2023
DOI: 10.1109/tsg.2022.3188489
|View full text |Cite
|
Sign up to set email alerts
|

PDDL: Proactive Distributed Detection and Localization Against Stealthy Deception Attacks in DC Microgrids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 52 publications
0
3
0
Order By: Relevance
“…BIRCH is used to identify anomalies, and root cause analysis (RCA) is performed by employing a graph that represents anomaly transmission across systems. Additionally, there is recent research in this field as discussed in [44][45][46][47][48][49][50][51][52][53].…”
Section: Literature Reviewmentioning
confidence: 99%
“…BIRCH is used to identify anomalies, and root cause analysis (RCA) is performed by employing a graph that represents anomaly transmission across systems. Additionally, there is recent research in this field as discussed in [44][45][46][47][48][49][50][51][52][53].…”
Section: Literature Reviewmentioning
confidence: 99%
“…One specific threat that poses a significant risk to consensus-based secondary control in CPS-based microgrids is the replay attack [36]. A replay attack involves an attacker intercepting valid communication between devices and then replaying or resending those messages to deceive the system [37]. In the context of consensus-based control, replay attacks could lead to incorrect decisions being made by the DERs [38].…”
Section: Introductionmentioning
confidence: 99%
“…To conduct penetration testing in large-scale network environments, a penetration scenario is transformed into the planning domain definition language (PDDL), and classical planning algorithms are used to discover the attack paths. The penetration testing network environment is modeled by description files of the network configuration and vulnerability information [3][4][5]. The basic idea of this kind of method is to transform the penetration testing problem into PDDL, and then to obtain the attack path by using an artificial intelligence planning algorithm.…”
Section: Introductionmentioning
confidence: 99%