2021
DOI: 10.3389/fenrg.2021.666130
|View full text |Cite
|
Sign up to set email alerts
|

Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link

Abstract: Existing coordinated cyber-attack detection methods have low detection accuracy and efficiency and poor generalization ability due to difficulties dealing with unbalanced attack data samples, high data dimensionality, and noisy data sets. This paper proposes a model for cyber and physical data fusion using a data link for detecting attacks on a Cyber–Physical Power System (CPPS). The two-step principal component analysis (PCA) is used for classifying the system’s operating status. An adaptive synthetic samplin… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…In [17,18], two effective cyber-attack schemes for remote control units (RTUs) were proposed by Lallie et al and Wang et al, respectively. Meanwhile, a method was proposed based on an improved attack graph to evaluate the hazard of crossspace cascading faults in cyber-physical power systems [19,20]. Zhu et al [21] underlined the comparison requirement in a broader range of settings, which provided promising suggestions for further work.…”
Section: Introductionmentioning
confidence: 99%
“…In [17,18], two effective cyber-attack schemes for remote control units (RTUs) were proposed by Lallie et al and Wang et al, respectively. Meanwhile, a method was proposed based on an improved attack graph to evaluate the hazard of crossspace cascading faults in cyber-physical power systems [19,20]. Zhu et al [21] underlined the comparison requirement in a broader range of settings, which provided promising suggestions for further work.…”
Section: Introductionmentioning
confidence: 99%
“…And they use physical knowledge to intelligently derive signi cant features from a large number of noisy physical measurements [10]. Machine learning methods were used to identify the difference between normal activities and attack activities [11]. Wang et al [12] proposed a network attack identification algorithm based on temporal causality Bayesian network for the extraction of cooperative attack modes of physical systems in power networks.…”
Section: Introductionmentioning
confidence: 99%