

and future visions,” IEEE Journal of

Emerging and Selected Topics in Power

Electronics, vol. 9, no. 4, pp. 4639–4657,

] Raza, S., Hameed, A., Tariq, M., &

Ahmed, M. (2019). A hierarchical intrusion

detection system for industrial control

networks using support vector machines.

IEEE Access, 7, 30189-30201. doi:

1109/ACCESS.2019.2905985

] B. Wang, H. Wang, L. Zhang, D. Zhu,

D. Lin, and S. Wan, “A data driven method

to detect and localize the single-phase

grounding fault in distribution network

based on synchronized phasor

measurement,” EURASIP Journal on Wireless Communications and Networking,

vol. 2019, no. 1, p. 195, 2019.

] Y. He, G. J. Mendis, and J. Wei, “Realtime detection of false data injection attacks

in smart grid: A deep learning-based

intelligent mechanism,” IEEE Transactions

on Smart Grid, vol. 8, no. 5, pp. 2505–2516,

] Džafic, R. A. Jabr, S. Henselmeyer, and

T. Ðonlagi ´ c, “Fault location ´ in

distribution networks through graph

marking,” IEEE Transactions on Smart

Grid, vol. 9, no. 2, pp. 1345–1353, 2016.

] R. Bhargav, B. R. Bhalja, and C. P.

Gupta, “Novel fault detection and

localization algorithm for low voltage dc

micro grid,” IEEE Transactions on Industrial

Informatics, 2019.

] Wu, G. Wang, J. Sun, and J. Chen,

“Optimal partial feedback attacks in cyberphysical power systems,” IEEE Transactions

on Automatic Control, vol. 65, no. 9, pp.

–3926, 2020.

] Li, Y. Shi, A. Shinde, J. Ye, and W.-Z.

Song, “Enhanced cyber physical security in

internet of things through energy auditing,”

IEEE Internet of Things Journal, vol. 6, no.

, pp. 5224–5231, 2019.

] Wilson, D. R. Reising, R. W. Hay, R.

C. Johnson, A. A. Karrar, and T. D.

Loveless, “Automated identification of

electrical disturbance waveforms within an

operational smart power grid,” IEEE

Transactions on Smart Grid, vol. 11, no. 5,

pp. 4380– 4389, 2020.

] P. Dutta, A. Esmaeilian, and M.

Kezunovic, “Transmission-line fault

analysis using synchronized sampling,”

IEEE transactions on power delivery, vol.

, no. 2, pp. 942–950, 2014.

] Sadeghkhani, M. E. H. Golshan, A.

Mehrizi-Sani, J. M. Guerrero, and A. Ketabi,

“Transient monitoring function–based fault

detection for inverter-interfaced micro

grids,” IEEE Transactions on Smart Grid,

vol. 9, no. 3, pp. 2097–2107, 2016.

] Bastos, S. Santoso, W. Freitas, and W.

Xu, “Synchrowaveform measurement units

and applications,” in 2019 IEEE Power &

Energy Society General Meeting (PESGM).

IEEE, 2019, pp. 1–5.

] Schweitzer Engineering Laboratories,

Pullman, WA, USA, “SEL-T400L Time

Domain Line Protection,” https://selinc.com/

products/T400L/, Last Access: July 31,

] Candura instruments, Oakville, ON,

Canada. “IPSR intelligent Power System

Recorder,” https://www.candura.com/

products/ipsr.html, Last Access: July 31,

] D. Borkowski, A. Wetula, and A. Bien,

“Contactless measurement of ´ substation

bus bars voltages and waveforms

reconstruction using electric field sensors

and artificial neural network,” IEEE

Transactions on Smart Grid, vol. 6, no. 3,

pp. 1560–1569, 2014.

] B. Gao, R. Torquato, W. Xu, and W.

Freitas, “Waveform-based method for fast

and accurate identification of sub

synchronous resonance events,” IEEE

Transactions on Power Systems, vol. 34, no.

, pp. 3626–3636, 2019.

] Li, R. Xie, Z. Wang, L. Guo, J. Ye, P.

Ma, and W. Song, “Online distributed iot

security monitoring with multidimensional

streaming big data,” IEEE Internet of Things

Journal, vol. 7, no. 5, pp. 4387–4394, 2020.

] Li, A. Shinde, Y. Shi, J. Ye, X.-Y. Li,

and W.-Z. Song, “System statistics learningbased iot security: Feasibility and

suitability,” IEEE Internet of Things

Journal, vol. 6, no. 4, pp. 6396–6403, 2019.

] F. Li, Q. Li, J. Zhang, J. Kou, J. Ye,

W. Song, and H. A. Man tooth, “Detection

and diagnosis of data integrity attacks in

solar farms based on multilayer long shortterm memory network,” IEEE Transactions

on Power Electronics, vol. 36, no. 3, pp.

–2498, 2021.

] Wang and J. Shi, “Holistic modeling

and analysis of multistage manufacturing

processes with sparse effective inputs and

mixed profile outputs,” IISE Transactions,

vol. 53, no. 5, pp. 582–596, 2021.

] Ye, L. Guo, B. Yang, F. Li, L. Du, L.

Guan, and W. Song, “Cyber–physical

security of powertrain systems in modern

electric vehicles: Vulnerabilities, challenges,

and future visions,” IEEE Journal of

Emerging and Selected Topics in Power

Electronics, vol. 9, no. 4, pp. 4639–4657,