Skip to main content

Support Vector Machine-Based Dynamic Cyber-Attack Detection in AGC System

  • Conference paper
  • First Online:
Intelligent Computing in Control and Communication

Abstract

This paper presents novel dynamic cyber-attack detection in automatic generation control (AGC) using support vector machine (SVM). The basic idea of attack detection is based on the pattern recognition of the residual signal of the linear observer designed to estimate the states of the AGC system. Features are extracted from the residual and its derivative signal and are trained using SVM. The proposed idea is tested for various types of attack signals

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bou-Harb E, Fachkha C, Pourzandi M, Debbabi M, Assi C (2013) Communication security for smart grid distribution networks. IEEE Commun Mag 51:42–49. https://doi.org/10.1109/MCOM.2013.6400437

    Article  Google Scholar 

  2. Barreto C, Giraldo J, Cardenas AA, Mojica-Nava E, Quijano N (2014) Control systems for the power grid and their resiliency to attacks. IEEE Secur Priv 12:15–23. https://doi.org/10.1109/MSP.2014.111

    Article  Google Scholar 

  3. Liang G, Zhao J, Luo F, Weller SR, Dong ZY (2017) A review of false data injection attacks against modern power systems. IEEE Trans Smart Grid 8:1630–1638. https://doi.org/10.1109/TSG.2015.2495133

    Article  Google Scholar 

  4. Case DU (2016) Analysis of the cyber attack on the Ukrainian power grid. Electr Inform Sharing Anal Cent (E-ISAC) 388

    Google Scholar 

  5. Li X, Liang X, Lu R, Shen X, Lin X, Zhu H (2012) Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun Mag 50:38–45. https://doi.org/10.1109/MCOM.2012.6257525

    Article  Google Scholar 

  6. Liu C-C, Stefanov A, Hong J, Panciatici P (2012) Intruders in the grid. IEEE Power Energy Mag 10:58–66. https://doi.org/10.1109/MPE.2011.943114

    Article  Google Scholar 

  7. Bevrani H (2014) Robust power system frequency control. Springer International Publishing, Cham. https://doi.org/10.1007/978-3-319-07278-4.

  8. Taha AF, Qi J, Wang J, Panchal JH (2018) Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs. IEEE Trans Smart Grid 9:886–899. https://doi.org/10.1109/TSG.2016.2570546

    Article  Google Scholar 

  9. Sureshkumar, LV, Nagesh Kumar GV, Madichetty S (2017) Pattern search algorithm based automatic online parameter estimation for AGC with effects of wind power. Int J Electr Power Energy Syst 84:135–142

    Google Scholar 

  10. Ameli A, Hooshyar A, El-Saadany EF, Youssef AM (2018) Attack detection and identification for automatic generation control systems. IEEE Trans Power Syst 33:4760–4774. https://doi.org/10.1109/TPWRS.2018.2810161

    Article  Google Scholar 

  11. Sridhar S, Govindarasu M (2014) Model-based attack detection and mitigation for automatic generation control. IEEE Trans Smart Grid 5:580–591. https://doi.org/10.1109/TSG.2014.2298195

    Article  Google Scholar 

  12. Ameli A, Hooshyar A, Yazdavar AH, El-Saadany EF, Youssef A (2018) Attack detection for load frequency control systems using stochastic unknown input estimators. IEEE Trans Inf For Secur 13:2575–2590. https://doi.org/10.1109/TIFS.2018.2824253

    Article  Google Scholar 

  13. Karimipour H, Dehghantanha A, Parizi RM, Choo K-KR, Leung H (2019) A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access 7:80778–80788. https://doi.org/10.1109/ACCESS.2019.2920326

    Article  Google Scholar 

  14. Ahmed S, Lee Y, Hyun S-H, Koo I (2019) Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest. IEEE Trans Inf For Secur 14:2765–2777. https://doi.org/10.1109/TIFS.2019.2902822

    Article  Google Scholar 

  15. Wang H, Ruan J, Wang G, Zhou B, Liu Y, Fu X, Peng J (2018) Deep learning-based interval state estimation of AC smart grids against sparse cyber attacks. IEEE Trans Ind Inform 14:4766–4778. https://doi.org/10.1109/TII.2018.2804669

    Article  Google Scholar 

  16. Esmalifalak M, Liu L, Nguyen N, Zheng R, Han Z (2017) Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst J 11:1644–1652. https://doi.org/10.1109/JSYST.2014.2341597

    Article  Google Scholar 

  17. Wang J, Shi D, Li Y, Chen J, Ding H, Duan X (2019) Distributed framework for detecting PMU data manipulation attacks with deep autoencoders. IEEE Trans Smart Grid 10:4401–4410. https://doi.org/10.1109/TSG.2018.2859339

    Article  Google Scholar 

  18. Tan R, Nguyen HH, Foo EYS, Yau DKY, Kalbarczyk Z, Iyer RK, Gooi HB (2017) Modeling and mitigating impact of false data injection attacks on automatic generation control. IEEE Trans Inf For Secur 12:1609–1624. https://doi.org/10.1109/TIFS.2017.2676721

    Article  Google Scholar 

  19. Law YW, Alpcan T, Palaniswami M (2015) Security games for risk minimization in automatic generation control. IEEE Trans Power Syst 30:223–232. https://doi.org/10.1109/TPWRS.2014.2326403

    Article  Google Scholar 

  20. Chen C, Zhang K, Yuan K, Zhu L, Qian M (2018) Novel detection scheme design considering cyber attacks on load frequency control. IEEE Trans Ind Inform 14:1932–1941. https://doi.org/10.1109/TII.2017.2765313

    Article  Google Scholar 

  21. Kundur P (2012) Power system stability and control. CRC Press

    Google Scholar 

  22. Tummala ASLV, Inapakurthi R, Ramanarao PV (2018) Observer based sliding mode frequency control for multi-machine power systems with high renewable energy. J Mod Power Syst Clean Energy. https://doi.org/10.1007/s40565-017-0363-3

    Article  Google Scholar 

  23. Zhou J, Yang Y, Ding SX, Zi Y, Wei M (2018) A fault detection and health monitoring scheme for ship propulsion systems using SVM technique. IEEE Access 6:16207–16215. https://doi.org/10.1109/ACCESS.2018.2812207

    Article  Google Scholar 

  24. Jan SU, Lee Y-D, Shin J, Koo I (2017) Sensor fault classification based on support vector machine and statistical time-domain features. IEEE Access 5:8682–8690. https://doi.org/10.1109/ACCESS.2017.2705644

    Article  Google Scholar 

  25. Ahmed S, Lee Y, Hyun S-H, Koo I (2018) Feature selection-based detection of covert cyber deception assaults in smart grid communications networks using machine learning. IEEE Access 6:27518–27529. https://doi.org/10.1109/ACCESS.2018.2835527

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. Venkata Sureshkumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ayyarao, T.S.L.V., Sureshkumar, L.V., Vijaya Kumar, D. (2021). Support Vector Machine-Based Dynamic Cyber-Attack Detection in AGC System. In: Sekhar, G.C., Behera, H.S., Nayak, J., Naik, B., Pelusi, D. (eds) Intelligent Computing in Control and Communication. Lecture Notes in Electrical Engineering, vol 702. Springer, Singapore. https://doi.org/10.1007/978-981-15-8439-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8439-8_28

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8438-1

  • Online ISBN: 978-981-15-8439-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics