Cyber Attack Detection Scheme for a Load Frequency Control System Based on Dual-Source Data of Compromised Variables
نویسندگان
چکیده
Cyber attacks bring key challenges to the system reliability of load frequency control (LFC) systems. Attackers can compromise measured data critical variables LFC system, making received by defender unreliable and resulting in fluctuation or even collapse. In this paper, detect potential on data, we propose a novel attack detection scheme using dual-source (DSD) compromised variables. First, study characteristics considering potentially vulnerable different types templates. Second, designing variable observer, relationship between known security which are at risk being is established. The features obtained observer reflect those true data. Third, Siamese network (SN) designed quantify distance that observed Finally, an analyzing similarity DSD. Simulation results verify feasibility studied paper.
منابع مشابه
A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique
Based on frequency-domain transformation technique, this paper proposes an attack detection scheme for stochastic control systems under stochastic cyber-attacks and disturbances. The focus is on designing an anomaly detector for the stochastic control systems. First, we construct a model of stochastic control system with stochastic cyber-attacks which satisfy the Markovian stochastic process. A...
متن کاملReview of Attack Detection Scheme for Cyber Physical Security System
Cyber-Physical Systems (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges that are (1) general workflow of cyber physical systems, (2) identifying the unique properties of cyber-physical systems and (3) discussing security mechanisms applicable to cyber physical systems. In particular, we analyze and we ...
متن کاملA Novel Technique for Detection of Time Delay Switch Attack on Load Frequency Control
In this paper, we focus on the estimation of time delays caused by adversaries in the sensing loop (SL). Based on the literature review, time delay switch (TDS) attacks could make any control system, in particular a power control system, unstable. Therefore, future smart grids will have to use advanced methods to provide better situational awareness of power grid states keeping smart grids reli...
متن کاملCyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2021
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app11041584