2018
DOI: 10.3390/app8050772
|View full text |Cite
|
Sign up to set email alerts
|

Covert Cyber Assault Detection in Smart Grid Networks Utilizing Feature Selection and Euclidean Distance-Based Machine Learning

Abstract: Communications technologies are an integral part of efficient monitoring and reliable control in smart grids, but enhanced reliance on these technologies heightens the risk of cyber assaults. Recently, a new type of stealth, or covert, assault in smart grid networks has been discovered, which cannot be ascertained by legacy bad-data detectors using state estimation. Due to the delay-sensitive nature of smart grid networks, swift detection of abnormal changes is immensely desired. In this paper, we propose two … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 37 publications
0
14
0
Order By: Relevance
“…These parameters are stated in table I. [15] and [16]. The resultant subset of features selected by each algorithm are tested with the three classification algorithms, SVM, KNN, and ANN, and their classification accuracy on each of the three IEEE bus systems are recorded in tables III, IV, and V.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…These parameters are stated in table I. [15] and [16]. The resultant subset of features selected by each algorithm are tested with the three classification algorithms, SVM, KNN, and ANN, and their classification accuracy on each of the three IEEE bus systems are recorded in tables III, IV, and V.…”
Section: Methodsmentioning
confidence: 99%
“…2) Genetic Algorithm: GA is an optimization technique that yields the best solution based on the evolution mechanism of living beings [16]. Following the principle of natural selection, GA chooses the best solutions based on their fitness.…”
Section: A Feature Selectionmentioning
confidence: 99%
“…Load distribution attack, stealthy deception attack, covert cyber deception attack, data integrity attack, and malicious data attack -all these terms are also used to mention such attacks [196], [197]. FDIAs need to be capable of escaping bad data detection (BDD) protocols in place, and perform stealth attacks on the system state estimation mechanism [196] -which is fundamental to monitor the state of a power system [197]. Also, most of the legacy BDD systems fail to detect such attacks [197].…”
Section: Cyber Security In Smart Grid a Cyber-security Challengementioning
confidence: 99%
“…FDIAs need to be capable of escaping bad data detection (BDD) protocols in place, and perform stealth attacks on the system state estimation mechanism [196] -which is fundamental to monitor the state of a power system [197]. Also, most of the legacy BDD systems fail to detect such attacks [197]. Along with affecting the state estimations, FDIA can disrupt electricity markets through false economic dispatch and data [196], [198], [199].…”
Section: Cyber Security In Smart Grid a Cyber-security Challengementioning
confidence: 99%
“…Thus, the time consumed in detection can be saved; however, all measurement samples are reconstructed in this scheme, whether they were attacked or not. To extend our previous work from detection [6,25,26] to mitigation, in this paper, we propose a deep neural network (DNN)-based data reconstruction scheme (Scheme-III) to mitigate the impacts of a CCDA on the SG's measurement dataset.…”
Section: Introductionmentioning
confidence: 99%