Downloads: 108
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015
Attack Detection and Mitigation for AGC
Pooja A Kulkarni | Harshal A Karande
Abstract: Cyber systems play a critical role in improving the efficiency and reliability of power system operation and ensuring the system remains within safe operating margins. An adversary can inflict severe damage to the underlying physical system by compromising the control and monitoring applications facilitated by the cyber layer. There is a growing need for cyber-attack-resilient control techniques that look beyond traditional cyber defense mechanisms to detect highly skilled attacks. In this paper, we make the following contributions. We first demonstrate the impact of data integrity attacks on Automatic Generation Control (AGC) on power system frequency and electricity market operation. We propose a general framework to the application of attack resilient control to power systems as a composition of smart attack detection and mitigation. Finally, we develop a model-based anomaly detection and attack mitigation algorithm for AGC. We evaluate the detection capability of the proposed anomaly detection algorithm through simulation studies. Our results show that the algorithm is capable of detecting scaling and ramp attacks with low false positive and negative rates. The proposed model-based mitigation algorithm is also efficient in maintaining system frequency within acceptable limits during the attack period.
Keywords: Anomaly detection, automatic generation control, intrusion detection systems, kernel density estimation, supervisory control and data acquisition
Edition: Volume 4 Issue 3, March 2015,
Pages: 2011 - 2014
Attack Detection and Mitigation for AGC
How to Cite this Article?
Pooja A Kulkarni, Harshal A Karande, "Attack Detection and Mitigation for AGC", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB152632, Volume 4 Issue 3, March 2015, 2011 - 2014, #ijsrnet
How to Share this Article?
Similar Articles with Keyword 'Anomaly detection'
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 984 - 986Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems
Vrushali G. Chabilwad | A. D. Gujar
Downloads: 110
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1496 - 1500An Intrusion Detection Model for Detecting Type of Attack Using Data Mining
Amruta Surana | Shyam Gupta [8]