Dynamic Security Assessment for Power System Under Cyber-Attack

被引:8
|
作者
Al-Gburi, Qusay A. [1 ]
Ariff, Mohd Aifaa Mohd [1 ]
机构
[1] Univ Tun Hussein Onn, Fac Elect & Elect Engn, Dept Elect Power Engn, Parit Raja 86400, Malaysia
关键词
Dynamic security assessment; Cyber-attack; Decision tree; Logistic model trees; Symmetrical uncertainty; FEATURE-SELECTION;
D O I
10.1007/s42835-019-00084-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, power systems have become more dependent on new technological advancement in the communication network to send and receive data and commands through the wide area power network. This dependence has created a new threat to the network, known as a cyber-attack. Such attacks could lead to blackouts and the consequences on the security of the power system would be severe. This study presents a new approach, which aims at assessing the dynamic behavior of the test system's model under a cyber-attack contingency. The methodology used in this study was based on the scenarios of cyber-attacks on the protection relay devices to generate the database for dynamic security assessment. Then, a data mining framework was used for the database preparation and classification via feature selection algorithm and decision tree classifier. The results of the modified IEEE 30-bus test system model in this study showed a high accuracy of 99.537%, and a short time frame that makes this application suitable for real-time application to protect the power network from an insecure state and ensure that the power system remains reliable.
引用
收藏
页码:549 / 559
页数:11
相关论文
共 50 条
  • [41] A Dynamic Strategy for Cyber-Attack Detection in Large-scale Power Systems via Output Clustering
    Jevtic, Ana
    Ilic, Marija
    [J]. 2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 4231 - 4236
  • [42] Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction
    Polatidis, Nikolaos
    Pimenidis, Elias
    Pavlidis, Michalis
    Mouratidis, Haralambos
    [J]. ENGINEERING APPLICATIONS OF NEURAL NETWORKS, EANN 2017, 2017, 744 : 508 - 519
  • [43] Cyber-attack as inevitable kinetic war
    Lilienthal, Gary
    Ahmad, Nehaluddin
    [J]. COMPUTER LAW & SECURITY REVIEW, 2015, 31 (03) : 390 - 400
  • [44] Cyber-attack and defense simulation framework
    Bergin, Dennis Lee
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
  • [45] Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link
    Wang, Lei
    Xu, Pengcheng
    Qu, Zhaoyang
    Bo, Xiaoyong
    Dong, Yunchang
    Zhang, Zhenming
    Li, Yang
    [J]. FRONTIERS IN ENERGY RESEARCH, 2021, 9
  • [46] Vulnerability Analysis of Power Systems Based on Cyber-Attack and Defense Models
    Hasan, Saqib
    Ghafouri, Amin
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    [J]. 2018 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2018,
  • [47] Cyber-attack, a clear and present danger
    不详
    [J]. NEW SCIENTIST, 2009, 201 (2699) : 18 - 19
  • [48] Controller Cyber-Attack Detection and Isolation
    Sztyber-Betley, Anna
    Syfert, Michal
    Koscielny, Jan Maciej
    Gorecka, Zuzanna
    [J]. SENSORS, 2023, 23 (05)
  • [49] ARTT Taxonomy and Cyber-attack Framewok
    Douad, Mohamed Amine
    Dahmani, Youcef
    [J]. 2015 FIRST INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF INFORMATION AND COMMUNICATION (NTIC), 2015,
  • [50] A quantitative assessment framework for cyber-attack scenarios on nuclear power plants using relative difficulty and consequence
    Park, Jong Woo
    Lee, Seung Jun
    [J]. ANNALS OF NUCLEAR ENERGY, 2020, 142