2021
DOI: 10.1109/access.2021.3106873
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Source Multi-Domain Data Fusion for Cyberattack Detection in Power Systems

Abstract: Modern power systems equipped with advanced communication infrastructure are cyberphysical in nature. The traditional approach of leveraging physical measurements for detecting cyberinduced physical contingencies are insufficient to reflect the accurate cyber-physical states. Moreover, deploying conventional rule-based and anomaly-based intrusion detection systems for cyberattack detection results in higher false positives. Hence, independent usage of detection tools of cyberattacks in cyber and physical sides… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 59 publications
(27 citation statements)
references
References 71 publications
(62 reference statements)
0
27
0
Order By: Relevance
“…A distributive and collaborative-based IDS is proposed using DSTE for fusion data from multiple nodes [20], where the detection is done collaboratively and the decision is distributed among all nodes. The presented work, IDEA-I, is the first to leverage DS theory for the purpose of classification based on the dataset [11] generated from Man-in-The-Middle (MiTM) attacks in a cyber-physical power system testbed [21]. DSTE suffers from major drawbacks of its computational requirements and the challenges it encounters while eliciting the probability masses from multiple evidence [13].…”
Section: Development Of Idea-i From Dempster-shafer Theory and Combin...mentioning
confidence: 99%
See 4 more Smart Citations
“…A distributive and collaborative-based IDS is proposed using DSTE for fusion data from multiple nodes [20], where the detection is done collaboratively and the decision is distributed among all nodes. The presented work, IDEA-I, is the first to leverage DS theory for the purpose of classification based on the dataset [11] generated from Man-in-The-Middle (MiTM) attacks in a cyber-physical power system testbed [21]. DSTE suffers from major drawbacks of its computational requirements and the challenges it encounters while eliciting the probability masses from multiple evidence [13].…”
Section: Development Of Idea-i From Dempster-shafer Theory and Combin...mentioning
confidence: 99%
“…Different Supervised Learning (SL)-based classifiers are used in the Data Fusion Engine [ 11 ]. The probability scores based on the classifier’s output for each data point are considered for computing the mass function from each evidence.…”
Section: Development Of Idea-i From Dempster–shafer Theory and Combin...mentioning
confidence: 99%
See 3 more Smart Citations