Methods of cyber-attack identification for power systems based on bilateral cyber-physical information

被引:22
作者
Wang, Qi [1 ]
Cai, Xingpu [1 ]
Tang, Yi [1 ]
Ni, Ming [2 ]
机构
[1] Southeast Univ, Sch Elect Engn, Nanjing 210096, Peoples R China
[2] State Grid Elect Power Res Inst, Nanjing 210096, Peoples R China
关键词
Cyber-physical power system; Cyber-attack identification; Characteristic sequence; Data mining;
D O I
10.1016/j.ijepes.2020.106515
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber-attacks present great challenges to modern power systems. Well-designed cyber-attacks can mimic normal faults, making it difficult to identify the causes of power system faults. Collaboratively applying bilateral information from both the cyber side and the physical side can help to accurately identify fault causes (e.g., incidental faults or cyber-attacks), which can provide a premise for taking timely countermeasures to avoid the spread of failure. In this paper, to comprehensively express the system state, a data fusion model is first proposed to combine this bilateral information, together with a discretization method based on expert experience. Then, a characteristic sequence extraction method is presented to obtain patterns indicative of different kinds of events. To improve the identification accuracy and efficiency of the pure sequence-matching-based identification method, empirical sequences and original data are integrated to drive a new identification method. Finally, the proposed methods are verified by simulations on a co-simulation platform. The results show that practical requirements can be met in terms of reliability, efficiency and accuracy.
引用
收藏
页数:12
相关论文
共 28 条
[1]  
[Anonymous], 2018, IEEE T SMART GRID
[2]  
[Anonymous], 2011, TPL001WECCCRT2 WECC
[3]  
[Anonymous], 1996, P INT C EXT DAT TECH
[4]  
[Anonymous], 2009, ELECT J DIFFERENTIAL, DOI DOI 10.1371/J0URNAL.P0NE.0106787
[5]  
[Anonymous], 2001, DL7552001 SGCC
[6]  
[Anonymous], 2012, P 2 ACM C DAT APPL S
[7]  
Brockwell PJ, 2002, INTRO TIME SERIES FO, DOI [10.1007/b97391(5):138-177., DOI 10.1007/B97391(5):138-177]
[8]   Lessons from Stuxnet [J].
Chen, Thomas M. ;
Abu-Nimeh, Saeed .
COMPUTER, 2011, 44 (04) :91-93
[9]   Relay performance verification using fault event records [J].
Das, Swagata ;
Ananthan, Sundaravaradan Navalpakkam ;
Santoso, Surya .
PROTECTION AND CONTROL OF MODERN POWER SYSTEMS, 2018, 3 (01)
[10]  
George Edward Pelham Box e Gwilym Jenkins., 1990, Time Series Analysis, Forecasting and Control