Volume 19 No 9 (2021)
 Download PDF
ADAPTIVE HIERARCHICAL CYBER ATTACK DETECTION AND LOCALIZATION IN ACTIVE DISTRIBUTION SYSTEM
B V Pranay Kumar, A Sowmya, K Raja Shekar, Thakur Gayathri
Abstract
Since dispersed renewable energy sources are increasingly being integrated into the grid, developing a cyber security plan for active distribution systems has become more difficult. This article describes an approach to using electrical waveform analysis to identify and localise cyberattacks in distributed active distribution systems. The cornerstone for cyber attack detection is a sequential deep learning model, which allows the identification of even the slightest intrusions. The targeted cyberattack is initially localised inside the estimated cyberattack sub-region in a two-stage process. We present a network splitting approach based on a modified form of spectral clustering for "coarse" localisation of hierarchical cyber-attacks. To further localise the origin of a cyber assault, it is advised to define a number of waveform parameters and apply a normalised effect score based on statistical metrics of the waves themselves. Finally, a thorough quantitative assessment based on two case studies demonstrates that the proposed framework yields accurate estimations in contrast to both classic and state-of-the-art methods. Search Term Suggestions: Support Vector Machine; Random Forest; Gradient Boosting; Logistic Regression; Cyber Attack Detection.
Keywords
Since dispersed renewable energy sources are increasingly being integrated into the grid, developing a cyber security plan for active distribution systems has become more difficult.
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.