2019 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia) 2019
DOI: 10.1109/isgt-asia.2019.8881319
|View full text |Cite
|
Sign up to set email alerts
|

Isolation Forest based Detection for False Data Attacks in Power Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…The work highlights that the analysis on ON-OFF and data omission attacks with minor modifications to the tier-2 detection level approach can also be considered for future studies. In [69], researchers have developed an isolation forest-based detection method to detect FDIA without a pretraining procedure for detection labels in a power system with an fast detection accuracy rate 96.3% at time 1.944 sec. In [70], the authors have developed a highly randomized tree algorithm to detect FDIA, which jeopardizes power system state estimation by applying FDIA into smart meter measurements.…”
Section: ) Detection Of Devices Through Cyber-attacksmentioning
confidence: 99%
“…The work highlights that the analysis on ON-OFF and data omission attacks with minor modifications to the tier-2 detection level approach can also be considered for future studies. In [69], researchers have developed an isolation forest-based detection method to detect FDIA without a pretraining procedure for detection labels in a power system with an fast detection accuracy rate 96.3% at time 1.944 sec. In [70], the authors have developed a highly randomized tree algorithm to detect FDIA, which jeopardizes power system state estimation by applying FDIA into smart meter measurements.…”
Section: ) Detection Of Devices Through Cyber-attacksmentioning
confidence: 99%
“…Experimentation considered 4 real-time datasets taken from UCI source validate that the suggested procedure can efficiently detect anomalies for the considered data. Song et al [47] employed isolation forest method to detect attacks on power systems which are very vulnerable to cyber-attacks. Authors [48] find isolation forest useful in finding anomalous data patterns in sensory data generated by IoT environment.…”
Section: A Deep Learning Based Idsmentioning
confidence: 99%