Hybrid Detection of Intermittent Cyber-Attacks in Networked Power Systems

被引:6
|
作者
Kontouras, Efstathios [1 ]
Tzes, Anthony [2 ]
Dritsas, Leonidas [3 ]
机构
[1] Univ Patras, Elect & Comp Engn Dept, Rion 26500, Greece
[2] New York Univ Abu Dhabi, Elect & Comp Engn Program, POB 129188, Abu Dhabi, U Arab Emirates
[3] ASPETE, Sch Pedag & Technol Educ, Dept Elect & Elect Engn Educators, Athens 14121, Greece
关键词
cyber-attacks; load-frequency control; power systems; set-theoretic methods; state estimation;
D O I
10.3390/en12244625
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
This article addresses the concept of a compound attack detection mechanism, that links estimation-based and set-theoretic methods, and is mainly focused on the disclosure of intermittent data corruption cyber-attacks. The detection mechanism is developed as a security enhancing tool for the load-frequency control loop of a networked power system that consists of several interconnected control areas. The dynamics of the power network are derived in observable form in the discrete-time domain, considering that an adversary corrupts the frequency measurements of certain control areas by means of a bias injection cyber-attack. Simulations indicate that an estimation-based detector is unable to discern an intermittent attack, especially when the latter one occurs at the same time as changes in the power load. The detector can be improved by exploiting the safe operation constraints imposed on the state variables of the system. It is shown that the disclosure of intermittent data corruption cyber-attacks in the presence of unknown power load changes is guaranteed only when the estimation-based detector is combined with its set-theoretic counterpart. To this end, a robust invariant set for the networked power system is computed and an alarm is triggered whenever the state vector exits this set. Simulations indicate that the above detectors can operate jointly in terms of a hybrid scheme, which enhances their detection capabilities.
引用
收藏
页数:29
相关论文
共 50 条
  • [21] A Hybrid Framework for Detecting and Eliminating Cyber-Attacks in Power Grids
    Aflaki, Arshia
    Gitizadeh, Mohsen
    Razavi-Far, Roozbeh
    Palade, Vasile
    Ghasemi, Ali Akbar
    ENERGIES, 2021, 14 (18)
  • [22] Set-Induced Anomaly Detectors for Networked Power Systems under Bias Injection Cyber-Attacks
    Kontouras, Efstathios
    Tzes, Anthony
    Dritsas, Leonidas
    2018 EUROPEAN CONTROL CONFERENCE (ECC), 2018, : 2472 - 2475
  • [23] A Novel Networked Control Scheme with Safety Guarantees for Detection and Mitigation of Cyber-Attacks
    Gheitasi, Kian
    Ghaderi, Mohsen
    Lucia, Walter
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 1449 - 1454
  • [24] A Review on Research of Cyber-attacks and Defense in Cyber Physical Power Systems Part Two Detection and Protection
    Tang Y.
    Li M.
    Wang Q.
    Ni M.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2019, 43 (10): : 1 - 9and18
  • [25] An Ensemble Learning-Based Cyber-Attacks Detection Method of Cyber-Physical Power Systems
    Lu, Kang-Di
    Wu, Zheng-Guang
    2022 INTERNATIONAL CONFERENCE ON ADVANCED ROBOTICS AND MECHATRONICS (ICARM 2022), 2022, : 1029 - 1034
  • [26] Adaptive event-triggered control for networked interconnected systems with cyber-attacks
    Liu, Jinliang
    Qian, Yan
    Zha, Lijuan
    Tian, Engang
    Xie, Xiangpeng
    NONLINEAR ANALYSIS-HYBRID SYSTEMS, 2023, 50
  • [27] Fuzzy-Model-Based Lateral Control for Networked Autonomous Vehicle Systems Under Hybrid Cyber-Attacks
    Lian, Zhi
    Shi, Peng
    Lim, Cheng-Chew
    Yuan, Xin
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (04) : 2600 - 2609
  • [28] INTRUSION DETECTION SYSTEMS TRENDS TO COUNTERACT GROWING CYBER-ATTACKS ON CYBER-PHYSICAL SYSTEMS
    Ali, Jokha
    2021 22ND INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2021, : 699 - 704
  • [29] Robust fusion filter for networked uncertain descriptor systems with colored noise and cyber-attacks
    Zhang, Yexuan
    Ran, Chenjian
    Sun, Shuli
    SIGNAL PROCESSING, 2025, 227
  • [30] Observer-Based Optimal Fuzzy Control for Networked IT-2 Fuzzy Systems Against Hybrid Cyber-Attacks
    Li, Yang
    Park, Ju H.
    Gu, Yang
    He, Yong
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2025, 33 (02) : 704 - 716