Detecting Data Manipulation Attacks on the Substation Interlocking Function Using Direct Power Feedback

Any form of deliberate physical or cyber activity that attempts to undermine the control mechanisms that maintain the key goals of reliability, efficiency and safety of a physical system can be considered to be an attack on the system. Indeed, an attack can be as subtle as a configuration change that prevents the optimal operation of a power system.

[1]  Seiichi Shin,et al.  A fallback control study of networked control systems for cybersecurity , 2015, 2015 10th Asian Control Conference (ASCC).

[2]  Ing-Ray Chen,et al.  Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[3]  Bin Duan,et al.  Research on Interlocking CILO Based on IEC 61499/62351 , 2012, 2012 Asia-Pacific Power and Energy Engineering Conference.

[4]  Anna Scaglione,et al.  A hybrid network IDS for protective digital relays in the power transmission grid , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[5]  A. K. Pradhan,et al.  A Fault Detection Technique for the Series-Compensated Line During Power Swing , 2013, IEEE Transactions on Power Delivery.

[6]  Lucio Soibelman,et al.  Robust adaptive event detection in non-intrusive load monitoring for energy aware smart facilities , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[7]  Aaron R. Rababaah,et al.  Electric load monitoring of residential buildings using goodness of fit and multi-layer perceptron neural networks , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).

[8]  Gérard-André Capolino,et al.  Advances in Electrical Machine, Power Electronic, and Drive Condition Monitoring and Fault Detection: State of the Art , 2015, IEEE Transactions on Industrial Electronics.

[9]  Steve Hutchinson,et al.  Intrusion Detection in Industrial Control Systems , 2016 .

[10]  Mohammad Ali Abido,et al.  An adaptive fault location algorithm for power system networks based on synchrophasor measurements , 2014 .

[11]  Cameron D. Patterson,et al.  Design and implementation of a security framework for industrial control systems , 2015, 2015 International Conference on Industrial Instrumentation and Control (ICIC).

[12]  Thoshitha T. Gamage,et al.  Analyzing the Cyber-Physical Impact of Cyber Events on the Power Grid , 2015, IEEE Transactions on Smart Grid.