Detection and Localization of Adaptive Hierarchical Cyber Attacks in Active Distribution Systems
Detection and Localization of Adaptive Hierarchical Cyber Attacks in Active Distribution Systems
ISSN No:-2456-2165
Abstract:- As active distribution systems are widely used Waveform analysis is not limited to power grid
and complex, securing them with renewable energy can monitoring. Its utilization of a network of sensors creates a
be challenging. To tackle this difficulty, a two-stage "Internet of Things" for electrical impulses, opening up a
methodology is proposed in this research. Deep learning vast amount of unexplored data. This broadens its use to a
is utilized to identify even the most minor cyber-attacks variety of cyber-physical systems, including electric cars
in electrical waveforms, and a hierarchical localization and industry. Waveform analysis can also serve as a
technique is then applied to determine the attack's watchdog in cybersecurity, spotting irregularities in data that
source. This technique uses waveform analysis in indicate impending threats. However, in order to distinguish
conjunction with network partitioning to precisely these attacks from other problems, accurate current and
identify attacks. The suggested methodology provides a voltage information is essential. Waveform analysis is
viable means of improving cyber security in these essentially a potent tool that can be used to monitor,
developing power systems, outperforming current diagnose, and secure many systems, and its potential is still
approaches in simulations. Its capacity to recognize growing. Do you have any particular uses for this
different kinds of attacks, manage big networks, and technology, or problems that you imagine it addressing.
interact with current security protocols for practical
application might all be investigated further. II. EXISTING SYSTEM
IJISRT24FEB195 www.ijisrt.com 70
Volume 9, Issue 2, February 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
section, effectively searches the created data matrix for electrical waveform measurements. Your prior work shows
abnormalities. This makes it possible to quickly identify how a Multi-layer Long Short-Term Memory Network
possible attacks. The attack's underlying cause is identified (MLSTM) may effectively capture sequential information
in further detail in the second section, which is called binary and generalize complex behaviour without requiring a large
matrix factorization-based attack diagnostics. HCADI dataset. This task is addressed as a one-class classification
accomplishes these jobs effectively by using binary coding problem. The MLSTM's potential for real-time cyberattack
and the data's intrinsic structure, which represents a major detection in distribution systems is indicated by a
breakthrough in this sector. This is the first attempt to use comparison of its performance with other detectors, such as
unprocessed electrical waveform data to identify and detect CUSUM and DBSCAN.
cyber-physical attacks that are explicitly directed at power
electronics in PV-equipped distribution grids. IV. DESIGN
In order to achieve optimal predictive performance, we The following is a summary of our contributions:
employ an ensemble classifier and carry out a thorough Using the electrical waveform, we suggest an adaptable
inspection. To make it easier for the security professionals to hierarchical structure for localizing and detecting
conduct additional analysis, all raw URL requests, cyberattacks in active distribution networks with DERs. To
normalized data, and detection results are stored in a examine the effects of cyberattacks on distribution networks,
database within the fine-tuning and updates module. To high quality models of DER and cyberattacks are
further enhance deep learning models during the training constructed.
stage and update them gradually to find new web threats,
EDL-WADS is made to leverage expert analysis.
IJISRT24FEB195 www.ijisrt.com 71
Volume 9, Issue 2, February 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Modules Description the CSIC 2010 dataset. It includes a variety of online
The following are the modules consisted in this assaults, such as buffer overflow, SQL injection, and cross-
project. site scripting (XSS). Additionally, we assess EDL-WADS
using a real-world dataset gathered by a security firm.
Service Provider
View and Authorize users Further, we use TP and TN to compute accuracy, true
Remote users positive rate (TPR), false positive rate (FPR), and precision
Feature Learning for the detection problem, which serves as a classification
Data Collection problem.
IJISRT24FEB195 www.ijisrt.com 72
Volume 9, Issue 2, February 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
construct a program structure that follows design REFERENCES
specifications.
[1]. Diafi'c, R. A. Jabr, S. Henselmeyer, and T. Donlagi 'c,
User Acceptance Testing: "Fault location in distribution networks through
The most important element in any system's success is graph marking," IEEE Transactions on Smart Grid,
user acceptance. While the system is being developed, it is vol. 9, no. 2, pp. 1345- 1353, 2016.
continuously tested for user acceptability by staying in [2]. R. Bhargav, B. R. Bhalja, and C. P. Gupta, "Novel
continual communication with potential users and making fault detection and localization algorithm for low
necessary modifications. voltage dc microgrid," IEEE Transactions on
Industrial Informatics, 2019.
Output Testing: [3]. G. Wu, G. Wang, J. Sun, and J. Chen, "Optimal
The proposed system's output must be tested when the partial feedback attacks in cyber physical power
validation testing is finished, as no system can be useful if it systems," IEEE Transactions on Automatic Control,
cannot generate the necessary output in the appropriate vol. 65, no. 9, pp. 3919-3926, 2020.
format. By asking users what format they need, you may test [4]. F. Li, Y. Shi, A. Shinde, J. Ye, and W.-Z. Song,
the outputs that the system is considering producing or "Enhanced cyber physical security in internet of
displaying. As a result, there are two ways to think about the things through energy auditing," IEEE Internet of
output format: one is on screen, and the other is printed. Things Journal, vol. 6, no. 3, pp. 5224-5231, 2019.
[5]. P. Dutta, A. Esmaeilian, and M. Kezunovic,
White Box Testing: "Transmission-line fault analysis using synchronized
White box testing is a kind of software testing where sampling," IEEE transactions on power delivery, vol.
the tester is exposed to the program's inner workings, 29, no. 2, pp. 942-950, 2014.
structure, and language—or at the very least, what it is
meant to do. It has a purpose. It is employed to test regions
that are inaccessible from a level of the black box.
VI. CONCLUSION
IJISRT24FEB195 www.ijisrt.com 73