Detection of cyber attacks on smart grids

نویسندگان

چکیده

The paper analyzes observations using a logic-based numerical methodology in Python. Logical Analysis of Data (LAD) specializes selecting minimal number features and finding unique patterns within it to distinguish ‘positive’ from ‘negative’ observations. Python implementation the classification model is further improved by introducing adaptations pattern generation techniques. Finally, case study Power Attack Systems Dataset used improvise Smart Grid technology performed explore real-life applications analyze its performance against commonly

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

REACT to Cyber Attacks on Power Grids

Motivated by the recent cyber attack on the Ukrainian power grid, we study cyber attacks on power grids that affect both the physical infrastructure and the data at the control center. In particular, we assume that an adversary attacks an area by: (i) remotely disconnecting some lines within the attacked area, and (ii) modifying the information received from the attacked area to mask the line f...

متن کامل

Identification of "unobservable" cyber data attacks on power grids

This paper presents a new framework of identifying cyber data attacks on synchrophasor measurements. We focus on detecting “unobservable” cyber data attacks that cannot be detected by any existing detection method that purely relies on measurements received at one time instant. Leveraging the approximate low-rank property of phasor measurement unit (PMU) data, we formulate the unobservable cybe...

متن کامل

Smart Grids Cyber Security Issues and Challenges

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks....

متن کامل

Scalable Detection of Cyber Attacks

Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely laborintensive and error-prone. To address this important problem, we build on previous work on topological vulnerability analysis, and pro...

متن کامل

Cyber Risk Assessment of Transmission Lines in Smart Grids

The increasing use of information technologies in power systems has increased the risk of power systems to cyber-attacks. In this paper, we assess the risk of transmission lines being overloaded due to cyber-based false data injection attacks. The cyber risk assessment is formulated as bilevel optimization problems that determine the maximum line flows under false data injection attacks. We pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Computational Intelligence

سال: 2022

ISSN: ['2730-7808', '2730-7794']

DOI: https://doi.org/10.1007/s43674-022-00042-y