scholarly journals From Static to Dynamic Anomaly Detection With Application to Power System Cyber Security

2020 ◽  
Vol 35 (2) ◽  
pp. 1584-1596 ◽  
Author(s):  
Kaikai Pan ◽  
Peter Palensky ◽  
Peyman Mohajerin Esfahani
Author(s):  
José A. Perusquía ◽  
Jim E. Griffin ◽  
Cristiano Villa

2011 ◽  
Vol 2011 ◽  
pp. 1-8 ◽  
Author(s):  
Swapna Iyer

The invention of “smart grid” promises to improve the efficiency and reliability of the power system. As smart grid is turning out to be one of the most promising technologies, its security concerns are becoming more crucial. The grid is susceptible to different types of attacks. This paper will focus on these threats and risks especially relating to cyber security. Cyber security is a vital topic, since the smart grid uses high level of computation like the IT. We will also see cryptography and key management techniques that are required to overcome these attacks. Privacy of consumers is another important security concern that this paper will deal with.


Proceedings ◽  
2020 ◽  
Vol 59 (1) ◽  
pp. 9
Author(s):  
Antoine Chevrot ◽  
Alexandre Vernotte ◽  
Pierre Bernabe ◽  
Aymeric Cretin ◽  
Fabien Peureux ◽  
...  

Major transportation surveillance protocols have not been specified with cyber security in mind and therefore provide no encryption nor identification. These issues expose air and sea transport to false data injection attacks (FDIAs), in which an attacker modifies, blocks or emits fake surveillance messages to dupe controllers and surveillance systems. There has been growing interest in conducting research on machine learning-based anomaly detection systems that address these new threats. However, significant amounts of data are needed to achieve meaningful results with this type of model. Raw, genuine data can be obtained from existing databases but need to be preprocessed before being fed to a model. Acquiring anomalous data is another challenge: such data is much too scarce for both the Automatic Dependent Surveillance–Broadcast (ADS-B) and the Automatic Identification System (AIS). Crafting anomalous data by hand, which has been the sole method applied to date, is hardly suitable for broad detection model testing. This paper proposes an approach built upon existing libraries and ideas that offers ML researchers the necessary tools to facilitate the access and processing of genuine data as well as to automatically generate synthetic anomalous surveillance data to constitute broad, elaborated test datasets. We demonstrate the usability of the approach by discussing work in progress that includes the reproduction of related work, creation of relevant datasets and design of advanced anomaly detection models for both domains of application.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 151019-151064
Author(s):  
Rajaa Vikhram Yohanandhan ◽  
Rajvikram Madurai Elavarasan ◽  
Premkumar Manoharan ◽  
Lucian Mihet-Popa

Sign in / Sign up

Export Citation Format

Share Document