2015
DOI: 10.1109/tii.2015.2420951
|View full text |Cite
|
Sign up to set email alerts
|

Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data

Abstract: Visualization and situational awareness are of vital importance for power systems, as the earlier a power-system event such as a transmission line fault or cyber-attack is identified, the quicker operators can react to avoid unnecessary loss. Accurate time-synchronized data, such as system measurements and device status, provide benefits for system state monitoring. However, the time-domain analysis of such heterogeneous data to extract patterns is difficult due to the existence of transient phenomena in the a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 127 publications
(58 citation statements)
references
References 28 publications
(40 reference statements)
0
47
0
Order By: Relevance
“…Because the critical states are generally well known and limited in number, one can enumerate them formally beforehand and predict the criticality by tracking the changes in the distance between the current system state and the critical states. Likewise, Pan et al [31] processed a sequence of critical system states using a sequential pattern mining algorithm to detect disturbances and cyberattacks in power systems. In contrast to exploiting the abnormal patterns, one can also specify the acceptable behaviors of a system, and subsequently detect attacks that cause violation to them [34], [35].…”
Section: Related Workmentioning
confidence: 99%
“…Because the critical states are generally well known and limited in number, one can enumerate them formally beforehand and predict the criticality by tracking the changes in the distance between the current system state and the critical states. Likewise, Pan et al [31] processed a sequence of critical system states using a sequential pattern mining algorithm to detect disturbances and cyberattacks in power systems. In contrast to exploiting the abnormal patterns, one can also specify the acceptable behaviors of a system, and subsequently detect attacks that cause violation to them [34], [35].…”
Section: Related Workmentioning
confidence: 99%
“…The sequence pattern mining-based detector utilizes a series of state transitions to denote the normal system behaviors and abnormal system behaviors. An effective method has been proposed in the works by the authors of [26,27], where defenders compute the number of occurrences of every state transition path and use some methods to determine whether a path is normal. In general, the larger the number of occurrences is, the larger the possibility that it is a normal path.…”
Section: Sequence Pattern Mining-based Detectormentioning
confidence: 99%
“…The introduction of automatic discovery of common paths from the labeled data logs. Pan et al [26] presented the systematic approach for the design of hybrid IDS and learned the temporal based specifications. They proposed the common path mining algorithms for the learning.…”
Section: Related Workmentioning
confidence: 99%
“…Feature name (1) duration (2) protocol type (3) service (4) Flag (5) Src bytes (6) Dst bytes 7land (8) Wrong fragment (9) urgent (10) hot (11) Num failed logins (12) Logged.in (13) Num compromised (14) Root shell (15) Su attempted (16) Num root (17) Num file creations (18) Num shells (19) Num access files (20) Num outbound cmds (21) Is hot login (22) Is guest login (23) count (24) Srv count (25) Serror rate (26) Srv serror rate (27) Rerror (1) Gas pipeline 100,000 27 (2) Water tower 200,000 24…”
Section: S Numbermentioning
confidence: 99%
See 1 more Smart Citation