Decentralized Intrusion Prevention (DIP) Against Co-Ordinated Cyberattacks on Distribution Automation Systems

被引:10
作者
Appiah-Kubi, Jennifer [1 ]
Liu, Chen-Ching [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
来源
IEEE OPEN ACCESS JOURNAL OF POWER AND ENERGY | 2020年 / 7卷
基金
美国国家科学基金会;
关键词
Cyber-physical system security; smart grid; distribution systems; intrusion detection; anomaly detection; multi-agent system; VULNERABILITY ASSESSMENT; CYBER SECURITY; PROTECTION;
D O I
10.1109/OAJPE.2020.3029805
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Integration of Information and Communications Technology (ICT) into the distribution system makes today's power grid more remotely monitored and controlled than it has been. The fast increasing connectivity, however, also implies that the distribution grid today, or smart grid, is more vulnerable. Thus, research into intrusion/anomaly detection systems at the distribution level is in critical need. Current research on Intrusion Detection Systems for the power grid has been focused primarily on cyber security at the Supervisory Control And Data Acquisition, and single node levels with little attention on coordinated cyberattacks at multiple nodes. A holistic approach toward system-wide cyber security for distribution systems is yet to be developed. This paper presents a novel approach toward intrusion prevention, using a multi-agent system, at the distribution system level. Simulations of the method have been performed on the IEEE 13-Node Test Feeder, and the results compared to those obtained from existing methods. The results have validated the performance of the proposed method for protection against cyber intrusions at the distribution system level.
引用
收藏
页码:389 / 402
页数:14
相关论文
共 37 条
  • [1] Akyol B. A, 2012, P 3 INT WORKSH AG TE
  • [2] Amullen EA, 2018, WORLD AUTOMAT CONG, P80, DOI 10.23919/WAC.2018.8430423
  • [3] Bertsekas D., 2015, Parallel and Distributed Computation: Numerical Methods
  • [4] Biondi P., 2019, Scapy
  • [5] Intrusion Detection using a Multiple-Detector Set Artificial Immune System
    Brown, James
    Anwar, Mohd
    Dozier, Gerry
    [J]. PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI), 2016, : 283 - 286
  • [6] Calkins H, 2017, J ARRYTHM, V33, P369, DOI 10.1016/j.joa.2017.08.001
  • [7] Chih-Che Sun, 2016, 2016 Power Systems Computation Conference (PSCC), P1, DOI 10.1109/PSCC.2016.7540902
  • [8] Risk Assessment for Cyberattack in Active Distribution Systems Considering the Role of Feeder Automation
    Dai, Qiangsheng
    Shi, Libao
    Ni, Yixin
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2019, 34 (04) : 3230 - 3240
  • [9] Duan XM, 2015, IEEE DECIS CONTR P, P4517, DOI 10.1109/CDC.2015.7402925
  • [10] El Ajjouri M, 2015, 2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), P241