The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.1109/jestpe.2019.2943449
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Identification of Cyber and Physical Attacks on Distribution Power Grids With PVs: An Online High-Dimensional Data-Driven Approach

Abstract: Cyber and physical attacks threaten the security of distribution power grids. The emerging renewable energy sources such as photovoltaics (PVs) introduce new potential vulnerabilities. Based on the electric waveform data measured by waveform sensors in the distribution power networks, in this paper, we propose a novel high-dimensional data-driven cyber physical attack detection and identification approach (HCADI). Firstly, we analyze the cyber and physical attack impacts (including cyber attacks on the solar i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 63 publications
(21 citation statements)
references
References 33 publications
0
21
0
Order By: Relevance
“…In [3], Li et al describe an online data-driven algorithm for detecting and identifying both cyber and physical attacks without the need for the training found in artificial intelligence/machine learning methods. It directly uses electrical waveform data to perform these determinations and is thus suitable for online deployment in power electronics hardware such as solar inverters.…”
Section: Guest Editorial Special Section On Cybersecurity Of Power El...mentioning
confidence: 99%
“…In [3], Li et al describe an online data-driven algorithm for detecting and identifying both cyber and physical attacks without the need for the training found in artificial intelligence/machine learning methods. It directly uses electrical waveform data to perform these determinations and is thus suitable for online deployment in power electronics hardware such as solar inverters.…”
Section: Guest Editorial Special Section On Cybersecurity Of Power El...mentioning
confidence: 99%
“…], and fewer still, which allow for missing data [63], [64]. Some of the recent ones [30], [33]- [35], [65], [66] also consider low-rank factorizations, albeit without subsampling. From the methodological works, we differ in our assumptions (uniform, rather than Gaussian noise), focus on efficient algorithms (subsampled subspace proximity testers) for the test, and our PAC guarantees.…”
Section: Related Workmentioning
confidence: 99%
“…As data-driven methods do not require explicit physical models, they can cope with complex, complicated, and heterogeneous phenomena. There are many data-driven methods for the security issues, such as the geometrically designed residual filter [46], signal analytics based [152], generalized likelihood ratio [153], the cumulative sum (CUSUM) [154], leverage score [155], influential point selection [156], support vector machine (SVM) [121], Gaussian mixture model (GMM) [122], neural networks [123], machine learning [121], deep learning [157], and so on.…”
Section: Data-driven Cyber-attack Detection and Mitigationmentioning
confidence: 99%