Professional Documents
Culture Documents
ISSN No:-2456-2165
Abstract:- Creating a cyber security strategy for active several smart grid levels, including as the transmission,
distribution systems is challenging due to the integration substation, and distribution levels [3].
of distributed renewable energy source. This essay
presents a methodology for adaptive hierarchical cyber- Modern electric vehicles' power train systems' cyber-
attack localisation and detection for distributed active physical security (EVs). The paper discusses the weaknesses
distribution systems utilising electrical waveform and difficulties of EV power train systems, including
analysis. The foundation for cyber attack detection is a intrusions on the communication networks, electric motor
sequential deep learning model, which enables the control, and battery management system [4]. Using support
detection of even the tiniest cyberattacks. The two-stage vector machines, a hierarchical intrusion detection system
approach first estimates the cyber-attack sub-region (IDS) for industrial control networks (SVMs). The
before localising the specified cyber-attack within it. For suggested approach is intended to identify and categorise
the "coarse" localization of hierarchical cyber-attacks, various intrusion types, such as reconnaissance assaults,
we propose a modified spectral clustering-based method DoS attacks, and data modification attacks. The models
of network partitioning. Second, it is recommended to distinguish between typical and aberrant network behaviour
use a normalised impact score based on waveform using a variety of parameters, including packet size and
statistical metrics to further pinpoint the location of a frequency [5] a data-driven technique based on synchronised
cyber attack by defining various waveform phasor measurement for locating single-phase grounding
features.Finally, a detailed quantitative evaluation using faults in distribution networks. The suggested approach
two case studies shows that the proposed framework makes use of the synchronised phasor data to determine the
produces good estimation results when compared to fault's location and kind as well as to calculate the fault
established and cutting-edge approaches. resistance [6] a smart system that uses deep learning to
detect fake data injection assaults in real time in smart grids.
Keywords:- SVM, Random Forest, Gradient Boosting, In order to identify aberrant changes brought on by bogus
Logistic Regression, Cyber Attack Detection. data injection assaults and learn the temporal patterns of the
power system data, the suggested approach makesa use of
I. INTRODUCTION neural network with long short-term memory (LSTM) [7].
Cyber-attacks have become more sophisticated in II. RELATED WORK
recent years, particularly those that target systems that store
or handle sensitive information. As vital information or A cutting-edge intrusion detection system (IDS)
services depend on critical national infrastructures, incorporating the REP Tree, JRip algorithm, and Forest PA
protecting them from cyberattacks becomes a significant classifier approaches, all of which are founded on decision
problem for both corporations and countries. Intrusion trees and rules-based ideas. Characteristics from the initial
detection systems (IDS) are utilised as a secondary line of data set as well as the results of the first and second
defence in addition to current preventive security techniques classifiers are inputs for the third classifier. Using the
like access restriction and authentication.IDS is able to CICIDS2017 dataset, which was proposed by Mehmood et
differentiate between legitimate conduct and malicious al [1], the experimental results show that the suggested IDS
behaviour based on a set of specified rules or patterns[1]. is superior to current state-of-the-art approaches in terms of
precision, rate of detection, frequency of false alarms, and
Power electronics converters are more susceptible to time overhead.Distribution power grid security is at risk
cyber/physical attacks as a result of their rising use in from both physical and digital attacks. Photovoltaics (PVs),
Internet of Things (IoT) enabled applications, such as smart one of the burgeoning renewable energy sources, introduces
grids. Because there is a dearth of cyber knowledge within new potential vulnerabilities. In this paper, an existing
the power electronics industry, it is more important than system creates a novel high-dimensional data-driven cyber
ever to create techniques for power electronics converters to physical attack detection and identification (HCADI)
detect and identify cyber/physical attacks in many safety- approach based on the electric waveform data collected by
critical applications. These malicious assaults have the waveform sensors in the distribution power networks and
potential to cause catastrophic failure and severe financial was proposed by F. Li, R. Xiewt. al [2].
loss if they are not identified in the early stages [2].
Employing extensive smart metre data, a hierarchical
architecture for anomaly detection in smart grids. The
suggested methodology is intended to identify anomalies at
III. METHODOLOGIES classifiers to identify attacks that have bypassed the top-
level detection mechanisms. These classifiers are trained on
A. GRADIENT BOOSTING more specialized data and can identify attacks that are
For classification and regression analysis, machine specific to certain components or behaviours within the
learning algorithms called gradient boosting are used. By system. The bottom layer of the hierarchy consists of
assembling a group of weak decision trees that have been response mechanisms that are activated once an attack has
trained on various subsets of the data, it operates. been detected. These mechanisms can include automated
Combining all of the decision trees' projections yields the responses such as blocking traffic, quarantining infected
ultimate conclusion. systems, and alerting security personnel.Gradient boosting
machine learning approach flowchart(Fig 4). A number of
The adaptive hierarchical approach using gradient weak classifiers make up the ensemble classifiers. In the
boosting involves the use of multiple layers of detection following classifier, the weights of the erroneously predicted
mechanisms that are organized hierarchically. At each layer, points are increased. The weighted average of the individual
gradient boosting classifiers are used to classify system data predictions serves as the basis for the final judgement.
and identify potential cyber-attacks. The top layer of the
hierarchy consists of a broad-based detection mechanism In addition to detection and response mechanisms,
that uses a gradient boosting classifier to identify known adaptive hierarchical cyber-attack detection and localization
attack patterns and deviations from normal system in active distribution systems using gradient boosting also
behaviour. The classifier is trained on historical data and is includes localization mechanisms that can pinpoint the
capable of identifying common attack signatures and location of the attack. These mechanisms use techniques
anomalies. such as network topology analysis and geo-location to
identify the source of the attack and the affected components
The middle layer of the hierarchy consists of more in the system.
specific detection mechanisms that use gradient boosting
C. LOGISTIC REGRESSION CLASSIFIERS This software computes binary logistic regression and
The link between a collection of independent multinomial logistic regression for independent variables
(explanatory) variables and a categorical dependent variable that are both numerical and categorical. It contains details
is examined using logistic regression analysis. The phrase on odds ratios, confidence intervals, probability, and
"logistic regression" is used when the dependent variable deviance as well as the regression equation. There is a
only has two values, such as 0 and 1 or Yes and No. When detailed residual analysis performed, complete with
the dependent variable, such as Married, Single, Divorced, diagnostic residual charts and reports. By carrying out an
or Widowed, has three or more distinct values, the term independent variable subset selection, it can search for the
multinomial logistic regression is typically best regression model with the fewest independent variables.
employed.Despite using a different set of data for the To help choose the ideal cut-off point for classification, it
dependent variable than multiple regression, the method has offers ROC curves and confidence intervals on predicted
a similar practical use. values. By automatically identifying rows that are not used
in the study, it enables you to verify your results.
FIG 8: SVM
V. CONCLUSION REFERENCES
In this research, we suggested an active distribution [1.] Mehmood, A., Abbas, H., & Khan, S. (2018). A
system-specific adaptive hierarchical cyber assault hierarchical intrusion detection system for power
localisation method. The aberrant features are captured distribution networks using decision trees. IEEE
using electric waveform data from WMU sensors, which Access, 6, 29268-29280. Doi:
would otherwise go unnoticed. We suggest a modified 10.1109/ACCESS.2018.2846620
spectral clustering method to firstly partition the entire large [2.] Li, R. Xie, B. Yang, L. Guo, P. Ma, J. Shi, J. Ye, and
network into more efficient, "coarse" sub-regions. Each W. Song, “Detection and identification of cyber and
sensor's effect score in the potential sub-region can then be physical attacks on distribution power grids with pvs:
calculated and analysed to pinpoint the precise site of the An online high-dimensional data-driven approach,”
'fine' cyber-attack. Also, we contrast our approach with IEEE Journal of Emerging and Selected Topics in
alternative approaches at each stage of the localization, sub- Power Electronics, Early Access
graph clustering, and detection of cyber-attacks, [3.] Li, G., Lu, Z., Wu, J., Liu, Y., & He, X. (2019).
respectively. The outcomes from two example distribution Anomaly detection in smart grids: A hierarchical
grids demonstrate the potential of our strategy. approach. IEEE Transactions on Smart Grid, 10(6),
6728-6739. doi: 10.1109/TSG.2018.2847337