Set-Induced Anomaly Detectors for Networked Power Systems under Bias Injection Cyber-Attacks

Efstathios Kontouras, Antonios Tzes, Leonidas Dritsas

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper addresses the concept of a set-induced anomaly detector of bias injection cyber-attacks affecting the load frequency control loop of a networked power system. An adversary corrupts the frequency sensor measurements causing abnormal system behavior. A set-theoretic methodology is used for the extraction of a convex and compact polyhedral robust invariant set under the overall discretized network dynamics. An attack is considered disclosed when the state vector exits the invariant set. Simulation studies demonstrate the impact of an intermittent attack on a two-area power plant and provide an assessment of the proposed detector, when the attack happens simultaneously with changes in the power load demand.

Original languageEnglish (US)
Title of host publication2018 European Control Conference, ECC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2472-2475
Number of pages4
ISBN (Electronic)9783952426982
DOIs
StatePublished - Nov 27 2018
Event16th European Control Conference, ECC 2018 - Limassol, Cyprus
Duration: Jun 12 2018Jun 15 2018

Conference

Conference16th European Control Conference, ECC 2018
CountryCyprus
CityLimassol
Period6/12/186/15/18

Fingerprint

Power System
Anomaly
Injection
Detector
Attack
Detectors
Invariant Set
Power plants
Network Dynamics
Sensors
Power Plant
Simulation Study
Sensor
Methodology
Demonstrate

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Control and Optimization

Cite this

Kontouras, E., Tzes, A., & Dritsas, L. (2018). Set-Induced Anomaly Detectors for Networked Power Systems under Bias Injection Cyber-Attacks. In 2018 European Control Conference, ECC 2018 (pp. 2472-2475). [8550393] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.23919/ECC.2018.8550393

Set-Induced Anomaly Detectors for Networked Power Systems under Bias Injection Cyber-Attacks. / Kontouras, Efstathios; Tzes, Antonios; Dritsas, Leonidas.

2018 European Control Conference, ECC 2018. Institute of Electrical and Electronics Engineers Inc., 2018. p. 2472-2475 8550393.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kontouras, E, Tzes, A & Dritsas, L 2018, Set-Induced Anomaly Detectors for Networked Power Systems under Bias Injection Cyber-Attacks. in 2018 European Control Conference, ECC 2018., 8550393, Institute of Electrical and Electronics Engineers Inc., pp. 2472-2475, 16th European Control Conference, ECC 2018, Limassol, Cyprus, 6/12/18. https://doi.org/10.23919/ECC.2018.8550393
Kontouras E, Tzes A, Dritsas L. Set-Induced Anomaly Detectors for Networked Power Systems under Bias Injection Cyber-Attacks. In 2018 European Control Conference, ECC 2018. Institute of Electrical and Electronics Engineers Inc. 2018. p. 2472-2475. 8550393 https://doi.org/10.23919/ECC.2018.8550393
Kontouras, Efstathios ; Tzes, Antonios ; Dritsas, Leonidas. / Set-Induced Anomaly Detectors for Networked Power Systems under Bias Injection Cyber-Attacks. 2018 European Control Conference, ECC 2018. Institute of Electrical and Electronics Engineers Inc., 2018. pp. 2472-2475
@inproceedings{6b48524a4f474eb5b39dc2fa9ab71656,
title = "Set-Induced Anomaly Detectors for Networked Power Systems under Bias Injection Cyber-Attacks",
abstract = "This paper addresses the concept of a set-induced anomaly detector of bias injection cyber-attacks affecting the load frequency control loop of a networked power system. An adversary corrupts the frequency sensor measurements causing abnormal system behavior. A set-theoretic methodology is used for the extraction of a convex and compact polyhedral robust invariant set under the overall discretized network dynamics. An attack is considered disclosed when the state vector exits the invariant set. Simulation studies demonstrate the impact of an intermittent attack on a two-area power plant and provide an assessment of the proposed detector, when the attack happens simultaneously with changes in the power load demand.",
author = "Efstathios Kontouras and Antonios Tzes and Leonidas Dritsas",
year = "2018",
month = "11",
day = "27",
doi = "10.23919/ECC.2018.8550393",
language = "English (US)",
pages = "2472--2475",
booktitle = "2018 European Control Conference, ECC 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Set-Induced Anomaly Detectors for Networked Power Systems under Bias Injection Cyber-Attacks

AU - Kontouras, Efstathios

AU - Tzes, Antonios

AU - Dritsas, Leonidas

PY - 2018/11/27

Y1 - 2018/11/27

N2 - This paper addresses the concept of a set-induced anomaly detector of bias injection cyber-attacks affecting the load frequency control loop of a networked power system. An adversary corrupts the frequency sensor measurements causing abnormal system behavior. A set-theoretic methodology is used for the extraction of a convex and compact polyhedral robust invariant set under the overall discretized network dynamics. An attack is considered disclosed when the state vector exits the invariant set. Simulation studies demonstrate the impact of an intermittent attack on a two-area power plant and provide an assessment of the proposed detector, when the attack happens simultaneously with changes in the power load demand.

AB - This paper addresses the concept of a set-induced anomaly detector of bias injection cyber-attacks affecting the load frequency control loop of a networked power system. An adversary corrupts the frequency sensor measurements causing abnormal system behavior. A set-theoretic methodology is used for the extraction of a convex and compact polyhedral robust invariant set under the overall discretized network dynamics. An attack is considered disclosed when the state vector exits the invariant set. Simulation studies demonstrate the impact of an intermittent attack on a two-area power plant and provide an assessment of the proposed detector, when the attack happens simultaneously with changes in the power load demand.

UR - http://www.scopus.com/inward/record.url?scp=85053546636&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85053546636&partnerID=8YFLogxK

U2 - 10.23919/ECC.2018.8550393

DO - 10.23919/ECC.2018.8550393

M3 - Conference contribution

SP - 2472

EP - 2475

BT - 2018 European Control Conference, ECC 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -