Loading…

Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression

We study the problem of line failure detection following a cyber-physical attack. Since such attacks can result in line trippings (by remotely activating switches) as well as loss of measurement feeds, we consider an attack model in which an adversary attacks an area by: (i) disconnecting some lines...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on power systems 2019-09, Vol.34 (5), p.3758-3768
Main Authors: Soltan, Saleh, Mittal, Prateek, Poor, H. Vincent
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803
cites cdi_FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803
container_end_page 3768
container_issue 5
container_start_page 3758
container_title IEEE transactions on power systems
container_volume 34
creator Soltan, Saleh
Mittal, Prateek
Poor, H. Vincent
description We study the problem of line failure detection following a cyber-physical attack. Since such attacks can result in line trippings (by remotely activating switches) as well as loss of measurement feeds, we consider an attack model in which an adversary attacks an area by: (i) disconnecting some lines within the attacked area, and (ii) blocking the measurements coming from inside the attacked area from reaching the control center. Hence, after the attack, voltage phase angles of the buses and status of the lines inside the attacked area become unavailable to the grid operator. We build upon a recently introduced convex optimization method for detecting line failures and exploit Bayesian regression to develop the novel PROBER Algorithm for probabilistically detecting line failures after an attack using partial noisy measurements. The PROBER Algorithm provides the probability that each line is failed inside the attacked area in a running time which is independent of the number of line failures. Hence, these probabilities can be efficiently computed and used to make the existing brute force search methods tractable (for detecting multiple-line failures) by significantly reducing their search space. We numerically demonstrate that such an approach hits a sweet spot in accuracy and efficiency.
doi_str_mv 10.1109/TPWRS.2019.2910396
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2279818357</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8686241</ieee_id><sourcerecordid>2279818357</sourcerecordid><originalsourceid>FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803</originalsourceid><addsrcrecordid>eNo9kMtOAjEUhhujiYi-gG6auB7shem0S0RBExIJQkzcNJ3OGSjigG1ZzNtbhLg6i_9y_nwI3VLSo5Soh_n0Y_beY4SqHlOUcCXOUIfmucyIKNQ56hAp80yqnFyiqxDWhBCRhA76nLgG8Mi4zd4DfoIINrptgwd1BI8NHrYl-Gy6aoOzZoMHMRr7hZMhrgCPvavwIrhmiR9NC8GZBs9g6SGE1HGNLmqzCXBzul20GD3Phy_Z5G38OhxMMsu5ihk1AEAJs30BpkoTy0LktKxJXzBupLR5acHaqqSmyqmypTC8kryshWC1koR30f2xd-e3P3sIUa-3e9-kl5qxQkkqeV4kFzu6rN-G4KHWO---jW81JfrAUP8x1AeG-sQwhe6OIZc2_gekkIL1Kf8FvLJuBQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2279818357</pqid></control><display><type>article</type><title>Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression</title><source>IEEE Xplore (Online service)</source><creator>Soltan, Saleh ; Mittal, Prateek ; Poor, H. Vincent</creator><creatorcontrib>Soltan, Saleh ; Mittal, Prateek ; Poor, H. Vincent</creatorcontrib><description>We study the problem of line failure detection following a cyber-physical attack. Since such attacks can result in line trippings (by remotely activating switches) as well as loss of measurement feeds, we consider an attack model in which an adversary attacks an area by: (i) disconnecting some lines within the attacked area, and (ii) blocking the measurements coming from inside the attacked area from reaching the control center. Hence, after the attack, voltage phase angles of the buses and status of the lines inside the attacked area become unavailable to the grid operator. We build upon a recently introduced convex optimization method for detecting line failures and exploit Bayesian regression to develop the novel PROBER Algorithm for probabilistically detecting line failures after an attack using partial noisy measurements. The PROBER Algorithm provides the probability that each line is failed inside the attacked area in a running time which is independent of the number of line failures. Hence, these probabilities can be efficiently computed and used to make the existing brute force search methods tractable (for detecting multiple-line failures) by significantly reducing their search space. We numerically demonstrate that such an approach hits a sweet spot in accuracy and efficiency.</description><identifier>ISSN: 0885-8950</identifier><identifier>EISSN: 1558-0679</identifier><identifier>DOI: 10.1109/TPWRS.2019.2910396</identifier><identifier>CODEN: ITPSEG</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algorithms ; Angle of attack ; Area measurement ; Bayes methods ; Bayesian analysis ; Bayesian regression ; Computational geometry ; Convexity ; cyber-physical attacks ; Cyberattack ; Data buses ; Failure detection ; machine learning ; Noise measurement ; Optimization ; Phase measurement ; Power grid ; Power grids ; state estimation ; Statistical analysis ; Switches ; Voltage measurement</subject><ispartof>IEEE transactions on power systems, 2019-09, Vol.34 (5), p.3758-3768</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803</citedby><cites>FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803</cites><orcidid>0000-0003-0607-1523 ; 0000-0002-2062-131X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8686241$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,27905,27906,54777</link.rule.ids></links><search><creatorcontrib>Soltan, Saleh</creatorcontrib><creatorcontrib>Mittal, Prateek</creatorcontrib><creatorcontrib>Poor, H. Vincent</creatorcontrib><title>Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression</title><title>IEEE transactions on power systems</title><addtitle>TPWRS</addtitle><description>We study the problem of line failure detection following a cyber-physical attack. Since such attacks can result in line trippings (by remotely activating switches) as well as loss of measurement feeds, we consider an attack model in which an adversary attacks an area by: (i) disconnecting some lines within the attacked area, and (ii) blocking the measurements coming from inside the attacked area from reaching the control center. Hence, after the attack, voltage phase angles of the buses and status of the lines inside the attacked area become unavailable to the grid operator. We build upon a recently introduced convex optimization method for detecting line failures and exploit Bayesian regression to develop the novel PROBER Algorithm for probabilistically detecting line failures after an attack using partial noisy measurements. The PROBER Algorithm provides the probability that each line is failed inside the attacked area in a running time which is independent of the number of line failures. Hence, these probabilities can be efficiently computed and used to make the existing brute force search methods tractable (for detecting multiple-line failures) by significantly reducing their search space. We numerically demonstrate that such an approach hits a sweet spot in accuracy and efficiency.</description><subject>Algorithms</subject><subject>Angle of attack</subject><subject>Area measurement</subject><subject>Bayes methods</subject><subject>Bayesian analysis</subject><subject>Bayesian regression</subject><subject>Computational geometry</subject><subject>Convexity</subject><subject>cyber-physical attacks</subject><subject>Cyberattack</subject><subject>Data buses</subject><subject>Failure detection</subject><subject>machine learning</subject><subject>Noise measurement</subject><subject>Optimization</subject><subject>Phase measurement</subject><subject>Power grid</subject><subject>Power grids</subject><subject>state estimation</subject><subject>Statistical analysis</subject><subject>Switches</subject><subject>Voltage measurement</subject><issn>0885-8950</issn><issn>1558-0679</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><recordid>eNo9kMtOAjEUhhujiYi-gG6auB7shem0S0RBExIJQkzcNJ3OGSjigG1ZzNtbhLg6i_9y_nwI3VLSo5Soh_n0Y_beY4SqHlOUcCXOUIfmucyIKNQ56hAp80yqnFyiqxDWhBCRhA76nLgG8Mi4zd4DfoIINrptgwd1BI8NHrYl-Gy6aoOzZoMHMRr7hZMhrgCPvavwIrhmiR9NC8GZBs9g6SGE1HGNLmqzCXBzul20GD3Phy_Z5G38OhxMMsu5ihk1AEAJs30BpkoTy0LktKxJXzBupLR5acHaqqSmyqmypTC8kryshWC1koR30f2xd-e3P3sIUa-3e9-kl5qxQkkqeV4kFzu6rN-G4KHWO---jW81JfrAUP8x1AeG-sQwhe6OIZc2_gekkIL1Kf8FvLJuBQ</recordid><startdate>201909</startdate><enddate>201909</enddate><creator>Soltan, Saleh</creator><creator>Mittal, Prateek</creator><creator>Poor, H. Vincent</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0003-0607-1523</orcidid><orcidid>https://orcid.org/0000-0002-2062-131X</orcidid></search><sort><creationdate>201909</creationdate><title>Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression</title><author>Soltan, Saleh ; Mittal, Prateek ; Poor, H. Vincent</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Angle of attack</topic><topic>Area measurement</topic><topic>Bayes methods</topic><topic>Bayesian analysis</topic><topic>Bayesian regression</topic><topic>Computational geometry</topic><topic>Convexity</topic><topic>cyber-physical attacks</topic><topic>Cyberattack</topic><topic>Data buses</topic><topic>Failure detection</topic><topic>machine learning</topic><topic>Noise measurement</topic><topic>Optimization</topic><topic>Phase measurement</topic><topic>Power grid</topic><topic>Power grids</topic><topic>state estimation</topic><topic>Statistical analysis</topic><topic>Switches</topic><topic>Voltage measurement</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Soltan, Saleh</creatorcontrib><creatorcontrib>Mittal, Prateek</creatorcontrib><creatorcontrib>Poor, H. Vincent</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore (Online service)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on power systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Soltan, Saleh</au><au>Mittal, Prateek</au><au>Poor, H. Vincent</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression</atitle><jtitle>IEEE transactions on power systems</jtitle><stitle>TPWRS</stitle><date>2019-09</date><risdate>2019</risdate><volume>34</volume><issue>5</issue><spage>3758</spage><epage>3768</epage><pages>3758-3768</pages><issn>0885-8950</issn><eissn>1558-0679</eissn><coden>ITPSEG</coden><abstract>We study the problem of line failure detection following a cyber-physical attack. Since such attacks can result in line trippings (by remotely activating switches) as well as loss of measurement feeds, we consider an attack model in which an adversary attacks an area by: (i) disconnecting some lines within the attacked area, and (ii) blocking the measurements coming from inside the attacked area from reaching the control center. Hence, after the attack, voltage phase angles of the buses and status of the lines inside the attacked area become unavailable to the grid operator. We build upon a recently introduced convex optimization method for detecting line failures and exploit Bayesian regression to develop the novel PROBER Algorithm for probabilistically detecting line failures after an attack using partial noisy measurements. The PROBER Algorithm provides the probability that each line is failed inside the attacked area in a running time which is independent of the number of line failures. Hence, these probabilities can be efficiently computed and used to make the existing brute force search methods tractable (for detecting multiple-line failures) by significantly reducing their search space. We numerically demonstrate that such an approach hits a sweet spot in accuracy and efficiency.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TPWRS.2019.2910396</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0003-0607-1523</orcidid><orcidid>https://orcid.org/0000-0002-2062-131X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0885-8950
ispartof IEEE transactions on power systems, 2019-09, Vol.34 (5), p.3758-3768
issn 0885-8950
1558-0679
language eng
recordid cdi_proquest_journals_2279818357
source IEEE Xplore (Online service)
subjects Algorithms
Angle of attack
Area measurement
Bayes methods
Bayesian analysis
Bayesian regression
Computational geometry
Convexity
cyber-physical attacks
Cyberattack
Data buses
Failure detection
machine learning
Noise measurement
Optimization
Phase measurement
Power grid
Power grids
state estimation
Statistical analysis
Switches
Voltage measurement
title Line Failure Detection After a Cyber-Physical Attack on the Grid Using Bayesian Regression
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T12%3A08%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Line%20Failure%20Detection%20After%20a%20Cyber-Physical%20Attack%20on%20the%20Grid%20Using%20Bayesian%20Regression&rft.jtitle=IEEE%20transactions%20on%20power%20systems&rft.au=Soltan,%20Saleh&rft.date=2019-09&rft.volume=34&rft.issue=5&rft.spage=3758&rft.epage=3768&rft.pages=3758-3768&rft.issn=0885-8950&rft.eissn=1558-0679&rft.coden=ITPSEG&rft_id=info:doi/10.1109/TPWRS.2019.2910396&rft_dat=%3Cproquest_cross%3E2279818357%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c339t-1aeee102c46ead895b7651bf04623a88c5bceccdb1ad519cb6a3d83bf662f9803%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2279818357&rft_id=info:pmid/&rft_ieee_id=8686241&rfr_iscdi=true