2016
DOI: 10.1109/tsg.2016.2544854
|View full text |Cite
|
Sign up to set email alerts
|

A Bayesian Algorithm to Enhance the Resilience of WAMS Applications Against Cyber Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 93 publications
(26 citation statements)
references
References 23 publications
0
26
0
Order By: Relevance
“…The main drawbacks of the protection-based schemes are the unguaranteed effectiveness with the different operating conditions of the power grid and the extreme need for the measurement's redundancy [72]. Detection-based schemes utilize the Bayesian framework in detecting FDI attacks that would look like an anomaly among the set of measurements [73]. The main drawback of these schemes is the incapability of detecting FDI attacks that closely imitate the normal distribution of the measurements of the power grid which are also known as stealthy attacks [72].…”
Section: Blockchain Applications In Cyber-physical Securitymentioning
confidence: 99%
“…The main drawbacks of the protection-based schemes are the unguaranteed effectiveness with the different operating conditions of the power grid and the extreme need for the measurement's redundancy [72]. Detection-based schemes utilize the Bayesian framework in detecting FDI attacks that would look like an anomaly among the set of measurements [73]. The main drawback of these schemes is the incapability of detecting FDI attacks that closely imitate the normal distribution of the measurements of the power grid which are also known as stealthy attacks [72].…”
Section: Blockchain Applications In Cyber-physical Securitymentioning
confidence: 99%
“…If the attacker successfully launches an attack by manipulating or injecting false data either in the measurements or the control signals to the energy internet, it may lead to the wrong decision of the control center and eventually cause the chain failure. Countermeasures against FDI attacks are classified in the literature into protection-based methods [32] and detection-based methods [33]. However, when FDI attacks closely imitating the normal distribution of the measurements, these methods have the incapability of detecting the attacks [34].…”
Section: Information Security Requirements Of the System Operation Layermentioning
confidence: 99%
“…However, there are two problems: The results are as follows: (1) the size of the time period is given randomly by people, which cannot represent the security and real-time performance of the current network; (2) the state transition matrix and the observation symbol matrix are usually determined by experience and have strong abstractness. To solve this problem, Li et al later trained the parameters of the HMM model by mixed multi-population genetic algorithm (MPGA) [8] to improve the reliability of the parameters and to solve the problem that the emergency situation could not be highlighted in a certain period of time. Experiments show that this method can reflect the current network security situation effectively and accurately.…”
Section: Related Workmentioning
confidence: 99%