A Method of Synchrophasor Technology for Detecting and Analyzing Cyber-Attacks

被引:0
|
作者
Al-Sarray, Muthanna [1 ]
McCann, Roy A. [1 ]
机构
[1] Univ Arkansas, Dept Elect Engn, Fayetteville, AR 72701 USA
关键词
Cybersecurity; power line communication; synchrophasor; AUTOMATIC-GENERATION CONTROL;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Studying cybersecurity events and analyzing their impacts encourage planners and operators to develop innovative approaches for preventing attacks in order to avoid outages and other disruptions. This work considers two parts in security studies; detecting an integrity attack and examining its effects on power system generators. The detection was conducted through employing synchrophasor technology to provide authentication of ACG commands based on observed system operating characteristics. The examination of an attack is completed via a detailed simulation of a modified IEEE 68-bus benchmark model to show the associated power system dynamic response. The results of the simulation are discussed for assessing the impacts of cyber threats.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Analyzing cyber-attacks targeted on the Banks of Pakistan and their Solutions
    Bukht, Tanvir Fatima Naik
    Raza, Muhammad Ahsan
    Awan, Jawad Hussain
    Ahmad, Rizwan
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (02): : 31 - 38
  • [2] A Linguistic Analysis Metric in Detecting Ransomware Cyber-attacks
    Florea, Diana
    Patterson, Wayne
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 517 - 522
  • [3] A Linguistic Analysis Metric in Detecting Ransomware Cyber-attacks
    Florea, Diana
    Patterson, Wayne
    [J]. International Journal of Advanced Computer Science and Applications, 2021, 12 (11): : 517 - 522
  • [4] Detecting network cyber-attacks using an integrated statistical approach
    Bouyeddou, Benamar
    Harrou, Fouzi
    Kadri, Benamar
    Sun, Ying
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
  • [5] Detecting network cyber-attacks using an integrated statistical approach
    Benamar Bouyeddou
    Fouzi Harrou
    Benamar Kadri
    Ying Sun
    [J]. Cluster Computing, 2021, 24 : 1435 - 1453
  • [6] A Feasibility Study of Autonomically Detecting In-process Cyber-Attacks
    Sun, Fangzhou
    Zhang, Peng
    White, Jules
    Schmidt, Douglas C.
    Staples, Jacob
    Krause, Lee
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 407 - 414
  • [7] Futuristic cyber-attacks
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Rathnam, M. Venkata
    Srinithi, K.
    Vaidehi, V.
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2018, 22 (03) : 195 - 204
  • [8] A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids
    Aflaki, Arshia
    Gitizadeh, Mohsen
    Razavi-Far, Roozbeh
    Palade, Vasile
    Ghasemi, Ali Akbar
    [J]. ENERGIES, 2021, 14 (18)
  • [9] A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding
    Feng, Yaokai
    Hori, Yoshiaki
    Sakurai, Kouichi
    [J]. 2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 152 - 159
  • [10] A System for Detecting Targeted Cyber-Attacks Using Attack Patterns
    Herwono, Ian
    El-Moussa, Fadi Ali
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 20 - 34