Abstract:Cyber and physical attacks threaten the security of distribution power grids. The emerging renewable energy sources such as photovoltaics (PVs) introduce new potential vulnerabilities. Based on the electric waveform data measured by waveform sensors in the distribution power networks, in this paper, we propose a novel high-dimensional data-driven cyber physical attack detection and identification approach (HCADI). Firstly, we analyze the cyber and physical attack impacts (including cyber attacks on the solar i… Show more
“…In [3], Li et al describe an online data-driven algorithm for detecting and identifying both cyber and physical attacks without the need for the training found in artificial intelligence/machine learning methods. It directly uses electrical waveform data to perform these determinations and is thus suitable for online deployment in power electronics hardware such as solar inverters.…”
Section: Guest Editorial Special Section On Cybersecurity Of Power El...mentioning
“…In [3], Li et al describe an online data-driven algorithm for detecting and identifying both cyber and physical attacks without the need for the training found in artificial intelligence/machine learning methods. It directly uses electrical waveform data to perform these determinations and is thus suitable for online deployment in power electronics hardware such as solar inverters.…”
Section: Guest Editorial Special Section On Cybersecurity Of Power El...mentioning
“…], and fewer still, which allow for missing data [63], [64]. Some of the recent ones [30], [33]- [35], [65], [66] also consider low-rank factorizations, albeit without subsampling. From the methodological works, we differ in our assumptions (uniform, rather than Gaussian noise), focus on efficient algorithms (subsampled subspace proximity testers) for the test, and our PAC guarantees.…”
Monitoring of streamed data to detect abnormal behaviour (variously known as event detection, anomaly detection, change detection, or outlier detection) underlies many applications, especially within the Internet of Things. There, one often collects data from a variety of sources, with asynchronous sampling, and missing data. In this setting, one can detect abnormal behavior using low-rank techniques. In particular, we assume that normal observations come from a low-rank subspace, prior to being corrupted by a uniformly distributed noise. Correspondingly, we aim to recover a representation of the subspace, and perform event detection by running point-to-subspace distance query for incoming data. We use a variant of low-rank factorisation, which considers interval uncertainty sets around "known entries", on a suitable flattening of the input data to obtain a low-rank model. On-line, we compute the distance of incoming data to the low-rank normal subspace and update the subspace to keep it consistent with the seasonal changes present. For the distance computation, we consider subsampling. We bound the one-sided error as a function of the number of coordinates employed. In our experimental evaluation, we test the proposed algorithm on induction-loop data from Dublin, Ireland.
“…As data-driven methods do not require explicit physical models, they can cope with complex, complicated, and heterogeneous phenomena. There are many data-driven methods for the security issues, such as the geometrically designed residual filter [46], signal analytics based [152], generalized likelihood ratio [153], the cumulative sum (CUSUM) [154], leverage score [155], influential point selection [156], support vector machine (SVM) [121], Gaussian mixture model (GMM) [122], neural networks [123], machine learning [121], deep learning [157], and so on.…”
Section: Data-driven Cyber-attack Detection and Mitigationmentioning
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.