2019
DOI: 10.3390/en12244625
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Detection of Intermittent Cyber-Attacks in Networked Power Systems

Abstract: This article addresses the concept of a compound attack detection mechanism, that links estimation-based and set-theoretic methods, and is mainly focused on the disclosure of intermittent data corruption cyber-attacks. The detection mechanism is developed as a security enhancing tool for the load-frequency control loop of a networked power system that consists of several interconnected control areas. The dynamics of the power network are derived in observable form in the discrete-time domain, considering that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 35 publications
(89 reference statements)
0
8
0
Order By: Relevance
“…The concept of a compound attack detection mechanism, that links estimation-based and set-theoretic methods is addressed in [22] by Kontouras et al The detection mechanism is developed as a security enhancing tool for the load-frequency control loop of a networked power system that consists of several interconnected control areas. Simulations indicate that an estimation-based detector is unable to discern an intermittent attack.…”
Section: Published Papers Highlightsmentioning
confidence: 99%
“…The concept of a compound attack detection mechanism, that links estimation-based and set-theoretic methods is addressed in [22] by Kontouras et al The detection mechanism is developed as a security enhancing tool for the load-frequency control loop of a networked power system that consists of several interconnected control areas. Simulations indicate that an estimation-based detector is unable to discern an intermittent attack.…”
Section: Published Papers Highlightsmentioning
confidence: 99%
“…However, such a detector requires additional physical communication channels, which may not be feasible or realistic. Traditional analytical redundancy-based passive anomaly detectors are enhanced in [35] and [36] for detecting stealthy integrity attacks by using a backward-in-time signal processor. In these studies, even a small change due to a stealthy integrity attack is amplified by a backward-in-time signal processor such that the amplified change becomes sufficiently "large" to be detected.…”
Section: A State Of the Artmentioning
confidence: 99%
“…In these studies, even a small change due to a stealthy integrity attack is amplified by a backward-in-time signal processor such that the amplified change becomes sufficiently "large" to be detected. However, stealthy intermittent integrity attacks are not considered in [34]- [36].…”
Section: A State Of the Artmentioning
confidence: 99%
See 1 more Smart Citation
“…(2) Intermittent (inter): every targeted instance is followed by a non-attacked instance and vice versa. In [34], this pattern showed to be hardly detected by an estimation-based detector;…”
Section: Threat Modelmentioning
confidence: 99%