2021
DOI: 10.1109/tsg.2020.3040361
|View full text |Cite
|
Sign up to set email alerts
|

A Deep Learning-Based Cyberattack Detection System for Transmission Protective Relays

Abstract: The digitalization of power systems over the past decade has made the cybersecurity of substations a top priority for regulatory agencies and utilities. Proprietary communication protocols are being increasingly replaced by standardized and interoperable protocols providing utility operators with remote access and control capabilities at the expense of growing cyberattack risks. In particular, the potential of supply chain cyberattacks is on the rise in industrial control systems. In this environment, there is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 63 publications
(30 citation statements)
references
References 27 publications
0
30
0
Order By: Relevance
“…Firms showed benefits, such as an increase of productivity, and faster time responses to suppliers and consumers. RA from the Adoption of decision-making processes is more relevant for organizations in logistics, maritime (Mileski et al, 2018) and manufacturing organizations (Huma et al, 2021;Khaw et al, 2021) than for those organizations in the service industry. On a comparative note, Yeboah-Ofori et al (2021), highlighted the following sectors as cyber vulnerable: Energy, Communication, Transport, Health-care and Manufacturing, and calls on cybersecurity to include the global delivery of physical goods plus the delivery of software.…”
Section: Discussionmentioning
confidence: 99%
“…Firms showed benefits, such as an increase of productivity, and faster time responses to suppliers and consumers. RA from the Adoption of decision-making processes is more relevant for organizations in logistics, maritime (Mileski et al, 2018) and manufacturing organizations (Huma et al, 2021;Khaw et al, 2021) than for those organizations in the service industry. On a comparative note, Yeboah-Ofori et al (2021), highlighted the following sectors as cyber vulnerable: Energy, Communication, Transport, Health-care and Manufacturing, and calls on cybersecurity to include the global delivery of physical goods plus the delivery of software.…”
Section: Discussionmentioning
confidence: 99%
“…Due to the hybridization approach, the additional hyperparameters dramatically decrease the model's learning efficiency [85]. In [86], an unsupervised DL scheme-based cyberattack detection system for transmission protective relays has been proposed using a 1-dimensional convolutional-based AE. A comparative study of AE and its variants is presented in Table 3.…”
Section: E Autoencodersmentioning
confidence: 99%
“…3. This attack model exploits the vulnerabilities in the IEC 61850 protocol to capture and modify, or fabricate false signals, as discussed in [36], [37]. This attack is feasible due to lack of communication encryption.…”
Section: Attack Modelmentioning
confidence: 99%