International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 108

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Cyber systems play a critical role in improving the efficiency and reliability of power system operation and ensuring the system remains within safe operating margins. An adversary can inflict severe damage to the underlying physical system by compromising the control and monitoring applications facilitated by the cyber layer. There is a growing need for cyber-attack-resilient control techniques that look beyond traditional cyber defense mechanisms to detect highly skilled attacks. In this paper, we make the following contributions. We first demonstrate the impact of data integrity attacks on Automatic Generation Control (AGC) on power system frequency and electricity market operation. We propose a general framework to the application of attack resilient control to power systems as a composition of smart attack detection and mitigation. Finally, we develop a model-based anomaly detection and attack mitigation algorithm for AGC. We evaluate the detection capability of the proposed anomaly detection algorithm through simulation studies. Our results show that the algorithm is capable of detecting scaling and ramp attacks with low false positive and negative rates. The proposed model-based mitigation algorithm is also efficient in maintaining system frequency within acceptable limits during the attack period.

Keywords: Anomaly detection, automatic generation control, intrusion detection systems, kernel density estimation, supervisory control and data acquisition

Edition: Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Share this Article

How to Cite this Article?

Pooja A Kulkarni, Harshal A Karande, "Attack Detection and Mitigation for AGC", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152632, Volume 4 Issue 3, March 2015, 2011 - 2014

Enter Your Email Address


Similar Articles with Keyword 'Anomaly detection'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar

Share this Article

Downloads: 110

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1496 - 1500

An Intrusion Detection Model for Detecting Type of Attack Using Data Mining

Amruta Surana, Shyam Gupta

Share this Article

Similar Articles with Keyword 'intrusion detection systems'

Downloads: 106

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Similar Articles with Keyword 'kernel density estimation'

Downloads: 114

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1449 - 1452

Anomalous Events Detection in Frequent Sequence Video via Object Segmentation Using Motion Pixel Compensation and Gradient

S. Tamilselvan, B. Monika

Share this Article

Downloads: 134 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 358 - 363

Registration and Tracking by using Mean Shift Algorithm

Kavya G, Jharna Majumdar

Share this Article

Similar Articles with Keyword 'Anomaly'

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2241 - 2244

Backup Anomaly Identification with R and Hadoop

Ravindra Phule, Madhav Ingle

Share this Article

Similar Articles with Keyword 'detection'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2623 - 2629

Object Detection and Pose Tracking In Augmented Reality

Vipul P.Chauhan, Dr. Manish M. Kayasth

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article

Similar Articles with Keyword 'automatic'

Downloads: 61

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 28 - 37

Glaucoma Detection Using Machine Learning

Sharanya S

Share this Article

Downloads: 67 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1334 - 1337

Mutation Testing Techniques in Software Testing: A Review

Dushyant Singh, Parulpreet Singh

Share this Article

Similar Articles with Keyword 'generation'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 649 - 652

Image Segmentation using Biogeography based Optimization and its Comparison with K Means Clustering

Babita Chauhan, Preeti Sondhi

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 965 - 966

University Event Management System

V. Balu, P. Vagish Krishnan, Varadarajan .M

Share this Article

Similar Articles with Keyword 'control'

Downloads: 174 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'intrusion'

Downloads: 71

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article
Top