On the detection of cyber-events in the grid using PCA
Nathan Wallace and
Travis Atkison
International Journal of Critical Infrastructures, 2017, vol. 13, issue 2/3, 96-112
Abstract:
The emergence of cyber systems to the realm of physical control is currently being seen in the control environment of the critical infrastructure power grid. This research describes a possible way of detecting cyber-events including malicious intrusions. Specifically, the intrusion this work examines is data manipulation or data injection. The detection mechanism used is based on information retrieval and feature identification methods. Principal component analysis, a type of feature identification method, is used to transform each observed power system instance into a new dimensional space. In this new space, detection metric is created based on the Hotelling T2 value along with a probabilistic metric to classify instances that may contain malicious activity. An experimental trusted model is derived based on a pseudo-random Monte Carlo simulation of the Newton-Raphson method for a 5-bus power system.
Keywords: SCADA systems; data security; power system simulation; principal component analysis; Hotelling T 2; industrial control systems; data mining; cyber-event detection; Newton-Raphson method; feature identification. (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.inderscience.com/link.php?id=88228 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ids:ijcist:v:13:y:2017:i:2/3:p:96-112
Access Statistics for this article
More articles in International Journal of Critical Infrastructures from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().