Hybrid Detection of Intermittent Cyber-Attacks in Networked Power Systems

被引:6
|
作者
Kontouras, Efstathios [1 ]
Tzes, Anthony [2 ]
Dritsas, Leonidas [3 ]
机构
[1] Univ Patras, Elect & Comp Engn Dept, Rion 26500, Greece
[2] New York Univ Abu Dhabi, Elect & Comp Engn Program, POB 129188, Abu Dhabi, U Arab Emirates
[3] ASPETE, Sch Pedag & Technol Educ, Dept Elect & Elect Engn Educators, Athens 14121, Greece
关键词
cyber-attacks; load-frequency control; power systems; set-theoretic methods; state estimation;
D O I
10.3390/en12244625
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
This article addresses the concept of a compound attack detection mechanism, that links estimation-based and set-theoretic methods, and is mainly focused on the disclosure of intermittent data corruption cyber-attacks. The detection mechanism is developed as a security enhancing tool for the load-frequency control loop of a networked power system that consists of several interconnected control areas. The dynamics of the power network are derived in observable form in the discrete-time domain, considering that an adversary corrupts the frequency measurements of certain control areas by means of a bias injection cyber-attack. Simulations indicate that an estimation-based detector is unable to discern an intermittent attack, especially when the latter one occurs at the same time as changes in the power load. The detector can be improved by exploiting the safe operation constraints imposed on the state variables of the system. It is shown that the disclosure of intermittent data corruption cyber-attacks in the presence of unknown power load changes is guaranteed only when the estimation-based detector is combined with its set-theoretic counterpart. To this end, a robust invariant set for the networked power system is computed and an alarm is triggered whenever the state vector exits this set. Simulations indicate that the above detectors can operate jointly in terms of a hybrid scheme, which enhances their detection capabilities.
引用
收藏
页数:29
相关论文
共 50 条
  • [41] Hybrid-triggered predictive control of cyber-physical-systems under cyber-attacks
    Li, Hengqian
    Zhan, Xisheng
    Wu, Bo
    Wu, Jie
    Yan, Huaicheng
    ASIAN JOURNAL OF CONTROL, 2024, 26 (05) : 2495 - 2506
  • [42] A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems
    Mohan, Athira M.
    Meskin, Nader
    Mehrjerdi, Hasan
    ENERGIES, 2020, 13 (15)
  • [43] Detection of Cyber-Attacks with Zone Dividing and PCA
    Morita, T.
    Yogo, S.
    Koike, M.
    Hamaguchi, T.
    Jung, S.
    Koshijima, I.
    Hashimoto, Y.
    17TH INTERNATIONAL CONFERENCE IN KNOWLEDGE BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS - KES2013, 2013, 22 : 727 - 736
  • [44] Detection of collaborative misbehaviour in distributed cyber-attacks
    Thoma, Marios
    Hadjicostis, Christoforos N.
    COMPUTER COMMUNICATIONS, 2021, 174 : 28 - 41
  • [45] Modeling cyber-attacks on Industrial Control Systems
    Paliath, Vivin
    Shakarian, Paulo
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 316 - 318
  • [46] Cyber-attacks on health-care systems
    Devi, Sharmila
    LANCET ONCOLOGY, 2023, 24 (04): : 148 - 148
  • [47] TAXONOMY OF SEVERITY OF CYBER-ATTACKS IN CYBER-MANUFACTURING SYSTEMS
    Espinoza-Zelaya, Carlos
    Moon, Young
    PROCEEDINGS OF ASME 2022 INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, IMECE2022, VOL 2B, 2022,
  • [48] Secure Event-Triggered Mechanism for Networked Control Systems under Injection Cyber-Attacks
    Cai, Xiao
    Kang, Jian
    Shi, Kaibo
    DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2022, 2022
  • [49] Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid
    Kurt, Mehmet Necip
    Yilmaz, Yasin
    Wang, Xiaodong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 498 - 513
  • [50] Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems
    Jahromi, Amir Namavar
    Karimipour, Hadis
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (17) : 13712 - 13722