2022
DOI: 10.3390/en15124328
|View full text |Cite
|
Sign up to set email alerts
|

Data Mining-Based Cyber-Physical Attack Detection Tool for Attack-Resilient Adaptive Protective Relays

Abstract: Maintaining proper operation of adaptive protection schemes is one of the main challenges that must be considered for smart grid deployment. The use of reliable cyber detection and protection systems boosts the preparedness potential of the network as required by National Infrastructure Protection Plans (NIPPS). In an effort to enhance grid cyber-physical resilience, this paper proposes a tool to enable attack detection in protective relays to tackle the problem of compromising their online settings by cyber a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 26 publications
0
9
0
Order By: Relevance
“…Table 2 provides a comprehensive overview of the limitations that are associated with the adaptive protection schemes in microgrids, along with the limited research proposed in the existing literature for investigating the cyber-physical threats. Rahman et al [28] and Mohamed and Salama [35] introduced two tools to identify cyber threats on the power protection system. However, the paper did not address the impact of cyber threats on different adaptive OCR with and without communication needs.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 2 provides a comprehensive overview of the limitations that are associated with the adaptive protection schemes in microgrids, along with the limited research proposed in the existing literature for investigating the cyber-physical threats. Rahman et al [28] and Mohamed and Salama [35] introduced two tools to identify cyber threats on the power protection system. However, the paper did not address the impact of cyber threats on different adaptive OCR with and without communication needs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The time transfer demands of these information exchanges are determined by their importance to the operation of the substation and protection system. Furthermore, Table 3 presents the main message categories found for protection systems in substation, along by the performance standards specified in IEC 61850-5 [39,40]. The substation is structured into different message types, as described in IEC 61850-5, each with predetermined maximum time required for a transfer process.…”
Section: Potential Cyber-physical Threats For Adaptive Protection Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Applying large number of logical operators in algorithm and multiple telecommunication routes is the main drawback of proposed method. In [40], false data injection attack in overcurrent relay settings is detected. Monte Carlo simulation is done to train data sets and load conditional commands using the rough classification method.…”
Section: Cyber-security Concept On Power Systemmentioning
confidence: 99%
“…Based on the characteristics of big data, a reasonable access method needs to be designed to access the huge amount of ponderous data. Thus, the hit rate of data access in the distributed memory cache layer can be improved as much as possible so that the advantages of in-memory data storage in terms of read and write access performance can be exploited [30]- [33].…”
Section: Data Accessmentioning
confidence: 99%