Abstract
Advancement in technology and the adoption of smart devices in the operation of power grid systems have made it imperative to ensure adequate protection for the cyber-physical power grid system against cyber-attacks. This is because, contemporary cyber-attack landscapes have made devices’ first line of defense (i.e. authentication and authorization) hardly enough to withstand the attacks. To detect these attacks, this paper proposes a detection methodology based on Machine Learning techniques. The dataset used in this experiment was obtained from the synchrophasor measurements of data logs from snort, simulated control panels and relays of a smart power grid transmission system. After the preprocessing of the dataset, it was then scaled and analyzed before the fitting of - Random Forest, Support Vector Machine, Linear Discriminant Analysis and K-Nearest Neighbor algorithms. The fitting of the different classifiers was done in order to find the algorithm with the best output. Upon the completion of the experiment, the results of classifiers were tabulated and the result of the Random Forest model was the most effective with an accuracy of 92% and a significantly low rate of misclassification. The Random Forest model also shows a high percentage of the true positive rate that is critical to the security issue.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Escudero, C., Sicard, F., Zamai, E.: Process-aware model based IDSs for industrial control systems cybersecurity: approaches, limits and further research. In: Emerging Technologies and Factory Automation ETFA, vol. 2018, pp. 605–612 (2018). https://doi.org/10.1109/ETFA.2018.8502585
Pan, S., Morris, T., Adhikari, U.: A specification-based intrusion detection framework for cyber-physical environment in electric power system. Int. J. Netw. Secur. 17(2), 174–188 (2015)
Gilchrist, A.: IoT security issues. Walter de Gruyter GmbH & Co KG (2017)
Dondossola, G., Szanto, J., Masera, M., Fovino, I.N.: Effects of intentional threats to power substation control systems. Int. J. Crit. Infrastructures 4(1–2), 129–143 (2008). https://doi.org/10.1504/IJCIS.2008.016096
Morris, T., et al.: Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators. ACM Int. Conf. Proceeding Ser. (2011). https://doi.org/10.1145/2179298.2179324
Haber, M.J., Haber, M.J.: Privileged Attack Vectors (2020)
Maglaras, L.A., et al.: Cyber security of critical infrastructures.pdf. Elsevier, vol. ICT Expres, pp. 42–45 (2018). https://doi.org/10.1016/j.icte.2018.02.001
Mollus, K., Westhoff, D., Markmann, T.: Curtailing privilege escalation attacks over asynchronous channels on Android. In: 14th Int. Conf. Innov. Community Serv. “Technologies Everyone”, I4CS 2014 - Conf. Proc., pp. 87–94 (2014). https://doi.org/10.1109/I4CS.2014.6860558
Wilhelm, T.: Chapter 10 - Privilege Escalation _ Elsevier Enhanced Reader.pdf. In: Professional Penetration Testing, Elsevier, pp. 271–306 (2013)
Conteh, D.N.Y., Royer, M.D.: The rise in cybercrime and the dynamics of exploiting the human vulnerability factor. Int. J. Comput. 20(1), 12 (2016). https://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/518/374
Events, N., et al.: Power System Attack Datasets - Mississippi State University and Oak Ridge National Laboratory - 4 / 15 / 2014, no. 8, pp. 1–3 (2014)
Mo, Y., et al.: Cyber-physical security of a smart grid infrastructure. Proc. IEEE 100(1), 195–209 (2012). https://doi.org/10.1109/JPROC.2011.2161428
Bakken, D.E., Bose, A., Hauser, C.H., Whitehead, D.E., Zweigle, G.C.: Smart generation and transmission with coherent, real-time data. Proc. IEEE 99(6), 928–951 (2011). https://doi.org/10.1109/JPROC.2011.2116110
Liu, W., Lin, Z., Wen, F., Ledwich, G., Member, S.: A Wide area monitoring system based load restoration method. IEEE Xplore 28(2), 2025–2034 (2013). https://doi.org/10.1109/TPWRS.2013.2249595
Mitchell, R., Chen, I.R.: Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans. Dependable Secur. Comput. 12(1), 16–30 (2015). https://doi.org/10.1109/TDSC.2014.2312327
Park, K., Lin, Y., Metsis, V., Le, Z., Makedon, F.: Abnormal human behavioral pattern detection in assisted living environments. ACM Int. Conf. Proceeding Ser. (2010). https://doi.org/10.1145/1839294.1839305
Faisal, M.A., Aung, Z., Williams, J.R., Sanchez, A.: Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study. IEEE Syst. J. 9(1), 31–44 (2015). https://doi.org/10.1109/JSYST.2013.2294120
Pan, S., Morris, T., Adhikari, U.: Developing a hybrid intrusion detection system using data mining for power systems. IEEE Trans. Smart Grid 6(6), 3104–3113 (2015). https://doi.org/10.1109/TSG.2015.2409775
Aggarwal, C.C.: Outlier analysis, Second Edn., vol. 9781461463. Springer, Heidelberg (2017)
Gaber, T., Tharwat, A., Ibrahim, A., Hassanien, A.: Linear Discriminant Analysis : A Detailed Tutorial. Univ. Salford, Manchester, pp. 0–22 (2017). https://doi.org/10.3233/AIC-170729
Schlkopf, B., Smola, A.J., Bach, F.: Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond. The MIT Press, Cambridge (2018)
Thanh Noi, P., Kappas, M.: Comparison of random forest, k-nearest neighbor, and support vector machine classifiers for land cover classification using Sentinel-2 imagery. Sensors 18(1), 18 (2018)
Van Essen, B., Macaraeg, C., Gokhale, M., Prenger, R.: Accelerating a random forest classifier: multi-core, GP-GPU, or FPGA In: 2012 IEEE 20th International Symposium on Field-Programmable Custom Computing Machines, pp. 232–239 (2012)
Fawcett, T.: An Introduction to ROC Graphs, pp. 861–874 (2005). https://doi.org/10.1016/j.patrec.2005.10.010
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Appendix
Appendix
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Otokwala, U., Petrovski, A., Kalutarage, H. (2021). Effective Detection of Cyber Attack in a Cyber-Physical Power Grid System. In: Arai, K. (eds) Advances in Information and Communication. FICC 2021. Advances in Intelligent Systems and Computing, vol 1363. Springer, Cham. https://doi.org/10.1007/978-3-030-73100-7_57
Download citation
DOI: https://doi.org/10.1007/978-3-030-73100-7_57
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73099-4
Online ISBN: 978-3-030-73100-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)