Intrusion Detection, Measurement Correction, and Attack Localization of PMU Networks
نویسندگان
چکیده
Accurate state estimation is essential for correct supervision of power grids. With the existence cyber-attacks, may become inaccurate, which can eventually lead to wrong supervisory decision making. To detect cyber-attacks in grids equipped with phasor measurement units (PMUs), a new intrusion detection system based on clustering approach, called PMU Intrusion Detection System (PMUIDS), proposed this article. After solving optimal placement N -1 contingency, several static estimations are obtained by removing measurements one each time. The resulting vectors clustered two steps: First, subtractive employed obtain number clusters, determines integrity attacks; and second, fuzzy C-means assigns corresponding attacked PMUs. In addition, theorems proved, indicate that attacker cannot coordinate successful stealth attacks cases PMUs from estimation, still remains full observable. Furthermore, case possible attacks, falsify any arbitrary variable. hardware-in-the-loop results sample show approach determine vector, localize even multiple simultaneous attacks.
منابع مشابه
An Effective Intrusion Detection System for Detection and Correction of Gray Hole Attack in MANETs
Mobile Adhoc Networks is a collection of wireless mobile nodes, which form temporary networks without relying on any existing infrastructure or centralized administration or standard support services regularly available in wide area networks to which the host may normally be connected. In this paper the simulation results has been compared between previous & current approach for the correction ...
متن کاملReal-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach
Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملMultistep Attack Detection and Alert Correlation in Intrusion Detection Systems
A growing trend in the cybersecurity landscape is represented by multistep attacks that involve multiple correlated intrusion activities to reach the intended target. The duty of correlating security alerts and reconstructing complete attack scenarios is left to system administrators because current Network Intrusion Detection Systems (NIDS) are still oriented to generate alerts related to sing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Industrial Electronics
سال: 2022
ISSN: ['1557-9948', '0278-0046']
DOI: https://doi.org/10.1109/tie.2021.3080212