Detection and Characterization of Intrusions to Network Parameter Data in Electric Power Systems. Molzahn, D. K. & Wang, J. . Submitted
abstract   bibtex   
The potential for cyberattacks is an emerging challenge to maintaining reliable and economic operation of electric power systems. Possible cyberattacks include intrusions to the parameter data at a control center. In this class of attacks, algorithms at the control center are correctly executed, but the attacker's modification of the associated parameter data yields improper results. This paper proposes an algorithm for detecting and characterizing cyberattacks to the network parameter data, with specific application to optimal power flow problems. The proposed algorithm evaluates whether historical operating point data are consistent with the network parameters. Inconsistencies indicating potential cyberattacks are characterized using historical operational data (power injections and voltage phasors) along with network parameter data. Simulated test cases illustrate the proposed algorithm's detection and characterization capabilities.
@article{molzahn_wang-cyberattack_parameters,
	author={D. K. Molzahn and J. Wang},
	journal={},
	title={{Detection and Characterization of Intrusions to Network Parameter Data in Electric Power Systems}},
	year={},
	keywords={Cybersecurity},
	abstract={The potential for cyberattacks is an emerging challenge to maintaining reliable and economic operation of electric power systems. Possible cyberattacks include intrusions to the parameter data at a control center. In this class of attacks, algorithms at the control center are correctly executed, but the attacker's modification of the associated parameter data yields improper results. This paper proposes an algorithm for detecting and characterizing cyberattacks to the network parameter data, with specific application to optimal power flow problems. The proposed algorithm evaluates whether historical operating point data are consistent with the network parameters. Inconsistencies indicating potential cyberattacks are characterized using historical operational data (power injections and voltage phasors) along with network parameter data. Simulated test cases illustrate the  proposed algorithm's detection and characterization capabilities.},
	note={Submitted},
}

Downloads: 0