2014 7th International Symposium on Resilient Control Systems (ISRCS) 2014
DOI: 10.1109/isrcs.2014.6900095
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning for power system disturbance and cyber-attack discrimination

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

4
81
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 159 publications
(85 citation statements)
references
References 17 publications
4
81
0
Order By: Relevance
“…First, this work demonstrates a new classifier capable of distinguishing power-system disturbances and cyber security attacks that interrupt power-system control actions and mimic real disturbances. Compared to a similar work in [11], the method described in this paper provides precise classifications of fault types and the types of cyber-attacks with similar accuracy. Second, this work uses the common path-mining algorithm to mine fused heterogeneous data and create common paths for each known event type.…”
Section: Classification Of Disturbances and Cyber-attacks In Power Symentioning
confidence: 98%
See 3 more Smart Citations
“…First, this work demonstrates a new classifier capable of distinguishing power-system disturbances and cyber security attacks that interrupt power-system control actions and mimic real disturbances. Compared to a similar work in [11], the method described in this paper provides precise classifications of fault types and the types of cyber-attacks with similar accuracy. Second, this work uses the common path-mining algorithm to mine fused heterogeneous data and create common paths for each known event type.…”
Section: Classification Of Disturbances and Cyber-attacks In Power Symentioning
confidence: 98%
“…Hardware-in-the-loop (HIL) simulation allows targeted dataset creation with realistic scenarios captured from the same commercial devices found in utilities. The same datasets used in this work have also been used in [11] for synchrophasor data-mining research.…”
Section: Classification Of Disturbances and Cyber-attacks In Power Symentioning
confidence: 99%
See 2 more Smart Citations
“…These methods have become increasingly effective at detecting sophisticated attacks by analyzing both the profile of the attacks and the damage as it unfolds [6]. Attacks of limited impact, when quickly contained, may be acceptable if used to learn more effective defenses [7]. When firewalls are deficient, methods based on machine learning and AI operate like drugs in the human body, and can quickly identify and mitigate the effect of viruses and worms [10,11].…”
Section: Introductionmentioning
confidence: 99%