Loading…
Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression
We study the problem of line failure detection following a cyber-physical attack. Since such attacks can result in line trippings (by remotely activating switches) as well as loss of measurement feeds, we consider an attack model in which an adversary attacks an area by: (i) disconnecting some lines...
Saved in:
Published in: | IEEE transactions on power systems 2019-09, Vol.34 (5), p.3758-3768 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803 |
---|---|
cites | cdi_FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803 |
container_end_page | 3768 |
container_issue | 5 |
container_start_page | 3758 |
container_title | IEEE transactions on power systems |
container_volume | 34 |
creator | Soltan, Saleh Mittal, Prateek Poor, H. Vincent |
description | We study the problem of line failure detection following a cyber-physical attack. Since such attacks can result in line trippings (by remotely activating switches) as well as loss of measurement feeds, we consider an attack model in which an adversary attacks an area by: (i) disconnecting some lines within the attacked area, and (ii) blocking the measurements coming from inside the attacked area from reaching the control center. Hence, after the attack, voltage phase angles of the buses and status of the lines inside the attacked area become unavailable to the grid operator. We build upon a recently introduced convex optimization method for detecting line failures and exploit Bayesian regression to develop the novel PROBER Algorithm for probabilistically detecting line failures after an attack using partial noisy measurements. The PROBER Algorithm provides the probability that each line is failed inside the attacked area in a running time which is independent of the number of line failures. Hence, these probabilities can be efficiently computed and used to make the existing brute force search methods tractable (for detecting multiple-line failures) by significantly reducing their search space. We numerically demonstrate that such an approach hits a sweet spot in accuracy and efficiency. |
doi_str_mv | 10.1109/TPWRS.2019.2910396 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2279818357</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8686241</ieee_id><sourcerecordid>2279818357</sourcerecordid><originalsourceid>FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803</originalsourceid><addsrcrecordid>eNo9kMtOAjEUhhujiYi-gG6auB7shem0S0RBExIJQkzcNJ3OGSjigG1ZzNtbhLg6i_9y_nwI3VLSo5Soh_n0Y_beY4SqHlOUcCXOUIfmucyIKNQ56hAp80yqnFyiqxDWhBCRhA76nLgG8Mi4zd4DfoIINrptgwd1BI8NHrYl-Gy6aoOzZoMHMRr7hZMhrgCPvavwIrhmiR9NC8GZBs9g6SGE1HGNLmqzCXBzul20GD3Phy_Z5G38OhxMMsu5ihk1AEAJs30BpkoTy0LktKxJXzBupLR5acHaqqSmyqmypTC8kryshWC1koR30f2xd-e3P3sIUa-3e9-kl5qxQkkqeV4kFzu6rN-G4KHWO---jW81JfrAUP8x1AeG-sQwhe6OIZc2_gekkIL1Kf8FvLJuBQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2279818357</pqid></control><display><type>article</type><title>Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression</title><source>IEEE Xplore (Online service)</source><creator>Soltan, Saleh ; Mittal, Prateek ; Poor, H. Vincent</creator><creatorcontrib>Soltan, Saleh ; Mittal, Prateek ; Poor, H. Vincent</creatorcontrib><description>We study the problem of line failure detection following a cyber-physical attack. Since such attacks can result in line trippings (by remotely activating switches) as well as loss of measurement feeds, we consider an attack model in which an adversary attacks an area by: (i) disconnecting some lines within the attacked area, and (ii) blocking the measurements coming from inside the attacked area from reaching the control center. Hence, after the attack, voltage phase angles of the buses and status of the lines inside the attacked area become unavailable to the grid operator. We build upon a recently introduced convex optimization method for detecting line failures and exploit Bayesian regression to develop the novel PROBER Algorithm for probabilistically detecting line failures after an attack using partial noisy measurements. The PROBER Algorithm provides the probability that each line is failed inside the attacked area in a running time which is independent of the number of line failures. Hence, these probabilities can be efficiently computed and used to make the existing brute force search methods tractable (for detecting multiple-line failures) by significantly reducing their search space. We numerically demonstrate that such an approach hits a sweet spot in accuracy and efficiency.</description><identifier>ISSN: 0885-8950</identifier><identifier>EISSN: 1558-0679</identifier><identifier>DOI: 10.1109/TPWRS.2019.2910396</identifier><identifier>CODEN: ITPSEG</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; Angle of attack ; Area measurement ; Bayes methods ; Bayesian analysis ; Bayesian regression ; Computational geometry ; Convexity ; cyber-physical attacks ; Cyberattack ; Data buses ; Failure detection ; machine learning ; Noise measurement ; Optimization ; Phase measurement ; Power grid ; Power grids ; state estimation ; Statistical analysis ; Switches ; Voltage measurement</subject><ispartof>IEEE transactions on power systems, 2019-09, Vol.34 (5), p.3758-3768</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803</citedby><cites>FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803</cites><orcidid>0000-0003-0607-1523 ; 0000-0002-2062-131X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8686241$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,54777</link.rule.ids></links><search><creatorcontrib>Soltan, Saleh</creatorcontrib><creatorcontrib>Mittal, Prateek</creatorcontrib><creatorcontrib>Poor, H. Vincent</creatorcontrib><title>Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression</title><title>IEEE transactions on power systems</title><addtitle>TPWRS</addtitle><description>We study the problem of line failure detection following a cyber-physical attack. Since such attacks can result in line trippings (by remotely activating switches) as well as loss of measurement feeds, we consider an attack model in which an adversary attacks an area by: (i) disconnecting some lines within the attacked area, and (ii) blocking the measurements coming from inside the attacked area from reaching the control center. Hence, after the attack, voltage phase angles of the buses and status of the lines inside the attacked area become unavailable to the grid operator. We build upon a recently introduced convex optimization method for detecting line failures and exploit Bayesian regression to develop the novel PROBER Algorithm for probabilistically detecting line failures after an attack using partial noisy measurements. The PROBER Algorithm provides the probability that each line is failed inside the attacked area in a running time which is independent of the number of line failures. Hence, these probabilities can be efficiently computed and used to make the existing brute force search methods tractable (for detecting multiple-line failures) by significantly reducing their search space. We numerically demonstrate that such an approach hits a sweet spot in accuracy and efficiency.</description><subject>Algorithms</subject><subject>Angle of attack</subject><subject>Area measurement</subject><subject>Bayes methods</subject><subject>Bayesian analysis</subject><subject>Bayesian regression</subject><subject>Computational geometry</subject><subject>Convexity</subject><subject>cyber-physical attacks</subject><subject>Cyberattack</subject><subject>Data buses</subject><subject>Failure detection</subject><subject>machine learning</subject><subject>Noise measurement</subject><subject>Optimization</subject><subject>Phase measurement</subject><subject>Power grid</subject><subject>Power grids</subject><subject>state estimation</subject><subject>Statistical analysis</subject><subject>Switches</subject><subject>Voltage measurement</subject><issn>0885-8950</issn><issn>1558-0679</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNo9kMtOAjEUhhujiYi-gG6auB7shem0S0RBExIJQkzcNJ3OGSjigG1ZzNtbhLg6i_9y_nwI3VLSo5Soh_n0Y_beY4SqHlOUcCXOUIfmucyIKNQ56hAp80yqnFyiqxDWhBCRhA76nLgG8Mi4zd4DfoIINrptgwd1BI8NHrYl-Gy6aoOzZoMHMRr7hZMhrgCPvavwIrhmiR9NC8GZBs9g6SGE1HGNLmqzCXBzul20GD3Phy_Z5G38OhxMMsu5ihk1AEAJs30BpkoTy0LktKxJXzBupLR5acHaqqSmyqmypTC8kryshWC1koR30f2xd-e3P3sIUa-3e9-kl5qxQkkqeV4kFzu6rN-G4KHWO---jW81JfrAUP8x1AeG-sQwhe6OIZc2_gekkIL1Kf8FvLJuBQ</recordid><startdate>201909</startdate><enddate>201909</enddate><creator>Soltan, Saleh</creator><creator>Mittal, Prateek</creator><creator>Poor, H. Vincent</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0003-0607-1523</orcidid><orcidid>https://orcid.org/0000-0002-2062-131X</orcidid></search><sort><creationdate>201909</creationdate><title>Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression</title><author>Soltan, Saleh ; Mittal, Prateek ; Poor, H. Vincent</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Angle of attack</topic><topic>Area measurement</topic><topic>Bayes methods</topic><topic>Bayesian analysis</topic><topic>Bayesian regression</topic><topic>Computational geometry</topic><topic>Convexity</topic><topic>cyber-physical attacks</topic><topic>Cyberattack</topic><topic>Data buses</topic><topic>Failure detection</topic><topic>machine learning</topic><topic>Noise measurement</topic><topic>Optimization</topic><topic>Phase measurement</topic><topic>Power grid</topic><topic>Power grids</topic><topic>state estimation</topic><topic>Statistical analysis</topic><topic>Switches</topic><topic>Voltage measurement</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Soltan, Saleh</creatorcontrib><creatorcontrib>Mittal, Prateek</creatorcontrib><creatorcontrib>Poor, H. Vincent</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore (Online service)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on power systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Soltan, Saleh</au><au>Mittal, Prateek</au><au>Poor, H. Vincent</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression</atitle><jtitle>IEEE transactions on power systems</jtitle><stitle>TPWRS</stitle><date>2019-09</date><risdate>2019</risdate><volume>34</volume><issue>5</issue><spage>3758</spage><epage>3768</epage><pages>3758-3768</pages><issn>0885-8950</issn><eissn>1558-0679</eissn><coden>ITPSEG</coden><abstract>We study the problem of line failure detection following a cyber-physical attack. Since such attacks can result in line trippings (by remotely activating switches) as well as loss of measurement feeds, we consider an attack model in which an adversary attacks an area by: (i) disconnecting some lines within the attacked area, and (ii) blocking the measurements coming from inside the attacked area from reaching the control center. Hence, after the attack, voltage phase angles of the buses and status of the lines inside the attacked area become unavailable to the grid operator. We build upon a recently introduced convex optimization method for detecting line failures and exploit Bayesian regression to develop the novel PROBER Algorithm for probabilistically detecting line failures after an attack using partial noisy measurements. The PROBER Algorithm provides the probability that each line is failed inside the attacked area in a running time which is independent of the number of line failures. Hence, these probabilities can be efficiently computed and used to make the existing brute force search methods tractable (for detecting multiple-line failures) by significantly reducing their search space. We numerically demonstrate that such an approach hits a sweet spot in accuracy and efficiency.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TPWRS.2019.2910396</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0003-0607-1523</orcidid><orcidid>https://orcid.org/0000-0002-2062-131X</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0885-8950 |
ispartof | IEEE transactions on power systems, 2019-09, Vol.34 (5), p.3758-3768 |
issn | 0885-8950 1558-0679 |
language | eng |
recordid | cdi_proquest_journals_2279818357 |
source | IEEE Xplore (Online service) |
subjects | Algorithms Angle of attack Area measurement Bayes methods Bayesian analysis Bayesian regression Computational geometry Convexity cyber-physical attacks Cyberattack Data buses Failure detection machine learning Noise measurement Optimization Phase measurement Power grid Power grids state estimation Statistical analysis Switches Voltage measurement |
title | Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T12%3A08%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Line%20Failure%20Detection%20After%20a%20Cyber-Physical%20Attack%20on%20the%20Grid%20Using%20Bayesian%20Regression&rft.jtitle=IEEE%20transactions%20on%20power%20systems&rft.au=Soltan,%20Saleh&rft.date=2019-09&rft.volume=34&rft.issue=5&rft.spage=3758&rft.epage=3768&rft.pages=3758-3768&rft.issn=0885-8950&rft.eissn=1558-0679&rft.coden=ITPSEG&rft_id=info:doi/10.1109/TPWRS.2019.2910396&rft_dat=%3Cproquest_cross%3E2279818357%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2279818357&rft_id=info:pmid/&rft_ieee_id=8686241&rfr_iscdi=true |