Model-Based Attack Detection and Mitigation for Automatic Generation Control

被引:345
作者
Sridhar, Siddharth [1 ]
Govindarasu, Manimaran [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
基金
美国国家科学基金会;
关键词
Anomaly detection; automatic generation control; intrusion detection systems; kernel density estimation; supervisory control and data acquisition; CYBER ATTACK; REAL-TIME;
D O I
10.1109/TSG.2014.2298195
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber systems play a critical role in improving the efficiency and reliability of power system operation and ensuring the system remains within safe operating margins. An adversary can inflict severe damage to the underlying physical system by compromising the control and monitoring applications facilitated by the cyber layer. Protection of critical assets from electronic threats has traditionally been done through conventional cyber security measures that involve host-based and network-based security technologies. However, it has been recognized that highly skilled attacks can bypass these security mechanisms to disrupt the smooth operation of control systems. There is a growing need for cyber-attack-resilient control techniques that look beyond traditional cyber defense mechanisms to detect highly skilled attacks. In this paper, we make the following contributions. We first demonstrate the impact of data integrity attacks on Automatic Generation Control (AGC) on power system frequency and electricity market operation. We propose a general framework to the application of attack resilient control to power systems as a composition of smart attack detection and mitigation. Finally, we develop a model-based anomaly detection and attack mitigation algorithm for AGC. We evaluate the detection capability of the proposed anomaly detection algorithm through simulation studies. Our results show that the algorithm is capable of detecting scaling and ramp attacks with low false positive and negative rates. The proposed model-based mitigation algorithm is also efficient in maintaining system frequency within acceptable limits during the attack period.
引用
收藏
页码:580 / 591
页数:12
相关论文
共 28 条
[1]  
[Anonymous], 2011, W32.Stuxnet Dossier
[2]  
[Anonymous], IEEE T SMART GRID
[3]  
[Anonymous], P ACM COMPUT SURV
[4]  
[Anonymous], ANAL OPERATIONS CYBE
[5]  
[Anonymous], CONTROL SYSTEMS CYBE
[6]  
[Anonymous], SPECIAL PUBLICATION
[7]  
[Anonymous], 2000, 2000 CHALM U TECHN D
[8]  
[Anonymous], MRO UNDER FREQUENCY
[9]  
Bevrani H, 2009, POWER ELECTRON POWER, P1, DOI 10.1007/978-0-387-84878-5_1
[10]  
Bigham J, 2003, LECT NOTES COMPUT SC, V2776, P171