0% found this document useful (0 votes)
71 views

Detection and Localization of Adaptive Hierarchical Cyber Attacks in Active Distribution Systems

As active distribution systems are widely used and complex, securing them with renewable energy can be challenging. To tackle this difficulty, a two-stage methodology is proposed in this research. Deep learning is utilized to identify even the most minor cyber-attacks in electrical waveforms, and a hierarchical localization technique is then applied to determine the attack's source. This technique uses waveform analysis in conjunction with network partitioning to precisely identify attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views

Detection and Localization of Adaptive Hierarchical Cyber Attacks in Active Distribution Systems

As active distribution systems are widely used and complex, securing them with renewable energy can be challenging. To tackle this difficulty, a two-stage methodology is proposed in this research. Deep learning is utilized to identify even the most minor cyber-attacks in electrical waveforms, and a hierarchical localization technique is then applied to determine the attack's source. This technique uses waveform analysis in conjunction with network partitioning to precisely identify attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Volume 9, Issue 2, February 2024 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Detection and Localization of Adaptive Hierarchical


Cyber Attacks in Active Distribution Systems
1
P.B. Samiullah Khan; 2G. Ravi Teja Reddy; 3R. Selvameena
IV Year B.Tech CSE DS(AI) Students, Dept of Computer science and Engineering, DR. M.G.R EDUCATIONAL AND
RESEARCH INSTITUTE, Maduravoyal, Chennai-95, Tamil Nadu, India
Assistant Professor, Department of Computer Science Engineering, DR.M.G.R Educational And Research Institute Maduravoyal,
Chennai-600095,Tamil Nadu, India

Abstract:- As active distribution systems are widely used Waveform analysis is not limited to power grid
and complex, securing them with renewable energy can monitoring. Its utilization of a network of sensors creates a
be challenging. To tackle this difficulty, a two-stage "Internet of Things" for electrical impulses, opening up a
methodology is proposed in this research. Deep learning vast amount of unexplored data. This broadens its use to a
is utilized to identify even the most minor cyber-attacks variety of cyber-physical systems, including electric cars
in electrical waveforms, and a hierarchical localization and industry. Waveform analysis can also serve as a
technique is then applied to determine the attack's watchdog in cybersecurity, spotting irregularities in data that
source. This technique uses waveform analysis in indicate impending threats. However, in order to distinguish
conjunction with network partitioning to precisely these attacks from other problems, accurate current and
identify attacks. The suggested methodology provides a voltage information is essential. Waveform analysis is
viable means of improving cyber security in these essentially a potent tool that can be used to monitor,
developing power systems, outperforming current diagnose, and secure many systems, and its potential is still
approaches in simulations. Its capacity to recognize growing. Do you have any particular uses for this
different kinds of attacks, manage big networks, and technology, or problems that you imagine it addressing.
interact with current security protocols for practical
application might all be investigated further. II. EXISTING SYSTEM

I. INTRODUCTION An innovative method for identifying and detecting


cyber-physical attacks on power networks that incorporate
Detecting the source of a cyberattack is necessary to renewable energy sources, such as solar panels, is presented
defend smart grids against them, but complicated DER in this article. High-Dimensional Cyber-Physical Attack
integration and network topologies make this challenging. Detection and Identification (HCADI) is the technique that
Electrical information in its raw form has potential. Attacked uses waveform sensors positioned inside the grid to evaluate
devices leave distinctive imprints in waveforms, such as odd data. Unlike typical machine learning techniques, HCADI
harmonics or patterns of energy use. Locating the source of can detect the attack source without a large amount of
the attack can be aided by real-time monitoring of these training data by analysing the effects of attacks on electrical
signals from several grid points. This data is being used by waveforms. This makes it especially useful for safeguarding
developing approaches like digital twins, machine learning, intricate networks that use a variety of renewable energy
and graph neural networks to increase the accuracy of sources.
detection and localization. All things considered, utilizing
sophisticated analytics to unlock the potential of raw The first stage is exploring how the electrical
electrical data presents a viable way to secure intelligent waveforms in distribution power networks are impacted by
distribution networks. physical and cyberattacks, like those that target solar
inverters and produce odd harmonics. The foundation for
Energy grid reliability and state can be determined comprehending the attack signatures is provided by this
using waveform analysis, which can be used as a diagnostic analysis. The method then makes use of this information to
tool during interruptions as well as regular operations. It create a high-dimensional streaming data feature matrix. The
provides utilities with a thorough understanding of the grid construction of this matrix involves the analysis of signals
by evaluating electrical signals and their underlying causes, gathered from several sensors positioned tactically across
which improves operational efficiency for a variety of staff the network. This method attempts to detect and identify
members. Essential data is captured by electronic sensors cyber-physical attacks within the grid by merging real-time
such as PMUs and WMUs, where PMUs concentrate on sensor data with the attack impact analysis.
phasors and WMUs provide raw waveform details. Real-
time data streaming for online analysis and quick response is The proposed HCADI system does more than only
made possible via network connectivity. Waveform analysis assess the effects of attacks. Unlike conventional machine
is an important tool for guaranteeing grid efficiency and learning techniques, it presents a two-pronged strategy for
dependability because of its mix of real-time data and both detection and identification without the need for
profound insights. training data. Leverage score-based attack detection, the first

IJISRT24FEB195 www.ijisrt.com 70
Volume 9, Issue 2, February 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
section, effectively searches the created data matrix for electrical waveform measurements. Your prior work shows
abnormalities. This makes it possible to quickly identify how a Multi-layer Long Short-Term Memory Network
possible attacks. The attack's underlying cause is identified (MLSTM) may effectively capture sequential information
in further detail in the second section, which is called binary and generalize complex behaviour without requiring a large
matrix factorization-based attack diagnostics. HCADI dataset. This task is addressed as a one-class classification
accomplishes these jobs effectively by using binary coding problem. The MLSTM's potential for real-time cyberattack
and the data's intrinsic structure, which represents a major detection in distribution systems is indicated by a
breakthrough in this sector. This is the first attempt to use comparison of its performance with other detectors, such as
unprocessed electrical waveform data to identify and detect CUSUM and DBSCAN.
cyber-physical attacks that are explicitly directed at power
electronics in PV-equipped distribution grids. IV. DESIGN

III. PROPOSED SYSTEM  System Architecture


This notion describes a hierarchical technique for
A multi-step workflow is used in the proposed adaptive localizing and detecting cyberattacks in active distribution
hierarchical cyber-attack localization approach to locate and networks. The network is first partitioned using an
identify harmful activity in distribution systems. An impact unsupervised clustering technique into smaller groups. The
score is computed for every sub-region, and a dynamic precise position is then more precisely determined by a deep
network partitioning based on sensor data comes after a learning-based anomaly detection technique that identifies
deep learning model for assault detection. This utilizes possible attacks inside each sub-group. This two-pronged
strong deep learning or statistical approaches to refine the method makes use of deep learning for accurate attack
search area for a more accurate localization inside the detection and unsupervised learning for effective network
selected sub-region. Feedback is incorporated into the segmentation. This method's efficacy has been confirmed in
strategy to enhance its efficacy in the actual world, representative case studies using a range of assault
adaptability, explainability, efficiency, and privacy. Adaptive scenarios. The summary does, however, refer to "features
learning, distributed decision-making, threat intelligence from input vectors" and a "CNN model with embedding
integration, and physical layer security are some of the layer," but these specifics don't seem to have anything to do
future directions that will improve cyber protection. with the hierarchical architecture and general methodology
that are being discussed.
Distribution power systems typically operate in a
steady state, therefore detecting anomalies can be a useful For classification, three deep learning models are
method of spotting intrusions. For real-time attack detection, employed, and following computation, each of them
your research makes use of time-series sensor data, namely produces an intermediate vector.

Fig 1 System Architecture

In order to achieve optimal predictive performance, we The following is a summary of our contributions:
employ an ensemble classifier and carry out a thorough Using the electrical waveform, we suggest an adaptable
inspection. To make it easier for the security professionals to hierarchical structure for localizing and detecting
conduct additional analysis, all raw URL requests, cyberattacks in active distribution networks with DERs. To
normalized data, and detection results are stored in a examine the effects of cyberattacks on distribution networks,
database within the fine-tuning and updates module. To high quality models of DER and cyberattacks are
further enhance deep learning models during the training constructed.
stage and update them gradually to find new web threats,
EDL-WADS is made to leverage expert analysis.

IJISRT24FEB195 www.ijisrt.com 71
Volume 9, Issue 2, February 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
 Modules Description the CSIC 2010 dataset. It includes a variety of online
The following are the modules consisted in this assaults, such as buffer overflow, SQL injection, and cross-
project. site scripting (XSS). Additionally, we assess EDL-WADS
using a real-world dataset gathered by a security firm.
 Service Provider
 View and Authorize users Further, we use TP and TN to compute accuracy, true
 Remote users positive rate (TPR), false positive rate (FPR), and precision
 Feature Learning for the detection problem, which serves as a classification
 Data Collection problem.

 Service Provider V. IMPLEMENTATION


The Service Provider must enter a valid user name and
password to log in to this module. Following a successful  System Testing
login, one can perform a number of tasks, including Look The main objective of testing is to find mistakes. The
through Data Sets, Train, and Test View the results of the purpose of testing is to find every potential flaw or
trained and tested accuracy, view the bar chart representing vulnerability in a work product. It offers a means of testing
the accuracy, view the prediction of the web attack status, the functionality of individual parts, assemblies,
view the web attack status ratio, and download the predicted subassemblies, and/or final products. It is a procedure for
data sets for the web attack status. View All Remote Users testing software to make sure it satisfies user requirements
and Web Attack Status Ratio Results. and expectations and doesn't malfunction in an unacceptable
way. Different test kinds exist. Every test type responds to a
certain testing need.
 View and Authorize users
In order to access this module, the service provider
 Testing Techniques
must enter a valid user name and password. Upon successful
login, he can perform several tasks including logging in, The following are the testing methods.
Examine Data Sets, Train & Test, See results of trained and
tested accuracy, view a bar chart showing the accuracy, view  Unit Testing.
a prediction of the status of a web attack, view the ratio of  Integration Testing.
the web attack, and download data sets predicted by the web  User Acceptance Testing.
attack. View all remote users and the results of the web  Output Testing.
attack status ratio.  White Box Testing
 Black Box Testing
 Remote user
There are n numbers of users present in this module.  Unit Testing:
Prior to beginning any operations, the user must register. The process of designing test cases for unit testing
The user's information is saved in the database after they ensures that the core logic of the program is operating
register. Upon successful registration, he must use his correctly and that program inputs result in legitimate
permitted user name and password to log in. Following a outputs. Validation should be done on all internal code flows
successful login, the user can perform several tasks such as and decision branches. It is the testing of the application's
registering, logging in, predicting the state of a web assault, various software components. Before integration, it is
and viewing their profile. completed following the conclusion of a single unit. This is
an intrusive structural test that depends on an understanding
 Feature Learning of its structure. Unit tests evaluate a particular application,
As features determine the performance ceiling, they are system configuration, or business process at the component
the foundation of all deep learning applications. Being the level. Unit tests make assurance that every distinct path in a
initial module of EDL-WADS, it is essential to maintaining business process has inputs and outputs that are well-defined
the accuracy and consistency of the input data. Data and that it operates precisely according to the stated
processing is used to filter out irrelevant information and specifications.
decode the data flow because URL requests vary widely.
Two methods are used for URL analysis in the EDL-WADS  Integration Testing:
feature representation: one method is based on embedding The purpose of integration tests is to evaluate
layers. Notably, we used two automatic approaches to integrated software components to see if they function as a
evaluate URL requests and convert them into vectors in single unit. Testing is event-driven and focuses mostly on
EDL-WADS, and we found that automatic methods the fundamental results of fields or screens.
outperformed human methods in similar research.
The concerns related to the two problems of
 Data Collection verification and program creation are addressed by
To assess EDL-WADS and conduct a fair comparison integration testing. A series of high-order tests are carried
with current methodologies, we employed the HTTP CSIC out following the software's integration. Using unit-tested
dataset 2010 (also known as CSIC 2010) as a benchmark modules, the primary goal of this testing procedure is to
dataset. IDS evaluations have been conducted widely using

IJISRT24FEB195 www.ijisrt.com 72
Volume 9, Issue 2, February 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
construct a program structure that follows design REFERENCES
specifications.
[1]. Diafi'c, R. A. Jabr, S. Henselmeyer, and T. Donlagi 'c,
 User Acceptance Testing: "Fault location in distribution networks through
The most important element in any system's success is graph marking," IEEE Transactions on Smart Grid,
user acceptance. While the system is being developed, it is vol. 9, no. 2, pp. 1345- 1353, 2016.
continuously tested for user acceptability by staying in [2]. R. Bhargav, B. R. Bhalja, and C. P. Gupta, "Novel
continual communication with potential users and making fault detection and localization algorithm for low
necessary modifications. voltage dc microgrid," IEEE Transactions on
Industrial Informatics, 2019.
 Output Testing: [3]. G. Wu, G. Wang, J. Sun, and J. Chen, "Optimal
The proposed system's output must be tested when the partial feedback attacks in cyber physical power
validation testing is finished, as no system can be useful if it systems," IEEE Transactions on Automatic Control,
cannot generate the necessary output in the appropriate vol. 65, no. 9, pp. 3919-3926, 2020.
format. By asking users what format they need, you may test [4]. F. Li, Y. Shi, A. Shinde, J. Ye, and W.-Z. Song,
the outputs that the system is considering producing or "Enhanced cyber physical security in internet of
displaying. As a result, there are two ways to think about the things through energy auditing," IEEE Internet of
output format: one is on screen, and the other is printed. Things Journal, vol. 6, no. 3, pp. 5224-5231, 2019.
[5]. P. Dutta, A. Esmaeilian, and M. Kezunovic,
 White Box Testing: "Transmission-line fault analysis using synchronized
White box testing is a kind of software testing where sampling," IEEE transactions on power delivery, vol.
the tester is exposed to the program's inner workings, 29, no. 2, pp. 942-950, 2014.
structure, and language—or at the very least, what it is
meant to do. It has a purpose. It is employed to test regions
that are inaccessible from a level of the black box.

 Black Box Testing:


Testing software "black box" is performing it without
having any idea of the inner workings, architecture, or
language of the module being tested. such the majority of
other test types, black box tests also need to be written from
an official source document, such a specification or
requirements document.

VI. CONCLUSION

In this paper, we propose an innovative adaptive


hierarchical cyber-attack localization method tailored to
active distribution networks. Our technology uses electric
waveform data obtained from WMU sensors to identify and
evaluate tiny abnormalities that are frequently missed by
traditional techniques. In order to improve efficiency, we
first divide the distribution network into smaller 'coarse' sub-
regions using a modified version of spectral clustering. This
process ensures accurate detection and pinpointing of cyber-
attacks within the network by calculating the Impact Score
of each sensor in the prospective subregion. This sets the
stage for exact localization.

To validate the effectiveness of our approach, we


conduct a comprehensive comparative analysis against
existing methods in key stages: cyber-attack detection,
subgraph clustering, and localization. Through rigorous
evaluation, our method demonstrates superior performance,
highlighting its potential to revolutionize cyber threat
detection and localization in active distribution systems.
Empirical results from experiments conducted on two
representative distribution grids confirm the promising
capabilities of our approach, underscoring its significance in
fortifying the security and resilience of critical infrastructure
against evolving cyber threats.

IJISRT24FEB195 www.ijisrt.com 73

You might also like