Hybrid Detection of Intermittent Cyber-Attacks in Networked Power Systems

被引:6
|
作者
Kontouras, Efstathios [1 ]
Tzes, Anthony [2 ]
Dritsas, Leonidas [3 ]
机构
[1] Univ Patras, Elect & Comp Engn Dept, Rion 26500, Greece
[2] New York Univ Abu Dhabi, Elect & Comp Engn Program, POB 129188, Abu Dhabi, U Arab Emirates
[3] ASPETE, Sch Pedag & Technol Educ, Dept Elect & Elect Engn Educators, Athens 14121, Greece
关键词
cyber-attacks; load-frequency control; power systems; set-theoretic methods; state estimation;
D O I
10.3390/en12244625
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
This article addresses the concept of a compound attack detection mechanism, that links estimation-based and set-theoretic methods, and is mainly focused on the disclosure of intermittent data corruption cyber-attacks. The detection mechanism is developed as a security enhancing tool for the load-frequency control loop of a networked power system that consists of several interconnected control areas. The dynamics of the power network are derived in observable form in the discrete-time domain, considering that an adversary corrupts the frequency measurements of certain control areas by means of a bias injection cyber-attack. Simulations indicate that an estimation-based detector is unable to discern an intermittent attack, especially when the latter one occurs at the same time as changes in the power load. The detector can be improved by exploiting the safe operation constraints imposed on the state variables of the system. It is shown that the disclosure of intermittent data corruption cyber-attacks in the presence of unknown power load changes is guaranteed only when the estimation-based detector is combined with its set-theoretic counterpart. To this end, a robust invariant set for the networked power system is computed and an alarm is triggered whenever the state vector exits this set. Simulations indicate that the above detectors can operate jointly in terms of a hybrid scheme, which enhances their detection capabilities.
引用
收藏
页数:29
相关论文
共 50 条
  • [1] Detection and Prevention of Cyber-Attacks in Networked Control Systems
    Li, Yike
    Tong, Yin
    Giua, Alessandro
    IFAC PAPERSONLINE, 2020, 53 (04): : 7 - 13
  • [2] Set-Theoretic Detection of Bias Injection Cyber-Attacks on Networked Power Systems
    Kontouras, Efstathios
    Tzes, Anthony
    Dritsas, Leonidas
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 165 - 170
  • [3] Event-Triggered Control for Networked Control Systems under Intermittent Cyber-Attacks
    Li, Tao
    Wang, Ting
    Chen, Linbo
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 4709 - 4713
  • [4] Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems
    Rasim Alguliyev
    Yadigar Imamverdiyev
    Lyudmila Sukhostat
    Neural Computing and Applications, 2021, 33 : 10211 - 10226
  • [5] Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    NEURAL COMPUTING & APPLICATIONS, 2021, 33 (16): : 10211 - 10226
  • [6] An Overview About Detection of Cyber-Attacks on Power SCADA Systems
    de Figueiredo, Hugo F. M.
    Ferst, Matheus K.
    Denardin, Gustavo W.
    2019 IEEE 15TH BRAZILIAN POWER ELECTRONICS CONFERENCE AND 5TH IEEE SOUTHERN POWER ELECTRONICS CONFERENCE (COBEP/SPEC), 2019,
  • [7] Hybrid DeepGCL model for cyber-attacks detection on cyber-physical systems
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    Neural Computing and Applications, 2021, 33 (16) : 10211 - 10226
  • [8] Guaranteed cost control of hybrid-triggered networked systems with stochastic cyber-attacks
    Wu, Jiancun
    Peng, Chen
    Zhang, Jin
    Yang, Mingjin
    Zhang, Bao-Lin
    ISA TRANSACTIONS, 2020, 104 : 84 - 92
  • [9] Effects of Permanent Bounded Cyber-Attacks on Networked Control Systems
    Gerard, Benjamin
    Voos, Holger
    Li, Yumei
    Darouach, Mohamed
    2015 23RD MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2015, : 877 - 882
  • [10] Stabilization for networked control systems under stochastic cyber-attacks
    Wei, Lili
    Liu, Jinliang
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 8020 - 8025