Dynamic Security Assessment for Power System Under Cyber-Attack

被引:10
作者
Al-Gburi, Qusay A. [1 ]
Ariff, Mohd Aifaa Mohd [1 ]
机构
[1] Univ Tun Hussein Onn, Fac Elect & Elect Engn, Dept Elect Power Engn, Parit Raja 86400, Malaysia
关键词
Dynamic security assessment; Cyber-attack; Decision tree; Logistic model trees; Symmetrical uncertainty; FEATURE-SELECTION;
D O I
10.1007/s42835-019-00084-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, power systems have become more dependent on new technological advancement in the communication network to send and receive data and commands through the wide area power network. This dependence has created a new threat to the network, known as a cyber-attack. Such attacks could lead to blackouts and the consequences on the security of the power system would be severe. This study presents a new approach, which aims at assessing the dynamic behavior of the test system's model under a cyber-attack contingency. The methodology used in this study was based on the scenarios of cyber-attacks on the protection relay devices to generate the database for dynamic security assessment. Then, a data mining framework was used for the database preparation and classification via feature selection algorithm and decision tree classifier. The results of the modified IEEE 30-bus test system model in this study showed a high accuracy of 99.537%, and a short time frame that makes this application suitable for real-time application to protect the power network from an insecure state and ensure that the power system remains reliable.
引用
收藏
页码:549 / 559
页数:11
相关论文
共 42 条
[1]  
Al-Gubri Q.A., 2016, 4th IET Clean Energy and Technology Conference (CEAT 2016), P37
[2]   A Novel Implementation for Generator Rotor Angle Stability Prediction Using an Adaptive Artificial Neural Network Application for Dynamic Security Assessment [J].
AL-Masri, Ahmed Naufal ;
Ab Kadir, Mohd Zainal Abidin ;
Hizam, Hashim ;
Mariun, Norman .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (03) :2516-2525
[3]  
[Anonymous], INT J RES REV COMPUT
[4]  
[Anonymous], 2012, International Journal of Computer Applications, DOI [DOI 10.5120/8762-2680, 10.5120/8762-2680]
[5]  
[Anonymous], 2009, Wall Str. J
[6]  
Cleveland F. M., 2008, 2008 IEEE POW EN SOC
[7]   Dynamic IEEE Test Systems for Transient Analysis [J].
Demetriou, Panayiotis ;
Asprou, Markos ;
Quiros-Tortos, Jairo ;
Kyriakides, Elias .
IEEE SYSTEMS JOURNAL, 2017, 11 (04) :2108-2117
[8]  
Doetsch Patrick., 2009, JMLR WCP, V7, P77
[9]   Research on collaborative negotiation for e-commerce. [J].
Feng, YQ ;
Lei, Y ;
Li, Y ;
Cao, RZ .
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, :2085-2088
[10]  
Frank E., 2005, Data Mining: Practical Machine Learning Tools and Techniques