International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 108

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Attack Detection and Mitigation for AGC

Pooja A Kulkarni | Harshal A Karande

Abstract: Cyber systems play a critical role in improving the efficiency and reliability of power system operation and ensuring the system remains within safe operating margins. An adversary can inflict severe damage to the underlying physical system by compromising the control and monitoring applications facilitated by the cyber layer. There is a growing need for cyber-attack-resilient control techniques that look beyond traditional cyber defense mechanisms to detect highly skilled attacks. In this paper, we make the following contributions. We first demonstrate the impact of data integrity attacks on Automatic Generation Control (AGC) on power system frequency and electricity market operation. We propose a general framework to the application of attack resilient control to power systems as a composition of smart attack detection and mitigation. Finally, we develop a model-based anomaly detection and attack mitigation algorithm for AGC. We evaluate the detection capability of the proposed anomaly detection algorithm through simulation studies. Our results show that the algorithm is capable of detecting scaling and ramp attacks with low false positive and negative rates. The proposed model-based mitigation algorithm is also efficient in maintaining system frequency within acceptable limits during the attack period.

Keywords: Anomaly detection, automatic generation control, intrusion detection systems, kernel density estimation, supervisory control and data acquisition

Edition: Volume 4 Issue 3, March 2015,

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

How to Cite this Article?

Pooja A Kulkarni, Harshal A Karande, "Attack Detection and Mitigation for AGC", International Journal of Science and Research (IJSR),, Volume 4 Issue 3, March 2015, 2011 - 2014, #ijsrnet

How to Share this Article?

Enter Your Email Address

Similar Articles with Keyword 'Anomaly detection'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad | A. D. Gujar

Share this Article

Downloads: 110

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1496 - 1500

An Intrusion Detection Model for Detecting Type of Attack Using Data Mining

Amruta Surana | Shyam Gupta [8]

Share this Article