A Decentralized Intrusion Detection System for Security of Generation Control

被引:14
|
作者
Roy, Siddhartha Deb [1 ]
Debbarma, Sanjoy [1 ]
Iqbal, Adnan [2 ]
机构
[1] Natl Inst Technol Meghalaya, Dept Elect Engn, Shillong 793003, Meghalaya, India
[2] Indian Inst Technol Indore, Dept Elect Engn, Indore 453552, Madhya Pradesh, India
关键词
Automatic generation control (AGC); ensemble learning; false data injection (FDI); machine learning (ML); power system security; support vector machine (SVM); ATTACK; CLASSIFICATION; INTERNET;
D O I
10.1109/JIOT.2022.3163502
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, several incidents have been reported relating to security breaches in the power system network. As the operation of the automatic generation control (AGC) system fully depends on communication technologies, any compromise in its functionality could lead to total system collapse. For example, the intruders may target the communication network of the legacy grid by launching deception and data-availability attacks, which have the potential to manipulate the crucial telemetered quantities, such as wide-area sensor measurements and (or) the control signals. Despite significant work on AGC security, most of the past studies were limited to the detection of intrusions in sensor measurements, and less emphasis is given to addressing the impact of attacks on control signals. To this end, this article proposes a decentralized intrusion detection system (IDS) that jointly identifies data anomalies in the sensor measurement and the control signals. The IDS is powered by a novel machine learning (ML) classifier, which we call cluster-driven ensemble learning (CDEL) algorithm. The proposed CDEL is based on the ensemble principle that combines the predictive power of multiple support vector machines and the K-means clustering algorithm. Experimental results reveal the supremacy of CDEL over existing state-of-the-art ML techniques.
引用
收藏
页码:18924 / 18933
页数:10
相关论文
共 50 条
  • [31] Physical Intrusion Detection for Industrial Control System
    Liu, Pengfei
    Liu, Ting
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [32] Enhancing System Security by Intrusion Detection Using Deep Learning
    Sama, Lakshit
    Wang, Hua
    Watters, Paul
    DATABASES THEORY AND APPLICATIONS (ADC 2022), 2022, 13459 : 169 - 176
  • [33] Internet security and intrusion detection
    Kemmerer, RA
    Vigna, G
    25TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2003, : 748 - 749
  • [34] Security challenges in intrusion detection
    Jouad, Mohammed
    Diouani, Sara
    Houmani, Hanane
    Zaki, Ali
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 350 - 360
  • [35] Next-Generation Intrusion Detection and Prevention System Performance in Distributed Big Data Network Security Architectures
    Hart, Michael
    Dave, Rushit
    Richardson, Eric
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (09) : 990 - 998
  • [36] POSITIVE TRAIN CONTROL SECURITY An Intrusion-Detection System to Provide Cyber-Situational Awareness
    Kolli, Satish
    Lilly, Joshua
    Wijesekera, Duminda
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2018, 13 (03): : 48 - 60
  • [37] Linking Intrusion Detection System Information and System Model to Redesign Security Architecture
    Betancourt, Victor Pazmino
    Glock, Thomas
    Kharitonov, Aleksei
    Kern, Matthias
    Liu, Bo
    Sax, Eric
    Becker, Juergen
    2020 14TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON2020), 2020,
  • [38] Campus Network Security Program Based on Snort Network Security Intrusion Detection System
    Ling, Jia
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 3235 - 3240
  • [39] An Intrusion Detection and Mitigation Framework for Automatic Generation Control Systems
    Mohammadi, Fazel
    Saif, Mehrdad
    IEEE Transactions on Industrial Cyber-Physical Systems, 2024, 2 : 412 - 421
  • [40] Design of the Network Security Intrusion Detection System Based on the Cloud Computing
    Di, Meng
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 68 - 73