2020
DOI: 10.1109/oajpe.2020.3029805
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Intrusion Prevention (DIP) Against Co-Ordinated Cyberattacks on Distribution Automation Systems

Abstract: Integration of Information and Communications Technology (ICT) into the distribution system makes today's power grid more remotely monitored and controlled than it has been. The fast increasing connectivity, however, also implies that the distribution grid today, or smart grid, is more vulnerable. Thus, research into intrusion/anomaly detection systems at the distribution level is in critical need. Current research on Intrusion Detection Systems for the power grid has been focused primarily on cyber security a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 30 publications
(38 reference statements)
0
6
0
Order By: Relevance
“…The algorithms aim to prevent direct switching of circuit breakers and tampering with relay settings that could lead to voltage violations and inconsistent protections settings. In [7], a decentralized algorithm is put forward to address coordinated switching attacks on the power distribution system. The algorithm predicts the targets of a coordinated cyberattack ahead of the attacker, and determines mitigation strategies.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithms aim to prevent direct switching of circuit breakers and tampering with relay settings that could lead to voltage violations and inconsistent protections settings. In [7], a decentralized algorithm is put forward to address coordinated switching attacks on the power distribution system. The algorithm predicts the targets of a coordinated cyberattack ahead of the attacker, and determines mitigation strategies.…”
Section: A Related Workmentioning
confidence: 99%
“…Constraint (5) maximizes the load served. In ( 6), the sum of power generated/supplied and the power inflow, at a node, equals the sum of power outflows and specified demand, and in (7) there is no power flow into a source node. The sets Φ i and Φ ij are the set of phases at node i, and the set of phases between nodes i and j, respectively.…”
Section: B Attack Objective Modelmentioning
confidence: 99%
“…This paper in ref. [21] demonstrated an innovative technique for intrusion prevention at the distribution system level utilising a multi‐agent system. The approach was simulated on the IEEE 13‐Node Test Feeder, and the results were compared to those achieved using other methods.…”
Section: Related Workmentioning
confidence: 99%
“…The concept of process-aware IDS is especially interesting in a SCADA and industrial control systems (ICS) environment, where valid traffic is well-defined and commands lead to physical changes in the controlled system [ 121 ]. In combination with a distributed IDS, such approaches can lead to substantially more secure power grids, while introducing a minimum of extra hardware into the PCN.…”
Section: Providing Cybersecurity For Interconnected Power Gridsmentioning
confidence: 99%