2018 IEEE Power &Amp; Energy Society General Meeting (PESGM) 2018
DOI: 10.1109/pesgm.2018.8586159
|View full text |Cite
|
Sign up to set email alerts
|

Decision Tree Based Anomaly Detection for Remedial Action Scheme in Smart Grid using PMU Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 8 publications
0
17
0
Order By: Relevance
“…Yan et al [18] compared SVM, KNN, and extended nearest neighbor (ENN) for detecting both a direct and stealth FDI attack in smart grids. Singh et al [19] proposed a decision tree-based anomaly detection approach based on PMU measurements to distinguish the normal tripping from power line faults and malicious attacks tripping the physical relays. An Adaboost-based classification model using the random forest as the base classifier using individual PMU data was developed in [20] for detecting power system disturbances and cyber attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Yan et al [18] compared SVM, KNN, and extended nearest neighbor (ENN) for detecting both a direct and stealth FDI attack in smart grids. Singh et al [19] proposed a decision tree-based anomaly detection approach based on PMU measurements to distinguish the normal tripping from power line faults and malicious attacks tripping the physical relays. An Adaboost-based classification model using the random forest as the base classifier using individual PMU data was developed in [20] for detecting power system disturbances and cyber attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The cyber physical system (CPS) federated testbed works as a driving force to enable the pipeline from state-ofthe art research work through the transition to industry by experimental testing and validation. In this work, we have presented a cyber (network) based federated testbed; inspired by the NASPINet architecture, to evaluate the applied anomaly detector, as proposed in [6], in terms of network latency, communication bandwidth, and accuracy rate. We have implemented the realistic data integrity attacks targeting physical relays and substation RTUs, located at the ISU Power Cyber lab.…”
Section: Discussionmentioning
confidence: 99%
“…The attacker closes the legitimate RTU program and initiates a python scripted malicious logic routine which periodically sends control signals to the simulator targeting the generator (Gen 6) to initiate ramp and pulse attacks. We have also simulated three phase to ground faults followed by the normal tripping of the line L16-17 to simulate physical disturbances; and multiple simulations are performed for different cases as discussed in [6]. It is appropriate to note that the due to the space limitation, we are not discussing the details of different scenarios required for generating the labeled datasets.…”
Section: Federation Architecture and Detection Methodologymentioning
confidence: 99%
See 2 more Smart Citations